cybersecurity1

19
Cyber-Security 1 Wicked Design Solutions Lisa Martinez

Upload: lisa-martinez

Post on 09-May-2015

171 views

Category:

Design


0 download

TRANSCRIPT

Page 1: Cybersecurity1

Cyber-Security 1Wicked Design Solutions

Lisa Martinez

Page 2: Cybersecurity1

• Problem • UN Women Law Workgroup Thematic relationships• Thematic 2 Economic • Thematic 3 Social • Thematic 4 Safety

Overview

• 3 Management Capabilities • List the component and sub-types

Generic Components

• Retail • Financial Investment

Perspectives

Table of Contents

2013 @ Copyright WICKED Design Solutions

Page 3: Cybersecurity1

Thematic 2. Economic◦ We must restore a way to guide the reality of the world from the

rationale in a balance with Intuitive. The dimensions around a person The legal and ethical issues

Thematic 3. Social Life ◦ Personal information from a person’s private life are inserted into the

professional persona and used without any regard for the impact Thematic 4. Safety

◦ Criminal threats to a person’s physical safety◦ Physical harm caused by an unknown threat

Problem

2013 @ Copyright WICKED Design Solutions

Page 4: Cybersecurity1

Thematic 2 EconomicUN Women Law Workgroup

2013 @ Copyright WICKED Design Solutions

Page 5: Cybersecurity1

• Employee• Supplier• Customer• Consumer

Party

• Products/Software • ServicesOffer

• Location• Pricing and interest with tax and duty fees• Structure of financingFinancial

Generic Components

2013 @ Copyright WICKED Design Solutions

Page 6: Cybersecurity1

Management Capability◦ Manage the create, read and update with

managed record retention versus delete or purge. Business Activities must be grouped in a series of

Task to ensure due diligence. ◦ ETL – Integration technology must not alter inputs

in backend processes. Transaction Capability

◦ Expense◦ Revenue

Party

2013 @ Copyright WICKED Design Solutions

Page 7: Cybersecurity1

Thematic 3 Social LifeUN Women Law Workgroup

2013 @ Copyright WICKED Design Solutions

Page 8: Cybersecurity1

an education consumer

a driver and insured person

an Employeea healthcare

insured person

an occupant or home owner

A person Consumer Protection

2013 @ Copyright WICKED Design Solutions

Page 9: Cybersecurity1

Any company can collect these details from a number of sources.

Voice of the customer◦ “My fathers name was never used other than k-6th

grade. Can you tell me how my data as a minor was sold to

a search company? I’ve never had an id or anything official using the

name in that name. “

A person protects

Birth Record

Social Security

#

Education

RecordsHealth

Records

Driving and

Insurance Records

Personal Information

2013 @ Copyright WICKED Design Solutions

Page 10: Cybersecurity1

Thematic 4 Safety

2013 @ Copyright WICKED Design Solutions

Page 11: Cybersecurity1

Person

Personal Connections

Job Search

A person with internet Family Needs

2013 @ Copyright WICKED Design Solutions

Page 12: Cybersecurity1

School

Person

Car

Social Networking

Job

Phone

Banking

Personal Identifiable Information

Professional

Networks To get these services

Each assigns an ID

Birth Record

Social Security

#

Education

Records

Health Records

Driving and

Insurance Records

PersonalInformation

2013 @ Copyright WICKED Design Solutions

Page 13: Cybersecurity1

Consumer Privacy - Protect

2013 @ Copyright WICKED Design Solutions

Page 14: Cybersecurity1

2013 @ Copyright WICKED Design Solutions

Perspectives

Page 15: Cybersecurity1

Stakeholder Perspectives

Organization to OrganizationCurrent State

Employee 1 per organization Networked Future State

MFG

•Customer•Broker and

Dealer

Broker and Dealer

•Customer •Finance

Company

Finance Company

•Consumer Customer

•Supplier Broker and Dealership

MFG

•Customer•Broker and

Dealer

Broker and Dealer

•Customer •Finance

Company

Finance Company

•Consumer Customer

•Supplier Broker and Dealership

2+2+2=6 3+1=4

2013 @ Copyright WICKED Design Solutions

Page 16: Cybersecurity1

Variance +2 Captures of Personal InformationLess risk to an error in releasing my detailsLess power in transporting mine and others

between organizations

6 4 2

2013 @ Copyright WICKED Design Solutions

Page 17: Cybersecurity1

Employee

MFG

DealerBroker

Financial Investmen

t

Retail with Credit

2013 @ Copyright WICKED Design Solutions

Page 18: Cybersecurity1

The Thing

Manufacturerbuilds a thing

Dealership or Broker

Acquires the Things from

MFG

A consumer buys or

commits to finance a

things

A finance company

invest in the thing for the

consumer

Perspectives

2013 @ Copyright WICKED Design Solutions

Page 19: Cybersecurity1

Private Industry• Localization – any geography

• For a profit indicates several things around tax and reporting to the Security Exchange Commission.

Anywhere in the world we have things organizations sell in the private sector.

Anywhere in the world a consumer may purchase with cash or credit.

A finance company may make an investment in a legal binding relationship with the consumer who becomes the finance companies customer.

2013 @ Copyright WICKED Design Solutions