SlideShare a Scribd company logo
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios
Why the CLOUD for CMA’s 
archival repository?
Artwork Photography
Digital Assets
Benefits 
• no in-house hardware/maintenance 
expenses, no hardware replacement 
• proven expertise in administering 
enormous disk allocations 
• follows archival best practices 
for out-of-region redundancy
Performance 
Speed?
Issues / Worries 
• viability / life span of virtual data center company 
• physical security of virtual data center 
• best practices / operational procedures 
of virtual data center 
• remote access speed / file transfer performance 
• possible effects of hardware compression 
on archival file integrity 
• long-term expense 
– virtual data center services 
– transport charges
Solutions
WViroturall dDa-tcal Caesnste Lr oonc saalm Ce lISoPu trdunk 
Virtual data center 
• annual SSAE SOC2 Type 2 
audits 
• provide cloud services to 
Homeland Security and 
other gov’t agencies
Full Redundancy 
establish point-to-point 
connection 
through shared ISP
$$$$$$$$
significant gift-in-kind donation 
Partnership
5 years = $600,000+
Why we changed to iBeacons 
for the 
Near You Now function of ArtLens
How does 
Near You Now 
know where you 
Why we are using iBeacons 
for are? 
Near You Now function 
of ArtLens
The Near You Now portion of the ArtLens 
app uses a technology called iBeacon to 
locate a visitors location in the Museum.
iBeacon uses Bluetooth low-energy (BLE) 
wireless technology that was developed by 
Apple. Using a series of small Bluetooth 
transmitters Apps installed on the mobile device 
listen out for the signal transmitted by these 
beacons and respond accordingly when the 
device comes into range. 
iBeacon technology is compatible with mobile 
devices from Apple running iOS7 and Android 
running 4.3 and above.
What does an iBeacon look like?
CMA’s implementation of iBeacon 
In addition to the iBeacon hardware nodes a backend 
software system is needed to manage and provide location 
data to apps running on the mobile device. 
CMA is using Navizon to power its backend portion of 
iBeacon. 
Navizon’ s location system supports multiple ways to locate 
a visitors location within the Museum. In addition to 
iBeacon Navizon can also determine a users location using 
the accelerometer within the mobile device along with Wi-Fi 
triangulation.
Where are the iBeacon’s located?
Where are the iBeacon’s located?
How are the iBeacon’s ? 
Since the iBeacon nodes are very compact and 
require very little power CMA was easily able to 
use multiple ways to discretely install.
How are the iBeacon’s configured? 
The iBeacon nodes arrived preconfigured. 
Once installed a training process was 
conducted through out the areas of the 
Museum where the nodes were installed. This 
training process collects what is know as the 
“Fingerprint”. This fingerprint contains the 
signal strength of the iBeacons in proximity to 
the mobile device being use to train the system. 
This data is then uploaded to the Navizon ITS 
server.
How where the fingerprints 
collected? 
When Navizon arrived onsite 
they had mapped out routes in 
advance throughout the 
Museum to ensure optimal 
accuracy.
What is involved to integrated 
Navizon into ArtLens App? 
Navizon provides a Software Developer Kit 
(SDK) for both iOS and Android based mobile 
devices. 
Using this SDK an App can query the Navizon 
server for the mobile devices current location 
within the Museum based on its current 
proximity to the iBeacon nodes.
What is involved … 
For the ArtLens app a database of location 
information based on the Museum floor plan 
was created. ArtLens then takes the 
information returned from the Navizon 
server and matches it to this database. 
ArtLens then provides the gallery content to 
the visitor based on the appropriate location 
match.
How do I managing ever-increasing 
challenge of IT risks?
32 CSTMC CN Collection CN000994
33 
Risk 
Impact x Likelihood = Risk
34 
Risk 
LIKELIHOOD 
IMPACT High Medium Low 
Seldom/ 
never 
Major High High Moderate Low 
Significant High Moderate Moderate Low 
Minor Moderate Moderate Low Negligible 
Negligible Moderate Low Low Negligible 
Based on BC Museums Best Practices Module – Risk Management, 2005 (modified)
Risk Assessment 
Threat > Impact x Likelihood = Risk > Safeguards > Residual Risk 
35 
Define IT security 
requirements 
Risk that remains 
after safeguards 
are implemented 
Potential act or 
event that could 
cause loss
Threat and Risk Assessment / Certification 
& Accreditation Steps 
36 
Identify and 
Categorize 
Assets 
Threat and 
Risk 
Assessment 
Implement Certify Accredit 
How critical? 
How sensitive? 
Identify 
safeguards, 
IT security 
requirements 
Implement 
safeguards 
Confirm 
whether 
safeguards are 
implemented 
Accept 
residual 
risk 
Project 
Team 
Project 
Team 
Project 
Team 
IT Security 
Coordinator 
Management
37
What does PCI Compliance means 
for museums?
Isn’t Peripheral (graphic, 
Modem, and sound cards)
It means “Payment Card Industry” 
I'm a museum…who cares!
What is PCI? 
The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements 
designed to ensure that ALL companies that process, store or transmit credit card 
information maintain a secure environment. 
To whom does PCI apply? 
• PCI applies to ALL organizations or merchants (yes, museum), regardless of size or 
number of transactions, that accepts, transmits or stores any cardholder data. 
If I only accept credit cards over the phone, does PCI still apply to me? 
• Yes. All business that store, process or transmit payment cardholder data must be 
PCI Compliant. 
Do organizations using third-party processors have to be PCI compliant? 
• Yes. Merely using a third-party company does not exclude a company from PCI 
compliance.
DOs & DON’Ts 
DOs 
• Do regularly monitor and test networks/systems 
• Do implement and enforce a company Information Security 
Policy. 
• Do install and keep up-to-date, a firewall that protects 
cardholder data stored within company systems. 
• Do assign every employee with computer access a unique ID 
and use a robust password (e.g., mix of letters, numbers, and 
symbols), which is changed frequently (every 45-60 days). 
• Do restrict physical access to company systems and records 
with cardholder data to only those employees with a business 
“need-to-know.” 
• Do encrypt cardholder data if transmitting it over wireless or 
open, public networks. 
• Do use and regularly update anti-virus software. 
• Do have secure company systems and applications 
• Do ensure any e-commerce payment solutions are tested to 
prevent programming vulnerabilities like SQL injection. 
• Do use a Payment Application Data Security Standard (PA-DSS) 
compliant payment application listed on the PCI Security 
Standards Council website at 
https://www.pcisecuritystandards.org 
• Do verify that any third party service provider you use who 
handles cardholder data has validated PCI DSS compliance by 
visiting the PCI Security Standards Council website. 
DON’Ts 
Don't store magnetic stripe cardholder data or the CVV or CVC code 
(the additional security number on the back of credit cards) after 
authorization. 
Don't use vendor-supplied or default system passwords or 
common/weak passwords. 
Don't store cardholder data in any systems in clear text (i.e., 
unencrypted). 
Don't leave remote access applications in an "always on" mode.
How do I control unauthorized 
IT systems and services
44
45 CSTMC CN Collection CN009587
46 
CSTMC CN Collection CN002603
What is the best password 
policy for museums?
Role of passwords 
• The role of a password is to prevent 
unauthorized access to data just as a key 
prevents unauthorized access to a house or 
apartment. 
• A password should be guarded with the same 
care as the key to a house or apartment. 
• The hardest part of choosing a password is 
making it difficult for others to guess but easy for 
you to remember. Writing down passwords your 
password should be avoided. 
• Because of its name, many assume that a 
password should be based off of a "word"
Passphrase 
What is a passphrase? 
• A passphrase is simply a different way of thinking about a much 
longer password. Dictionary words and names are no longer 
restricted. In fact, one of the very few restrictions is the length - 16 
characters 
Almost anything goes 
• The restrictions of numbers and/or symbols in certain places in your 
password are gone. 
Long and …Length is your friend 
• Passphrases can be simple short sentences of five or six words 
with spaces, using natural language. Since you type emails and 
such every day, typing in natural language shouldn't be anything 
new. 
A happy medium 
• Passphrases bring into balance the trade-off between hard to 
remember but much more secure passwords, and easy to 
remember but much less secure passwords.
Password or Passphrase, user hate it all.
What are some passphrase examples? 
Choosing a strong passphrase 
In general terms, the aim should be to create a passphrase that is easy to remember and to type when needed. 
• very hard for anyone else to guess, even for someone who knows you well. 
• It should also be long enough to make any dictionary attack or brute-force attack impractical. 
• Fireworks of Glass is a masterpiece (493 quattuordecillion years) 
• Power of Children is my favorite! (54 quattuordecillion years) 
• Carousel Wishes and Dreams (10 nonillion years) 
• Children's Museum is #1 (30 octillion years)
How strong is my password vs. 
passphrase? 
Current password: Mus3um! (1 hour) New: ”bucky the teenage t. rex” (24 Char) 
37 sextillion years to crack your password 
VS. 
https://howsecureismypassword.net
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios
Thank You 
Jane Alexander @janecalexander 
Brian Dawson @braindawson 
Yvel Guelce @yguelce

More Related Content

PDF
Information Security Management Education Program - Concept Document
PDF
Incident Response Requires Superhumans
PPTX
Your cyber security webinar
PPTX
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
PDF
Setting up CSIRT
PDF
CSIRT_16_Jun
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
PDF
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Information Security Management Education Program - Concept Document
Incident Response Requires Superhumans
Your cyber security webinar
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
Setting up CSIRT
CSIRT_16_Jun
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...

What's hot (20)

PDF
Information Security It's All About Compliance
PDF
Day 1 Enisa Setting Up A Csirt
PPT
Compliance Awareness
PPTX
Cyber Security Professionals Viewed via Supply Chain
PDF
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
PPTX
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
PDF
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
PPTX
Keynote at the Cyber Security Summit Prague 2015
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PDF
Cyber Security Strategies and Approaches
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
PDF
Event Presentation: Cyber Security for Industrial Control Systems
PDF
Shift Toward Dynamic Cyber Resilience
PPTX
Your cyber security webinar
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
PPTX
It and-cyber-module-2
PDF
Why Executives Underinvest In Cybersecurity
PDF
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Information Security It's All About Compliance
Day 1 Enisa Setting Up A Csirt
Compliance Awareness
Cyber Security Professionals Viewed via Supply Chain
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
Advanced Persistent Threat - Evaluating Effective Responses
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
Gary Leatherman - A Holistic Approach for Reimagining Cyber Defense
Keynote at the Cyber Security Summit Prague 2015
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Security Strategies and Approaches
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Event Presentation: Cyber Security for Industrial Control Systems
Shift Toward Dynamic Cyber Resilience
Your cyber security webinar
Energy Industry Organizational Strategies to Increase Cyber Resiliency
It and-cyber-module-2
Why Executives Underinvest In Cybersecurity
Marcel van der Heijden - SpeedInvest & Aircloak - EU GDPR & Data Privacy Comp...
Ad

Viewers also liked (20)

PDF
Practical approach to security risk management
PPT
Review of Enterprise Security Risk Management
PPTX
Cissp- Security and Risk Management
PDF
IT Security & Risk Management
PPT
Five Golden Rules
DOCX
The Significance of IT Security Management & Risk Assessment
PPTX
Risk Management and Security in Strategic Planning
PPSX
Journey Management and Safely Driving Procedure
PDF
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
PDF
Evolution of Security Management
PDF
Rapid Risk Assessment: A New Approach to Risk Management
PPTX
Vi Minh Toại - Security Risk Management, tough path to success
PDF
European Trends in Travel Risk Management 2015
PDF
CISSP Prep: Ch 3. Asset Security
PDF
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
PPS
Securities Market
PPTX
Securities market
PDF
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
PDF
The importance of information security risk management
PDF
Risk assessment principles and guidelines
Practical approach to security risk management
Review of Enterprise Security Risk Management
Cissp- Security and Risk Management
IT Security & Risk Management
Five Golden Rules
The Significance of IT Security Management & Risk Assessment
Risk Management and Security in Strategic Planning
Journey Management and Safely Driving Procedure
Security Risk Management: ovvero come mitigare e gestire i rischi dei dati at...
Evolution of Security Management
Rapid Risk Assessment: A New Approach to Risk Management
Vi Minh Toại - Security Risk Management, tough path to success
European Trends in Travel Risk Management 2015
CISSP Prep: Ch 3. Asset Security
CISSP Prep: Ch 2. Security and Risk Management I (part 2)
Securities Market
Securities market
Hazard Identification, Risk Assessment and Risk Control (HIRARC) Malay version
The importance of information security risk management
Risk assessment principles and guidelines
Ad

Similar to #MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios (20)

PPT
Protecting Your Data in the Cloud - CSO - Conference 2011
PDF
2. Asset Security
PDF
CNIT 125 Ch 3. Asset Security
PDF
Credit card frauds in hospitality
PDF
What You Need To Know About The New PCI Cloud Guidelines
PDF
CyberLink MediaShow 5
PDF
Cyber Security and Data Privacy - presentation
PDF
What is Security, anyway? Software architecture for information security part...
PDF
PCI DSS for Pentesting
PPTX
PCI DSS Conference in London UK 2011
PPTX
PCI Compliance (for developers)
PDF
ISSA: Cloud data security
PDF
Fu3111411144
PDF
TISA Pro-Talk_1-2554-K.Sommai_pci-dss
PPTX
PCI DSS for Penetration Testing
DOCX
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
PPTX
Chapter 5
PDF
Software Technical Design for Information Security: A short intro for Tech Le...
PDF
04812167
PPTX
Securing data today and in the future - Oracle NYC
Protecting Your Data in the Cloud - CSO - Conference 2011
2. Asset Security
CNIT 125 Ch 3. Asset Security
Credit card frauds in hospitality
What You Need To Know About The New PCI Cloud Guidelines
CyberLink MediaShow 5
Cyber Security and Data Privacy - presentation
What is Security, anyway? Software architecture for information security part...
PCI DSS for Pentesting
PCI DSS Conference in London UK 2011
PCI Compliance (for developers)
ISSA: Cloud data security
Fu3111411144
TISA Pro-Talk_1-2554-K.Sommai_pci-dss
PCI DSS for Penetration Testing
Study notes for CompTIA Certified Advanced Security Practitioner (ver2)
Chapter 5
Software Technical Design for Information Security: A short intro for Tech Le...
04812167
Securing data today and in the future - Oracle NYC

More from Jane Alexander (20)

PPTX
Defining the Museum of the Future: Revealing Krishna
PPTX
AAM2020: Digital Engagement through Open Access in the time of Quarantine
PPTX
Iteration Made our Back End a Star!
PPTX
MW20: Big Data and the Visitor Journey, Using Data Science to Understand the ...
PDF
Play With Data: OpenGLAM Now 11/20/2019
PDF
Digitization, Big Data, and the Visitor Journey
PDF
ARTLENS Gallery: Designing Meaningful, Barrier-Free Digital Experiences
PPTX
MCN 2017 Diverse Strategies for Managing Digital Experience
PPTX
Premier CIO Forum 2017 ArtLens Exhibition
PPTX
Free to Move, Create, Engage: ArtLens, Gallery One, and Studio Play at CMA
PPTX
Not all Screen Time is Created Equal: Developing interactives that transcend ...
PDF
Invisible Architectures - Supporting Public-Facing Technologies
PDF
Getting $*it Done: Implementing Your Digital Strategy (MCN2015)
PDF
#MCN2014 - What Are Your Visitors Really Telling You? Data Analytics and Wha...
PPTX
Mw2014 art-in-the-clouds
PPTX
Moving Ground Zero: Implementing Digital Strategy at the Cleveland Museum of Art
PPTX
MW2014 - Gallery One, The First Year: Sustainability, Evaluation Process,
PPTX
Panel Discussion, The Future of the Museum: Technology
PPTX
MCN 2013 - Big-Picture Strategy for Collection-Information Technology Project...
PPTX
NEOSA - CIO Symposium 2013 - LEADING EDGE INNOVATIONS FROM LOCAL COMPANIES - ...
Defining the Museum of the Future: Revealing Krishna
AAM2020: Digital Engagement through Open Access in the time of Quarantine
Iteration Made our Back End a Star!
MW20: Big Data and the Visitor Journey, Using Data Science to Understand the ...
Play With Data: OpenGLAM Now 11/20/2019
Digitization, Big Data, and the Visitor Journey
ARTLENS Gallery: Designing Meaningful, Barrier-Free Digital Experiences
MCN 2017 Diverse Strategies for Managing Digital Experience
Premier CIO Forum 2017 ArtLens Exhibition
Free to Move, Create, Engage: ArtLens, Gallery One, and Studio Play at CMA
Not all Screen Time is Created Equal: Developing interactives that transcend ...
Invisible Architectures - Supporting Public-Facing Technologies
Getting $*it Done: Implementing Your Digital Strategy (MCN2015)
#MCN2014 - What Are Your Visitors Really Telling You? Data Analytics and Wha...
Mw2014 art-in-the-clouds
Moving Ground Zero: Implementing Digital Strategy at the Cleveland Museum of Art
MW2014 - Gallery One, The First Year: Sustainability, Evaluation Process,
Panel Discussion, The Future of the Museum: Technology
MCN 2013 - Big-Picture Strategy for Collection-Information Technology Project...
NEOSA - CIO Symposium 2013 - LEADING EDGE INNOVATIONS FROM LOCAL COMPANIES - ...

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...

#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-Win Scenarios

  • 6. Why the CLOUD for CMA’s archival repository?
  • 9. Benefits • no in-house hardware/maintenance expenses, no hardware replacement • proven expertise in administering enormous disk allocations • follows archival best practices for out-of-region redundancy
  • 11. Issues / Worries • viability / life span of virtual data center company • physical security of virtual data center • best practices / operational procedures of virtual data center • remote access speed / file transfer performance • possible effects of hardware compression on archival file integrity • long-term expense – virtual data center services – transport charges
  • 13. WViroturall dDa-tcal Caesnste Lr oonc saalm Ce lISoPu trdunk Virtual data center • annual SSAE SOC2 Type 2 audits • provide cloud services to Homeland Security and other gov’t agencies
  • 14. Full Redundancy establish point-to-point connection through shared ISP
  • 17. 5 years = $600,000+
  • 18. Why we changed to iBeacons for the Near You Now function of ArtLens
  • 19. How does Near You Now know where you Why we are using iBeacons for are? Near You Now function of ArtLens
  • 20. The Near You Now portion of the ArtLens app uses a technology called iBeacon to locate a visitors location in the Museum.
  • 21. iBeacon uses Bluetooth low-energy (BLE) wireless technology that was developed by Apple. Using a series of small Bluetooth transmitters Apps installed on the mobile device listen out for the signal transmitted by these beacons and respond accordingly when the device comes into range. iBeacon technology is compatible with mobile devices from Apple running iOS7 and Android running 4.3 and above.
  • 22. What does an iBeacon look like?
  • 23. CMA’s implementation of iBeacon In addition to the iBeacon hardware nodes a backend software system is needed to manage and provide location data to apps running on the mobile device. CMA is using Navizon to power its backend portion of iBeacon. Navizon’ s location system supports multiple ways to locate a visitors location within the Museum. In addition to iBeacon Navizon can also determine a users location using the accelerometer within the mobile device along with Wi-Fi triangulation.
  • 24. Where are the iBeacon’s located?
  • 25. Where are the iBeacon’s located?
  • 26. How are the iBeacon’s ? Since the iBeacon nodes are very compact and require very little power CMA was easily able to use multiple ways to discretely install.
  • 27. How are the iBeacon’s configured? The iBeacon nodes arrived preconfigured. Once installed a training process was conducted through out the areas of the Museum where the nodes were installed. This training process collects what is know as the “Fingerprint”. This fingerprint contains the signal strength of the iBeacons in proximity to the mobile device being use to train the system. This data is then uploaded to the Navizon ITS server.
  • 28. How where the fingerprints collected? When Navizon arrived onsite they had mapped out routes in advance throughout the Museum to ensure optimal accuracy.
  • 29. What is involved to integrated Navizon into ArtLens App? Navizon provides a Software Developer Kit (SDK) for both iOS and Android based mobile devices. Using this SDK an App can query the Navizon server for the mobile devices current location within the Museum based on its current proximity to the iBeacon nodes.
  • 30. What is involved … For the ArtLens app a database of location information based on the Museum floor plan was created. ArtLens then takes the information returned from the Navizon server and matches it to this database. ArtLens then provides the gallery content to the visitor based on the appropriate location match.
  • 31. How do I managing ever-increasing challenge of IT risks?
  • 32. 32 CSTMC CN Collection CN000994
  • 33. 33 Risk Impact x Likelihood = Risk
  • 34. 34 Risk LIKELIHOOD IMPACT High Medium Low Seldom/ never Major High High Moderate Low Significant High Moderate Moderate Low Minor Moderate Moderate Low Negligible Negligible Moderate Low Low Negligible Based on BC Museums Best Practices Module – Risk Management, 2005 (modified)
  • 35. Risk Assessment Threat > Impact x Likelihood = Risk > Safeguards > Residual Risk 35 Define IT security requirements Risk that remains after safeguards are implemented Potential act or event that could cause loss
  • 36. Threat and Risk Assessment / Certification & Accreditation Steps 36 Identify and Categorize Assets Threat and Risk Assessment Implement Certify Accredit How critical? How sensitive? Identify safeguards, IT security requirements Implement safeguards Confirm whether safeguards are implemented Accept residual risk Project Team Project Team Project Team IT Security Coordinator Management
  • 37. 37
  • 38. What does PCI Compliance means for museums?
  • 39. Isn’t Peripheral (graphic, Modem, and sound cards)
  • 40. It means “Payment Card Industry” I'm a museum…who cares!
  • 41. What is PCI? The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information maintain a secure environment. To whom does PCI apply? • PCI applies to ALL organizations or merchants (yes, museum), regardless of size or number of transactions, that accepts, transmits or stores any cardholder data. If I only accept credit cards over the phone, does PCI still apply to me? • Yes. All business that store, process or transmit payment cardholder data must be PCI Compliant. Do organizations using third-party processors have to be PCI compliant? • Yes. Merely using a third-party company does not exclude a company from PCI compliance.
  • 42. DOs & DON’Ts DOs • Do regularly monitor and test networks/systems • Do implement and enforce a company Information Security Policy. • Do install and keep up-to-date, a firewall that protects cardholder data stored within company systems. • Do assign every employee with computer access a unique ID and use a robust password (e.g., mix of letters, numbers, and symbols), which is changed frequently (every 45-60 days). • Do restrict physical access to company systems and records with cardholder data to only those employees with a business “need-to-know.” • Do encrypt cardholder data if transmitting it over wireless or open, public networks. • Do use and regularly update anti-virus software. • Do have secure company systems and applications • Do ensure any e-commerce payment solutions are tested to prevent programming vulnerabilities like SQL injection. • Do use a Payment Application Data Security Standard (PA-DSS) compliant payment application listed on the PCI Security Standards Council website at https://www.pcisecuritystandards.org • Do verify that any third party service provider you use who handles cardholder data has validated PCI DSS compliance by visiting the PCI Security Standards Council website. DON’Ts Don't store magnetic stripe cardholder data or the CVV or CVC code (the additional security number on the back of credit cards) after authorization. Don't use vendor-supplied or default system passwords or common/weak passwords. Don't store cardholder data in any systems in clear text (i.e., unencrypted). Don't leave remote access applications in an "always on" mode.
  • 43. How do I control unauthorized IT systems and services
  • 44. 44
  • 45. 45 CSTMC CN Collection CN009587
  • 46. 46 CSTMC CN Collection CN002603
  • 47. What is the best password policy for museums?
  • 48. Role of passwords • The role of a password is to prevent unauthorized access to data just as a key prevents unauthorized access to a house or apartment. • A password should be guarded with the same care as the key to a house or apartment. • The hardest part of choosing a password is making it difficult for others to guess but easy for you to remember. Writing down passwords your password should be avoided. • Because of its name, many assume that a password should be based off of a "word"
  • 49. Passphrase What is a passphrase? • A passphrase is simply a different way of thinking about a much longer password. Dictionary words and names are no longer restricted. In fact, one of the very few restrictions is the length - 16 characters Almost anything goes • The restrictions of numbers and/or symbols in certain places in your password are gone. Long and …Length is your friend • Passphrases can be simple short sentences of five or six words with spaces, using natural language. Since you type emails and such every day, typing in natural language shouldn't be anything new. A happy medium • Passphrases bring into balance the trade-off between hard to remember but much more secure passwords, and easy to remember but much less secure passwords.
  • 50. Password or Passphrase, user hate it all.
  • 51. What are some passphrase examples? Choosing a strong passphrase In general terms, the aim should be to create a passphrase that is easy to remember and to type when needed. • very hard for anyone else to guess, even for someone who knows you well. • It should also be long enough to make any dictionary attack or brute-force attack impractical. • Fireworks of Glass is a masterpiece (493 quattuordecillion years) • Power of Children is my favorite! (54 quattuordecillion years) • Carousel Wishes and Dreams (10 nonillion years) • Children's Museum is #1 (30 octillion years)
  • 52. How strong is my password vs. passphrase? Current password: Mus3um! (1 hour) New: ”bucky the teenage t. rex” (24 Char) 37 sextillion years to crack your password VS. https://howsecureismypassword.net
  • 54. Thank You Jane Alexander @janecalexander Brian Dawson @braindawson Yvel Guelce @yguelce