Project Main Details
2012-05-02 16:17:47 GMT 2012-05-06 15:00:00 (GMT -05:00) Eastern Time (US & Canada) Yes (click here to learn more about ) Closed 0 0 3 direct invitation(s) have been sent by the voice seeker resulting in 0 audition(s) and/or proposal(s) so far. Voice123 SmartCast is seeking 10 auditions and/or proposals for this project (approx.) Invitations sent by SmartCast have resulted in 0 audition(s) and/or proposal(s) so far.
• Audio files must be delivered via FTP/Dropbox/Google Drive/cloud
We live in a complex world with interconnected electronic systems. All types of entities such as Commercial companies, Hospitals, Universities, Airports, Governments, banks and our homes are connected and communicate with each other. This allows us to perform our routine business and personal activities online.
All this is done through electronic devices and advanced networks. The scenario demonstrates the complex environment we live in and risks associated to it, as we connect to the internet & become part of a public network which has millions of users connecting through range of devices. This also exposes our systems to the online world with many new risks.
We generate, store and transmit information on these networks using different electronic devices. These devices also require protection from unwanted users and targeted attacks.
The animation in the scenario shows how fast can a malware spread between different computers and networks, where physical distance is only matter of seconds. A computer infected with a virus in North America, can spread to Asia or Africa in matter of seconds, infecting millions of computers within few hours causing millions in loss as seen previously due to Melisa, Nimda, I love you and Code Red, all these are names of some of the most disastrous malwares.
A successful information security program covering policies, procedures, security awareness and legal agreements can help us protect our information assets.
Sample Slide 2:
Confidential Information is protected by statutes, regulations, Government policies, or contracts. Confidential data may be disclosed to individuals on a need-to-know basis only, and disclosure to external parties should be authorized by executive management.
Information is most critical within organizations and can have severe impact if disclosed leading to financial loses and serious reputation losses or legal implications.
Information is mainly meant for use within the organization with limited people access to it.
Information includes business plans, trade secrets, research or patented information formulas, source code and other information that could seriously impact the organization’s existence.
Confidential information needs to be protected with level of security controls.
Mergers and Acquisitions (M&A)
Risk and Audit Findings
Incidents & Security Assessment Reports
Voice123 Team Comments
This project - phone.
Previous projects - phone.
This project - email or chat.
Previous projects - email or chat.
Corporate web site for this voice-seeker confirmed by Voice123