id sid tid token lemma pos cord-023944-pufcn56j 1 1 key key NN cord-023944-pufcn56j 1 2 : : : cord-023944-pufcn56j 2 1 cord-023944-pufcn56j cord-023944-pufcn56j XX cord-023944-pufcn56j 3 1 authors author NNS cord-023944-pufcn56j 3 2 : : : cord-023944-pufcn56j 3 3 Fibikova Fibikova NNP cord-023944-pufcn56j 3 4 , , , cord-023944-pufcn56j 3 5 Lenka Lenka NNP cord-023944-pufcn56j 3 6 ; ; : cord-023944-pufcn56j 3 7 Mueller Mueller NNP cord-023944-pufcn56j 3 8 , , , cord-023944-pufcn56j 3 9 Roland Roland NNP cord-023944-pufcn56j 3 10 title title NN cord-023944-pufcn56j 3 11 : : : cord-023944-pufcn56j 3 12 Threats threat NNS cord-023944-pufcn56j 3 13 , , , cord-023944-pufcn56j 3 14 Risks risk NNS cord-023944-pufcn56j 3 15 and and CC cord-023944-pufcn56j 3 16 the the DT cord-023944-pufcn56j 3 17 Derived derive VBN cord-023944-pufcn56j 3 18 Information Information NNP cord-023944-pufcn56j 3 19 Security Security NNP cord-023944-pufcn56j 3 20 Strategy Strategy NNP cord-023944-pufcn56j 3 21 date date NN cord-023944-pufcn56j 3 22 : : : cord-023944-pufcn56j 3 23 2012 2012 CD cord-023944-pufcn56j 3 24 - - HYPH cord-023944-pufcn56j 3 25 06 06 CD cord-023944-pufcn56j 3 26 - - HYPH cord-023944-pufcn56j 3 27 04 04 CD cord-023944-pufcn56j 3 28 journal journal NN cord-023944-pufcn56j 3 29 : : : cord-023944-pufcn56j 4 1 ISSE ISSE NNP cord-023944-pufcn56j 4 2 2012 2012 CD cord-023944-pufcn56j 5 1 Securing secure VBG cord-023944-pufcn56j 5 2 Electronic Electronic NNP cord-023944-pufcn56j 5 3 Business Business NNP cord-023944-pufcn56j 5 4 Processes Processes NNPS cord-023944-pufcn56j 5 5 DOI DOI NNP cord-023944-pufcn56j 6 1 : : : cord-023944-pufcn56j 6 2 10.1007/978 10.1007/978 LS cord-023944-pufcn56j 6 3 - - HYPH cord-023944-pufcn56j 6 4 3 3 CD cord-023944-pufcn56j 6 5 - - HYPH cord-023944-pufcn56j 6 6 658 658 CD cord-023944-pufcn56j 6 7 - - HYPH cord-023944-pufcn56j 6 8 00333 00333 CD cord-023944-pufcn56j 6 9 - - SYM cord-023944-pufcn56j 6 10 3_2 3_2 CD cord-023944-pufcn56j 6 11 sha sha NNP cord-023944-pufcn56j 6 12 : : : cord-023944-pufcn56j 7 1 ab9991bf8de039cf473f9cd82f6afafa75773d7e ab9991bf8de039cf473f9cd82f6afafa75773d7e NNP cord-023944-pufcn56j 7 2 doc_id doc_id CD cord-023944-pufcn56j 7 3 : : : cord-023944-pufcn56j 7 4 23944 23944 CD cord-023944-pufcn56j 7 5 cord_uid cord_uid NNS cord-023944-pufcn56j 7 6 : : : cord-023944-pufcn56j 8 1 pufcn56j pufcn56j NNP cord-023944-pufcn56j 9 1 This this DT cord-023944-pufcn56j 9 2 article article NN cord-023944-pufcn56j 9 3 concentrates concentrate VBZ cord-023944-pufcn56j 9 4 on on IN cord-023944-pufcn56j 9 5 the the DT cord-023944-pufcn56j 9 6 development development NN cord-023944-pufcn56j 9 7 of of IN cord-023944-pufcn56j 9 8 an an DT cord-023944-pufcn56j 9 9 information information NN cord-023944-pufcn56j 9 10 security security NN cord-023944-pufcn56j 9 11 strategy strategy NN cord-023944-pufcn56j 9 12 . . . cord-023944-pufcn56j 10 1 An an DT cord-023944-pufcn56j 10 2 information information NN cord-023944-pufcn56j 10 3 security security NN cord-023944-pufcn56j 10 4 strategy strategy NN cord-023944-pufcn56j 10 5 needs need VBZ cord-023944-pufcn56j 10 6 to to TO cord-023944-pufcn56j 10 7 focus focus VB cord-023944-pufcn56j 10 8 on on IN cord-023944-pufcn56j 10 9 an an DT cord-023944-pufcn56j 10 10 overall overall JJ cord-023944-pufcn56j 10 11 objective objective NN cord-023944-pufcn56j 10 12 , , , cord-023944-pufcn56j 10 13 usually usually RB cord-023944-pufcn56j 10 14 the the DT cord-023944-pufcn56j 10 15 objectives objective NNS cord-023944-pufcn56j 10 16 laid lay VBN cord-023944-pufcn56j 10 17 out out RP cord-023944-pufcn56j 10 18 in in IN cord-023944-pufcn56j 10 19 an an DT cord-023944-pufcn56j 10 20 organization organization NN cord-023944-pufcn56j 10 21 ’s ’s POS cord-023944-pufcn56j 10 22 business business NN cord-023944-pufcn56j 10 23 strategy strategy NN cord-023944-pufcn56j 10 24 and and CC cord-023944-pufcn56j 10 25 its -PRON- PRP$ cord-023944-pufcn56j 10 26 derived derive VBN cord-023944-pufcn56j 10 27 information information NN cord-023944-pufcn56j 10 28 technology technology NN cord-023944-pufcn56j 10 29 strategy strategy NN cord-023944-pufcn56j 10 30 , , , cord-023944-pufcn56j 10 31 where where WRB cord-023944-pufcn56j 10 32 it -PRON- PRP cord-023944-pufcn56j 10 33 takes take VBZ cord-023944-pufcn56j 10 34 the the DT cord-023944-pufcn56j 10 35 status status NN cord-023944-pufcn56j 10 36 quo quo NN cord-023944-pufcn56j 10 37 and and CC cord-023944-pufcn56j 10 38 reflects reflect VBZ cord-023944-pufcn56j 10 39 the the DT cord-023944-pufcn56j 10 40 main main JJ cord-023944-pufcn56j 10 41 objectives objective NNS cord-023944-pufcn56j 10 42 derived derive VBN cord-023944-pufcn56j 10 43 and and CC cord-023944-pufcn56j 10 44 postulates postulate VBZ cord-023944-pufcn56j 10 45 how how WRB cord-023944-pufcn56j 10 46 and and CC cord-023944-pufcn56j 10 47 when when WRB cord-023944-pufcn56j 10 48 to to TO cord-023944-pufcn56j 10 49 close close VB cord-023944-pufcn56j 10 50 the the DT cord-023944-pufcn56j 10 51 identified identify VBN cord-023944-pufcn56j 10 52 gaps gap NNS cord-023944-pufcn56j 10 53 . . . cord-023944-pufcn56j 11 1 This this DT cord-023944-pufcn56j 11 2 strategy strategy NN cord-023944-pufcn56j 11 3 approach approach NN cord-023944-pufcn56j 11 4 for for IN cord-023944-pufcn56j 11 5 improving improve VBG cord-023944-pufcn56j 11 6 information information NN cord-023944-pufcn56j 11 7 security security NN cord-023944-pufcn56j 11 8 is be VBZ cord-023944-pufcn56j 11 9 intended intend VBN cord-023944-pufcn56j 11 10 for for IN cord-023944-pufcn56j 11 11 an an DT cord-023944-pufcn56j 11 12 organization organization NN cord-023944-pufcn56j 11 13 which which WDT cord-023944-pufcn56j 11 14 supports support VBZ cord-023944-pufcn56j 11 15 an an DT cord-023944-pufcn56j 11 16 automotive automotive JJ cord-023944-pufcn56j 11 17 and and CC cord-023944-pufcn56j 11 18 captive captive JJ cord-023944-pufcn56j 11 19 finance finance NN cord-023944-pufcn56j 11 20 enterprise enterprise NN cord-023944-pufcn56j 11 21 but but CC cord-023944-pufcn56j 11 22 is be VBZ cord-023944-pufcn56j 11 23 not not RB cord-023944-pufcn56j 11 24 restricted restrict VBN cord-023944-pufcn56j 11 25 to to IN cord-023944-pufcn56j 11 26 this this DT cord-023944-pufcn56j 11 27 . . . cord-023944-pufcn56j 12 1 The the DT cord-023944-pufcn56j 12 2 approach approach NN cord-023944-pufcn56j 12 3 is be VBZ cord-023944-pufcn56j 12 4 aligned align VBN cord-023944-pufcn56j 12 5 to to IN cord-023944-pufcn56j 12 6 the the DT cord-023944-pufcn56j 12 7 scope scope NN cord-023944-pufcn56j 12 8 of of IN cord-023944-pufcn56j 12 9 ISO iso NN cord-023944-pufcn56j 12 10 270002 270002 CD cord-023944-pufcn56j 13 1 “ " `` cord-023944-pufcn56j 13 2 Code Code NNP cord-023944-pufcn56j 13 3 of of IN cord-023944-pufcn56j 13 4 Practice Practice NNP cord-023944-pufcn56j 13 5 for for IN cord-023944-pufcn56j 13 6 an an DT cord-023944-pufcn56j 13 7 Information Information NNP cord-023944-pufcn56j 13 8 Security Security NNP cord-023944-pufcn56j 13 9 Management Management NNP cord-023944-pufcn56j 13 10 System System NNP cord-023944-pufcn56j 13 11 ” " '' cord-023944-pufcn56j 13 12 [ [ -LRB- cord-023944-pufcn56j 13 13 ISO05 ISO05 NNP cord-023944-pufcn56j 13 14 ] ] -RRB- cord-023944-pufcn56j 13 15 . . . cord-023944-pufcn56j 14 1 However however RB cord-023944-pufcn56j 14 2 , , , cord-023944-pufcn56j 14 3 compliance compliance NN cord-023944-pufcn56j 14 4 is be VBZ cord-023944-pufcn56j 14 5 left leave VBN cord-023944-pufcn56j 14 6 out out IN cord-023944-pufcn56j 14 7 of of IN cord-023944-pufcn56j 14 8 the the DT cord-023944-pufcn56j 14 9 scope scope NN cord-023944-pufcn56j 14 10 . . . cord-023944-pufcn56j 15 1 The the DT cord-023944-pufcn56j 15 2 strategy strategy NN cord-023944-pufcn56j 15 3 concentrates concentrate VBZ cord-023944-pufcn56j 15 4 on on IN cord-023944-pufcn56j 15 5 four four CD cord-023944-pufcn56j 15 6 areas area NNS cord-023944-pufcn56j 15 7 considered consider VBD cord-023944-pufcn56j 15 8 the the DT cord-023944-pufcn56j 15 9 relevant relevant JJ cord-023944-pufcn56j 15 10 areas area NNS cord-023944-pufcn56j 15 11 for for IN cord-023944-pufcn56j 15 12 infonnation infonnation NN cord-023944-pufcn56j 15 13 security security NN cord-023944-pufcn56j 15 14 : : : cord-023944-pufcn56j 15 15 people people NNS cord-023944-pufcn56j 15 16 , , , cord-023944-pufcn56j 15 17 business business NN cord-023944-pufcn56j 15 18 processses processse NNS cord-023944-pufcn56j 15 19 . . . cord-023944-pufcn56j 16 1 applications application NNS cord-023944-pufcn56j 16 2 and and CC cord-023944-pufcn56j 16 3 infrastructure infrastructure NN cord-023944-pufcn56j 16 4 and and CC cord-023944-pufcn56j 16 5 has have VBZ cord-023944-pufcn56j 16 6 therefore therefore RB cord-023944-pufcn56j 16 7 a a DT cord-023944-pufcn56j 16 8 clear clear JJ cord-023944-pufcn56j 16 9 focus focus NN cord-023944-pufcn56j 16 10 on on IN cord-023944-pufcn56j 16 11 processes process NNS cord-023944-pufcn56j 16 12 , , , cord-023944-pufcn56j 16 13 stability stability NN cord-023944-pufcn56j 16 14 , , , cord-023944-pufcn56j 16 15 resilience resilience NN cord-023944-pufcn56j 16 16 and and CC cord-023944-pufcn56j 16 17 efficiency efficiency NN cord-023944-pufcn56j 16 18 which which WDT cord-023944-pufcn56j 16 19 are be VBP cord-023944-pufcn56j 16 20 the the DT cord-023944-pufcn56j 16 21 pillars pillar NNS cord-023944-pufcn56j 16 22 of of IN cord-023944-pufcn56j 16 23 a a DT cord-023944-pufcn56j 16 24 successful successful JJ cord-023944-pufcn56j 16 25 enterprise enterprise NN cord-023944-pufcn56j 16 26 . . . cord-023944-pufcn56j 17 1 There there EX cord-023944-pufcn56j 17 2 are be VBP cord-023944-pufcn56j 17 3 two two CD cord-023944-pufcn56j 17 4 main main JJ cord-023944-pufcn56j 17 5 streams stream NNS cord-023944-pufcn56j 17 6 related relate VBN cord-023944-pufcn56j 17 7 to to IN cord-023944-pufcn56j 17 8 a a DT cord-023944-pufcn56j 17 9 security security NN cord-023944-pufcn56j 17 10 strategy strategy NN cord-023944-pufcn56j 17 11 nowadays nowadays RB cord-023944-pufcn56j 18 1 -either -either RB cord-023944-pufcn56j 19 1 it -PRON- PRP cord-023944-pufcn56j 19 2 is be VBZ cord-023944-pufcn56j 19 3 considered consider VBN cord-023944-pufcn56j 19 4 an an DT cord-023944-pufcn56j 19 5 information information NN cord-023944-pufcn56j 19 6 security security NN cord-023944-pufcn56j 19 7 strategy strategy NN cord-023944-pufcn56j 19 8 and and CC cord-023944-pufcn56j 19 9 its -PRON- PRP$ cord-023944-pufcn56j 19 10 main main JJ cord-023944-pufcn56j 19 11 focus focus NN cord-023944-pufcn56j 19 12 is be VBZ cord-023944-pufcn56j 19 13 on on IN cord-023944-pufcn56j 19 14 the the DT cord-023944-pufcn56j 19 15 three three CD cord-023944-pufcn56j 19 16 common common JJ cord-023944-pufcn56j 19 17 objectives objective NNS cord-023944-pufcn56j 19 18 of of IN cord-023944-pufcn56j 19 19 information information NN cord-023944-pufcn56j 19 20 security security NN cord-023944-pufcn56j 19 21 which which WDT cord-023944-pufcn56j 19 22 are be VBP cord-023944-pufcn56j 19 23 confidentiality confidentiality NN cord-023944-pufcn56j 19 24 , , , cord-023944-pufcn56j 19 25 integrity integrity NN cord-023944-pufcn56j 19 26 and and CC cord-023944-pufcn56j 19 27 availability availability NN cord-023944-pufcn56j 19 28 ( ( -LRB- cord-023944-pufcn56j 19 29 CIA CIA NNP cord-023944-pufcn56j 19 30 ) ) -RRB- cord-023944-pufcn56j 19 31 or or CC cord-023944-pufcn56j 19 32 it -PRON- PRP cord-023944-pufcn56j 19 33 is be VBZ cord-023944-pufcn56j 19 34 considered consider VBN cord-023944-pufcn56j 19 35 a a DT cord-023944-pufcn56j 19 36 cyber cyber JJ cord-023944-pufcn56j 19 37 security security NN cord-023944-pufcn56j 19 38 strategy strategy NN cord-023944-pufcn56j 19 39 and and CC cord-023944-pufcn56j 19 40 there there EX cord-023944-pufcn56j 19 41 are be VBP cord-023944-pufcn56j 19 42 various various JJ cord-023944-pufcn56j 19 43 discussions discussion NNS cord-023944-pufcn56j 19 44 why why WRB cord-023944-pufcn56j 19 45 cyber cyber JJ cord-023944-pufcn56j 19 46 security security NN cord-023944-pufcn56j 19 47 has have VBZ cord-023944-pufcn56j 19 48 a a DT cord-023944-pufcn56j 19 49 broader broad JJR cord-023944-pufcn56j 19 50 view view NN cord-023944-pufcn56j 19 51 in in IN cord-023944-pufcn56j 19 52 addressing address VBG cord-023944-pufcn56j 19 53 also also RB cord-023944-pufcn56j 19 54 objectives objective NNS cord-023944-pufcn56j 19 55 which which WDT cord-023944-pufcn56j 19 56 go go VBP cord-023944-pufcn56j 19 57 beyond beyond IN cord-023944-pufcn56j 19 58 the the DT cord-023944-pufcn56j 19 59 CIA CIA NNP cord-023944-pufcn56j 19 60 objectives objective NNS cord-023944-pufcn56j 19 61 such such JJ cord-023944-pufcn56j 19 62 as as IN cord-023944-pufcn56j 19 63 reputation reputation NN cord-023944-pufcn56j 19 64 and and CC cord-023944-pufcn56j 19 65 legal legal JJ cord-023944-pufcn56j 19 66 consequences consequence NNS cord-023944-pufcn56j 19 67 . . . cord-023944-pufcn56j 20 1 Although although IN cord-023944-pufcn56j 20 2 a a DT cord-023944-pufcn56j 20 3 strategy strategy NN cord-023944-pufcn56j 20 4 should should MD cord-023944-pufcn56j 20 5 consider consider VB cord-023944-pufcn56j 20 6 the the DT cord-023944-pufcn56j 20 7 latter latter JJ cord-023944-pufcn56j 20 8 objectives objective NNS cord-023944-pufcn56j 20 9 as as RB cord-023944-pufcn56j 20 10 well well RB cord-023944-pufcn56j 20 11 , , , cord-023944-pufcn56j 20 12 we -PRON- PRP cord-023944-pufcn56j 20 13 will will MD cord-023944-pufcn56j 20 14 make make VB cord-023944-pufcn56j 20 15 use use NN cord-023944-pufcn56j 20 16 of of IN cord-023944-pufcn56j 20 17 the the DT cord-023944-pufcn56j 20 18 more more RBR cord-023944-pufcn56j 20 19 common common JJ cord-023944-pufcn56j 20 20 term term NN cord-023944-pufcn56j 20 21 " " `` cord-023944-pufcn56j 20 22 information information NN cord-023944-pufcn56j 20 23 securitY securitY NNP cord-023944-pufcn56j 20 24 ' ' '' cord-023944-pufcn56j 20 25 throughout throughout IN cord-023944-pufcn56j 20 26 this this DT cord-023944-pufcn56j 20 27 article article NN cord-023944-pufcn56j 20 28 . . . cord-023944-pufcn56j 21 1 Therefore therefore RB cord-023944-pufcn56j 21 2 , , , cord-023944-pufcn56j 21 3 we -PRON- PRP cord-023944-pufcn56j 21 4 concentrate concentrate VBP cord-023944-pufcn56j 21 5 on on IN cord-023944-pufcn56j 21 6 an an DT cord-023944-pufcn56j 21 7 information information NN cord-023944-pufcn56j 21 8 security security NN cord-023944-pufcn56j 21 9 strategy strategy NN cord-023944-pufcn56j 21 10 and and CC cord-023944-pufcn56j 21 11 the the DT cord-023944-pufcn56j 21 12 main main JJ cord-023944-pufcn56j 21 13 objective objective NN cord-023944-pufcn56j 21 14 is be VBZ cord-023944-pufcn56j 21 15 the the DT cord-023944-pufcn56j 21 16 establishment establishment NN cord-023944-pufcn56j 21 17 of of IN cord-023944-pufcn56j 21 18 a a DT cord-023944-pufcn56j 21 19 ' ' `` cord-023944-pufcn56j 21 20 process process NN cord-023944-pufcn56j 21 21 driven drive VBN cord-023944-pufcn56j 21 22 organization organization NN cord-023944-pufcn56j 21 23 with with IN cord-023944-pufcn56j 21 24 stable stable JJ cord-023944-pufcn56j 21 25 and and CC cord-023944-pufcn56j 21 26 efficient efficient JJ cord-023944-pufcn56j 21 27 operations operation NNS cord-023944-pufcn56j 21 28 . . . cord-023944-pufcn56j 22 1 " " `` cord-023944-pufcn56j 22 2 Todays todays JJ cord-023944-pufcn56j 22 3 information information NN cord-023944-pufcn56j 22 4 technology technology NN cord-023944-pufcn56j 22 5 is be VBZ cord-023944-pufcn56j 22 6 in in IN cord-023944-pufcn56j 22 7 a a DT cord-023944-pufcn56j 22 8 flux flux NN cord-023944-pufcn56j 22 9 where where WRB cord-023944-pufcn56j 22 10 well well RB cord-023944-pufcn56j 22 11 - - HYPH cord-023944-pufcn56j 22 12 known know VBN cord-023944-pufcn56j 22 13 techniques technique NNS cord-023944-pufcn56j 22 14 are be VBP cord-023944-pufcn56j 22 15 now now RB cord-023944-pufcn56j 22 16 used use VBN cord-023944-pufcn56j 22 17 in in IN cord-023944-pufcn56j 22 18 a a DT cord-023944-pufcn56j 22 19 way way NN cord-023944-pufcn56j 22 20 offering offer VBG cord-023944-pufcn56j 22 21 new new JJ cord-023944-pufcn56j 22 22 opportunities opportunity NNS cord-023944-pufcn56j 22 23 for for IN cord-023944-pufcn56j 22 24 security security NN cord-023944-pufcn56j 22 25 and and CC cord-023944-pufcn56j 22 26 stability stability NN cord-023944-pufcn56j 22 27 as as RB cord-023944-pufcn56j 22 28 well well RB cord-023944-pufcn56j 22 29 as as IN cord-023944-pufcn56j 22 30 for for IN cord-023944-pufcn56j 22 31 cost cost NN cord-023944-pufcn56j 22 32 savings saving NNS cord-023944-pufcn56j 22 33 . . . cord-023944-pufcn56j 23 1 Areas area NNS cord-023944-pufcn56j 23 2 like like IN cord-023944-pufcn56j 23 3 virtualization virtualization NN cord-023944-pufcn56j 23 4 , , , cord-023944-pufcn56j 23 5 cloud cloud NN cord-023944-pufcn56j 23 6 computing computing NN cord-023944-pufcn56j 23 7 , , , cord-023944-pufcn56j 23 8 and and CC cord-023944-pufcn56j 23 9 big big JJ cord-023944-pufcn56j 23 10 data datum NNS cord-023944-pufcn56j 23 11 are be VBP cord-023944-pufcn56j 23 12 based base VBN cord-023944-pufcn56j 23 13 on on IN cord-023944-pufcn56j 23 14 technologies technology NNS cord-023944-pufcn56j 23 15 which which WDT cord-023944-pufcn56j 23 16 were be VBD cord-023944-pufcn56j 23 17 examined examine VBN cord-023944-pufcn56j 23 18 and and CC cord-023944-pufcn56j 23 19 discussed discuss VBN cord-023944-pufcn56j 23 20 for for IN cord-023944-pufcn56j 23 21 decades decade NNS cord-023944-pufcn56j 23 22 but but CC cord-023944-pufcn56j 23 23 can can MD cord-023944-pufcn56j 23 24 now now RB cord-023944-pufcn56j 23 25 be be VB cord-023944-pufcn56j 23 26 handled handle VBN cord-023944-pufcn56j 23 27 by by IN cord-023944-pufcn56j 23 28 the the DT cord-023944-pufcn56j 23 29 underlying underlie VBG cord-023944-pufcn56j 23 30 technical technical JJ cord-023944-pufcn56j 23 31 eqnipment eqnipment NN cord-023944-pufcn56j 23 32 and and CC cord-023944-pufcn56j 23 33 the the DT cord-023944-pufcn56j 23 34 technical technical JJ cord-023944-pufcn56j 23 35 development development NN cord-023944-pufcn56j 23 36 . . . cord-023944-pufcn56j 24 1 Also also RB cord-023944-pufcn56j 24 2 , , , cord-023944-pufcn56j 24 3 the the DT cord-023944-pufcn56j 24 4 Internet internet NN cord-023944-pufcn56j 24 5 is be VBZ cord-023944-pufcn56j 24 6 on on IN cord-023944-pufcn56j 24 7 a a DT cord-023944-pufcn56j 24 8 threshold threshold NN cord-023944-pufcn56j 24 9 which which WDT cord-023944-pufcn56j 24 10 is be VBZ cord-023944-pufcn56j 24 11 not not RB cord-023944-pufcn56j 24 12 ouly ouly RB cord-023944-pufcn56j 24 13 triggered trigger VBN cord-023944-pufcn56j 24 14 by by IN cord-023944-pufcn56j 24 15 higher high JJR cord-023944-pufcn56j 24 16 speed speed NN cord-023944-pufcn56j 24 17 but but CC cord-023944-pufcn56j 24 18 also also RB cord-023944-pufcn56j 24 19 by by IN cord-023944-pufcn56j 24 20 technical technical JJ cord-023944-pufcn56j 24 21 standards standard NNS cord-023944-pufcn56j 24 22 such such JJ cord-023944-pufcn56j 24 23 as as IN cord-023944-pufcn56j 24 24 Internet Internet NNP cord-023944-pufcn56j 24 25 Protocol Protocol NNP cord-023944-pufcn56j 24 26 version version NN cord-023944-pufcn56j 24 27 6 6 CD cord-023944-pufcn56j 24 28 ( ( -LRB- cord-023944-pufcn56j 24 29 IPv6 ipv6 NN cord-023944-pufcn56j 24 30 ) ) -RRB- cord-023944-pufcn56j 24 31 and and CC cord-023944-pufcn56j 24 32 the the DT cord-023944-pufcn56j 24 33 Domain Domain NNP cord-023944-pufcn56j 24 34 Name Name NNP cord-023944-pufcn56j 24 35 Service Service NNP cord-023944-pufcn56j 24 36 Security Security NNP cord-023944-pufcn56j 24 37 Extensions Extensions NNPS cord-023944-pufcn56j 24 38 ( ( -LRB- cord-023944-pufcn56j 24 39 DNSSEC)[DNSSllj DNSSEC)[DNSSllj NNP cord-023944-pufcn56j 24 40 . . . cord-023944-pufcn56j 25 1 Fioally fioally RB cord-023944-pufcn56j 25 2 , , , cord-023944-pufcn56j 25 3 the the DT cord-023944-pufcn56j 25 4 work work NN cord-023944-pufcn56j 25 5 life life NN cord-023944-pufcn56j 25 6 is be VBZ cord-023944-pufcn56j 25 7 changing change VBG cord-023944-pufcn56j 25 8 and and CC cord-023944-pufcn56j 25 9 the the DT cord-023944-pufcn56j 25 10 limits limit NNS cord-023944-pufcn56j 25 11 between between IN cord-023944-pufcn56j 25 12 work work NN cord-023944-pufcn56j 25 13 and and CC cord-023944-pufcn56j 25 14 leisure leisure NN cord-023944-pufcn56j 25 15 are be VBP cord-023944-pufcn56j 25 16 also also RB cord-023944-pufcn56j 25 17 io io IN cord-023944-pufcn56j 25 18 a a DT cord-023944-pufcn56j 25 19 move move NN cord-023944-pufcn56j 25 20 ; ; : cord-023944-pufcn56j 25 21 the the DT cord-023944-pufcn56j 25 22 trend trend NN cord-023944-pufcn56j 25 23 of of IN cord-023944-pufcn56j 25 24 BYOD BYOD NNP cord-023944-pufcn56j 25 25 or or CC cord-023944-pufcn56j 25 26 " " `` cord-023944-pufcn56j 25 27 briog briog VB cord-023944-pufcn56j 25 28 your -PRON- PRP$ cord-023944-pufcn56j 25 29 own own JJ cord-023944-pufcn56j 25 30 device~ device~ NNP cord-023944-pufcn56j 25 31 social social JJ cord-023944-pufcn56j 25 32 computiog computiog NN cord-023944-pufcn56j 25 33 and and CC cord-023944-pufcn56j 25 34 social social JJ cord-023944-pufcn56j 25 35 networks network NNS cord-023944-pufcn56j 25 36 and and CC cord-023944-pufcn56j 25 37 tools tool NNS cord-023944-pufcn56j 25 38 like like IN cord-023944-pufcn56j 25 39 smart smart JJ cord-023944-pufcn56j 25 40 phones phone NNS cord-023944-pufcn56j 25 41 and and CC cord-023944-pufcn56j 25 42 tablet tablet NN cord-023944-pufcn56j 25 43 PC pc NN cord-023944-pufcn56j 25 44 have have VBP cord-023944-pufcn56j 25 45 played play VBN cord-023944-pufcn56j 25 46 a a DT cord-023944-pufcn56j 25 47 major major JJ cord-023944-pufcn56j 25 48 role role NN cord-023944-pufcn56j 25 49 io io IN cord-023944-pufcn56j 25 50 brioging brioge VBG cord-023944-pufcn56j 25 51 work work NN cord-023944-pufcn56j 25 52 to to IN cord-023944-pufcn56j 25 53 the the DT cord-023944-pufcn56j 25 54 people people NNS cord-023944-pufcn56j 25 55 . . . cord-023944-pufcn56j 26 1 The the DT cord-023944-pufcn56j 26 2 goal goal NN cord-023944-pufcn56j 26 3 of of IN cord-023944-pufcn56j 26 4 implementing implement VBG cord-023944-pufcn56j 26 5 ioformation ioformation NNP cord-023944-pufcn56j 26 6 security security NNP cord-023944-pufcn56j 26 7 io io NNP cord-023944-pufcn56j 26 8 an an DT cord-023944-pufcn56j 26 9 organization organization NN cord-023944-pufcn56j 26 10 is be VBZ cord-023944-pufcn56j 26 11 to to TO cord-023944-pufcn56j 26 12 protect protect VB cord-023944-pufcn56j 26 13 the the DT cord-023944-pufcn56j 26 14 organization organization NN cord-023944-pufcn56j 26 15 's 's POS cord-023944-pufcn56j 26 16 ioformation ioformation NN cord-023944-pufcn56j 26 17 by by IN cord-023944-pufcn56j 26 18 ensuriog ensuriog NNP cord-023944-pufcn56j 26 19 its -PRON- PRP$ cord-023944-pufcn56j 26 20 confidentiality confidentiality NN cord-023944-pufcn56j 26 21 , , , cord-023944-pufcn56j 26 22 iotegrity iotegrity NN cord-023944-pufcn56j 26 23 and and CC cord-023944-pufcn56j 26 24 availability availability NN cord-023944-pufcn56j 26 25 . . . cord-023944-pufcn56j 27 1 Infonnation Infonnation NNP cord-023944-pufcn56j 27 2 is be VBZ cord-023944-pufcn56j 27 3 created create VBN cord-023944-pufcn56j 27 4 and and CC cord-023944-pufcn56j 27 5 processed process VBN cord-023944-pufcn56j 27 6 by by IN cord-023944-pufcn56j 27 7 employees employee NNS cord-023944-pufcn56j 27 8 , , , cord-023944-pufcn56j 27 9 contractors contractor NNS cord-023944-pufcn56j 27 10 and and CC cord-023944-pufcn56j 27 11 third third JJ cord-023944-pufcn56j 27 12 party party NN cord-023944-pufcn56j 27 13 users user NNS cord-023944-pufcn56j 27 14 ( ( -LRB- cord-023944-pufcn56j 27 15 also also RB cord-023944-pufcn56j 27 16 known know VBN cord-023944-pufcn56j 27 17 as as IN cord-023944-pufcn56j 27 18 ioformation ioformation NN cord-023944-pufcn56j 27 19 users user NNS cord-023944-pufcn56j 27 20 ) ) -RRB- cord-023944-pufcn56j 27 21 within within IN cord-023944-pufcn56j 27 22 busioess busioess NNP cord-023944-pufcn56j 27 23 processes process NNS cord-023944-pufcn56j 27 24 using use VBG cord-023944-pufcn56j 27 25 applications application NNS cord-023944-pufcn56j 27 26 and and CC cord-023944-pufcn56j 27 27 tools tool NNS cord-023944-pufcn56j 27 28 which which WDT cord-023944-pufcn56j 27 29 are be VBP cord-023944-pufcn56j 27 30 hosted host VBN cord-023944-pufcn56j 27 31 io io IN cord-023944-pufcn56j 27 32 the the DT cord-023944-pufcn56j 27 33 IT IT NNP cord-023944-pufcn56j 27 34 infrastructure infrastructure NN cord-023944-pufcn56j 27 35 ( ( -LRB- cord-023944-pufcn56j 27 36 see see VB cord-023944-pufcn56j 27 37 also also RB cord-023944-pufcn56j 27 38 Figure figure NN cord-023944-pufcn56j 27 39 1 1 CD cord-023944-pufcn56j 27 40 ) ) -RRB- cord-023944-pufcn56j 27 41 . . . cord-023944-pufcn56j 28 1 Consequently consequently RB cord-023944-pufcn56j 28 2 , , , cord-023944-pufcn56j 28 3 four four CD cord-023944-pufcn56j 28 4 areas area NNS cord-023944-pufcn56j 28 5 need need VBP cord-023944-pufcn56j 28 6 to to TO cord-023944-pufcn56j 28 7 be be VB cord-023944-pufcn56j 28 8 taken take VBN cord-023944-pufcn56j 28 9 ioto ioto RB cord-023944-pufcn56j 28 10 account account NN cord-023944-pufcn56j 28 11 when when WRB cord-023944-pufcn56j 28 12 implementiog implementiog NNP cord-023944-pufcn56j 28 13 infonnation infonnation NNP cord-023944-pufcn56j 28 14 security security NN cord-023944-pufcn56j 28 15 : : : cord-023944-pufcn56j 28 16 • • NNP cord-023944-pufcn56j 28 17 information information NN cord-023944-pufcn56j 28 18 users user NNS cord-023944-pufcn56j 28 19 , , , cord-023944-pufcn56j 28 20 or or CC cord-023944-pufcn56j 28 21 how how WRB cord-023944-pufcn56j 28 22 people people NNS cord-023944-pufcn56j 28 23 handle handle VBP cord-023944-pufcn56j 28 24 ioformation ioformation NN cord-023944-pufcn56j 28 25 and and CC cord-023944-pufcn56j 28 26 use use VB cord-023944-pufcn56j 28 27 tools tool NNS cord-023944-pufcn56j 28 28 and and CC cord-023944-pufcn56j 28 29 applications application NNS cord-023944-pufcn56j 28 30 properly properly RB cord-023944-pufcn56j 28 31 to to TO cord-023944-pufcn56j 28 32 protect protect VB cord-023944-pufcn56j 28 33 ioformation ioformation NN cord-023944-pufcn56j 28 34 • • NNP cord-023944-pufcn56j 28 35 Business business NN cord-023944-pufcn56j 28 36 processes process NNS cord-023944-pufcn56j 28 37 , , , cord-023944-pufcn56j 28 38 or or CC cord-023944-pufcn56j 28 39 how how WRB cord-023944-pufcn56j 28 40 ioformation ioformation NN cord-023944-pufcn56j 28 41 security security NN cord-023944-pufcn56j 28 42 is be VBZ cord-023944-pufcn56j 28 43 embedded embed VBN cord-023944-pufcn56j 28 44 withio withio NNP cord-023944-pufcn56j 28 45 working working NN cord-023944-pufcn56j 28 46 practices practice NNS cord-023944-pufcn56j 29 1 • • NNP cord-023944-pufcn56j 30 1 Applications application NNS cord-023944-pufcn56j 30 2 , , , cord-023944-pufcn56j 30 3 or or CC cord-023944-pufcn56j 30 4 how how WRB cord-023944-pufcn56j 30 5 well well RB cord-023944-pufcn56j 30 6 they -PRON- PRP cord-023944-pufcn56j 30 7 are be VBP cord-023944-pufcn56j 30 8 developed develop VBN cord-023944-pufcn56j 30 9 to to TO cord-023944-pufcn56j 30 10 ensure ensure VB cord-023944-pufcn56j 30 11 the the DT cord-023944-pufcn56j 30 12 protection protection NN cord-023944-pufcn56j 30 13 of of IN cord-023944-pufcn56j 30 14 iofonnation iofonnation NN cord-023944-pufcn56j 30 15 stored store VBN cord-023944-pufcn56j 30 16 and and CC cord-023944-pufcn56j 30 17 processed process VBN cord-023944-pufcn56j 30 18 • • NN cord-023944-pufcn56j 30 19 infrastructure infrastructure NN cord-023944-pufcn56j 30 20 , , , cord-023944-pufcn56j 30 21 or or CC cord-023944-pufcn56j 30 22 how how WRB cord-023944-pufcn56j 30 23 well well RB cord-023944-pufcn56j 30 24 it -PRON- PRP cord-023944-pufcn56j 30 25 provides provide VBZ cord-023944-pufcn56j 30 26 sufficient sufficient JJ cord-023944-pufcn56j 30 27 capacities capacity NNS cord-023944-pufcn56j 30 28 and and CC cord-023944-pufcn56j 30 29 adequate adequate JJ cord-023944-pufcn56j 30 30 protection protection NN cord-023944-pufcn56j 30 31 of of IN cord-023944-pufcn56j 30 32 infonnation infonnation NN cord-023944-pufcn56j 30 33 and and CC cord-023944-pufcn56j 30 34 applications application NNS cord-023944-pufcn56j 30 35 against against IN cord-023944-pufcn56j 30 36 unauthorized unauthorized JJ cord-023944-pufcn56j 30 37 access access NN cord-023944-pufcn56j 30 38 and and CC cord-023944-pufcn56j 30 39 modification modification NN cord-023944-pufcn56j 30 40 Infonnation Infonnation NNP cord-023944-pufcn56j 30 41 security security NN cord-023944-pufcn56j 30 42 is be VBZ cord-023944-pufcn56j 30 43 ensured ensure VBN cord-023944-pufcn56j 30 44 via via IN cord-023944-pufcn56j 30 45 implementation implementation NN cord-023944-pufcn56j 30 46 of of IN cord-023944-pufcn56j 30 47 various various JJ cord-023944-pufcn56j 30 48 measures measure NNS cord-023944-pufcn56j 30 49 . . . cord-023944-pufcn56j 31 1 These these DT cord-023944-pufcn56j 31 2 measures measure NNS cord-023944-pufcn56j 31 3 need need VBP cord-023944-pufcn56j 31 4 to to TO cord-023944-pufcn56j 31 5 • • NNS cord-023944-pufcn56j 31 6 cover cover VB cord-023944-pufcn56j 31 7 all all DT cord-023944-pufcn56j 31 8 aspects aspect NNS cord-023944-pufcn56j 31 9 of of IN cord-023944-pufcn56j 31 10 the the DT cord-023944-pufcn56j 31 11 four four CD cord-023944-pufcn56j 31 12 areas area NNS cord-023944-pufcn56j 31 13 - - HYPH cord-023944-pufcn56j 31 14 iofonnation iofonnation NN cord-023944-pufcn56j 31 15 users user NNS cord-023944-pufcn56j 31 16 , , , cord-023944-pufcn56j 31 17 busioess busioess NN cord-023944-pufcn56j 31 18 processes process NNS cord-023944-pufcn56j 31 19 , , , cord-023944-pufcn56j 31 20 applications application NNS cord-023944-pufcn56j 31 21 and and CC cord-023944-pufcn56j 31 22 infrastructure infrastructure NN cord-023944-pufcn56j 31 23 ( ( -LRB- cord-023944-pufcn56j 31 24 completeness completeness NN cord-023944-pufcn56j 31 25 ) ) -RRB- cord-023944-pufcn56j 32 1 • • NNS cord-023944-pufcn56j 32 2 provide provide VB cord-023944-pufcn56j 32 3 adequate adequate JJ cord-023944-pufcn56j 32 4 protection protection NN cord-023944-pufcn56j 32 5 for for IN cord-023944-pufcn56j 32 6 ioformation ioformation NN cord-023944-pufcn56j 32 7 ( ( -LRB- cord-023944-pufcn56j 32 8 effectiveness effectiveness NN cord-023944-pufcn56j 32 9 ) ) -RRB- cord-023944-pufcn56j 33 1 • • NNP cord-023944-pufcn56j 33 2 be be VB cord-023944-pufcn56j 34 1 seamiessly seamiessly NNP cord-023944-pufcn56j 34 2 iotegrated iotegrated NNP cord-023944-pufcn56j 34 3 ioto ioto NNP cord-023944-pufcn56j 35 1 the the DT cord-023944-pufcn56j 35 2 processes process NNS cord-023944-pufcn56j 35 3 ( ( -LRB- cord-023944-pufcn56j 35 4 integration integration NN cord-023944-pufcn56j 35 5 ) ) -RRB- cord-023944-pufcn56j 36 1 • • NNP cord-023944-pufcn56j 36 2 be be VB cord-023944-pufcn56j 36 3 supported support VBN cord-023944-pufcn56j 36 4 by by IN cord-023944-pufcn56j 36 5 efficient efficient JJ cord-023944-pufcn56j 36 6 tools tool NNS cord-023944-pufcn56j 36 7 and and CC cord-023944-pufcn56j 36 8 simple simple JJ cord-023944-pufcn56j 36 9 templates template NNS cord-023944-pufcn56j 36 10 ( ( -LRB- cord-023944-pufcn56j 36 11 support support NN cord-023944-pufcn56j 36 12 ) ) -RRB- cord-023944-pufcn56j 37 1 • • NNP cord-023944-pufcn56j 37 2 avoid avoid VB cord-023944-pufcn56j 37 3 putting put VBG cord-023944-pufcn56j 37 4 an an DT cord-023944-pufcn56j 37 5 unacceptable unacceptable JJ cord-023944-pufcn56j 37 6 burden burden NN cord-023944-pufcn56j 37 7 on on IN cord-023944-pufcn56j 37 8 the the DT cord-023944-pufcn56j 37 9 employees employee NNS cord-023944-pufcn56j 37 10 ( ( -LRB- cord-023944-pufcn56j 37 11 simplicity simplicity NN cord-023944-pufcn56j 37 12 ) ) -RRB- cord-023944-pufcn56j 38 1 Each each DT cord-023944-pufcn56j 38 2 of of IN cord-023944-pufcn56j 38 3 these these DT cord-023944-pufcn56j 38 4 properties property NNS cord-023944-pufcn56j 38 5 is be VBZ cord-023944-pufcn56j 38 6 crucial crucial JJ cord-023944-pufcn56j 38 7 for for IN cord-023944-pufcn56j 38 8 achieving achieve VBG cord-023944-pufcn56j 38 9 effective effective JJ cord-023944-pufcn56j 38 10 protection protection NN cord-023944-pufcn56j 38 11 of of IN cord-023944-pufcn56j 38 12 information information NN cord-023944-pufcn56j 38 13 . . . cord-023944-pufcn56j 39 1 • • NNP cord-023944-pufcn56j 40 1 If if IN cord-023944-pufcn56j 40 2 any any DT cord-023944-pufcn56j 40 3 of of IN cord-023944-pufcn56j 40 4 these these DT cord-023944-pufcn56j 40 5 areas area NNS cord-023944-pufcn56j 40 6 is be VBZ cord-023944-pufcn56j 40 7 not not RB cord-023944-pufcn56j 40 8 completely completely RB cord-023944-pufcn56j 40 9 or or CC cord-023944-pufcn56j 40 10 not not RB cord-023944-pufcn56j 40 11 sufficiently sufficiently RB cord-023944-pufcn56j 40 12 covered covered JJ cord-023944-pufcn56j 40 13 ( ( -LRB- cord-023944-pufcn56j 40 14 completeness completeness NN cord-023944-pufcn56j 40 15 and and CC cord-023944-pufcn56j 40 16 adequacy adequacy NN cord-023944-pufcn56j 40 17 ) ) -RRB- cord-023944-pufcn56j 40 18 then then RB cord-023944-pufcn56j 40 19 the the DT cord-023944-pufcn56j 40 20 existing exist VBG cord-023944-pufcn56j 40 21 weaknesses weakness NNS cord-023944-pufcn56j 40 22 may may MD cord-023944-pufcn56j 40 23 be be VB cord-023944-pufcn56j 40 24 deliberately deliberately RB cord-023944-pufcn56j 40 25 exploited exploit VBN cord-023944-pufcn56j 40 26 or or CC cord-023944-pufcn56j 40 27 lead lead VB cord-023944-pufcn56j 40 28 to to IN cord-023944-pufcn56j 40 29 failures failure NNS cord-023944-pufcn56j 40 30 . . . cord-023944-pufcn56j 41 1 • • NNP cord-023944-pufcn56j 42 1 If if IN cord-023944-pufcn56j 42 2 a a DT cord-023944-pufcn56j 42 3 measure measure NN cord-023944-pufcn56j 42 4 is be VBZ cord-023944-pufcn56j 42 5 not not RB cord-023944-pufcn56j 42 6 sufficiently sufficiently RB cord-023944-pufcn56j 42 7 supported support VBN cord-023944-pufcn56j 42 8 or or CC cord-023944-pufcn56j 42 9 simple simple JJ cord-023944-pufcn56j 42 10 to to TO cord-023944-pufcn56j 42 11 use use VB cord-023944-pufcn56j 42 12 ( ( -LRB- cord-023944-pufcn56j 42 13 support support NN cord-023944-pufcn56j 42 14 and and CC cord-023944-pufcn56j 42 15 simplicity simplicity NN cord-023944-pufcn56j 42 16 ) ) -RRB- cord-023944-pufcn56j 42 17 then then RB cord-023944-pufcn56j 42 18 users user NNS cord-023944-pufcn56j 42 19 may may MD cord-023944-pufcn56j 42 20 try try VB cord-023944-pufcn56j 42 21 to to TO cord-023944-pufcn56j 42 22 circumvent circumvent VB cord-023944-pufcn56j 42 23 the the DT cord-023944-pufcn56j 42 24 measure measure NN cord-023944-pufcn56j 42 25 . . . cord-023944-pufcn56j 43 1 • • NNP cord-023944-pufcn56j 44 1 If if IN cord-023944-pufcn56j 44 2 a a DT cord-023944-pufcn56j 44 3 measure measure NN cord-023944-pufcn56j 44 4 is be VBZ cord-023944-pufcn56j 44 5 not not RB cord-023944-pufcn56j 44 6 integrated integrate VBN cord-023944-pufcn56j 44 7 within within IN cord-023944-pufcn56j 44 8 the the DT cord-023944-pufcn56j 44 9 existing exist VBG cord-023944-pufcn56j 44 10 processes process NNS cord-023944-pufcn56j 44 11 ( ( -LRB- cord-023944-pufcn56j 44 12 integration integration NN cord-023944-pufcn56j 44 13 ) ) -RRB- cord-023944-pufcn56j 44 14 then then RB cord-023944-pufcn56j 44 15 its -PRON- PRP$ cord-023944-pufcn56j 44 16 use use NN cord-023944-pufcn56j 44 17 can can MD cord-023944-pufcn56j 44 18 not not RB cord-023944-pufcn56j 44 19 be be VB cord-023944-pufcn56j 44 20 guaranteed guarantee VBN cord-023944-pufcn56j 44 21 . . . cord-023944-pufcn56j 45 1 Protectin Protectin NNP cord-023944-pufcn56j 45 2 g g NN cord-023944-pufcn56j 45 3 information information NN cord-023944-pufcn56j 45 4 with with IN cord-023944-pufcn56j 45 5 out out RP cord-023944-pufcn56j 45 6 puttin puttin NNP cord-023944-pufcn56j 45 7 g g NNP cord-023944-pufcn56j 45 8 a a DT cord-023944-pufcn56j 45 9 burden burden NN cord-023944-pufcn56j 45 10 on on IN cord-023944-pufcn56j 45 11 th th XX cord-023944-pufcn56j 45 12 e e NN cord-023944-pufcn56j 45 13 Information information NN cord-023944-pufcn56j 45 14 Users user NNS cord-023944-pufcn56j 45 15 users user NNS cord-023944-pufcn56j 45 16 ( ( -LRB- cord-023944-pufcn56j 45 17 security security NN cord-023944-pufcn56j 45 18 appropri appropri NNP cord-023944-pufcn56j 45 19 ately ately NNP cord-023944-pufcn56j 45 20 applied apply VBD cord-023944-pufcn56j 45 21 ) ) -RRB- cord-023944-pufcn56j 45 22 ... ... . cord-023944-pufcn56j 46 1 Seam Seam NNP cord-023944-pufcn56j 46 2 le le FW cord-023944-pufcn56j 46 3 ss ss NNP cord-023944-pufcn56j 46 4 integ integ NNP cord-023944-pufcn56j 46 5 rati rati NNP cord-023944-pufcn56j 46 6 on on IN cord-023944-pufcn56j 46 7 of of IN cord-023944-pufcn56j 46 8 security security NN cord-023944-pufcn56j 46 9 within within IN cord-023944-pufcn56j 46 10 the the DT cord-023944-pufcn56j 46 11 business business NN cord-023944-pufcn56j 46 12 Business business NN cord-023944-pufcn56j 46 13 Processes Processes NNP cord-023944-pufcn56j 46 14 processes process NNS cord-023944-pufcn56j 46 15 ( ( -LRB- cord-023944-pufcn56j 46 16 built build VBN cord-023944-pufcn56j 46 17 - - HYPH cord-023944-pufcn56j 46 18 in in RP cord-023944-pufcn56j 46 19 security security NN cord-023944-pufcn56j 46 20 ) ) -RRB- cord-023944-pufcn56j 47 1 I -PRON- PRP cord-023944-pufcn56j 47 2 m be VBP cord-023944-pufcn56j 47 3 plementation plementation NN cord-023944-pufcn56j 47 4 of of IN cord-023944-pufcn56j 47 5 t t NNP cord-023944-pufcn56j 48 1 he -PRON- PRP cord-023944-pufcn56j 48 2 integrated integrate VBD cord-023944-pufcn56j 48 3 processes process NNS cord-023944-pufcn56j 48 4 including include VBG cord-023944-pufcn56j 48 5 Applications Applications NNP cord-023944-pufcn56j 48 6 securit securit NNP cord-023944-pufcn56j 48 7 y y NNP cord-023944-pufcn56j 48 8 ( ( -LRB- cord-023944-pufcn56j 48 9 tran tran NNP cord-023944-pufcn56j 48 10 sparent sparent NNP cord-023944-pufcn56j 48 11 security security NNP cord-023944-pufcn56j 48 12 ) ) -RRB- cord-023944-pufcn56j 48 13 ... ... . cord-023944-pufcn56j 49 1 H H NNP cord-023944-pufcn56j 49 2 igh igh NNP cord-023944-pufcn56j 50 1 a a DT cord-023944-pufcn56j 50 2 va va NNP cord-023944-pufcn56j 50 3 il il NNP cord-023944-pufcn56j 50 4 abi abi NNP cord-023944-pufcn56j 50 5 lity lity NN cord-023944-pufcn56j 50 6 and and CC cord-023944-pufcn56j 50 7 easily easily RB cord-023944-pufcn56j 50 8 manageable manageable JJ cord-023944-pufcn56j 50 9 infrastructure infrastructure NN cord-023944-pufcn56j 50 10 Infrastructure infrastructure NN cord-023944-pufcn56j 50 11 provi provi NN cord-023944-pufcn56j 51 1 ding ding NNP cord-023944-pufcn56j 51 2 sufficient sufficient JJ cord-023944-pufcn56j 51 3 capaci capaci NNP cord-023944-pufcn56j 51 4 ti ti NNP cord-023944-pufcn56j 51 5 es es NNP cord-023944-pufcn56j 51 6 and and CC cord-023944-pufcn56j 51 7 adequate adequate JJ cord-023944-pufcn56j 51 8 protection protection NN cord-023944-pufcn56j 51 9 for for IN cord-023944-pufcn56j 51 10 information information NN cord-023944-pufcn56j 51 11 and and CC cord-023944-pufcn56j 52 1 app app NNP cord-023944-pufcn56j 52 2 li li NNP cord-023944-pufcn56j 52 3 cation cation NNP cord-023944-pufcn56j 52 4 s s NNP cord-023944-pufcn56j 52 5 ( ( -LRB- cord-023944-pufcn56j 52 6 seaml seaml NNP cord-023944-pufcn56j 52 7 ess ess NNP cord-023944-pufcn56j 52 8 security security NNP cord-023944-pufcn56j 52 9 ) ) -RRB- cord-023944-pufcn56j 53 1 Effi Effi NNP cord-023944-pufcn56j 53 2 cient cient NN cord-023944-pufcn56j 53 3 information information NN cord-023944-pufcn56j 54 1 securit securit NNP cord-023944-pufcn56j 54 2 y y NNP cord-023944-pufcn56j 54 3 organiza organiza NNP cord-023944-pufcn56j 54 4 ti ti NNP cord-023944-pufcn56j 54 5 on on IN cord-023944-pufcn56j 54 6 enabling enable VBG cord-023944-pufcn56j 54 7 e e NNP cord-023944-pufcn56j 54 8 ffectiv ffectiv NNP cord-023944-pufcn56j 54 9 e e NNP cord-023944-pufcn56j 54 10 supp supp NNP cord-023944-pufcn56j 54 11 ort ort NN cord-023944-pufcn56j 54 12 of of IN cord-023944-pufcn56j 54 13 the the DT cord-023944-pufcn56j 54 14 loca loca NNP cord-023944-pufcn56j 54 15 l l NNP cord-023944-pufcn56j 54 16 business business NN cord-023944-pufcn56j 54 17 ( ( -LRB- cord-023944-pufcn56j 54 18 a a DT cord-023944-pufcn56j 54 19 value·added value·adde VBN cord-023944-pufcn56j 54 20 and and CC cord-023944-pufcn56j 54 21 trusted trust VBN cord-023944-pufcn56j 54 22 business business NN cord-023944-pufcn56j 54 23 p p NN cord-023944-pufcn56j 54 24 a a DT cord-023944-pufcn56j 54 25 rtner rtner NN cord-023944-pufcn56j 54 26 ) ) -RRB- cord-023944-pufcn56j 55 1 In in IN cord-023944-pufcn56j 55 2 addition addition NN cord-023944-pufcn56j 55 3 to to IN cord-023944-pufcn56j 55 4 the the DT cord-023944-pufcn56j 55 5 named name VBN cord-023944-pufcn56j 55 6 four four CD cord-023944-pufcn56j 55 7 areas area NNS cord-023944-pufcn56j 55 8 , , , cord-023944-pufcn56j 55 9 there there EX cord-023944-pufcn56j 55 10 must must MD cord-023944-pufcn56j 55 11 be be VB cord-023944-pufcn56j 55 12 an an DT cord-023944-pufcn56j 55 13 organization organization NN cord-023944-pufcn56j 55 14 that that WDT cord-023944-pufcn56j 55 15 initiates initiate VBZ cord-023944-pufcn56j 55 16 , , , cord-023944-pufcn56j 55 17 coordinates coordinate VBZ cord-023944-pufcn56j 55 18 and and CC cord-023944-pufcn56j 55 19 supports support VBZ cord-023944-pufcn56j 55 20 all all DT cord-023944-pufcn56j 55 21 activities activity NNS cord-023944-pufcn56j 55 22 with with IN cord-023944-pufcn56j 55 23 respect respect NN cord-023944-pufcn56j 55 24 to to IN cord-023944-pufcn56j 55 25 information information NN cord-023944-pufcn56j 55 26 security security NN cord-023944-pufcn56j 55 27 . . . cord-023944-pufcn56j 56 1 Therefore therefore RB cord-023944-pufcn56j 56 2 , , , cord-023944-pufcn56j 56 3 the the DT cord-023944-pufcn56j 56 4 organization organization NN cord-023944-pufcn56j 56 5 of of IN cord-023944-pufcn56j 56 6 information information NNP cord-023944-pufcn56j 56 7 security security NN cord-023944-pufcn56j 56 8 is be VBZ cord-023944-pufcn56j 56 9 another another DT cord-023944-pufcn56j 56 10 area area NN cord-023944-pufcn56j 56 11 that that WDT cord-023944-pufcn56j 56 12 needs need VBZ cord-023944-pufcn56j 56 13 to to TO cord-023944-pufcn56j 56 14 be be VB cord-023944-pufcn56j 56 15 taken take VBN cord-023944-pufcn56j 56 16 into into IN cord-023944-pufcn56j 56 17 account account NN cord-023944-pufcn56j 56 18 in in IN cord-023944-pufcn56j 56 19 order order NN cord-023944-pufcn56j 56 20 to to TO cord-023944-pufcn56j 56 21 achieve achieve VB cord-023944-pufcn56j 56 22 an an DT cord-023944-pufcn56j 56 23 effective effective JJ cord-023944-pufcn56j 56 24 implementation implementation NN cord-023944-pufcn56j 56 25 of of IN cord-023944-pufcn56j 56 26 information information NN cord-023944-pufcn56j 56 27 security security NN cord-023944-pufcn56j 56 28 ; ; : cord-023944-pufcn56j 56 29 i.e. i.e. FW cord-023944-pufcn56j 56 30 adding add VBG cord-023944-pufcn56j 56 31 a a DT cord-023944-pufcn56j 56 32 fifth fifth JJ cord-023944-pufcn56j 56 33 area area NN cord-023944-pufcn56j 56 34 : : : cord-023944-pufcn56j 56 35 • • NNP cord-023944-pufcn56j 56 36 Information Information NNP cord-023944-pufcn56j 56 37 security security NN cord-023944-pufcn56j 56 38 organization organization NN cord-023944-pufcn56j 56 39 . . . cord-023944-pufcn56j 57 1 or or CC cord-023944-pufcn56j 57 2 how how WRB cord-023944-pufcn56j 57 3 efficiently efficiently RB cord-023944-pufcn56j 57 4 the the DT cord-023944-pufcn56j 57 5 information information NN cord-023944-pufcn56j 57 6 security security NNP cord-023944-pufcn56j 57 7 organization organization NN cord-023944-pufcn56j 57 8 enables enable VBZ cord-023944-pufcn56j 57 9 effective effective JJ cord-023944-pufcn56j 57 10 support support NN cord-023944-pufcn56j 57 11 of of IN cord-023944-pufcn56j 57 12 the the DT cord-023944-pufcn56j 57 13 local local JJ cord-023944-pufcn56j 57 14 business business NN cord-023944-pufcn56j 57 15 in in IN cord-023944-pufcn56j 57 16 protecting protect VBG cord-023944-pufcn56j 57 17 their -PRON- PRP$ cord-023944-pufcn56j 57 18 information information NN cord-023944-pufcn56j 57 19 Figure figure NN cord-023944-pufcn56j 57 20 2 2 CD cord-023944-pufcn56j 57 21 provides provide VBZ cord-023944-pufcn56j 57 22 an an DT cord-023944-pufcn56j 57 23 overview overview NN cord-023944-pufcn56j 57 24 of of IN cord-023944-pufcn56j 57 25 the the DT cord-023944-pufcn56j 57 26 defined define VBN cord-023944-pufcn56j 57 27 information information NN cord-023944-pufcn56j 57 28 security security NN cord-023944-pufcn56j 57 29 areas area NNS cord-023944-pufcn56j 57 30 and and CC cord-023944-pufcn56j 57 31 summarizes summarize VBZ cord-023944-pufcn56j 57 32 the the DT cord-023944-pufcn56j 57 33 higb higb JJ cord-023944-pufcn56j 57 34 - - HYPH cord-023944-pufcn56j 57 35 level level NN cord-023944-pufcn56j 57 36 objectives objective NNS cord-023944-pufcn56j 57 37 . . . cord-023944-pufcn56j 58 1 The the DT cord-023944-pufcn56j 58 2 following following JJ cord-023944-pufcn56j 58 3 section section NN cord-023944-pufcn56j 58 4 will will MD cord-023944-pufcn56j 58 5 first first RB cord-023944-pufcn56j 58 6 address address VB cord-023944-pufcn56j 58 7 common common JJ cord-023944-pufcn56j 58 8 threats threat NNS cord-023944-pufcn56j 58 9 as as IN cord-023944-pufcn56j 58 10 reported report VBN cord-023944-pufcn56j 58 11 in in IN cord-023944-pufcn56j 58 12 Verizon Verizon NNP cord-023944-pufcn56j 58 13 's 's POS cord-023944-pufcn56j 58 14 2012 2012 CD cord-023944-pufcn56j 58 15 Data Data NNP cord-023944-pufcn56j 58 16 Breach Breach NNP cord-023944-pufcn56j 58 17 Report Report NNP cord-023944-pufcn56j 58 18 [ [ -LRB- cord-023944-pufcn56j 58 19 Veri12 Veri12 NNP cord-023944-pufcn56j 58 20 ] ] -RRB- cord-023944-pufcn56j 58 21 as as RB cord-023944-pufcn56j 58 22 well well RB cord-023944-pufcn56j 58 23 as as IN cord-023944-pufcn56j 58 24 introduced introduce VBN cord-023944-pufcn56j 58 25 in in IN cord-023944-pufcn56j 58 26 Symantec Symantec NNP cord-023944-pufcn56j 58 27 's 's POS cord-023944-pufcn56j 58 28 Internet Internet NNP cord-023944-pufcn56j 58 29 Security Security NNP cord-023944-pufcn56j 58 30 Threat Threat NNP cord-023944-pufcn56j 58 31 Report Report NNP cord-023944-pufcn56j 58 32 2011 2011 CD cord-023944-pufcn56j 59 1 [ [ -LRB- cord-023944-pufcn56j 59 2 Syma12 syma12 NN cord-023944-pufcn56j 59 3 ] ] -RRB- cord-023944-pufcn56j 59 4 and and CC cord-023944-pufcn56j 59 5 will will MD cord-023944-pufcn56j 59 6 then then RB cord-023944-pufcn56j 59 7 focus focus VB cord-023944-pufcn56j 59 8 on on IN cord-023944-pufcn56j 59 9 the the DT cord-023944-pufcn56j 59 10 threats threat NNS cord-023944-pufcn56j 59 11 directed direct VBN cord-023944-pufcn56j 59 12 to to IN cord-023944-pufcn56j 59 13 the the DT cord-023944-pufcn56j 59 14 four four CD cord-023944-pufcn56j 59 15 areas area NNS cord-023944-pufcn56j 59 16 which which WDT cord-023944-pufcn56j 59 17 the the DT cord-023944-pufcn56j 59 18 information information NN cord-023944-pufcn56j 59 19 security security NN cord-023944-pufcn56j 59 20 strategy strategy NN cord-023944-pufcn56j 59 21 is be VBZ cord-023944-pufcn56j 59 22 addressing address VBG cord-023944-pufcn56j 59 23 . . . cord-023944-pufcn56j 60 1 Additionally additionally RB cord-023944-pufcn56j 60 2 , , , cord-023944-pufcn56j 60 3 it -PRON- PRP cord-023944-pufcn56j 60 4 will will MD cord-023944-pufcn56j 60 5 point point VB cord-023944-pufcn56j 60 6 out out RP cord-023944-pufcn56j 60 7 where where WRB cord-023944-pufcn56j 60 8 new new JJ cord-023944-pufcn56j 60 9 technologies technology NNS cord-023944-pufcn56j 60 10 may may MD cord-023944-pufcn56j 60 11 influence influence VB cord-023944-pufcn56j 60 12 the the DT cord-023944-pufcn56j 60 13 situation situation NN cord-023944-pufcn56j 60 14 . . . cord-023944-pufcn56j 61 1 During during IN cord-023944-pufcn56j 61 2 the the DT cord-023944-pufcn56j 61 3 last last JJ cord-023944-pufcn56j 61 4 years year NNS cord-023944-pufcn56j 61 5 the the DT cord-023944-pufcn56j 61 6 threat threat NN cord-023944-pufcn56j 61 7 landscape landscape NN cord-023944-pufcn56j 61 8 has have VBZ cord-023944-pufcn56j 61 9 changed change VBN cord-023944-pufcn56j 61 10 dramatically dramatically RB cord-023944-pufcn56j 61 11 . . . cord-023944-pufcn56j 62 1 In in IN cord-023944-pufcn56j 62 2 former former JJ cord-023944-pufcn56j 62 3 years year NNS cord-023944-pufcn56j 62 4 , , , cord-023944-pufcn56j 62 5 the the DT cord-023944-pufcn56j 62 6 main main JJ cord-023944-pufcn56j 62 7 threats threat NNS cord-023944-pufcn56j 62 8 were be VBD cord-023944-pufcn56j 62 9 caused cause VBN cord-023944-pufcn56j 62 10 by by IN cord-023944-pufcn56j 62 11 viruses virus NNS cord-023944-pufcn56j 62 12 , , , cord-023944-pufcn56j 62 13 phisbing phisbe VBG cord-023944-pufcn56j 62 14 and and CC cord-023944-pufcn56j 62 15 unintended unintended JJ cord-023944-pufcn56j 62 16 data data NN cord-023944-pufcn56j 62 17 losses loss NNS cord-023944-pufcn56j 62 18 . . . cord-023944-pufcn56j 63 1 Nowadays nowadays RB cord-023944-pufcn56j 63 2 the the DT cord-023944-pufcn56j 63 3 number number NN cord-023944-pufcn56j 63 4 of of IN cord-023944-pufcn56j 63 5 targeted target VBN cord-023944-pufcn56j 63 6 attacks attack NNS cord-023944-pufcn56j 63 7 has have VBZ cord-023944-pufcn56j 63 8 increased increase VBN cord-023944-pufcn56j 63 9 to to IN cord-023944-pufcn56j 63 10 a a DT cord-023944-pufcn56j 63 11 level level NN cord-023944-pufcn56j 63 12 beyond beyond IN cord-023944-pufcn56j 63 13 expectations expectation NNS cord-023944-pufcn56j 63 14 . . . cord-023944-pufcn56j 64 1 And and CC cord-023944-pufcn56j 64 2 these these DT cord-023944-pufcn56j 64 3 attacks attack NNS cord-023944-pufcn56j 64 4 are be VBP cord-023944-pufcn56j 64 5 not not RB cord-023944-pufcn56j 64 6 only only RB cord-023944-pufcn56j 64 7 caused cause VBN cord-023944-pufcn56j 64 8 by by IN cord-023944-pufcn56j 64 9 " " `` cord-023944-pufcn56j 64 10 hacktivism hacktivism NN cord-023944-pufcn56j 64 11 " " '' cord-023944-pufcn56j 64 12 which which WDT cord-023944-pufcn56j 64 13 is be VBZ cord-023944-pufcn56j 64 14 politically politically RB cord-023944-pufcn56j 64 15 motivated motivated JJ cord-023944-pufcn56j 64 16 but but CC cord-023944-pufcn56j 64 17 even even RB cord-023944-pufcn56j 64 18 more more JJR cord-023944-pufcn56j 64 19 by by IN cord-023944-pufcn56j 64 20 data datum NNS cord-023944-pufcn56j 64 21 thieves thief NNS cord-023944-pufcn56j 64 22 who who WP cord-023944-pufcn56j 64 23 " " `` cord-023944-pufcn56j 64 24 are be VBP cord-023944-pufcn56j 64 25 professional professional JJ cord-023944-pufcn56j 64 26 criminals criminal NNS cord-023944-pufcn56j 64 27 deliberately deliberately RB cord-023944-pufcn56j 64 28 trying try VBG cord-023944-pufcn56j 64 29 to to TO cord-023944-pufcn56j 64 30 steal steal VB cord-023944-pufcn56j 64 31 information information NN cord-023944-pufcn56j 64 32 they -PRON- PRP cord-023944-pufcn56j 64 33 can can MD cord-023944-pufcn56j 64 34 turn turn VB cord-023944-pufcn56j 64 35 into into IN cord-023944-pufcn56j 64 36 cash cash NN cord-023944-pufcn56j 64 37 " " '' cord-023944-pufcn56j 65 1 [ [ -LRB- cord-023944-pufcn56j 65 2 Veril2 Veril2 NNP cord-023944-pufcn56j 65 3 ] ] -RRB- cord-023944-pufcn56j 65 4 . . . cord-023944-pufcn56j 66 1 Despite despite IN cord-023944-pufcn56j 66 2 the the DT cord-023944-pufcn56j 66 3 decIioe deciioe NN cord-023944-pufcn56j 66 4 of of IN cord-023944-pufcn56j 66 5 new new JJ cord-023944-pufcn56j 66 6 disclosed disclose VBN cord-023944-pufcn56j 66 7 vulnerabilities vulnerability NNS cord-023944-pufcn56j 66 8 in in IN cord-023944-pufcn56j 66 9 commercial commercial JJ cord-023944-pufcn56j 66 10 applications application NNS cord-023944-pufcn56j 66 11 -the -the DT cord-023944-pufcn56j 66 12 peak peak NN cord-023944-pufcn56j 66 13 of of IN cord-023944-pufcn56j 66 14 disclosed disclose VBN cord-023944-pufcn56j 66 15 vulnerabilities vulnerability NNS cord-023944-pufcn56j 66 16 reported report VBN cord-023944-pufcn56j 66 17 was be VBD cord-023944-pufcn56j 66 18 reached reach VBN cord-023944-pufcn56j 66 19 in in IN cord-023944-pufcn56j 66 20 2006 2006 CD cord-023944-pufcn56j 67 1 aod aod NNP cord-023944-pufcn56j 67 2 is be VBZ cord-023944-pufcn56j 67 3 slowly slowly RB cord-023944-pufcn56j 67 4 decreasing decrease VBG cord-023944-pufcn56j 67 5 -the -the DT cord-023944-pufcn56j 67 6 severity severity NN cord-023944-pufcn56j 67 7 of of IN cord-023944-pufcn56j 67 8 the the DT cord-023944-pufcn56j 67 9 vulnerabilities vulnerability NNS cord-023944-pufcn56j 67 10 has have VBZ cord-023944-pufcn56j 67 11 increased increase VBN cord-023944-pufcn56j 67 12 As as IN cord-023944-pufcn56j 67 13 lined line VBN cord-023944-pufcn56j 67 14 out out RP cord-023944-pufcn56j 67 15 in in IN cord-023944-pufcn56j 67 16 the the DT cord-023944-pufcn56j 67 17 HP HP NNP cord-023944-pufcn56j 67 18 2011 2011 CD cord-023944-pufcn56j 68 1 Top top JJ cord-023944-pufcn56j 68 2 Cyber Cyber NNP cord-023944-pufcn56j 68 3 Security Security NNP cord-023944-pufcn56j 68 4 Risk Risk NNP cord-023944-pufcn56j 68 5 Report Report NNP cord-023944-pufcn56j 68 6 [ [ -LRB- cord-023944-pufcn56j 68 7 TCSRI2 TCSRI2 NNS cord-023944-pufcn56j 68 8 ] ] -RRB- cord-023944-pufcn56j 68 9 , , , cord-023944-pufcn56j 68 10 in in IN cord-023944-pufcn56j 68 11 2011 2011 CD cord-023944-pufcn56j 68 12 almost almost RB cord-023944-pufcn56j 68 13 a a DT cord-023944-pufcn56j 68 14 quarter quarter NN cord-023944-pufcn56j 68 15 of of IN cord-023944-pufcn56j 68 16 disclosed disclose VBN cord-023944-pufcn56j 68 17 vulnerabilities vulnerability NNS cord-023944-pufcn56j 68 18 is be VBZ cord-023944-pufcn56j 68 19 rated rate VBN cord-023944-pufcn56j 68 20 as as IN cord-023944-pufcn56j 68 21 high high JJ cord-023944-pufcn56j 68 22 - - HYPH cord-023944-pufcn56j 68 23 severity severity NN cord-023944-pufcn56j 68 24 vulnerabilities vulnerability NNS cord-023944-pufcn56j 68 25 . . . cord-023944-pufcn56j 69 1 Finally finally RB cord-023944-pufcn56j 69 2 , , , cord-023944-pufcn56j 69 3 it -PRON- PRP cord-023944-pufcn56j 69 4 has have VBZ cord-023944-pufcn56j 69 5 to to TO cord-023944-pufcn56j 69 6 be be VB cord-023944-pufcn56j 69 7 mentioned mention VBN cord-023944-pufcn56j 69 8 that that IN cord-023944-pufcn56j 69 9 vulnerabilities vulnerability NNS cord-023944-pufcn56j 69 10 are be VBP cord-023944-pufcn56j 69 11 rising rise VBG cord-023944-pufcn56j 69 12 in in IN cord-023944-pufcn56j 69 13 non non JJ cord-023944-pufcn56j 69 14 - - JJ cord-023944-pufcn56j 69 15 traditional traditional JJ cord-023944-pufcn56j 69 16 enterprise enterprise NN cord-023944-pufcn56j 69 17 infrastructures infrastructure NNS cord-023944-pufcn56j 69 18 such such JJ cord-023944-pufcn56j 69 19 as as IN cord-023944-pufcn56j 69 20 industrial industrial JJ cord-023944-pufcn56j 69 21 control control NN cord-023944-pufcn56j 69 22 systems system NNS cord-023944-pufcn56j 69 23 ( ( -LRB- cord-023944-pufcn56j 69 24 e.g. e.g. RB cord-023944-pufcn56j 69 25 , , , cord-023944-pufcn56j 69 26 supervisory supervisory JJ cord-023944-pufcn56j 69 27 control control NN cord-023944-pufcn56j 69 28 aod aod NNP cord-023944-pufcn56j 69 29 data data NNP cord-023944-pufcn56j 69 30 acquisition acquisition NN cord-023944-pufcn56j 69 31 ( ( -LRB- cord-023944-pufcn56j 69 32 SCADA SCADA NNP cord-023944-pufcn56j 69 33 ) ) -RRB- cord-023944-pufcn56j 69 34 ) ) -RRB- cord-023944-pufcn56j 69 35 , , , cord-023944-pufcn56j 69 36 IP ip NN cord-023944-pufcn56j 69 37 telephony telephony NN cord-023944-pufcn56j 69 38 ( ( -LRB- cord-023944-pufcn56j 69 39 Voice voice NN cord-023944-pufcn56j 69 40 over over IN cord-023944-pufcn56j 69 41 IP IP NNP cord-023944-pufcn56j 69 42 ( ( -LRB- cord-023944-pufcn56j 69 43 VoIP VoIP NNP cord-023944-pufcn56j 69 44 ) ) -RRB- cord-023944-pufcn56j 69 45 ) ) -RRB- cord-023944-pufcn56j 70 1 aod aod NNP cord-023944-pufcn56j 70 2 new new JJ cord-023944-pufcn56j 70 3 infrastructure infrastructure NN cord-023944-pufcn56j 70 4 such such JJ cord-023944-pufcn56j 70 5 as as IN cord-023944-pufcn56j 70 6 mobile mobile JJ cord-023944-pufcn56j 70 7 phones phone NNS cord-023944-pufcn56j 70 8 aod aod NN cord-023944-pufcn56j 70 9 cloud cloud NN cord-023944-pufcn56j 70 10 infrastructure infrastructure NN cord-023944-pufcn56j 70 11 [ [ -LRB- cord-023944-pufcn56j 70 12 TCSRI2 TCSRI2 NNS cord-023944-pufcn56j 70 13 ] ] -RRB- cord-023944-pufcn56j 70 14 . . . cord-023944-pufcn56j 71 1 Stuxnet Stuxnet NNP cord-023944-pufcn56j 71 2 , , , cord-023944-pufcn56j 71 3 Duqu Duqu NNP cord-023944-pufcn56j 71 4 aod aod NN cord-023944-pufcn56j 71 5 Flame flame NN cord-023944-pufcn56j 71 6 are be VBP cord-023944-pufcn56j 71 7 examples example NNS cord-023944-pufcn56j 71 8 of of IN cord-023944-pufcn56j 71 9 targeted target VBN cord-023944-pufcn56j 71 10 malware malware NN cord-023944-pufcn56j 71 11 against against IN cord-023944-pufcn56j 71 12 SCADA SCADA NNP cord-023944-pufcn56j 71 13 infrastructures infrastructure NNS cord-023944-pufcn56j 71 14 . . . cord-023944-pufcn56j 72 1 All all PDT cord-023944-pufcn56j 72 2 these these DT cord-023944-pufcn56j 72 3 aspects aspect NNS cord-023944-pufcn56j 72 4 need need VBP cord-023944-pufcn56j 72 5 to to TO cord-023944-pufcn56j 72 6 be be VB cord-023944-pufcn56j 72 7 considered consider VBN cord-023944-pufcn56j 72 8 in in IN cord-023944-pufcn56j 72 9 order order NN cord-023944-pufcn56j 72 10 to to TO cord-023944-pufcn56j 72 11 protect protect VB cord-023944-pufcn56j 72 12 the the DT cord-023944-pufcn56j 72 13 areas area NNS cord-023944-pufcn56j 72 14 ao ao IN cord-023944-pufcn56j 72 15 organization organization NN cord-023944-pufcn56j 72 16 relies rely VBZ cord-023944-pufcn56j 72 17 upon upon IN cord-023944-pufcn56j 72 18 . . . cord-023944-pufcn56j 73 1 The the DT cord-023944-pufcn56j 73 2 primary primary JJ cord-023944-pufcn56j 73 3 problems problem NNS cord-023944-pufcn56j 73 4 caused cause VBN cord-023944-pufcn56j 73 5 by by IN cord-023944-pufcn56j 73 6 information information NN cord-023944-pufcn56j 73 7 users user NNS cord-023944-pufcn56j 73 8 include include VBP cord-023944-pufcn56j 73 9 the the DT cord-023944-pufcn56j 73 10 incorrect incorrect JJ cord-023944-pufcn56j 73 11 haodling haodling NN cord-023944-pufcn56j 73 12 of of IN cord-023944-pufcn56j 73 13 information information NN cord-023944-pufcn56j 73 14 due due JJ cord-023944-pufcn56j 73 15 to to IN cord-023944-pufcn56j 73 16 missing miss VBG cord-023944-pufcn56j 73 17 awareness awareness NN cord-023944-pufcn56j 73 18 and and CC cord-023944-pufcn56j 73 19 knowledge knowledge NN cord-023944-pufcn56j 73 20 about about IN cord-023944-pufcn56j 73 21 its -PRON- PRP$ cord-023944-pufcn56j 73 22 value value NN cord-023944-pufcn56j 73 23 and and CC cord-023944-pufcn56j 73 24 insufficient insufficient JJ cord-023944-pufcn56j 73 25 training training NN cord-023944-pufcn56j 73 26 and and CC cord-023944-pufcn56j 73 27 awareness awareness NN cord-023944-pufcn56j 73 28 in in IN cord-023944-pufcn56j 73 29 using use VBG cord-023944-pufcn56j 73 30 applicable applicable JJ cord-023944-pufcn56j 73 31 tools tool NNS cord-023944-pufcn56j 73 32 . . . cord-023944-pufcn56j 74 1 Additionally additionally RB cord-023944-pufcn56j 74 2 , , , cord-023944-pufcn56j 74 3 problems problem NNS cord-023944-pufcn56j 74 4 arise arise VBP cord-023944-pufcn56j 74 5 through through IN cord-023944-pufcn56j 74 6 external external JJ cord-023944-pufcn56j 74 7 attaclks attaclk NNS cord-023944-pufcn56j 74 8 targeting target VBG cord-023944-pufcn56j 74 9 information information NN cord-023944-pufcn56j 74 10 users user NNS cord-023944-pufcn56j 74 11 ( ( -LRB- cord-023944-pufcn56j 74 12 so so RB cord-023944-pufcn56j 74 13 - - HYPH cord-023944-pufcn56j 74 14 called call VBN cord-023944-pufcn56j 74 15 advaoced advaoced JJ cord-023944-pufcn56j 74 16 targeted target VBN cord-023944-pufcn56j 74 17 attacks attack NNS cord-023944-pufcn56j 74 18 , , , cord-023944-pufcn56j 74 19 phishing phishing NN cord-023944-pufcn56j 74 20 , , , cord-023944-pufcn56j 74 21 social social JJ cord-023944-pufcn56j 74 22 engineering engineering NN cord-023944-pufcn56j 74 23 , , , cord-023944-pufcn56j 74 24 etc etc FW cord-023944-pufcn56j 74 25 . . . cord-023944-pufcn56j 74 26 ) ) -RRB- cord-023944-pufcn56j 74 27 , , , cord-023944-pufcn56j 74 28 especially especially RB cord-023944-pufcn56j 74 29 considering consider VBG cord-023944-pufcn56j 74 30 the the DT cord-023944-pufcn56j 74 31 increased increase VBN cord-023944-pufcn56j 74 32 use use NN cord-023944-pufcn56j 74 33 of of IN cord-023944-pufcn56j 74 34 social social JJ cord-023944-pufcn56j 74 35 networks network NNS cord-023944-pufcn56j 74 36 . . . cord-023944-pufcn56j 75 1 aware aware JJ cord-023944-pufcn56j 75 2 of of IN cord-023944-pufcn56j 75 3 internal internal JJ cord-023944-pufcn56j 75 4 security security NN cord-023944-pufcn56j 75 5 measures measure NNS cord-023944-pufcn56j 75 6 aod aod NNP cord-023944-pufcn56j 75 7 compliaoce compliaoce NNP cord-023944-pufcn56j 75 8 issues issue NNS cord-023944-pufcn56j 75 9 ; ; : cord-023944-pufcn56j 75 10 however however RB cord-023944-pufcn56j 75 11 , , , cord-023944-pufcn56j 75 12 the the DT cord-023944-pufcn56j 75 13 extent extent NN cord-023944-pufcn56j 75 14 of of IN cord-023944-pufcn56j 75 15 misuse misuse NN cord-023944-pufcn56j 75 16 . . . cord-023944-pufcn56j 76 1 if if IN cord-023944-pufcn56j 76 2 it -PRON- PRP cord-023944-pufcn56j 76 3 occurs occur VBZ cord-023944-pufcn56j 76 4 , , , cord-023944-pufcn56j 76 5 increases increase VBZ cord-023944-pufcn56j 76 6 heavily heavily RB cord-023944-pufcn56j 76 7 aod aod NN cord-023944-pufcn56j 76 8 causes cause VBZ cord-023944-pufcn56j 76 9 greater great JJR cord-023944-pufcn56j 76 10 damage damage NN cord-023944-pufcn56j 77 1 [ [ -LRB- cord-023944-pufcn56j 77 2 VeriI2 VeriI2 NNP cord-023944-pufcn56j 77 3 ] ] -RRB- cord-023944-pufcn56j 77 4 . . . cord-023944-pufcn56j 78 1 Therefore therefore RB cord-023944-pufcn56j 78 2 , , , cord-023944-pufcn56j 78 3 in in IN cord-023944-pufcn56j 78 4 order order NN cord-023944-pufcn56j 78 5 to to TO cord-023944-pufcn56j 78 6 ensure ensure VB cord-023944-pufcn56j 78 7 that that IN cord-023944-pufcn56j 78 8 no no DT cord-023944-pufcn56j 78 9 further further JJ cord-023944-pufcn56j 78 10 risks risk NNS cord-023944-pufcn56j 78 11 arise arise VBP cord-023944-pufcn56j 78 12 from from IN cord-023944-pufcn56j 78 13 information information NN cord-023944-pufcn56j 78 14 users user NNS cord-023944-pufcn56j 78 15 , , , cord-023944-pufcn56j 78 16 awareness awareness NN cord-023944-pufcn56j 78 17 activities activity NNS cord-023944-pufcn56j 78 18 have have VBP cord-023944-pufcn56j 78 19 to to TO cord-023944-pufcn56j 78 20 be be VB cord-023944-pufcn56j 78 21 kept keep VBN cord-023944-pufcn56j 78 22 on on IN cord-023944-pufcn56j 78 23 a a DT cord-023944-pufcn56j 78 24 high high JJ cord-023944-pufcn56j 78 25 level level NN cord-023944-pufcn56j 78 26 aod aod NN cord-023944-pufcn56j 78 27 some some DT cord-023944-pufcn56j 78 28 of of IN cord-023944-pufcn56j 78 29 these these DT cord-023944-pufcn56j 78 30 activities activity NNS cord-023944-pufcn56j 78 31 have have VBP cord-023944-pufcn56j 78 32 to to TO cord-023944-pufcn56j 78 33 address address VB cord-023944-pufcn56j 78 34 common common JJ cord-023944-pufcn56j 78 35 weaknesses weakness NNS cord-023944-pufcn56j 78 36 in in IN cord-023944-pufcn56j 78 37 processes process NNS cord-023944-pufcn56j 78 38 administering administer VBG cord-023944-pufcn56j 78 39 employees employee NNS cord-023944-pufcn56j 78 40 . . . cord-023944-pufcn56j 79 1 The the DT cord-023944-pufcn56j 79 2 main main JJ cord-023944-pufcn56j 79 3 threats threat NNS cord-023944-pufcn56j 79 4 for for IN cord-023944-pufcn56j 79 5 business business NN cord-023944-pufcn56j 79 6 processes process NNS cord-023944-pufcn56j 79 7 are be VBP cord-023944-pufcn56j 79 8 interruptions interruption NNS cord-023944-pufcn56j 79 9 to to IN cord-023944-pufcn56j 79 10 critical critical JJ cord-023944-pufcn56j 79 11 processes process NNS cord-023944-pufcn56j 79 12 which which WDT cord-023944-pufcn56j 79 13 endangers endanger VBZ cord-023944-pufcn56j 79 14 the the DT cord-023944-pufcn56j 79 15 availability availability NN cord-023944-pufcn56j 79 16 of of IN cord-023944-pufcn56j 79 17 these these DT cord-023944-pufcn56j 79 18 processes process NNS cord-023944-pufcn56j 80 1 aod aod NNP cord-023944-pufcn56j 81 1 the the DT cord-023944-pufcn56j 81 2 inability inability NN cord-023944-pufcn56j 81 3 of of IN cord-023944-pufcn56j 81 4 the the DT cord-023944-pufcn56j 81 5 processes process NNS cord-023944-pufcn56j 81 6 to to IN cord-023944-pufcn56j 81 7 guaraotee guaraotee JJ cord-023944-pufcn56j 81 8 confidentiality confidentiality NN cord-023944-pufcn56j 81 9 , , , cord-023944-pufcn56j 81 10 integrity integrity NN cord-023944-pufcn56j 81 11 aod aod NN cord-023944-pufcn56j 81 12 correctness correctness NN cord-023944-pufcn56j 81 13 of of IN cord-023944-pufcn56j 81 14 the the DT cord-023944-pufcn56j 81 15 information information NN cord-023944-pufcn56j 81 16 . . . cord-023944-pufcn56j 82 1 Applications application NNS cord-023944-pufcn56j 82 2 supporting support VBG cord-023944-pufcn56j 82 3 the the DT cord-023944-pufcn56j 82 4 respective respective JJ cord-023944-pufcn56j 82 5 business business NN cord-023944-pufcn56j 82 6 processes process NNS cord-023944-pufcn56j 82 7 are be VBP cord-023944-pufcn56j 82 8 confronted confront VBN cord-023944-pufcn56j 82 9 with with IN cord-023944-pufcn56j 82 10 analogous analogous JJ cord-023944-pufcn56j 82 11 threats threat NNS cord-023944-pufcn56j 82 12 . . . cord-023944-pufcn56j 83 1 The the DT cord-023944-pufcn56j 83 2 IT IT NNP cord-023944-pufcn56j 83 3 infrastructure infrastructure NN cord-023944-pufcn56j 83 4 provides provide VBZ cord-023944-pufcn56j 83 5 the the DT cord-023944-pufcn56j 83 6 medium medium NN cord-023944-pufcn56j 83 7 for for IN cord-023944-pufcn56j 83 8 communication communication NN cord-023944-pufcn56j 83 9 between between IN cord-023944-pufcn56j 83 10 information information NN cord-023944-pufcn56j 83 11 users user NNS cord-023944-pufcn56j 83 12 , , , cord-023944-pufcn56j 83 13 applications application NNS cord-023944-pufcn56j 83 14 . . . cord-023944-pufcn56j 84 1 and and CC cord-023944-pufcn56j 84 2 business business NN cord-023944-pufcn56j 84 3 processes process NNS cord-023944-pufcn56j 84 4 , , , cord-023944-pufcn56j 84 5 and and CC cord-023944-pufcn56j 84 6 builds build VBZ cord-023944-pufcn56j 84 7 the the DT cord-023944-pufcn56j 84 8 border border NN cord-023944-pufcn56j 84 9 between between IN cord-023944-pufcn56j 84 10 an an DT cord-023944-pufcn56j 84 11 enterprise enterprise NN cord-023944-pufcn56j 84 12 's 's POS cord-023944-pufcn56j 84 13 internal internal JJ cord-023944-pufcn56j 84 14 environment environment NN cord-023944-pufcn56j 84 15 aod aod VB cord-023944-pufcn56j 84 16 the the DT cord-023944-pufcn56j 84 17 external external JJ cord-023944-pufcn56j 84 18 world world NN cord-023944-pufcn56j 84 19 . . . cord-023944-pufcn56j 85 1 Consequently consequently RB cord-023944-pufcn56j 85 2 , , , cord-023944-pufcn56j 85 3 it -PRON- PRP cord-023944-pufcn56j 85 4 is be VBZ cord-023944-pufcn56j 85 5 facing face VBG cord-023944-pufcn56j 85 6 threats threat NNS cord-023944-pufcn56j 85 7 from from IN cord-023944-pufcn56j 85 8 the the DT cord-023944-pufcn56j 85 9 outside outside NN cord-023944-pufcn56j 85 10 as as RB cord-023944-pufcn56j 85 11 well well RB cord-023944-pufcn56j 85 12 as as IN cord-023944-pufcn56j 85 13 from from IN cord-023944-pufcn56j 85 14 within within IN cord-023944-pufcn56j 85 15 of of IN cord-023944-pufcn56j 85 16 the the DT cord-023944-pufcn56j 85 17 orgaoization orgaoization NN cord-023944-pufcn56j 85 18 . . . cord-023944-pufcn56j 86 1 Threats threat NNS cord-023944-pufcn56j 86 2 targeting target VBG cord-023944-pufcn56j 86 3 the the DT cord-023944-pufcn56j 86 4 infrastructure infrastructure NN cord-023944-pufcn56j 86 5 ( ( -LRB- cord-023944-pufcn56j 86 6 internal internal JJ cord-023944-pufcn56j 86 7 as as RB cord-023944-pufcn56j 86 8 well well RB cord-023944-pufcn56j 86 9 as as IN cord-023944-pufcn56j 86 10 external external JJ cord-023944-pufcn56j 86 11 ) ) -RRB- cord-023944-pufcn56j 86 12 are be VBP cord-023944-pufcn56j 86 13 either either RB cord-023944-pufcn56j 86 14 passed pass VBN cord-023944-pufcn56j 86 15 to to IN cord-023944-pufcn56j 86 16 the the DT cord-023944-pufcn56j 86 17 information information NN cord-023944-pufcn56j 86 18 user user NN cord-023944-pufcn56j 86 19 ( ( -LRB- cord-023944-pufcn56j 86 20 e.g. e.g. RB cord-023944-pufcn56j 86 21 , , , cord-023944-pufcn56j 86 22 Trojaos Trojaos NNP cord-023944-pufcn56j 86 23 aod aod NN cord-023944-pufcn56j 86 24 viruses virus NNS cord-023944-pufcn56j 86 25 ) ) -RRB- cord-023944-pufcn56j 87 1 aod aod NNP cord-023944-pufcn56j 87 2 applications application NNS cord-023944-pufcn56j 87 3 ( ( -LRB- cord-023944-pufcn56j 87 4 e.g. e.g. RB cord-023944-pufcn56j 87 5 , , , cord-023944-pufcn56j 87 6 hacking hacking NN cord-023944-pufcn56j 87 7 ) ) -RRB- cord-023944-pufcn56j 87 8 , , , cord-023944-pufcn56j 87 9 or or CC cord-023944-pufcn56j 87 10 addressing address VBG cord-023944-pufcn56j 87 11 the the DT cord-023944-pufcn56j 87 12 infrastructure infrastructure NN cord-023944-pufcn56j 87 13 components component NNS cord-023944-pufcn56j 87 14 ( ( -LRB- cord-023944-pufcn56j 87 15 e.g. e.g. RB cord-023944-pufcn56j 87 16 , , , cord-023944-pufcn56j 87 17 denial denial NN cord-023944-pufcn56j 87 18 of of IN cord-023944-pufcn56j 87 19 service service NN cord-023944-pufcn56j 87 20 attack attack NN cord-023944-pufcn56j 87 21 , , , cord-023944-pufcn56j 87 22 hacking hack VBG cord-023944-pufcn56j 87 23 the the DT cord-023944-pufcn56j 87 24 components component NNS cord-023944-pufcn56j 87 25 ) ) -RRB- cord-023944-pufcn56j 87 26 . . . cord-023944-pufcn56j 88 1 Therefore therefore RB cord-023944-pufcn56j 88 2 , , , cord-023944-pufcn56j 88 3 the the DT cord-023944-pufcn56j 88 4 protection protection NN cord-023944-pufcn56j 88 5 of of IN cord-023944-pufcn56j 88 6 the the DT cord-023944-pufcn56j 88 7 infrastructure infrastructure NN cord-023944-pufcn56j 88 8 builds build VBZ cord-023944-pufcn56j 88 9 the the DT cord-023944-pufcn56j 88 10 basis basis NN cord-023944-pufcn56j 88 11 for for IN cord-023944-pufcn56j 88 12 protecting protect VBG cord-023944-pufcn56j 88 13 the the DT cord-023944-pufcn56j 88 14 other other JJ cord-023944-pufcn56j 88 15 three three CD cord-023944-pufcn56j 88 16 areas area NNS cord-023944-pufcn56j 88 17 , , , cord-023944-pufcn56j 88 18 the the DT cord-023944-pufcn56j 88 19 users user NNS cord-023944-pufcn56j 88 20 , , , cord-023944-pufcn56j 88 21 processes process NNS cord-023944-pufcn56j 88 22 and and CC cord-023944-pufcn56j 88 23 applications application NNS cord-023944-pufcn56j 88 24 . . . cord-023944-pufcn56j 89 1 Specific specific JJ cord-023944-pufcn56j 89 2 threats threat NNS cord-023944-pufcn56j 89 3 arise arise VBP cord-023944-pufcn56j 89 4 of of IN cord-023944-pufcn56j 89 5 technologies technology NNS cord-023944-pufcn56j 89 6 where where WRB cord-023944-pufcn56j 89 7 common common JJ cord-023944-pufcn56j 89 8 security security NN cord-023944-pufcn56j 89 9 techniques technique NNS cord-023944-pufcn56j 89 10 need need VBP cord-023944-pufcn56j 89 11 to to TO cord-023944-pufcn56j 89 12 be be VB cord-023944-pufcn56j 89 13 modified modify VBN cord-023944-pufcn56j 89 14 . . . cord-023944-pufcn56j 90 1 As as IN cord-023944-pufcn56j 90 2 an an DT cord-023944-pufcn56j 90 3 example example NN cord-023944-pufcn56j 90 4 . . . cord-023944-pufcn56j 91 1 virtualization virtualization NNP cord-023944-pufcn56j 91 2 may may MD cord-023944-pufcn56j 91 3 counter counter VB cord-023944-pufcn56j 91 4 a a DT cord-023944-pufcn56j 91 5 certain certain JJ cord-023944-pufcn56j 91 6 kind kind NN cord-023944-pufcn56j 91 7 of of IN cord-023944-pufcn56j 91 8 threat threat NN cord-023944-pufcn56j 91 9 but but CC cord-023944-pufcn56j 91 10 impose impose VB cord-023944-pufcn56j 91 11 new new JJ cord-023944-pufcn56j 91 12 risks risk NNS cord-023944-pufcn56j 91 13 because because IN cord-023944-pufcn56j 91 14 common common JJ cord-023944-pufcn56j 91 15 security security NN cord-023944-pufcn56j 91 16 mechanisms mechanism NNS cord-023944-pufcn56j 91 17 do do VBP cord-023944-pufcn56j 91 18 not not RB cord-023944-pufcn56j 91 19 work work VB cord-023944-pufcn56j 91 20 as as IN cord-023944-pufcn56j 91 21 used use VBN cord-023944-pufcn56j 91 22 before before RB cord-023944-pufcn56j 91 23 . . . cord-023944-pufcn56j 92 1 In in IN cord-023944-pufcn56j 92 2 this this DT cord-023944-pufcn56j 92 3 section section NN cord-023944-pufcn56j 92 4 , , , cord-023944-pufcn56j 92 5 the the DT cord-023944-pufcn56j 92 6 four four CD cord-023944-pufcn56j 92 7 areas area NNS cord-023944-pufcn56j 92 8 are be VBP cord-023944-pufcn56j 92 9 examined examine VBN cord-023944-pufcn56j 92 10 from from IN cord-023944-pufcn56j 92 11 the the DT cord-023944-pufcn56j 92 12 perspective perspective NN cord-023944-pufcn56j 92 13 how how WRB cord-023944-pufcn56j 92 14 an an DT cord-023944-pufcn56j 92 15 organization organization NN cord-023944-pufcn56j 92 16 usually usually RB cord-023944-pufcn56j 92 17 applies apply VBZ cord-023944-pufcn56j 92 18 measures measure NNS cord-023944-pufcn56j 92 19 . . . cord-023944-pufcn56j 93 1 All all DT cord-023944-pufcn56j 93 2 measures measure NNS cord-023944-pufcn56j 93 3 are be VBP cord-023944-pufcn56j 93 4 validated validate VBN cord-023944-pufcn56j 93 5 on on IN cord-023944-pufcn56j 93 6 their -PRON- PRP$ cord-023944-pufcn56j 93 7 completeness completeness NN cord-023944-pufcn56j 93 8 , , , cord-023944-pufcn56j 93 9 effectiveness effectiveness NN cord-023944-pufcn56j 93 10 , , , cord-023944-pufcn56j 93 11 integration integration NN cord-023944-pufcn56j 93 12 support support NN cord-023944-pufcn56j 93 13 and and CC cord-023944-pufcn56j 93 14 simplicity simplicity NN cord-023944-pufcn56j 93 15 as as RB cord-023944-pufcn56j 93 16 far far RB cord-023944-pufcn56j 93 17 as as IN cord-023944-pufcn56j 93 18 applicable applicable JJ cord-023944-pufcn56j 93 19 takiog takiog NN cord-023944-pufcn56j 93 20 into into IN cord-023944-pufcn56j 93 21 account account NN cord-023944-pufcn56j 93 22 an an DT cord-023944-pufcn56j 93 23 average average JJ cord-023944-pufcn56j 93 24 enterprise enterprise NN cord-023944-pufcn56j 93 25 , , , cord-023944-pufcn56j 93 26 its -PRON- PRP$ cord-023944-pufcn56j 93 27 security security NN cord-023944-pufcn56j 93 28 posture posture NN cord-023944-pufcn56j 93 29 and and CC cord-023944-pufcn56j 93 30 its -PRON- PRP$ cord-023944-pufcn56j 93 31 setup setup NN cord-023944-pufcn56j 93 32 . . . cord-023944-pufcn56j 94 1 This this DT cord-023944-pufcn56j 94 2 will will MD cord-023944-pufcn56j 94 3 build build VB cord-023944-pufcn56j 94 4 the the DT cord-023944-pufcn56j 94 5 basis basis NN cord-023944-pufcn56j 94 6 for for IN cord-023944-pufcn56j 94 7 later later JJ cord-023944-pufcn56j 94 8 prioritization prioritization NN cord-023944-pufcn56j 94 9 of of IN cord-023944-pufcn56j 94 10 measures measure NNS cord-023944-pufcn56j 94 11 . . . cord-023944-pufcn56j 95 1 Information information NN cord-023944-pufcn56j 95 2 security security NN cord-023944-pufcn56j 95 3 for for IN cord-023944-pufcn56j 95 4 information information NN cord-023944-pufcn56j 95 5 users user NNS cord-023944-pufcn56j 95 6 is be VBZ cord-023944-pufcn56j 95 7 based base VBN cord-023944-pufcn56j 95 8 on on IN cord-023944-pufcn56j 95 9 three three CD cord-023944-pufcn56j 95 10 pillars pillar NNS cord-023944-pufcn56j 95 11 : : : cord-023944-pufcn56j 95 12 1 1 CD cord-023944-pufcn56j 95 13 . . . cord-023944-pufcn56j 96 1 User user NN cord-023944-pufcn56j 96 2 awareness awareness NN cord-023944-pufcn56j 96 3 targets target VBZ cord-023944-pufcn56j 96 4 on on IN cord-023944-pufcn56j 96 5 training train VBG cord-023944-pufcn56j 96 6 the the DT cord-023944-pufcn56j 96 7 behavior behavior NN cord-023944-pufcn56j 96 8 focusing focus VBG cord-023944-pufcn56j 96 9 on on IN cord-023944-pufcn56j 96 10 compliance compliance NN cord-023944-pufcn56j 96 11 with with IN cord-023944-pufcn56j 96 12 applicable applicable JJ cord-023944-pufcn56j 96 13 legislation legislation NN cord-023944-pufcn56j 96 14 and and CC cord-023944-pufcn56j 96 15 the the DT cord-023944-pufcn56j 96 16 organization organization NN cord-023944-pufcn56j 96 17 's 's POS cord-023944-pufcn56j 96 18 policies policy NNS cord-023944-pufcn56j 96 19 and and CC cord-023944-pufcn56j 96 20 using use VBG cord-023944-pufcn56j 96 21 applicable applicable JJ cord-023944-pufcn56j 96 22 tools tool NNS cord-023944-pufcn56j 96 23 . . . cord-023944-pufcn56j 97 1 2 2 LS cord-023944-pufcn56j 97 2 . . . cord-023944-pufcn56j 98 1 HR hr NN cord-023944-pufcn56j 98 2 processes process NNS cord-023944-pufcn56j 98 3 which which WDT cord-023944-pufcn56j 98 4 ensure ensure VBP cord-023944-pufcn56j 98 5 that that IN cord-023944-pufcn56j 98 6 appropriate appropriate JJ cord-023944-pufcn56j 98 7 employees employee NNS cord-023944-pufcn56j 98 8 are be VBP cord-023944-pufcn56j 98 9 selected select VBN cord-023944-pufcn56j 99 1 , , , cord-023944-pufcn56j 99 2 their -PRON- PRP$ cord-023944-pufcn56j 99 3 skills skill NNS cord-023944-pufcn56j 99 4 are be VBP cord-023944-pufcn56j 99 5 kept keep VBN cord-023944-pufcn56j 99 6 up up IN cord-023944-pufcn56j 99 7 - - HYPH cord-023944-pufcn56j 99 8 to to IN cord-023944-pufcn56j 99 9 - - HYPH cord-023944-pufcn56j 99 10 date date NN cord-023944-pufcn56j 99 11 and and CC cord-023944-pufcn56j 99 12 starterlleaver starterlleaver NNP cord-023944-pufcn56j 99 13 / / SYM cord-023944-pufcn56j 99 14 position position NN cord-023944-pufcn56j 99 15 change change NN cord-023944-pufcn56j 99 16 procedures procedure NNS cord-023944-pufcn56j 99 17 enforce enforce VBP cord-023944-pufcn56j 99 18 the the DT cord-023944-pufcn56j 99 19 need need VB cord-023944-pufcn56j 99 20 - - HYPH cord-023944-pufcn56j 99 21 to to TO cord-023944-pufcn56j 99 22 - - HYPH cord-023944-pufcn56j 99 23 know know VB cord-023944-pufcn56j 99 24 principle principle NN cord-023944-pufcn56j 99 25 . . . cord-023944-pufcn56j 100 1 3 3 LS cord-023944-pufcn56j 100 2 . . . cord-023944-pufcn56j 101 1 Procurement procurement NN cord-023944-pufcn56j 101 2 is be VBZ cord-023944-pufcn56j 101 3 usually usually RB cord-023944-pufcn56j 101 4 responsible responsible JJ cord-023944-pufcn56j 101 5 for for IN cord-023944-pufcn56j 101 6 implementing implement VBG cord-023944-pufcn56j 101 7 measures measure NNS cord-023944-pufcn56j 101 8 that that WDT cord-023944-pufcn56j 101 9 contractors contractor NNS cord-023944-pufcn56j 101 10 and and CC cord-023944-pufcn56j 101 11 third third JJ cord-023944-pufcn56j 101 12 party party NN cord-023944-pufcn56j 101 13 users user NNS cord-023944-pufcn56j 101 14 follow follow VBP cord-023944-pufcn56j 101 15 the the DT cord-023944-pufcn56j 101 16 same same JJ cord-023944-pufcn56j 101 17 regulations regulation NNS cord-023944-pufcn56j 101 18 as as IN cord-023944-pufcn56j 101 19 employees employee NNS cord-023944-pufcn56j 101 20 and and CC cord-023944-pufcn56j 101 21 do do VBP cord-023944-pufcn56j 101 22 not not RB cord-023944-pufcn56j 101 23 increase increase VB cord-023944-pufcn56j 101 24 the the DT cord-023944-pufcn56j 101 25 risks risk NNS cord-023944-pufcn56j 101 26 . . . cord-023944-pufcn56j 102 1 Completeness completeness NN cord-023944-pufcn56j 102 2 : : : cord-023944-pufcn56j 102 3 1 1 LS cord-023944-pufcn56j 102 4 ) ) -RRB- cord-023944-pufcn56j 103 1 An an DT cord-023944-pufcn56j 103 2 induction induction NN cord-023944-pufcn56j 103 3 training training NN cord-023944-pufcn56j 103 4 / / SYM cord-023944-pufcn56j 103 5 orientation orientation NN cord-023944-pufcn56j 103 6 days day NNS cord-023944-pufcn56j 103 7 usually usually RB cord-023944-pufcn56j 103 8 cover cover VBP cord-023944-pufcn56j 103 9 information information NN cord-023944-pufcn56j 103 10 security security NN cord-023944-pufcn56j 103 11 topics topic NNS cord-023944-pufcn56j 103 12 . . . cord-023944-pufcn56j 104 1 Further further JJ cord-023944-pufcn56j 104 2 user user NN cord-023944-pufcn56j 104 3 awareness awareness NN cord-023944-pufcn56j 104 4 programs program NNS cord-023944-pufcn56j 104 5 are be VBP cord-023944-pufcn56j 104 6 rarely rarely RB cord-023944-pufcn56j 104 7 established establish VBN cord-023944-pufcn56j 104 8 at at IN cord-023944-pufcn56j 104 9 an an DT cord-023944-pufcn56j 104 10 organization organization NN cord-023944-pufcn56j 104 11 . . . cord-023944-pufcn56j 105 1 2 2 LS cord-023944-pufcn56j 105 2 ) ) -RRB- cord-023944-pufcn56j 106 1 An an DT cord-023944-pufcn56j 106 2 end end NN cord-023944-pufcn56j 106 3 - - HYPH cord-023944-pufcn56j 106 4 to to IN cord-023944-pufcn56j 106 5 - - HYPH cord-023944-pufcn56j 106 6 end end NN cord-023944-pufcn56j 106 7 employee employee NN cord-023944-pufcn56j 106 8 lifecycle lifecycle NN cord-023944-pufcn56j 106 9 management management NN cord-023944-pufcn56j 106 10 does do VBZ cord-023944-pufcn56j 106 11 rarely rarely RB cord-023944-pufcn56j 106 12 exist exist VB cord-023944-pufcn56j 106 13 Starter starter NN cord-023944-pufcn56j 106 14 processes process NNS cord-023944-pufcn56j 106 15 usually usually RB cord-023944-pufcn56j 106 16 work work VBP cord-023944-pufcn56j 106 17 well well RB cord-023944-pufcn56j 106 18 for for IN cord-023944-pufcn56j 106 19 employees employee NNS cord-023944-pufcn56j 106 20 . . . cord-023944-pufcn56j 107 1 During during IN cord-023944-pufcn56j 107 2 employment employment NN cord-023944-pufcn56j 107 3 , , , cord-023944-pufcn56j 107 4 many many JJ cord-023944-pufcn56j 107 5 organizations organization NNS cord-023944-pufcn56j 107 6 pay pay VBP cord-023944-pufcn56j 107 7 attention attention NN cord-023944-pufcn56j 107 8 that that IN cord-023944-pufcn56j 107 9 their -PRON- PRP$ cord-023944-pufcn56j 107 10 workforce workforce NN cord-023944-pufcn56j 107 11 is be VBZ cord-023944-pufcn56j 107 12 sufficiently sufficiently RB cord-023944-pufcn56j 107 13 trained train VBN cord-023944-pufcn56j 107 14 and and CC cord-023944-pufcn56j 107 15 kept keep VBD cord-023944-pufcn56j 107 16 up up RP cord-023944-pufcn56j 107 17 to to IN cord-023944-pufcn56j 107 18 date date NN cord-023944-pufcn56j 107 19 with with IN cord-023944-pufcn56j 107 20 new new JJ cord-023944-pufcn56j 107 21 technological technological JJ cord-023944-pufcn56j 107 22 developments development NNS cord-023944-pufcn56j 107 23 . . . cord-023944-pufcn56j 108 1 Deficiencies deficiency NNS cord-023944-pufcn56j 108 2 exist exist VBP cord-023944-pufcn56j 108 3 in in IN cord-023944-pufcn56j 108 4 the the DT cord-023944-pufcn56j 108 5 leaver leaver NN cord-023944-pufcn56j 108 6 process process NN cord-023944-pufcn56j 108 7 with with IN cord-023944-pufcn56j 108 8 the the DT cord-023944-pufcn56j 108 9 exception exception NN cord-023944-pufcn56j 108 10 of of IN cord-023944-pufcn56j 108 11 dismissal dismissal NN cord-023944-pufcn56j 108 12 . . . cord-023944-pufcn56j 109 1 Position position NN cord-023944-pufcn56j 109 2 change change NN cord-023944-pufcn56j 109 3 is be VBZ cord-023944-pufcn56j 109 4 frequently frequently RB cord-023944-pufcn56j 109 5 implemented implement VBN cord-023944-pufcn56j 109 6 only only RB cord-023944-pufcn56j 109 7 rudimentarily rudimentarily RB cord-023944-pufcn56j 109 8 . . . cord-023944-pufcn56j 110 1 3 3 LS cord-023944-pufcn56j 110 2 ) ) -RRB- cord-023944-pufcn56j 110 3 Contractors contractor NNS cord-023944-pufcn56j 110 4 and and CC cord-023944-pufcn56j 110 5 third third JJ cord-023944-pufcn56j 110 6 parties party NNS cord-023944-pufcn56j 110 7 are be VBP cord-023944-pufcn56j 110 8 usually usually RB cord-023944-pufcn56j 110 9 not not RB cord-023944-pufcn56j 110 10 considered consider VBN cord-023944-pufcn56j 110 11 at at RB cord-023944-pufcn56j 110 12 all all RB cord-023944-pufcn56j 110 13 because because IN cord-023944-pufcn56j 110 14 they -PRON- PRP cord-023944-pufcn56j 110 15 are be VBP cord-023944-pufcn56j 110 16 frequently frequently RB cord-023944-pufcn56j 110 17 not not RB cord-023944-pufcn56j 110 18 administered administer VBN cord-023944-pufcn56j 110 19 by by IN cord-023944-pufcn56j 110 20 HR HR NNP cord-023944-pufcn56j 110 21 and and CC cord-023944-pufcn56j 110 22 its -PRON- PRP$ cord-023944-pufcn56j 110 23 processes process NNS cord-023944-pufcn56j 110 24 . . . cord-023944-pufcn56j 111 1 Procurement procurement NN cord-023944-pufcn56j 111 2 departments department NNS cord-023944-pufcn56j 111 3 are be VBP cord-023944-pufcn56j 111 4 not not RB cord-023944-pufcn56j 111 5 aware aware JJ cord-023944-pufcn56j 111 6 about about IN cord-023944-pufcn56j 111 7 their -PRON- PRP$ cord-023944-pufcn56j 111 8 responsibility responsibility NN cord-023944-pufcn56j 111 9 and and CC cord-023944-pufcn56j 111 10 the the DT cord-023944-pufcn56j 111 11 requirements requirement NNS cord-023944-pufcn56j 111 12 for for IN cord-023944-pufcn56j 111 13 proper proper JJ cord-023944-pufcn56j 111 14 termination termination NN cord-023944-pufcn56j 111 15 of of IN cord-023944-pufcn56j 111 16 contracts contract NNS cord-023944-pufcn56j 111 17 with with IN cord-023944-pufcn56j 111 18 third third JJ cord-023944-pufcn56j 111 19 parties party NNS cord-023944-pufcn56j 111 20 . . . cord-023944-pufcn56j 112 1 Effectiveness effectiveness NN cord-023944-pufcn56j 112 2 : : : cord-023944-pufcn56j 112 3 1 1 CD cord-023944-pufcn56j 112 4 ) ) -RRB- cord-023944-pufcn56j 113 1 Since since IN cord-023944-pufcn56j 113 2 induction induction NN cord-023944-pufcn56j 113 3 training training NN cord-023944-pufcn56j 113 4 is be VBZ cord-023944-pufcn56j 113 5 a a DT cord-023944-pufcn56j 113 6 one one CD cord-023944-pufcn56j 113 7 - - HYPH cord-023944-pufcn56j 113 8 time time NN cord-023944-pufcn56j 113 9 activity activity NN cord-023944-pufcn56j 113 10 at at IN cord-023944-pufcn56j 113 11 the the DT cord-023944-pufcn56j 113 12 start start NN cord-023944-pufcn56j 113 13 of of IN cord-023944-pufcn56j 113 14 employment employment NN cord-023944-pufcn56j 113 15 , , , cord-023944-pufcn56j 113 16 it -PRON- PRP cord-023944-pufcn56j 113 17 does do VBZ cord-023944-pufcn56j 113 18 not not RB cord-023944-pufcn56j 113 19 have have VB cord-023944-pufcn56j 113 20 any any DT cord-023944-pufcn56j 113 21 long long JJ cord-023944-pufcn56j 113 22 - - HYPH cord-023944-pufcn56j 113 23 term term NN cord-023944-pufcn56j 113 24 effects effect NNS cord-023944-pufcn56j 113 25 . . . cord-023944-pufcn56j 114 1 2 2 LS cord-023944-pufcn56j 114 2 ) ) -RRB- cord-023944-pufcn56j 114 3 and and CC cord-023944-pufcn56j 114 4 3 3 CD cord-023944-pufcn56j 114 5 ) ) -RRB- cord-023944-pufcn56j 115 1 The the DT cord-023944-pufcn56j 115 2 implementation implementation NN cord-023944-pufcn56j 115 3 of of IN cord-023944-pufcn56j 115 4 the the DT cord-023944-pufcn56j 115 5 need need VB cord-023944-pufcn56j 115 6 - - HYPH cord-023944-pufcn56j 115 7 to to TO cord-023944-pufcn56j 115 8 - - HYPH cord-023944-pufcn56j 115 9 know know VB cord-023944-pufcn56j 115 10 principle principle NN cord-023944-pufcn56j 115 11 relies rely VBZ cord-023944-pufcn56j 115 12 on on IN cord-023944-pufcn56j 115 13 the the DT cord-023944-pufcn56j 115 14 respective respective JJ cord-023944-pufcn56j 115 15 line line NN cord-023944-pufcn56j 115 16 managers manager NNS cord-023944-pufcn56j 115 17 and and CC cord-023944-pufcn56j 115 18 the the DT cord-023944-pufcn56j 115 19 people people NNS cord-023944-pufcn56j 115 20 who who WP cord-023944-pufcn56j 115 21 manage manage VBP cord-023944-pufcn56j 115 22 and and CC cord-023944-pufcn56j 115 23 direct direct VB cord-023944-pufcn56j 115 24 third third JJ cord-023944-pufcn56j 115 25 party party NN cord-023944-pufcn56j 115 26 users user NNS cord-023944-pufcn56j 115 27 in in IN cord-023944-pufcn56j 115 28 an an DT cord-023944-pufcn56j 115 29 organization organization NN cord-023944-pufcn56j 115 30 . . . cord-023944-pufcn56j 116 1 integration integration NN cord-023944-pufcn56j 116 2 in in IN cord-023944-pufcn56j 116 3 the the DT cord-023944-pufcn56j 116 4 interual interual JJ cord-023944-pufcn56j 116 5 HR hr NN cord-023944-pufcn56j 116 6 and and CC cord-023944-pufcn56j 116 7 procurement procurement NN cord-023944-pufcn56j 116 8 processes process NNS cord-023944-pufcn56j 116 9 . . . cord-023944-pufcn56j 117 1 Support support NN cord-023944-pufcn56j 117 2 1 1 CD cord-023944-pufcn56j 117 3 ) ) -RRB- cord-023944-pufcn56j 118 1 A a DT cord-023944-pufcn56j 118 2 sample sample NN cord-023944-pufcn56j 118 3 induction induction NN cord-023944-pufcn56j 118 4 training training NN cord-023944-pufcn56j 118 5 as as RB cord-023944-pufcn56j 118 6 well well RB cord-023944-pufcn56j 118 7 as as IN cord-023944-pufcn56j 118 8 on on RB cord-023944-pufcn56j 118 9 - - HYPH cord-023944-pufcn56j 118 10 going go VBG cord-023944-pufcn56j 118 11 awareness awareness NN cord-023944-pufcn56j 118 12 programs program NNS cord-023944-pufcn56j 118 13 are be VBP cord-023944-pufcn56j 118 14 usually usually RB cord-023944-pufcn56j 118 15 centrally centrally RB cord-023944-pufcn56j 118 16 provided provide VBN cord-023944-pufcn56j 118 17 . . . cord-023944-pufcn56j 119 1 However however RB cord-023944-pufcn56j 119 2 , , , cord-023944-pufcn56j 119 3 these these DT cord-023944-pufcn56j 119 4 do do VBP cord-023944-pufcn56j 119 5 not not RB cord-023944-pufcn56j 119 6 cover cover VB cord-023944-pufcn56j 119 7 all all DT cord-023944-pufcn56j 119 8 aspects aspect NNS cord-023944-pufcn56j 119 9 of of IN cord-023944-pufcn56j 119 10 information information NN cord-023944-pufcn56j 119 11 security security NN cord-023944-pufcn56j 119 12 ; ; : cord-023944-pufcn56j 119 13 especially especially RB cord-023944-pufcn56j 119 14 information information NN cord-023944-pufcn56j 119 15 handling handling NN cord-023944-pufcn56j 119 16 is be VBZ cord-023944-pufcn56j 119 17 dealt deal VBN cord-023944-pufcn56j 119 18 with with IN cord-023944-pufcn56j 119 19 rudimentarily rudimentarily RB cord-023944-pufcn56j 119 20 . . . cord-023944-pufcn56j 120 1 There there EX cord-023944-pufcn56j 120 2 exist exist VBP cord-023944-pufcn56j 120 3 also also RB cord-023944-pufcn56j 120 4 several several JJ cord-023944-pufcn56j 120 5 tools tool NNS cord-023944-pufcn56j 120 6 enabling enable VBG cord-023944-pufcn56j 120 7 appro appro JJ cord-023944-pufcn56j 120 8 - - HYPH cord-023944-pufcn56j 120 9 priate priate JJ cord-023944-pufcn56j 120 10 handling handling NN cord-023944-pufcn56j 120 11 of of IN cord-023944-pufcn56j 120 12 information information NN cord-023944-pufcn56j 120 13 within within IN cord-023944-pufcn56j 120 14 an an DT cord-023944-pufcn56j 120 15 organization organization NN cord-023944-pufcn56j 120 16 ( ( -LRB- cord-023944-pufcn56j 120 17 e.g e.g FW cord-023944-pufcn56j 120 18 " " `` cord-023944-pufcn56j 120 19 tools tool NNS cord-023944-pufcn56j 120 20 for for IN cord-023944-pufcn56j 120 21 information information NN cord-023944-pufcn56j 120 22 classification classification NN cord-023944-pufcn56j 120 23 [ [ -LRB- cord-023944-pufcn56j 120 24 LFRM10 LFRM10 NNP cord-023944-pufcn56j 120 25 ] ] -RRB- cord-023944-pufcn56j 120 26 or or CC cord-023944-pufcn56j 120 27 for for IN cord-023944-pufcn56j 120 28 the the DT cord-023944-pufcn56j 120 29 encryption encryption NN cord-023944-pufcn56j 120 30 offiles offiles NNP cord-023944-pufcn56j 120 31 , , , cord-023944-pufcn56j 120 32 MS MS NNP cord-023944-pufcn56j 120 33 Office Office NNP cord-023944-pufcn56j 120 34 document document NN cord-023944-pufcn56j 120 35 templates template NNS cord-023944-pufcn56j 120 36 for for IN cord-023944-pufcn56j 120 37 labeling labeling NN cord-023944-pufcn56j 120 38 ) ) -RRB- cord-023944-pufcn56j 120 39 . . . cord-023944-pufcn56j 121 1 However however RB cord-023944-pufcn56j 121 2 , , , cord-023944-pufcn56j 121 3 these these DT cord-023944-pufcn56j 121 4 do do VBP cord-023944-pufcn56j 121 5 not not RB cord-023944-pufcn56j 121 6 cover cover VB cord-023944-pufcn56j 121 7 all all DT cord-023944-pufcn56j 121 8 aspects aspect NNS cord-023944-pufcn56j 121 9 and and CC cord-023944-pufcn56j 121 10 users user NNS cord-023944-pufcn56j 121 11 are be VBP cord-023944-pufcn56j 121 12 neither neither CC cord-023944-pufcn56j 121 13 sufficiently sufficiently RB cord-023944-pufcn56j 121 14 aware aware JJ cord-023944-pufcn56j 121 15 of of IN cord-023944-pufcn56j 121 16 the the DT cord-023944-pufcn56j 121 17 tools tool NNS cord-023944-pufcn56j 121 18 available available JJ cord-023944-pufcn56j 121 19 nor nor CC cord-023944-pufcn56j 121 20 do do VBP cord-023944-pufcn56j 121 21 they -PRON- PRP cord-023944-pufcn56j 121 22 know know VB cord-023944-pufcn56j 121 23 how how WRB cord-023944-pufcn56j 121 24 to to TO cord-023944-pufcn56j 121 25 handle handle VB cord-023944-pufcn56j 121 26 them -PRON- PRP cord-023944-pufcn56j 121 27 properly properly RB cord-023944-pufcn56j 121 28 . . . cord-023944-pufcn56j 122 1 2 2 LS cord-023944-pufcn56j 122 2 ) ) -RRB- cord-023944-pufcn56j 122 3 and and CC cord-023944-pufcn56j 122 4 3 3 CD cord-023944-pufcn56j 122 5 ) ) -RRB- cord-023944-pufcn56j 123 1 There there EX cord-023944-pufcn56j 123 2 are be VBP cord-023944-pufcn56j 123 3 only only RB cord-023944-pufcn56j 123 4 few few JJ cord-023944-pufcn56j 123 5 tools tool NNS cord-023944-pufcn56j 123 6 on on IN cord-023944-pufcn56j 123 7 the the DT cord-023944-pufcn56j 123 8 market market NN cord-023944-pufcn56j 123 9 and and CC cord-023944-pufcn56j 123 10 seldomly seldomly RB cord-023944-pufcn56j 123 11 in in IN cord-023944-pufcn56j 123 12 use use NN cord-023944-pufcn56j 123 13 which which WDT cord-023944-pufcn56j 123 14 support support VBP cord-023944-pufcn56j 123 15 the the DT cord-023944-pufcn56j 123 16 user user NN cord-023944-pufcn56j 123 17 provisioning provisioning NN cord-023944-pufcn56j 123 18 in in IN cord-023944-pufcn56j 123 19 the the DT cord-023944-pufcn56j 123 20 HR hr NN cord-023944-pufcn56j 123 21 and and CC cord-023944-pufcn56j 123 22 procurement procurement NN cord-023944-pufcn56j 123 23 processes process NNS cord-023944-pufcn56j 123 24 . . . cord-023944-pufcn56j 124 1 Simplicity simplicity NN cord-023944-pufcn56j 124 2 : : : cord-023944-pufcn56j 124 3 Varies vary VBZ cord-023944-pufcn56j 124 4 , , , cord-023944-pufcn56j 124 5 depending depend VBG cord-023944-pufcn56j 124 6 on on IN cord-023944-pufcn56j 124 7 the the DT cord-023944-pufcn56j 124 8 tools tool NNS cord-023944-pufcn56j 124 9 in in IN cord-023944-pufcn56j 124 10 use use NN cord-023944-pufcn56j 124 11 . . . cord-023944-pufcn56j 125 1 A a DT cord-023944-pufcn56j 125 2 simple simple JJ cord-023944-pufcn56j 125 3 conclusion conclusion NN cord-023944-pufcn56j 125 4 follows follow VBZ cord-023944-pufcn56j 125 5 out out IN cord-023944-pufcn56j 125 6 of of IN cord-023944-pufcn56j 125 7 this this DT cord-023944-pufcn56j 125 8 evaluation evaluation NN cord-023944-pufcn56j 125 9 : : : cord-023944-pufcn56j 125 10 the the DT cord-023944-pufcn56j 125 11 processes process NNS cord-023944-pufcn56j 125 12 for for IN cord-023944-pufcn56j 125 13 securing secure VBG cord-023944-pufcn56j 125 14 information information NN cord-023944-pufcn56j 125 15 by by IN cord-023944-pufcn56j 125 16 the the DT cord-023944-pufcn56j 125 17 respective respective JJ cord-023944-pufcn56j 125 18 owners owner NNS cord-023944-pufcn56j 125 19 are be VBP cord-023944-pufcn56j 125 20 usually usually RB cord-023944-pufcn56j 125 21 not not RB cord-023944-pufcn56j 125 22 sufficient sufficient JJ cord-023944-pufcn56j 125 23 to to TO cord-023944-pufcn56j 125 24 reduce reduce VB cord-023944-pufcn56j 125 25 risks risk NNS cord-023944-pufcn56j 125 26 with with IN cord-023944-pufcn56j 125 27 respect respect NN cord-023944-pufcn56j 125 28 to to IN cord-023944-pufcn56j 125 29 confidentiality confidentiality NN cord-023944-pufcn56j 125 30 , , , cord-023944-pufcn56j 125 31 integrity integrity NN cord-023944-pufcn56j 125 32 and and CC cord-023944-pufcn56j 125 33 availability availability NN cord-023944-pufcn56j 125 34 . . . cord-023944-pufcn56j 126 1 When when WRB cord-023944-pufcn56j 126 2 it -PRON- PRP cord-023944-pufcn56j 126 3 comes come VBZ cord-023944-pufcn56j 126 4 to to IN cord-023944-pufcn56j 126 5 business business NN cord-023944-pufcn56j 126 6 processes process NNS cord-023944-pufcn56j 126 7 , , , cord-023944-pufcn56j 126 8 two two CD cord-023944-pufcn56j 126 9 aspects aspect NNS cord-023944-pufcn56j 126 10 are be VBP cord-023944-pufcn56j 126 11 of of IN cord-023944-pufcn56j 126 12 relevance relevance NN cord-023944-pufcn56j 126 13 with with IN cord-023944-pufcn56j 126 14 respect respect NN cord-023944-pufcn56j 126 15 to to IN cord-023944-pufcn56j 126 16 information information NN cord-023944-pufcn56j 126 17 security security NN cord-023944-pufcn56j 126 18 : : : cord-023944-pufcn56j 126 19 1 1 LS cord-023944-pufcn56j 126 20 ) ) -RRB- cord-023944-pufcn56j 126 21 the the DT cord-023944-pufcn56j 126 22 information information NN cord-023944-pufcn56j 126 23 flows flow VBZ cord-023944-pufcn56j 126 24 , , , cord-023944-pufcn56j 126 25 and and CC cord-023944-pufcn56j 126 26 2 2 LS cord-023944-pufcn56j 126 27 ) ) -RRB- cord-023944-pufcn56j 126 28 the the DT cord-023944-pufcn56j 126 29 importance importance NN cord-023944-pufcn56j 126 30 of of IN cord-023944-pufcn56j 126 31 the the DT cord-023944-pufcn56j 126 32 respective respective JJ cord-023944-pufcn56j 126 33 process process NN cord-023944-pufcn56j 126 34 for for IN cord-023944-pufcn56j 126 35 the the DT cord-023944-pufcn56j 126 36 enterprise enterprise NN cord-023944-pufcn56j 126 37 . . . cord-023944-pufcn56j 127 1 lnformation lnformation NNP cord-023944-pufcn56j 127 2 flows flow VBZ cord-023944-pufcn56j 127 3 need need VBP cord-023944-pufcn56j 127 4 to to TO cord-023944-pufcn56j 127 5 be be VB cord-023944-pufcn56j 127 6 evaluated evaluate VBN cord-023944-pufcn56j 127 7 to to TO cord-023944-pufcn56j 127 8 ensure ensure VB cord-023944-pufcn56j 127 9 proper proper JJ cord-023944-pufcn56j 127 10 handling handling NN cord-023944-pufcn56j 127 11 of of IN cord-023944-pufcn56j 127 12 information information NN cord-023944-pufcn56j 127 13 in in IN cord-023944-pufcn56j 127 14 protecting protect VBG cord-023944-pufcn56j 127 15 its -PRON- PRP$ cord-023944-pufcn56j 127 16 confidentiality confidentiality NN cord-023944-pufcn56j 127 17 and and CC cord-023944-pufcn56j 127 18 integrity integrity NN cord-023944-pufcn56j 127 19 . . . cord-023944-pufcn56j 128 1 Importance importance NN cord-023944-pufcn56j 128 2 of of IN cord-023944-pufcn56j 128 3 the the DT cord-023944-pufcn56j 128 4 business business NN cord-023944-pufcn56j 128 5 process process NN cord-023944-pufcn56j 128 6 indicates indicate VBZ cord-023944-pufcn56j 128 7 how how WRB cord-023944-pufcn56j 128 8 important important JJ cord-023944-pufcn56j 128 9 its -PRON- PRP$ cord-023944-pufcn56j 128 10 information information NN cord-023944-pufcn56j 128 11 is be VBZ cord-023944-pufcn56j 128 12 for for IN cord-023944-pufcn56j 128 13 conducting conduct VBG cord-023944-pufcn56j 128 14 business business NN cord-023944-pufcn56j 128 15 ; ; : cord-023944-pufcn56j 128 16 this this DT cord-023944-pufcn56j 128 17 determines determine VBZ cord-023944-pufcn56j 128 18 the the DT cord-023944-pufcn56j 128 19 priorities priority NNS cord-023944-pufcn56j 128 20 for for IN cord-023944-pufcn56j 128 21 continuity continuity NN cord-023944-pufcn56j 128 22 activities activity NNS cord-023944-pufcn56j 128 23 and and CC cord-023944-pufcn56j 128 24 recovery recovery NN cord-023944-pufcn56j 128 25 . . . cord-023944-pufcn56j 129 1 Completeness completeness NN cord-023944-pufcn56j 129 2 : : : cord-023944-pufcn56j 129 3 is be VBZ cord-023944-pufcn56j 129 4 usually usually RB cord-023944-pufcn56j 129 5 not not RB cord-023944-pufcn56j 129 6 given give VBN cord-023944-pufcn56j 129 7 . . . cord-023944-pufcn56j 130 1 Handling handle VBG cord-023944-pufcn56j 130 2 of of IN cord-023944-pufcn56j 130 3 information information NN cord-023944-pufcn56j 130 4 within within IN cord-023944-pufcn56j 130 5 the the DT cord-023944-pufcn56j 130 6 business business NN cord-023944-pufcn56j 130 7 processes process NNS cord-023944-pufcn56j 130 8 relies rely VBZ cord-023944-pufcn56j 130 9 on on IN cord-023944-pufcn56j 130 10 the the DT cord-023944-pufcn56j 130 11 attentiveness attentiveness NN cord-023944-pufcn56j 130 12 of of IN cord-023944-pufcn56j 130 13 the the DT cord-023944-pufcn56j 130 14 employees employee NNS cord-023944-pufcn56j 130 15 ( ( -LRB- cord-023944-pufcn56j 130 16 see see VB cord-023944-pufcn56j 130 17 also also RB cord-023944-pufcn56j 130 18 Section section NN cord-023944-pufcn56j 130 19 4.1 4.1 CD cord-023944-pufcn56j 130 20 ) ) -RRB- cord-023944-pufcn56j 130 21 and and CC cord-023944-pufcn56j 130 22 individual individual JJ cord-023944-pufcn56j 130 23 business business NN cord-023944-pufcn56j 130 24 owners owner NNS cord-023944-pufcn56j 130 25 dealing deal VBG cord-023944-pufcn56j 130 26 with with IN cord-023944-pufcn56j 130 27 the the DT cord-023944-pufcn56j 130 28 information information NN cord-023944-pufcn56j 130 29 . . . cord-023944-pufcn56j 131 1 AB AB NNP cord-023944-pufcn56j 131 2 a a DT cord-023944-pufcn56j 131 3 consequence consequence NN cord-023944-pufcn56j 131 4 , , , cord-023944-pufcn56j 131 5 segregation segregation NN cord-023944-pufcn56j 131 6 of of IN cord-023944-pufcn56j 131 7 duties duty NNS cord-023944-pufcn56j 131 8 violations violation NNS cord-023944-pufcn56j 131 9 and and CC cord-023944-pufcn56j 131 10 missing miss VBG cord-023944-pufcn56j 131 11 business business NN cord-023944-pufcn56j 131 12 continuity continuity NN cord-023944-pufcn56j 131 13 are be VBP cord-023944-pufcn56j 131 14 the the DT cord-023944-pufcn56j 131 15 most most RBS cord-023944-pufcn56j 131 16 frequent frequent JJ cord-023944-pufcn56j 131 17 deficits deficit NNS cord-023944-pufcn56j 131 18 in in IN cord-023944-pufcn56j 131 19 many many JJ cord-023944-pufcn56j 131 20 organizations organization NNS cord-023944-pufcn56j 131 21 . . . cord-023944-pufcn56j 132 1 Business business NN cord-023944-pufcn56j 132 2 continuity continuity NN cord-023944-pufcn56j 132 3 management management NN cord-023944-pufcn56j 132 4 has have VBZ cord-023944-pufcn56j 132 5 currently currently RB cord-023944-pufcn56j 132 6 played play VBN cord-023944-pufcn56j 132 7 an an DT cord-023944-pufcn56j 132 8 important important JJ cord-023944-pufcn56j 132 9 role role NN cord-023944-pufcn56j 132 10 only only RB cord-023944-pufcn56j 132 11 in in IN cord-023944-pufcn56j 132 12 the the DT cord-023944-pufcn56j 132 13 Asian asian JJ cord-023944-pufcn56j 132 14 market market NN cord-023944-pufcn56j 132 15 due due IN cord-023944-pufcn56j 132 16 to to IN cord-023944-pufcn56j 132 17 the the DT cord-023944-pufcn56j 132 18 past past JJ cord-023944-pufcn56j 132 19 experiences experience NNS cord-023944-pufcn56j 132 20 ( ( -LRB- cord-023944-pufcn56j 132 21 SARS SARS NNP cord-023944-pufcn56j 132 22 , , , cord-023944-pufcn56j 132 23 bird bird NN cord-023944-pufcn56j 132 24 flue flue NN cord-023944-pufcn56j 132 25 , , , cord-023944-pufcn56j 132 26 and and CC cord-023944-pufcn56j 132 27 tsunami tsunami NN cord-023944-pufcn56j 132 28 ) ) -RRB- cord-023944-pufcn56j 132 29 ; ; : cord-023944-pufcn56j 132 30 usually usually RB cord-023944-pufcn56j 132 31 , , , cord-023944-pufcn56j 132 32 no no DT cord-023944-pufcn56j 132 33 central central JJ cord-023944-pufcn56j 132 34 activities activity NNS cord-023944-pufcn56j 132 35 exist exist VBP cord-023944-pufcn56j 132 36 to to TO cord-023944-pufcn56j 132 37 establish establish VB cord-023944-pufcn56j 132 38 a a DT cord-023944-pufcn56j 132 39 proper proper JJ cord-023944-pufcn56j 132 40 business business NN cord-023944-pufcn56j 132 41 continuity continuity NN cord-023944-pufcn56j 132 42 management management NN cord-023944-pufcn56j 132 43 process process NN cord-023944-pufcn56j 132 44 . . . cord-023944-pufcn56j 133 1 Effectivenes effectivene NNS cord-023944-pufcn56j 133 2 for for IN cord-023944-pufcn56j 133 3 the the DT cord-023944-pufcn56j 133 4 respective respective JJ cord-023944-pufcn56j 133 5 measures measure NNS cord-023944-pufcn56j 133 6 can can MD cord-023944-pufcn56j 133 7 not not RB cord-023944-pufcn56j 133 8 be be VB cord-023944-pufcn56j 133 9 validated validate VBN cord-023944-pufcn56j 133 10 since since IN cord-023944-pufcn56j 133 11 only only RB cord-023944-pufcn56j 133 12 limited limited JJ cord-023944-pufcn56j 133 13 activities activity NNS cord-023944-pufcn56j 133 14 have have VBP cord-023944-pufcn56j 133 15 been be VBN cord-023944-pufcn56j 133 16 initiated initiate VBN cord-023944-pufcn56j 133 17 in in IN cord-023944-pufcn56j 133 18 most most JJS cord-023944-pufcn56j 133 19 organizations organization NNS cord-023944-pufcn56j 133 20 . . . cord-023944-pufcn56j 134 1 However however RB cord-023944-pufcn56j 134 2 , , , cord-023944-pufcn56j 134 3 ifbusiness ifbusiness JJ cord-023944-pufcn56j 134 4 continuity continuity NN cord-023944-pufcn56j 134 5 is be VBZ cord-023944-pufcn56j 134 6 properly properly RB cord-023944-pufcn56j 134 7 set set VBN cord-023944-pufcn56j 134 8 up up RP cord-023944-pufcn56j 134 9 and and CC cord-023944-pufcn56j 134 10 tested test VBD cord-023944-pufcn56j 134 11 regnlarly regnlarly RB cord-023944-pufcn56j 134 12 then then RB cord-023944-pufcn56j 134 13 an an DT cord-023944-pufcn56j 134 14 appropriate appropriate JJ cord-023944-pufcn56j 134 15 level level NN cord-023944-pufcn56j 134 16 of of IN cord-023944-pufcn56j 134 17 effectiveness effectiveness NN cord-023944-pufcn56j 134 18 can can MD cord-023944-pufcn56j 134 19 be be VB cord-023944-pufcn56j 134 20 achieved achieve VBN cord-023944-pufcn56j 134 21 . . . cord-023944-pufcn56j 135 1 Integration integration NN cord-023944-pufcn56j 135 2 , , , cord-023944-pufcn56j 135 3 support support NN cord-023944-pufcn56j 135 4 and and CC cord-023944-pufcn56j 135 5 simplicity simplicity NN cord-023944-pufcn56j 135 6 have have VBP cord-023944-pufcn56j 135 7 to to TO cord-023944-pufcn56j 135 8 be be VB cord-023944-pufcn56j 135 9 considered consider VBN cord-023944-pufcn56j 135 10 when when WRB cord-023944-pufcn56j 135 11 other other JJ cord-023944-pufcn56j 135 12 areas area NNS cord-023944-pufcn56j 135 13 are be VBP cord-023944-pufcn56j 135 14 reviewed review VBN cord-023944-pufcn56j 135 15 . . . cord-023944-pufcn56j 136 1 Here here RB cord-023944-pufcn56j 136 2 the the DT cord-023944-pufcn56j 136 3 verdict verdict NN cord-023944-pufcn56j 136 4 is be VBZ cord-023944-pufcn56j 136 5 almost almost RB cord-023944-pufcn56j 136 6 identical identical JJ cord-023944-pufcn56j 136 7 to to IN cord-023944-pufcn56j 136 8 the the DT cord-023944-pufcn56j 136 9 one one CD cord-023944-pufcn56j 136 10 related relate VBN cord-023944-pufcn56j 136 11 to to IN cord-023944-pufcn56j 136 12 information information NN cord-023944-pufcn56j 136 13 users user NNS cord-023944-pufcn56j 136 14 : : : cord-023944-pufcn56j 136 15 business business NN cord-023944-pufcn56j 136 16 processes process NNS cord-023944-pufcn56j 136 17 do do VBP cord-023944-pufcn56j 136 18 not not RB cord-023944-pufcn56j 136 19 sufficiently sufficiently RB cord-023944-pufcn56j 136 20 implement implement VB cord-023944-pufcn56j 136 21 information information NN cord-023944-pufcn56j 136 22 security security NN cord-023944-pufcn56j 136 23 requirements requirement NNS cord-023944-pufcn56j 136 24 but but CC cord-023944-pufcn56j 136 25 focus focus NN cord-023944-pufcn56j 136 26 on on IN cord-023944-pufcn56j 136 27 topics topic NNS cord-023944-pufcn56j 136 28 triggered trigger VBN cord-023944-pufcn56j 136 29 by by IN cord-023944-pufcn56j 136 30 compliance compliance NN cord-023944-pufcn56j 136 31 ( ( -LRB- cord-023944-pufcn56j 136 32 e.g. e.g. RB cord-023944-pufcn56j 136 33 , , , cord-023944-pufcn56j 136 34 segregation segregation NN cord-023944-pufcn56j 136 35 of of IN cord-023944-pufcn56j 136 36 duties duty NNS cord-023944-pufcn56j 136 37 and and CC cord-023944-pufcn56j 136 38 dual dual JJ cord-023944-pufcn56j 136 39 control control NN cord-023944-pufcn56j 136 40 ) ) -RRB- cord-023944-pufcn56j 136 41 . . . cord-023944-pufcn56j 137 1 Business business NN cord-023944-pufcn56j 137 2 applications application NNS cord-023944-pufcn56j 137 3 need need VBP cord-023944-pufcn56j 137 4 to to TO cord-023944-pufcn56j 137 5 be be VB cord-023944-pufcn56j 137 6 developed develop VBN cord-023944-pufcn56j 137 7 in in IN cord-023944-pufcn56j 137 8 such such PDT cord-023944-pufcn56j 137 9 a a DT cord-023944-pufcn56j 137 10 way way NN cord-023944-pufcn56j 137 11 that that WDT cord-023944-pufcn56j 137 12 they -PRON- PRP cord-023944-pufcn56j 137 13 enforce enforce VBP cord-023944-pufcn56j 137 14 proper proper JJ cord-023944-pufcn56j 137 15 protection protection NN cord-023944-pufcn56j 137 16 of of IN cord-023944-pufcn56j 137 17 information information NN cord-023944-pufcn56j 137 18 by by IN cord-023944-pufcn56j 137 19 implementing implement VBG cord-023944-pufcn56j 137 20 the the DT cord-023944-pufcn56j 137 21 need need NN cord-023944-pufcn56j 137 22 - - HYPH cord-023944-pufcn56j 137 23 to to TO cord-023944-pufcn56j 137 24 - - HYPH cord-023944-pufcn56j 137 25 know know VB cord-023944-pufcn56j 137 26 principle principle NN cord-023944-pufcn56j 137 27 . . . cord-023944-pufcn56j 138 1 This this DT cord-023944-pufcn56j 138 2 includes include VBZ cord-023944-pufcn56j 138 3 input input NN cord-023944-pufcn56j 138 4 and and CC cord-023944-pufcn56j 138 5 output output NN cord-023944-pufcn56j 138 6 controls control NNS cord-023944-pufcn56j 138 7 ( ( -LRB- cord-023944-pufcn56j 138 8 especially especially RB cord-023944-pufcn56j 138 9 for for IN cord-023944-pufcn56j 138 10 web web NN cord-023944-pufcn56j 138 11 applications application NNS cord-023944-pufcn56j 138 12 ) ) -RRB- cord-023944-pufcn56j 138 13 , , , cord-023944-pufcn56j 138 14 correct correct JJ cord-023944-pufcn56j 138 15 data datum NNS cord-023944-pufcn56j 138 16 processing processing NN cord-023944-pufcn56j 138 17 , , , cord-023944-pufcn56j 138 18 authentication authentication NN cord-023944-pufcn56j 138 19 and and CC cord-023944-pufcn56j 138 20 authorization authorization NN cord-023944-pufcn56j 138 21 of of IN cord-023944-pufcn56j 138 22 users user NNS cord-023944-pufcn56j 138 23 and and CC cord-023944-pufcn56j 138 24 processes process NNS cord-023944-pufcn56j 138 25 , , , cord-023944-pufcn56j 138 26 protection protection NN cord-023944-pufcn56j 138 27 of of IN cord-023944-pufcn56j 138 28 information information NN cord-023944-pufcn56j 138 29 during during IN cord-023944-pufcn56j 138 30 transfer transfer NN cord-023944-pufcn56j 138 31 and and CC cord-023944-pufcn56j 138 32 storage storage NN cord-023944-pufcn56j 138 33 and and CC cord-023944-pufcn56j 138 34 appropriate appropriate JJ cord-023944-pufcn56j 138 35 deletion deletion NN cord-023944-pufcn56j 138 36 of of IN cord-023944-pufcn56j 138 37 information information NN cord-023944-pufcn56j 138 38 . . . cord-023944-pufcn56j 139 1 The the DT cord-023944-pufcn56j 139 2 development development NN cord-023944-pufcn56j 139 3 and and CC cord-023944-pufcn56j 139 4 the the DT cord-023944-pufcn56j 139 5 change change NN cord-023944-pufcn56j 139 6 of of IN cord-023944-pufcn56j 139 7 applications application NNS cord-023944-pufcn56j 139 8 need need VBP cord-023944-pufcn56j 139 9 to to TO cord-023944-pufcn56j 139 10 follow follow VB cord-023944-pufcn56j 139 11 a a DT cord-023944-pufcn56j 139 12 stringent stringent JJ cord-023944-pufcn56j 139 13 approval approval NN cord-023944-pufcn56j 139 14 process process NN cord-023944-pufcn56j 139 15 . . . cord-023944-pufcn56j 140 1 Furthermore furthermore RB cord-023944-pufcn56j 140 2 , , , cord-023944-pufcn56j 140 3 application application NN cord-023944-pufcn56j 140 4 recovery recovery NN cord-023944-pufcn56j 140 5 activities activity NNS cord-023944-pufcn56j 140 6 ensure ensure VBP cord-023944-pufcn56j 140 7 that that IN cord-023944-pufcn56j 140 8 the the DT cord-023944-pufcn56j 140 9 business business NN cord-023944-pufcn56j 140 10 processes process NNS cord-023944-pufcn56j 140 11 can can MD cord-023944-pufcn56j 140 12 retorn retorn VB cord-023944-pufcn56j 140 13 to to IN cord-023944-pufcn56j 140 14 normal normal JJ cord-023944-pufcn56j 140 15 work work NN cord-023944-pufcn56j 140 16 after after IN cord-023944-pufcn56j 140 17 a a DT cord-023944-pufcn56j 140 18 disruption disruption NN cord-023944-pufcn56j 140 19 of of IN cord-023944-pufcn56j 140 20 the the DT cord-023944-pufcn56j 140 21 application application NN cord-023944-pufcn56j 140 22 operations operation NNS cord-023944-pufcn56j 140 23 as as RB cord-023944-pufcn56j 140 24 fast fast RB cord-023944-pufcn56j 140 25 as as IN cord-023944-pufcn56j 140 26 possible possible JJ cord-023944-pufcn56j 140 27 . . . cord-023944-pufcn56j 141 1 Note note VB cord-023944-pufcn56j 141 2 : : : cord-023944-pufcn56j 141 3 Applications application NNS cord-023944-pufcn56j 141 4 currently currently RB cord-023944-pufcn56j 141 5 include include VBP cord-023944-pufcn56j 141 6 the the DT cord-023944-pufcn56j 141 7 respective respective JJ cord-023944-pufcn56j 141 8 server server NN cord-023944-pufcn56j 141 9 operating operate VBG cord-023944-pufcn56j 141 10 systems system NNS cord-023944-pufcn56j 141 11 and and CC cord-023944-pufcn56j 141 12 middleware middleware NN cord-023944-pufcn56j 141 13 ( ( -LRB- cord-023944-pufcn56j 141 14 e.g. e.g. RB cord-023944-pufcn56j 141 15 , , , cord-023944-pufcn56j 141 16 databases database NNS cord-023944-pufcn56j 141 17 ) ) -RRB- cord-023944-pufcn56j 141 18 ; ; : cord-023944-pufcn56j 141 19 with with IN cord-023944-pufcn56j 141 20 the the DT cord-023944-pufcn56j 141 21 rise rise NN cord-023944-pufcn56j 141 22 of of IN cord-023944-pufcn56j 141 23 cloud cloud NN cord-023944-pufcn56j 141 24 computing computing NN cord-023944-pufcn56j 141 25 and and CC cord-023944-pufcn56j 141 26 its -PRON- PRP$ cord-023944-pufcn56j 141 27 approach approach NN cord-023944-pufcn56j 141 28 of of IN cord-023944-pufcn56j 141 29 software software NN cord-023944-pufcn56j 141 30 as as IN cord-023944-pufcn56j 141 31 a a DT cord-023944-pufcn56j 141 32 service service NN cord-023944-pufcn56j 141 33 ( ( -LRB- cord-023944-pufcn56j 141 34 saaS saas CD cord-023944-pufcn56j 141 35 ) ) -RRB- cord-023944-pufcn56j 141 36 this this DT cord-023944-pufcn56j 141 37 will will MD cord-023944-pufcn56j 141 38 change change VB cord-023944-pufcn56j 141 39 . . . cord-023944-pufcn56j 142 1 Completeness completeness NN cord-023944-pufcn56j 142 2 : : : cord-023944-pufcn56j 143 1 All all DT cord-023944-pufcn56j 143 2 major major JJ cord-023944-pufcn56j 143 3 organizations organization NNS cord-023944-pufcn56j 143 4 have have VBP cord-023944-pufcn56j 143 5 set set VBN cord-023944-pufcn56j 143 6 up up RP cord-023944-pufcn56j 143 7 an an DT cord-023944-pufcn56j 143 8 approach approach NN cord-023944-pufcn56j 143 9 which which WDT cord-023944-pufcn56j 143 10 is be VBZ cord-023944-pufcn56j 143 11 similar similar JJ cord-023944-pufcn56j 143 12 to to IN cord-023944-pufcn56j 143 13 Microsoft Microsoft NNP cord-023944-pufcn56j 143 14 's 's POS cord-023944-pufcn56j 143 15 Secure Secure NNP cord-023944-pufcn56j 143 16 Development Development NNP cord-023944-pufcn56j 143 17 Lifecycle Lifecycle NNP cord-023944-pufcn56j 143 18 ( ( -LRB- cord-023944-pufcn56j 143 19 SDL SDL NNP cord-023944-pufcn56j 143 20 ) ) -RRB- cord-023944-pufcn56j 143 21 where where WRB cord-023944-pufcn56j 143 22 information information NN cord-023944-pufcn56j 143 23 security security NN cord-023944-pufcn56j 143 24 is be VBZ cord-023944-pufcn56j 143 25 an an DT cord-023944-pufcn56j 143 26 integral integral JJ cord-023944-pufcn56j 143 27 part part NN cord-023944-pufcn56j 143 28 of of IN cord-023944-pufcn56j 143 29 software software NN cord-023944-pufcn56j 143 30 development development NN cord-023944-pufcn56j 144 1 However however RB cord-023944-pufcn56j 144 2 , , , cord-023944-pufcn56j 144 3 most most JJS cord-023944-pufcn56j 144 4 organizations organization NNS cord-023944-pufcn56j 144 5 usually usually RB cord-023944-pufcn56j 144 6 rely rely VBP cord-023944-pufcn56j 144 7 on on IN cord-023944-pufcn56j 144 8 a a DT cord-023944-pufcn56j 144 9 majority majority NN cord-023944-pufcn56j 144 10 oflegacy oflegacy NN cord-023944-pufcn56j 144 11 applications application NNS cord-023944-pufcn56j 144 12 and and CC cord-023944-pufcn56j 144 13 only only RB cord-023944-pufcn56j 144 14 some some DT cord-023944-pufcn56j 144 15 modnles modnle NNS cord-023944-pufcn56j 144 16 have have VBP cord-023944-pufcn56j 144 17 been be VBN cord-023944-pufcn56j 144 18 modified modify VBN cord-023944-pufcn56j 144 19 or or CC cord-023944-pufcn56j 144 20 expanded expand VBN cord-023944-pufcn56j 144 21 in in IN cord-023944-pufcn56j 144 22 order order NN cord-023944-pufcn56j 144 23 to to TO cord-023944-pufcn56j 144 24 better better RB cord-023944-pufcn56j 144 25 use use VB cord-023944-pufcn56j 144 26 the the DT cord-023944-pufcn56j 144 27 Internet internet NN cord-023944-pufcn56j 144 28 . . . cord-023944-pufcn56j 145 1 The the DT cord-023944-pufcn56j 145 2 improvement improvement NN cord-023944-pufcn56j 145 3 of of IN cord-023944-pufcn56j 145 4 existing exist VBG cord-023944-pufcn56j 145 5 applications application NNS cord-023944-pufcn56j 145 6 is be VBZ cord-023944-pufcn56j 145 7 a a DT cord-023944-pufcn56j 145 8 crucial crucial JJ cord-023944-pufcn56j 145 9 issue issue NN cord-023944-pufcn56j 145 10 , , , cord-023944-pufcn56j 145 11 especially especially RB cord-023944-pufcn56j 145 12 when when WRB cord-023944-pufcn56j 145 13 it -PRON- PRP cord-023944-pufcn56j 145 14 comes come VBZ cord-023944-pufcn56j 145 15 to to IN cord-023944-pufcn56j 145 16 applications application NNS cord-023944-pufcn56j 145 17 that that WDT cord-023944-pufcn56j 145 18 are be VBP cord-023944-pufcn56j 145 19 used use VBN cord-023944-pufcn56j 145 20 by by IN cord-023944-pufcn56j 145 21 business business NN cord-023944-pufcn56j 145 22 entities entity NNS cord-023944-pufcn56j 145 23 , , , cord-023944-pufcn56j 145 24 but but CC cord-023944-pufcn56j 145 25 not not RB cord-023944-pufcn56j 145 26 developed develop VBN cord-023944-pufcn56j 145 27 and and CC cord-023944-pufcn56j 145 28 hosted host VBN cord-023944-pufcn56j 145 29 within within IN cord-023944-pufcn56j 145 30 the the DT cord-023944-pufcn56j 145 31 IT IT NNP cord-023944-pufcn56j 145 32 organization organization NN cord-023944-pufcn56j 145 33 which which WDT cord-023944-pufcn56j 145 34 usually usually RB cord-023944-pufcn56j 145 35 is be VBZ cord-023944-pufcn56j 145 36 the the DT cord-023944-pufcn56j 145 37 driver driver NN cord-023944-pufcn56j 145 38 for for IN cord-023944-pufcn56j 145 39 the the DT cord-023944-pufcn56j 145 40 SDL SDL NNP cord-023944-pufcn56j 145 41 . . . cord-023944-pufcn56j 146 1 This this DT cord-023944-pufcn56j 146 2 way way NN cord-023944-pufcn56j 146 3 , , , cord-023944-pufcn56j 146 4 applications application NNS cord-023944-pufcn56j 146 5 are be VBP cord-023944-pufcn56j 146 6 brought bring VBN cord-023944-pufcn56j 146 7 into into IN cord-023944-pufcn56j 146 8 operations operation NNS cord-023944-pufcn56j 146 9 whose whose WP$ cord-023944-pufcn56j 146 10 information information NN cord-023944-pufcn56j 146 11 security security NN cord-023944-pufcn56j 146 12 features feature NNS cord-023944-pufcn56j 146 13 are be VBP cord-023944-pufcn56j 146 14 not not RB cord-023944-pufcn56j 146 15 sufficiently sufficiently RB cord-023944-pufcn56j 146 16 used use VBN cord-023944-pufcn56j 146 17 respectively respectively RB cord-023944-pufcn56j 146 18 known know VBN cord-023944-pufcn56j 146 19 . . . cord-023944-pufcn56j 147 1 Effectiveness effectiveness NN cord-023944-pufcn56j 147 2 : : : cord-023944-pufcn56j 148 1 The the DT cord-023944-pufcn56j 148 2 SDL SDL NNP cord-023944-pufcn56j 148 3 methodology methodology NN cord-023944-pufcn56j 148 4 and and CC cord-023944-pufcn56j 148 5 similar similar JJ cord-023944-pufcn56j 148 6 approaches approach NNS cord-023944-pufcn56j 148 7 effectively effectively RB cord-023944-pufcn56j 148 8 enforce enforce VBP cord-023944-pufcn56j 148 9 the the DT cord-023944-pufcn56j 148 10 implementa- implementa- JJ cord-023944-pufcn56j 148 11 Integration integration NN cord-023944-pufcn56j 148 12 : : : cord-023944-pufcn56j 148 13 For for IN cord-023944-pufcn56j 148 14 the the DT cord-023944-pufcn56j 148 15 in in IN cord-023944-pufcn56j 148 16 - - HYPH cord-023944-pufcn56j 148 17 house house NN cord-023944-pufcn56j 148 18 development development NN cord-023944-pufcn56j 148 19 of of IN cord-023944-pufcn56j 148 20 major major JJ cord-023944-pufcn56j 148 21 applications application NNS cord-023944-pufcn56j 148 22 , , , cord-023944-pufcn56j 148 23 the the DT cord-023944-pufcn56j 148 24 use use NN cord-023944-pufcn56j 148 25 of of IN cord-023944-pufcn56j 148 26 an an DT cord-023944-pufcn56j 148 27 SDL SDL NNP cord-023944-pufcn56j 148 28 is be VBZ cord-023944-pufcn56j 148 29 enforced enforce VBN cord-023944-pufcn56j 148 30 . . . cord-023944-pufcn56j 149 1 However however RB cord-023944-pufcn56j 149 2 , , , cord-023944-pufcn56j 149 3 there there EX cord-023944-pufcn56j 149 4 is be VBZ cord-023944-pufcn56j 149 5 no no DT cord-023944-pufcn56j 149 6 integration integration NN cord-023944-pufcn56j 149 7 of of IN cord-023944-pufcn56j 149 8 information information NN cord-023944-pufcn56j 149 9 security security NN cord-023944-pufcn56j 149 10 for for IN cord-023944-pufcn56j 149 11 other other JJ cord-023944-pufcn56j 149 12 development development NN cord-023944-pufcn56j 149 13 projects project NNS cord-023944-pufcn56j 149 14 or or CC cord-023944-pufcn56j 149 15 for for IN cord-023944-pufcn56j 149 16 approaches approach NNS cord-023944-pufcn56j 149 17 like like IN cord-023944-pufcn56j 149 18 SaaS SaaS NNP cord-023944-pufcn56j 149 19 due due IN cord-023944-pufcn56j 149 20 to to IN cord-023944-pufcn56j 149 21 non non JJ cord-023944-pufcn56j 149 22 - - JJ cord-023944-pufcn56j 149 23 existent existent JJ cord-023944-pufcn56j 149 24 formal formal JJ cord-023944-pufcn56j 149 25 requirements requirement NNS cord-023944-pufcn56j 149 26 . . . cord-023944-pufcn56j 150 1 Usually usually RB cord-023944-pufcn56j 150 2 , , , cord-023944-pufcn56j 150 3 project project NN cord-023944-pufcn56j 150 4 management management NN cord-023944-pufcn56j 150 5 tools tool NNS cord-023944-pufcn56j 150 6 support support VBP cord-023944-pufcn56j 150 7 the the DT cord-023944-pufcn56j 150 8 project project NN cord-023944-pufcn56j 150 9 management management NN cord-023944-pufcn56j 150 10 process process NN cord-023944-pufcn56j 150 11 for for IN cord-023944-pufcn56j 150 12 developing develop VBG cord-023944-pufcn56j 150 13 major major JJ cord-023944-pufcn56j 150 14 applications application NNS cord-023944-pufcn56j 150 15 . . . cord-023944-pufcn56j 151 1 This this DT cord-023944-pufcn56j 151 2 encompasses encompass VBZ cord-023944-pufcn56j 151 3 the the DT cord-023944-pufcn56j 151 4 enforcement enforcement NN cord-023944-pufcn56j 151 5 of of IN cord-023944-pufcn56j 151 6 the the DT cord-023944-pufcn56j 151 7 quality quality NN cord-023944-pufcn56j 151 8 gates gate NNS cord-023944-pufcn56j 151 9 , , , cord-023944-pufcn56j 151 10 including include VBG cord-023944-pufcn56j 151 11 information information NN cord-023944-pufcn56j 151 12 security security NN cord-023944-pufcn56j 151 13 . . . cord-023944-pufcn56j 152 1 They -PRON- PRP cord-023944-pufcn56j 152 2 cover cover VBP cord-023944-pufcn56j 152 3 all all DT cord-023944-pufcn56j 152 4 phases phase NNS cord-023944-pufcn56j 152 5 of of IN cord-023944-pufcn56j 152 6 the the DT cord-023944-pufcn56j 152 7 application application NN cord-023944-pufcn56j 152 8 development development NN cord-023944-pufcn56j 152 9 lifecycle lifecycle NN cord-023944-pufcn56j 152 10 ; ; : cord-023944-pufcn56j 152 11 however however RB cord-023944-pufcn56j 152 12 , , , cord-023944-pufcn56j 152 13 additional additional JJ cord-023944-pufcn56j 152 14 information information NN cord-023944-pufcn56j 152 15 security security NN cord-023944-pufcn56j 152 16 tools tool NNS cord-023944-pufcn56j 152 17 and and CC cord-023944-pufcn56j 152 18 guidelines guideline NNS cord-023944-pufcn56j 152 19 ( ( -LRB- cord-023944-pufcn56j 152 20 e.g. e.g. RB cord-023944-pufcn56j 152 21 , , , cord-023944-pufcn56j 152 22 information information NN cord-023944-pufcn56j 152 23 classification classification NN cord-023944-pufcn56j 152 24 tools tool NNS cord-023944-pufcn56j 152 25 and and CC cord-023944-pufcn56j 152 26 tools tool NNS cord-023944-pufcn56j 152 27 for for IN cord-023944-pufcn56j 152 28 ensuring ensure VBG cord-023944-pufcn56j 152 29 compliance compliance NN cord-023944-pufcn56j 152 30 with with IN cord-023944-pufcn56j 152 31 existing exist VBG cord-023944-pufcn56j 152 32 policies policy NNS cord-023944-pufcn56j 152 33 ) ) -RRB- cord-023944-pufcn56j 152 34 are be VBP cord-023944-pufcn56j 152 35 not not RB cord-023944-pufcn56j 152 36 integrated integrate VBN cord-023944-pufcn56j 152 37 ( ( -LRB- cord-023944-pufcn56j 152 38 separate separate JJ cord-023944-pufcn56j 152 39 tools tool NNS cord-023944-pufcn56j 152 40 and and CC cord-023944-pufcn56j 152 41 guidelines guideline NNS cord-023944-pufcn56j 152 42 need need VBP cord-023944-pufcn56j 152 43 tu tu PRP cord-023944-pufcn56j 152 44 be be VB cord-023944-pufcn56j 152 45 used use VBN cord-023944-pufcn56j 152 46 to to IN cord-023944-pufcn56j 152 47 fnlfill fnlfill JJ cord-023944-pufcn56j 152 48 individual individual JJ cord-023944-pufcn56j 152 49 requirements requirement NNS cord-023944-pufcn56j 152 50 ) ) -RRB- cord-023944-pufcn56j 152 51 . . . cord-023944-pufcn56j 153 1 Also also RB cord-023944-pufcn56j 153 2 , , , cord-023944-pufcn56j 153 3 some some DT cord-023944-pufcn56j 153 4 aspects aspect NNS cord-023944-pufcn56j 153 5 of of IN cord-023944-pufcn56j 153 6 information information NN cord-023944-pufcn56j 153 7 security security NN cord-023944-pufcn56j 153 8 within within IN cord-023944-pufcn56j 153 9 common common JJ cord-023944-pufcn56j 153 10 quality quality NN cord-023944-pufcn56j 153 11 gates gate NNS cord-023944-pufcn56j 153 12 are be VBP cord-023944-pufcn56j 153 13 often often RB cord-023944-pufcn56j 153 14 not not RB cord-023944-pufcn56j 153 15 supported support VBN cord-023944-pufcn56j 153 16 by by IN cord-023944-pufcn56j 153 17 tools tool NNS cord-023944-pufcn56j 153 18 ( ( -LRB- cord-023944-pufcn56j 153 19 e.g. e.g. RB cord-023944-pufcn56j 153 20 , , , cord-023944-pufcn56j 153 21 code code NN cord-023944-pufcn56j 153 22 inspection inspection NN cord-023944-pufcn56j 153 23 ) ) -RRB- cord-023944-pufcn56j 153 24 . . . cord-023944-pufcn56j 154 1 Simplicity simplicity NN cord-023944-pufcn56j 154 2 : : : cord-023944-pufcn56j 154 3 Currently currently RB cord-023944-pufcn56j 154 4 , , , cord-023944-pufcn56j 154 5 SDL SDL NNP cord-023944-pufcn56j 154 6 processes process NNS cord-023944-pufcn56j 154 7 are be VBP cord-023944-pufcn56j 154 8 quite quite RB cord-023944-pufcn56j 154 9 complex complex JJ cord-023944-pufcn56j 154 10 and and CC cord-023944-pufcn56j 154 11 need need VBP cord-023944-pufcn56j 154 12 to to TO cord-023944-pufcn56j 154 13 be be VB cord-023944-pufcn56j 154 14 simplified simplify VBN cord-023944-pufcn56j 154 15 in in IN cord-023944-pufcn56j 154 16 order order NN cord-023944-pufcn56j 154 17 to to TO cord-023944-pufcn56j 154 18 improve improve VB cord-023944-pufcn56j 154 19 acceptance acceptance NN cord-023944-pufcn56j 154 20 . . . cord-023944-pufcn56j 155 1 The the DT cord-023944-pufcn56j 155 2 verdict verdict NN cord-023944-pufcn56j 155 3 is be VBZ cord-023944-pufcn56j 155 4 now now RB cord-023944-pufcn56j 155 5 more more RBR cord-023944-pufcn56j 155 6 complex complex JJ cord-023944-pufcn56j 155 7 : : : cord-023944-pufcn56j 155 8 there there EX cord-023944-pufcn56j 155 9 are be VBP cord-023944-pufcn56j 155 10 areas area NNS cord-023944-pufcn56j 155 11 where where WRB cord-023944-pufcn56j 155 12 information information NN cord-023944-pufcn56j 155 13 security security NN cord-023944-pufcn56j 155 14 is be VBZ cord-023944-pufcn56j 155 15 integrated integrate VBN cord-023944-pufcn56j 155 16 and and CC cord-023944-pufcn56j 155 17 there there EX cord-023944-pufcn56j 155 18 are be VBP cord-023944-pufcn56j 155 19 areas area NNS cord-023944-pufcn56j 155 20 where where WRB cord-023944-pufcn56j 155 21 there there EX cord-023944-pufcn56j 155 22 is be VBZ cord-023944-pufcn56j 155 23 a a DT cord-023944-pufcn56j 155 24 gap gap NN cord-023944-pufcn56j 155 25 . . . cord-023944-pufcn56j 156 1 The the DT cord-023944-pufcn56j 156 2 risks risk NNS cord-023944-pufcn56j 156 3 rely rely VBP cord-023944-pufcn56j 156 4 heavily heavily RB cord-023944-pufcn56j 156 5 on on IN cord-023944-pufcn56j 156 6 the the DT cord-023944-pufcn56j 156 7 implementation implementation NN cord-023944-pufcn56j 156 8 and and CC cord-023944-pufcn56j 156 9 integration integration NN cord-023944-pufcn56j 156 10 of of IN cord-023944-pufcn56j 156 11 a a DT cord-023944-pufcn56j 156 12 secure secure JJ cord-023944-pufcn56j 156 13 development development NN cord-023944-pufcn56j 156 14 ! ! . cord-023944-pufcn56j 157 1 ifecycle ifecycle NNP cord-023944-pufcn56j 157 2 for for IN cord-023944-pufcn56j 157 3 applications application NNS cord-023944-pufcn56j 157 4 and and CC cord-023944-pufcn56j 157 5 its -PRON- PRP$ cord-023944-pufcn56j 157 6 support support NN cord-023944-pufcn56j 157 7 by by IN cord-023944-pufcn56j 157 8 tools tool NNS cord-023944-pufcn56j 157 9 .. .. . cord-023944-pufcn56j 158 1 Effectiveness effectiveness NN cord-023944-pufcn56j 158 2 : : : cord-023944-pufcn56j 159 1 The the DT cord-023944-pufcn56j 159 2 majority majority NN cord-023944-pufcn56j 159 3 of of IN cord-023944-pufcn56j 159 4 the the DT cord-023944-pufcn56j 159 5 measures measure NNS cord-023944-pufcn56j 159 6 are be VBP cord-023944-pufcn56j 159 7 implemented implement VBN cord-023944-pufcn56j 159 8 correctly correctly RB cord-023944-pufcn56j 159 9 . . . cord-023944-pufcn56j 160 1 Problems problem NNS cord-023944-pufcn56j 160 2 arise arise VBP cord-023944-pufcn56j 160 3 with with IN cord-023944-pufcn56j 160 4 local local JJ cord-023944-pufcn56j 160 5 network network NN cord-023944-pufcn56j 160 6 architecture architecture NN cord-023944-pufcn56j 160 7 , , , cord-023944-pufcn56j 160 8 operating operating NN cord-023944-pufcn56j 160 9 system system NN cord-023944-pufcn56j 160 10 hardening hardening NN cord-023944-pufcn56j 160 11 , , , cord-023944-pufcn56j 160 12 vulnerability vulnerability NN cord-023944-pufcn56j 160 13 management management NN cord-023944-pufcn56j 160 14 ( ( -LRB- cord-023944-pufcn56j 160 15 especially especially RB cord-023944-pufcn56j 160 16 proper proper JJ cord-023944-pufcn56j 160 17 patching patching NN cord-023944-pufcn56j 160 18 ) ) -RRB- cord-023944-pufcn56j 160 19 and and CC cord-023944-pufcn56j 160 20 inadequate inadequate JJ cord-023944-pufcn56j 160 21 provisioning provision VBG cord-023944-pufcn56j 160 22 oflocal oflocal JJ cord-023944-pufcn56j 160 23 administrative administrative JJ cord-023944-pufcn56j 160 24 privileges privilege NNS cord-023944-pufcn56j 160 25 . . . cord-023944-pufcn56j 161 1 Shared share VBN cord-023944-pufcn56j 161 2 service service NN cord-023944-pufcn56j 161 3 centers center NNS cord-023944-pufcn56j 161 4 specializing specialize VBG cord-023944-pufcn56j 161 5 in in IN cord-023944-pufcn56j 161 6 specific specific JJ cord-023944-pufcn56j 161 7 infrastructure infrastructure NN cord-023944-pufcn56j 161 8 services service NNS cord-023944-pufcn56j 161 9 show show VBP cord-023944-pufcn56j 161 10 an an DT cord-023944-pufcn56j 161 11 increase increase NN cord-023944-pufcn56j 161 12 in in IN cord-023944-pufcn56j 161 13 effectiveness effectiveness NN cord-023944-pufcn56j 161 14 and and CC cord-023944-pufcn56j 161 15 efficiency efficiency NN cord-023944-pufcn56j 161 16 in in IN cord-023944-pufcn56j 161 17 the the DT cord-023944-pufcn56j 161 18 implementation implementation NN cord-023944-pufcn56j 161 19 of of IN cord-023944-pufcn56j 161 20 information information NN cord-023944-pufcn56j 161 21 security security NN cord-023944-pufcn56j 161 22 when when WRB cord-023944-pufcn56j 161 23 provided provide VBN cord-023944-pufcn56j 161 24 centrally centrally RB cord-023944-pufcn56j 161 25 by by IN cord-023944-pufcn56j 161 26 specialized specialized JJ cord-023944-pufcn56j 161 27 experts expert NNS cord-023944-pufcn56j 161 28 . . . cord-023944-pufcn56j 162 1 Integration integration NN cord-023944-pufcn56j 162 2 : : : cord-023944-pufcn56j 163 1 Some some DT cord-023944-pufcn56j 163 2 information information NN cord-023944-pufcn56j 163 3 security security NN cord-023944-pufcn56j 163 4 measures measure NNS cord-023944-pufcn56j 163 5 are be VBP cord-023944-pufcn56j 163 6 commonly commonly RB cord-023944-pufcn56j 163 7 included include VBN cord-023944-pufcn56j 163 8 in in IN cord-023944-pufcn56j 163 9 the the DT cord-023944-pufcn56j 163 10 operating operating NN cord-023944-pufcn56j 163 11 procedures procedure NNS cord-023944-pufcn56j 163 12 ( ( -LRB- cord-023944-pufcn56j 163 13 e.g. e.g. RB cord-023944-pufcn56j 163 14 , , , cord-023944-pufcn56j 163 15 backup backup NN cord-023944-pufcn56j 163 16 , , , cord-023944-pufcn56j 163 17 capacity capacity NN cord-023944-pufcn56j 163 18 management management NN cord-023944-pufcn56j 163 19 ) ) -RRB- cord-023944-pufcn56j 163 20 ; ; : cord-023944-pufcn56j 163 21 some some DT cord-023944-pufcn56j 163 22 measures measure NNS cord-023944-pufcn56j 163 23 are be VBP cord-023944-pufcn56j 163 24 rarely rarely RB cord-023944-pufcn56j 163 25 integrated integrate VBN cord-023944-pufcn56j 163 26 ( ( -LRB- cord-023944-pufcn56j 163 27 e.g. e.g. RB cord-023944-pufcn56j 163 28 , , , cord-023944-pufcn56j 163 29 vulnerability vulnerability NN cord-023944-pufcn56j 163 30 management management NN cord-023944-pufcn56j 163 31 ) ) -RRB- cord-023944-pufcn56j 163 32 . . . cord-023944-pufcn56j 164 1 Procedures procedure NNS cord-023944-pufcn56j 164 2 are be VBP cord-023944-pufcn56j 164 3 rarely rarely RB cord-023944-pufcn56j 164 4 documented document VBN cord-023944-pufcn56j 164 5 within within IN cord-023944-pufcn56j 164 6 an an DT cord-023944-pufcn56j 164 7 organization organization NN cord-023944-pufcn56j 164 8 . . . cord-023944-pufcn56j 165 1 Support support NN cord-023944-pufcn56j 165 2 Some some DT cord-023944-pufcn56j 165 3 areas area NNS cord-023944-pufcn56j 165 4 are be VBP cord-023944-pufcn56j 165 5 covered cover VBN cord-023944-pufcn56j 165 6 by by IN cord-023944-pufcn56j 165 7 tools tool NNS cord-023944-pufcn56j 165 8 , , , cord-023944-pufcn56j 165 9 however however RB cord-023944-pufcn56j 165 10 not not RB cord-023944-pufcn56j 165 11 continuously continuously RB cord-023944-pufcn56j 165 12 throughout throughout IN cord-023944-pufcn56j 165 13 the the DT cord-023944-pufcn56j 165 14 processes process NNS cord-023944-pufcn56j 165 15 , , , cord-023944-pufcn56j 165 16 i.e. i.e. FW cord-023944-pufcn56j 165 17 , , , cord-023944-pufcn56j 165 18 some some DT cord-023944-pufcn56j 165 19 tools tool NNS cord-023944-pufcn56j 165 20 support support VBP cord-023944-pufcn56j 165 21 only only RB cord-023944-pufcn56j 165 22 a a DT cord-023944-pufcn56j 165 23 part part NN cord-023944-pufcn56j 165 24 of of IN cord-023944-pufcn56j 165 25 a a DT cord-023944-pufcn56j 165 26 process process NN cord-023944-pufcn56j 166 1 ( ( -LRB- cord-023944-pufcn56j 166 2 e.g. e.g. RB cord-023944-pufcn56j 166 3 , , , cord-023944-pufcn56j 166 4 vulnerability vulnerability NN cord-023944-pufcn56j 166 5 management management NN cord-023944-pufcn56j 166 6 tools tool NNS cord-023944-pufcn56j 166 7 like like IN cord-023944-pufcn56j 166 8 Qualys Qualys NNP cord-023944-pufcn56j 166 9 support support VBP cord-023944-pufcn56j 166 10 the the DT cord-023944-pufcn56j 166 11 vulnerability vulnerability NN cord-023944-pufcn56j 166 12 identification identification NN cord-023944-pufcn56j 166 13 phase phase NN cord-023944-pufcn56j 166 14 within within IN cord-023944-pufcn56j 166 15 vninerability vninerability NN cord-023944-pufcn56j 166 16 management management NN cord-023944-pufcn56j 166 17 but but CC cord-023944-pufcn56j 166 18 not not RB cord-023944-pufcn56j 166 19 the the DT cord-023944-pufcn56j 166 20 remediation remediation NN cord-023944-pufcn56j 166 21 ) ) -RRB- cord-023944-pufcn56j 166 22 . . . cord-023944-pufcn56j 167 1 Tools tool NNS cord-023944-pufcn56j 167 2 are be VBP cord-023944-pufcn56j 167 3 often often RB cord-023944-pufcn56j 167 4 wrongly wrongly RB cord-023944-pufcn56j 167 5 configured configure VBN cord-023944-pufcn56j 167 6 . . . cord-023944-pufcn56j 168 1 Simplicity simplicity NN cord-023944-pufcn56j 168 2 : : : cord-023944-pufcn56j 168 3 Varies vary VBZ cord-023944-pufcn56j 168 4 , , , cord-023944-pufcn56j 168 5 depending depend VBG cord-023944-pufcn56j 168 6 on on IN cord-023944-pufcn56j 168 7 the the DT cord-023944-pufcn56j 168 8 respective respective JJ cord-023944-pufcn56j 168 9 tooL tool NN cord-023944-pufcn56j 169 1 An an DT cord-023944-pufcn56j 169 2 information information NN cord-023944-pufcn56j 169 3 security security NN cord-023944-pufcn56j 169 4 organization organization NN cord-023944-pufcn56j 169 5 for for IN cord-023944-pufcn56j 169 6 a a DT cord-023944-pufcn56j 169 7 global global JJ cord-023944-pufcn56j 169 8 enterprise enterprise NN cord-023944-pufcn56j 169 9 has have VBZ cord-023944-pufcn56j 169 10 to to TO cord-023944-pufcn56j 169 11 be be VB cord-023944-pufcn56j 169 12 set set VBN cord-023944-pufcn56j 169 13 up up RP cord-023944-pufcn56j 169 14 in in IN cord-023944-pufcn56j 169 15 a a DT cord-023944-pufcn56j 169 16 way way NN cord-023944-pufcn56j 169 17 that that WDT cord-023944-pufcn56j 169 18 it -PRON- PRP cord-023944-pufcn56j 169 19 covers cover VBZ cord-023944-pufcn56j 169 20 global global JJ cord-023944-pufcn56j 169 21 aspects aspect NNS cord-023944-pufcn56j 169 22 as as RB cord-023944-pufcn56j 169 23 well well RB cord-023944-pufcn56j 169 24 as as IN cord-023944-pufcn56j 169 25 local local JJ cord-023944-pufcn56j 169 26 ones one NNS cord-023944-pufcn56j 169 27 . . . cord-023944-pufcn56j 170 1 Ideally ideally RB cord-023944-pufcn56j 170 2 , , , cord-023944-pufcn56j 170 3 the the DT cord-023944-pufcn56j 170 4 global global JJ cord-023944-pufcn56j 170 5 aspects aspect NNS cord-023944-pufcn56j 170 6 are be VBP cord-023944-pufcn56j 170 7 the the DT cord-023944-pufcn56j 170 8 methodologies methodology NNS cord-023944-pufcn56j 170 9 , , , cord-023944-pufcn56j 170 10 policies policy NNS cord-023944-pufcn56j 170 11 and and CC cord-023944-pufcn56j 170 12 tools tool NNS cord-023944-pufcn56j 170 13 for for IN cord-023944-pufcn56j 170 14 all all DT cord-023944-pufcn56j 170 15 entities entity NNS cord-023944-pufcn56j 170 16 and and CC cord-023944-pufcn56j 170 17 the the DT cord-023944-pufcn56j 170 18 local local JJ cord-023944-pufcn56j 170 19 aspects aspect NNS cord-023944-pufcn56j 170 20 concentrate concentrate VBP cord-023944-pufcn56j 170 21 on on IN cord-023944-pufcn56j 170 22 the the DT cord-023944-pufcn56j 170 23 different different JJ cord-023944-pufcn56j 170 24 markets market NNS cord-023944-pufcn56j 170 25 and and CC cord-023944-pufcn56j 170 26 their -PRON- PRP$ cord-023944-pufcn56j 170 27 specialties specialty NNS cord-023944-pufcn56j 170 28 . . . cord-023944-pufcn56j 171 1 Global global JJ cord-023944-pufcn56j 171 2 aspects aspect NNS cord-023944-pufcn56j 171 3 are be VBP cord-023944-pufcn56j 171 4 then then RB cord-023944-pufcn56j 171 5 managed manage VBN cord-023944-pufcn56j 171 6 by by IN cord-023944-pufcn56j 171 7 a a DT cord-023944-pufcn56j 171 8 department department NN cord-023944-pufcn56j 171 9 providing provide VBG cord-023944-pufcn56j 171 10 methodologies methodology NNS cord-023944-pufcn56j 171 11 , , , cord-023944-pufcn56j 171 12 policies policy NNS cord-023944-pufcn56j 171 13 and and CC cord-023944-pufcn56j 171 14 tools tool NNS cord-023944-pufcn56j 171 15 globally globally RB cord-023944-pufcn56j 171 16 . . . cord-023944-pufcn56j 172 1 Local local JJ cord-023944-pufcn56j 172 2 aspects aspect NNS cord-023944-pufcn56j 172 3 are be VBP cord-023944-pufcn56j 172 4 dealt deal VBN cord-023944-pufcn56j 172 5 with with IN cord-023944-pufcn56j 172 6 people people NNS cord-023944-pufcn56j 172 7 in in IN cord-023944-pufcn56j 172 8 the the DT cord-023944-pufcn56j 172 9 markets market NNS cord-023944-pufcn56j 172 10 . . . cord-023944-pufcn56j 173 1 Depending depend VBG cord-023944-pufcn56j 173 2 on on IN cord-023944-pufcn56j 173 3 the the DT cord-023944-pufcn56j 173 4 portfolio portfolio NN cord-023944-pufcn56j 173 5 of of IN cord-023944-pufcn56j 173 6 an an DT cord-023944-pufcn56j 173 7 organization organization NN cord-023944-pufcn56j 173 8 , , , cord-023944-pufcn56j 173 9 there there EX cord-023944-pufcn56j 173 10 might may MD cord-023944-pufcn56j 173 11 be be VB cord-023944-pufcn56j 173 12 as as RB cord-023944-pufcn56j 173 13 well well RB cord-023944-pufcn56j 173 14 a a DT cord-023944-pufcn56j 173 15 regional regional JJ cord-023944-pufcn56j 173 16 or or CC cord-023944-pufcn56j 173 17 a a DT cord-023944-pufcn56j 173 18 divisional divisional JJ cord-023944-pufcn56j 173 19 intermediate intermediate JJ cord-023944-pufcn56j 173 20 level level NN cord-023944-pufcn56j 173 21 between between IN cord-023944-pufcn56j 173 22 the the DT cord-023944-pufcn56j 173 23 global global JJ cord-023944-pufcn56j 173 24 and and CC cord-023944-pufcn56j 173 25 the the DT cord-023944-pufcn56j 173 26 local local JJ cord-023944-pufcn56j 173 27 areas area NNS cord-023944-pufcn56j 173 28 ; ; : cord-023944-pufcn56j 173 29 we -PRON- PRP cord-023944-pufcn56j 173 30 will will MD cord-023944-pufcn56j 173 31 describe describe VB cord-023944-pufcn56j 173 32 them -PRON- PRP cord-023944-pufcn56j 173 33 as as IN cord-023944-pufcn56j 173 34 divisioual divisioual JJ cord-023944-pufcn56j 173 35 coordinators coordinator NNS cord-023944-pufcn56j 173 36 . . . cord-023944-pufcn56j 174 1 Commonly commonly RB cord-023944-pufcn56j 174 2 , , , cord-023944-pufcn56j 174 3 information information NN cord-023944-pufcn56j 174 4 security security NN cord-023944-pufcn56j 174 5 is be VBZ cord-023944-pufcn56j 174 6 part part NN cord-023944-pufcn56j 174 7 of of IN cord-023944-pufcn56j 174 8 an an DT cord-023944-pufcn56j 174 9 IT IT NNP cord-023944-pufcn56j 174 10 organization organization NN cord-023944-pufcn56j 174 11 . . . cord-023944-pufcn56j 175 1 Positive positive JJ cord-023944-pufcn56j 175 2 aspects aspect NNS cord-023944-pufcn56j 175 3 : : : cord-023944-pufcn56j 176 1 • • NFP cord-023944-pufcn56j 176 2 Direct direct JJ cord-023944-pufcn56j 176 3 responsibility responsibility NN cord-023944-pufcn56j 176 4 for for IN cord-023944-pufcn56j 176 5 information information NN cord-023944-pufcn56j 176 6 security security NN cord-023944-pufcn56j 176 7 at at IN cord-023944-pufcn56j 176 8 the the DT cord-023944-pufcn56j 176 9 local local JJ cord-023944-pufcn56j 176 10 entities entity NNS cord-023944-pufcn56j 176 11 is be VBZ cord-023944-pufcn56j 176 12 assigued assigue VBN cord-023944-pufcn56j 176 13 locally locally RB cord-023944-pufcn56j 176 14 . . . cord-023944-pufcn56j 177 1 In in IN cord-023944-pufcn56j 177 2 case case NN cord-023944-pufcn56j 177 3 of of IN cord-023944-pufcn56j 177 4 divisional divisional JJ cord-023944-pufcn56j 177 5 coordination coordination NN cord-023944-pufcn56j 177 6 it -PRON- PRP cord-023944-pufcn56j 177 7 can can MD cord-023944-pufcn56j 177 8 be be VB cord-023944-pufcn56j 177 9 ensured ensure VBN cord-023944-pufcn56j 177 10 that that DT cord-023944-pufcn56j 177 11 subject subject JJ cord-023944-pufcn56j 177 12 matter matter NN cord-023944-pufcn56j 177 13 expertise expertise NN cord-023944-pufcn56j 177 14 is be VBZ cord-023944-pufcn56j 177 15 available available JJ cord-023944-pufcn56j 177 16 for for IN cord-023944-pufcn56j 177 17 supporting support VBG cord-023944-pufcn56j 177 18 the the DT cord-023944-pufcn56j 177 19 local local JJ cord-023944-pufcn56j 177 20 entities entity NNS cord-023944-pufcn56j 177 21 , , , cord-023944-pufcn56j 177 22 which which WDT cord-023944-pufcn56j 177 23 do do VBP cord-023944-pufcn56j 177 24 not not RB cord-023944-pufcn56j 177 25 necessarily necessarily RB cord-023944-pufcn56j 177 26 have have VB cord-023944-pufcn56j 177 27 this this DT cord-023944-pufcn56j 177 28 expertise expertise NN cord-023944-pufcn56j 177 29 locally locally RB cord-023944-pufcn56j 177 30 . . . cord-023944-pufcn56j 178 1 • • NNP cord-023944-pufcn56j 179 1 The the DT cord-023944-pufcn56j 179 2 divisional divisional JJ cord-023944-pufcn56j 179 3 coordinator coordinator NN cord-023944-pufcn56j 179 4 serves serve VBZ cord-023944-pufcn56j 179 5 as as IN cord-023944-pufcn56j 179 6 a a DT cord-023944-pufcn56j 179 7 validation validation NN cord-023944-pufcn56j 179 8 / / SYM cord-023944-pufcn56j 179 9 distribution distribution NN cord-023944-pufcn56j 179 10 platform platform NN cord-023944-pufcn56j 179 11 for for IN cord-023944-pufcn56j 179 12 problems problem NNS cord-023944-pufcn56j 179 13 in in IN cord-023944-pufcn56j 179 14 escalating escalate VBG cord-023944-pufcn56j 179 15 general general JJ cord-023944-pufcn56j 179 16 problems problem NNS cord-023944-pufcn56j 179 17 to to IN cord-023944-pufcn56j 179 18 the the DT cord-023944-pufcn56j 179 19 global global JJ cord-023944-pufcn56j 179 20 department department NN cord-023944-pufcn56j 179 21 , , , cord-023944-pufcn56j 179 22 in in IN cord-023944-pufcn56j 179 23 developing develop VBG cord-023944-pufcn56j 179 24 divisional divisional JJ cord-023944-pufcn56j 179 25 solutions solution NNS cord-023944-pufcn56j 179 26 for for IN cord-023944-pufcn56j 179 27 division division NN cord-023944-pufcn56j 179 28 - - HYPH cord-023944-pufcn56j 179 29 internal internal JJ cord-023944-pufcn56j 179 30 problems problem NNS cord-023944-pufcn56j 179 31 and and CC cord-023944-pufcn56j 179 32 in in IN cord-023944-pufcn56j 179 33 providing provide VBG cord-023944-pufcn56j 179 34 solutions solution NNS cord-023944-pufcn56j 179 35 gained gain VBN cord-023944-pufcn56j 179 36 from from IN cord-023944-pufcn56j 179 37 local local JJ cord-023944-pufcn56j 179 38 entities entity NNS cord-023944-pufcn56j 179 39 to to IN cord-023944-pufcn56j 179 40 the the DT cord-023944-pufcn56j 179 41 other other JJ cord-023944-pufcn56j 179 42 entities entity NNS cord-023944-pufcn56j 179 43 within within IN cord-023944-pufcn56j 179 44 the the DT cord-023944-pufcn56j 179 45 division division NN cord-023944-pufcn56j 179 46 • • NNP cord-023944-pufcn56j 179 47 A a DT cord-023944-pufcn56j 179 48 self self NN cord-023944-pufcn56j 179 49 - - HYPH cord-023944-pufcn56j 179 50 assessment assessment NN cord-023944-pufcn56j 179 51 and and CC cord-023944-pufcn56j 179 52 the the DT cord-023944-pufcn56j 179 53 regular regular JJ cord-023944-pufcn56j 179 54 on on IN cord-023944-pufcn56j 179 55 - - HYPH cord-023944-pufcn56j 179 56 site site NN cord-023944-pufcn56j 179 57 assessments assessment NNS cord-023944-pufcn56j 179 58 conducted conduct VBN cord-023944-pufcn56j 179 59 at at IN cord-023944-pufcn56j 179 60 the the DT cord-023944-pufcn56j 179 61 local local JJ cord-023944-pufcn56j 179 62 entities entity NNS cord-023944-pufcn56j 179 63 by by IN cord-023944-pufcn56j 179 64 the the DT cord-023944-pufcn56j 179 65 divisional divisional JJ cord-023944-pufcn56j 179 66 coordinator coordinator NN cord-023944-pufcn56j 179 67 enable enable VB cord-023944-pufcn56j 179 68 measuring measure VBG cord-023944-pufcn56j 179 69 of of IN cord-023944-pufcn56j 179 70 the the DT cord-023944-pufcn56j 179 71 quality quality NN cord-023944-pufcn56j 179 72 of of IN cord-023944-pufcn56j 179 73 information information NN cord-023944-pufcn56j 179 74 security security NN cord-023944-pufcn56j 179 75 , , , cord-023944-pufcn56j 179 76 and and CC cord-023944-pufcn56j 179 77 help help VB cord-023944-pufcn56j 179 78 identifying identify VBG cord-023944-pufcn56j 179 79 common common JJ cord-023944-pufcn56j 179 80 problems problem NNS cord-023944-pufcn56j 179 81 as as RB cord-023944-pufcn56j 179 82 well well RB cord-023944-pufcn56j 179 83 as as IN cord-023944-pufcn56j 179 84 enforcing enforce VBG cord-023944-pufcn56j 179 85 ongoing ongoing JJ cord-023944-pufcn56j 179 86 improvement improvement NN cord-023944-pufcn56j 179 87 of of IN cord-023944-pufcn56j 179 88 the the DT cord-023944-pufcn56j 179 89 information information NN cord-023944-pufcn56j 179 90 security security NN cord-023944-pufcn56j 179 91 status status NN cord-023944-pufcn56j 179 92 at at IN cord-023944-pufcn56j 179 93 the the DT cord-023944-pufcn56j 179 94 local local JJ cord-023944-pufcn56j 179 95 entities entity NNS cord-023944-pufcn56j 179 96 . . . cord-023944-pufcn56j 180 1 • • NNP cord-023944-pufcn56j 180 2 On on IN cord-023944-pufcn56j 180 3 - - HYPH cord-023944-pufcn56j 180 4 site site NN cord-023944-pufcn56j 180 5 assessments assessment NNS cord-023944-pufcn56j 180 6 serve serve VBP cord-023944-pufcn56j 180 7 also also RB cord-023944-pufcn56j 180 8 to to TO cord-023944-pufcn56j 180 9 provide provide VB cord-023944-pufcn56j 180 10 consnltation consnltation NN cord-023944-pufcn56j 180 11 for for IN cord-023944-pufcn56j 180 12 the the DT cord-023944-pufcn56j 180 13 local local JJ cord-023944-pufcn56j 180 14 entities entity NNS cord-023944-pufcn56j 180 15 in in IN cord-023944-pufcn56j 180 16 their -PRON- PRP$ cord-023944-pufcn56j 180 17 specific specific JJ cord-023944-pufcn56j 180 18 problems problem NNS cord-023944-pufcn56j 180 19 and and CC cord-023944-pufcn56j 180 20 for for IN cord-023944-pufcn56j 180 21 creating create VBG cord-023944-pufcn56j 180 22 awareness awareness NN cord-023944-pufcn56j 180 23 about about IN cord-023944-pufcn56j 180 24 the the DT cord-023944-pufcn56j 180 25 importance importance NN cord-023944-pufcn56j 180 26 of of IN cord-023944-pufcn56j 180 27 information information NN cord-023944-pufcn56j 180 28 security security NN cord-023944-pufcn56j 180 29 among among IN cord-023944-pufcn56j 180 30 the the DT cord-023944-pufcn56j 180 31 local local JJ cord-023944-pufcn56j 180 32 management management NN cord-023944-pufcn56j 180 33 . . . cord-023944-pufcn56j 181 1 Negative negative JJ cord-023944-pufcn56j 181 2 aspects aspect NNS cord-023944-pufcn56j 181 3 : : : cord-023944-pufcn56j 182 1 • • NNP cord-023944-pufcn56j 183 1 An an DT cord-023944-pufcn56j 183 2 information information NN cord-023944-pufcn56j 183 3 security security NN cord-023944-pufcn56j 183 4 organization organization NN cord-023944-pufcn56j 183 5 which which WDT cord-023944-pufcn56j 183 6 is be VBZ cord-023944-pufcn56j 183 7 integrated integrate VBN cord-023944-pufcn56j 183 8 within within IN cord-023944-pufcn56j 183 9 an an DT cord-023944-pufcn56j 183 10 IT IT NNP cord-023944-pufcn56j 183 11 organization organization NN cord-023944-pufcn56j 183 12 is be VBZ cord-023944-pufcn56j 183 13 usually usually RB cord-023944-pufcn56j 183 14 not not RB cord-023944-pufcn56j 183 15 sufficiently sufficiently RB cord-023944-pufcn56j 183 16 involved involved JJ cord-023944-pufcn56j 183 17 in in IN cord-023944-pufcn56j 183 18 the the DT cord-023944-pufcn56j 183 19 busioess busioess NN cord-023944-pufcn56j 183 20 processes process NNS cord-023944-pufcn56j 183 21 , , , cord-023944-pufcn56j 183 22 which which WDT cord-023944-pufcn56j 183 23 is be VBZ cord-023944-pufcn56j 183 24 crucial crucial JJ cord-023944-pufcn56j 183 25 for for IN cord-023944-pufcn56j 183 26 the the DT cord-023944-pufcn56j 183 27 success success NN cord-023944-pufcn56j 183 28 of of IN cord-023944-pufcn56j 183 29 all all DT cord-023944-pufcn56j 183 30 initiatives initiative NNS cord-023944-pufcn56j 183 31 . . . cord-023944-pufcn56j 184 1 Therefore therefore RB cord-023944-pufcn56j 184 2 . . . cord-023944-pufcn56j 185 1 its -PRON- PRP$ cord-023944-pufcn56j 185 2 possibilities possibility NNS cord-023944-pufcn56j 185 3 are be VBP cord-023944-pufcn56j 185 4 limited limit VBN cord-023944-pufcn56j 185 5 at at IN cord-023944-pufcn56j 185 6 all all DT cord-023944-pufcn56j 185 7 levels level NNS cord-023944-pufcn56j 185 8 ( ( -LRB- cord-023944-pufcn56j 185 9 local local JJ cord-023944-pufcn56j 185 10 , , , cord-023944-pufcn56j 185 11 regioual regioual JJ cord-023944-pufcn56j 185 12 as as RB cord-023944-pufcn56j 185 13 well well RB cord-023944-pufcn56j 185 14 as as IN cord-023944-pufcn56j 185 15 central central JJ cord-023944-pufcn56j 185 16 level level NN cord-023944-pufcn56j 185 17 ) ) -RRB- cord-023944-pufcn56j 185 18 . . . cord-023944-pufcn56j 186 1 • • NNP cord-023944-pufcn56j 186 2 Global global JJ cord-023944-pufcn56j 186 3 information information NN cord-023944-pufcn56j 186 4 security security NN cord-023944-pufcn56j 186 5 departments department NNS cord-023944-pufcn56j 186 6 tend tend VBP cord-023944-pufcn56j 186 7 to to TO cord-023944-pufcn56j 186 8 concentrate concentrate VB cord-023944-pufcn56j 186 9 on on IN cord-023944-pufcn56j 186 10 information information NN cord-023944-pufcn56j 186 11 security security NN cord-023944-pufcn56j 186 12 problems problem NNS cord-023944-pufcn56j 186 13 related relate VBN cord-023944-pufcn56j 186 14 to to IN cord-023944-pufcn56j 186 15 those those DT cord-023944-pufcn56j 186 16 entities entity NNS cord-023944-pufcn56j 186 17 which which WDT cord-023944-pufcn56j 186 18 are be VBP cord-023944-pufcn56j 186 19 considered consider VBN cord-023944-pufcn56j 186 20 the the DT cord-023944-pufcn56j 186 21 heavy heavy JJ cord-023944-pufcn56j 186 22 weights weight NNS cord-023944-pufcn56j 186 23 of of IN cord-023944-pufcn56j 186 24 an an DT cord-023944-pufcn56j 186 25 enterprise enterprise NN cord-023944-pufcn56j 186 26 's 's POS cord-023944-pufcn56j 186 27 portfolio portfolio NN cord-023944-pufcn56j 186 28 and and CC cord-023944-pufcn56j 186 29 other other JJ cord-023944-pufcn56j 186 30 portfolio portfolio NN cord-023944-pufcn56j 186 31 items item NNS cord-023944-pufcn56j 186 32 are be VBP cord-023944-pufcn56j 186 33 left leave VBN cord-023944-pufcn56j 186 34 without without IN cord-023944-pufcn56j 186 35 support support NN cord-023944-pufcn56j 186 36 . . . cord-023944-pufcn56j 187 1 By by IN cord-023944-pufcn56j 187 2 mapping map VBG cord-023944-pufcn56j 187 3 the the DT cord-023944-pufcn56j 187 4 high high JJ cord-023944-pufcn56j 187 5 - - HYPH cord-023944-pufcn56j 187 6 level level NN cord-023944-pufcn56j 187 7 objectives objective NNS cord-023944-pufcn56j 187 8 defined define VBN cord-023944-pufcn56j 187 9 in in IN cord-023944-pufcn56j 187 10 Section section NN cord-023944-pufcn56j 187 11 2 2 CD cord-023944-pufcn56j 187 12 and and CC cord-023944-pufcn56j 187 13 the the DT cord-023944-pufcn56j 187 14 deficiencies deficiency NNS cord-023944-pufcn56j 187 15 identified identify VBN cord-023944-pufcn56j 187 16 in in IN cord-023944-pufcn56j 187 17 the the DT cord-023944-pufcn56j 187 18 in in IN cord-023944-pufcn56j 187 19 Section section NN cord-023944-pufcn56j 187 20 4 4 CD cord-023944-pufcn56j 187 21 on on IN cord-023944-pufcn56j 187 22 risk risk NN cord-023944-pufcn56j 187 23 considerations consideration NNS cord-023944-pufcn56j 187 24 , , , cord-023944-pufcn56j 187 25 the the DT cord-023944-pufcn56j 187 26 following follow VBG cord-023944-pufcn56j 187 27 strategic strategic JJ cord-023944-pufcn56j 187 28 goals goal NNS cord-023944-pufcn56j 187 29 should should MD cord-023944-pufcn56j 187 30 be be VB cord-023944-pufcn56j 187 31 set set VBN cord-023944-pufcn56j 187 32 up up RP cord-023944-pufcn56j 187 33 in in IN cord-023944-pufcn56j 187 34 order order NN cord-023944-pufcn56j 187 35 to to TO cord-023944-pufcn56j 187 36 generate generate VB cord-023944-pufcn56j 187 37 an an DT cord-023944-pufcn56j 187 38 integrated integrated JJ cord-023944-pufcn56j 187 39 information information NN cord-023944-pufcn56j 187 40 security security NN cord-023944-pufcn56j 187 41 strategy strategy NN cord-023944-pufcn56j 187 42 within within IN cord-023944-pufcn56j 187 43 an an DT cord-023944-pufcn56j 187 44 organization organization NN cord-023944-pufcn56j 187 45 : : : cord-023944-pufcn56j 188 1 1 1 LS cord-023944-pufcn56j 188 2 . . . cord-023944-pufcn56j 188 3 Set Set VBN cord-023944-pufcn56j 188 4 up up RP cord-023944-pufcn56j 188 5 a a DT cord-023944-pufcn56j 188 6 role role NN cord-023944-pufcn56j 188 7 concept concept NN cord-023944-pufcn56j 188 8 for for IN cord-023944-pufcn56j 188 9 all all DT cord-023944-pufcn56j 188 10 business business NN cord-023944-pufcn56j 188 11 processes process NNS cord-023944-pufcn56j 188 12 ( ( -LRB- cord-023944-pufcn56j 188 13 target target NN cord-023944-pufcn56j 188 14 areas area NNS cord-023944-pufcn56j 188 15 : : : cord-023944-pufcn56j 188 16 information information NN cord-023944-pufcn56j 188 17 users user NNS cord-023944-pufcn56j 188 18 , , , cord-023944-pufcn56j 188 19 business business NN cord-023944-pufcn56j 188 20 processes process NNS cord-023944-pufcn56j 188 21 ) ) -RRB- cord-023944-pufcn56j 188 22 . . . cord-023944-pufcn56j 189 1 3 3 LS cord-023944-pufcn56j 189 2 . . . cord-023944-pufcn56j 190 1 Set Set VBN cord-023944-pufcn56j 190 2 up up RP cord-023944-pufcn56j 190 3 business business NN cord-023944-pufcn56j 190 4 continuity continuity NN cord-023944-pufcn56j 190 5 management management NN cord-023944-pufcn56j 190 6 at at IN cord-023944-pufcn56j 190 7 all all DT cord-023944-pufcn56j 190 8 entities entity NNS cord-023944-pufcn56j 190 9 ( ( -LRB- cord-023944-pufcn56j 190 10 target target NN cord-023944-pufcn56j 190 11 areas area NNS cord-023944-pufcn56j 190 12 : : : cord-023944-pufcn56j 190 13 information information NN cord-023944-pufcn56j 190 14 users user NNS cord-023944-pufcn56j 190 15 , , , cord-023944-pufcn56j 190 16 business business NN cord-023944-pufcn56j 190 17 processes process NNS cord-023944-pufcn56j 190 18 , , , cord-023944-pufcn56j 190 19 applications application NNS cord-023944-pufcn56j 190 20 , , , cord-023944-pufcn56j 190 21 infrastructure infrastructure NN cord-023944-pufcn56j 190 22 ) ) -RRB- cord-023944-pufcn56j 190 23 . . . cord-023944-pufcn56j 191 1 4 4 LS cord-023944-pufcn56j 191 2 . . . cord-023944-pufcn56j 192 1 Provide provide VB cord-023944-pufcn56j 192 2 and and CC cord-023944-pufcn56j 192 3 embed embed VB cord-023944-pufcn56j 192 4 information information NN cord-023944-pufcn56j 192 5 security security NN cord-023944-pufcn56j 192 6 in in IN cord-023944-pufcn56j 192 7 the the DT cord-023944-pufcn56j 192 8 software software NN cord-023944-pufcn56j 192 9 development development NN cord-023944-pufcn56j 192 10 lifecycle lifecycle NN cord-023944-pufcn56j 192 11 searolessly searolessly NNP cord-023944-pufcn56j 192 12 , , , cord-023944-pufcn56j 192 13 including include VBG cord-023944-pufcn56j 192 14 the the DT cord-023944-pufcn56j 192 15 change change NN cord-023944-pufcn56j 192 16 process process NN cord-023944-pufcn56j 192 17 ( ( -LRB- cord-023944-pufcn56j 192 18 target target NN cord-023944-pufcn56j 192 19 area area NN cord-023944-pufcn56j 192 20 : : : cord-023944-pufcn56j 192 21 applications application NNS cord-023944-pufcn56j 192 22 ) ) -RRB- cord-023944-pufcn56j 192 23 . . . cord-023944-pufcn56j 193 1 5 5 LS cord-023944-pufcn56j 193 2 . . . cord-023944-pufcn56j 194 1 Establish establish VB cord-023944-pufcn56j 194 2 an an DT cord-023944-pufcn56j 194 3 ongoing ongoing JJ cord-023944-pufcn56j 194 4 improvement improvement NN cord-023944-pufcn56j 194 5 process process NN cord-023944-pufcn56j 194 6 for for IN cord-023944-pufcn56j 194 7 existing exist VBG cord-023944-pufcn56j 194 8 applications application NNS cord-023944-pufcn56j 194 9 ( ( -LRB- cord-023944-pufcn56j 194 10 target target NN cord-023944-pufcn56j 194 11 area area NN cord-023944-pufcn56j 194 12 : : : cord-023944-pufcn56j 194 13 applications application NNS cord-023944-pufcn56j 194 14 ) ) -RRB- cord-023944-pufcn56j 194 15 . . . cord-023944-pufcn56j 195 1 6 6 LS cord-023944-pufcn56j 195 2 . . . cord-023944-pufcn56j 195 3 integrate integrate VB cord-023944-pufcn56j 195 4 information information NN cord-023944-pufcn56j 195 5 security security NN cord-023944-pufcn56j 195 6 into into IN cord-023944-pufcn56j 195 7 the the DT cord-023944-pufcn56j 195 8 IT IT NNP cord-023944-pufcn56j 195 9 operating operate VBG cord-023944-pufcn56j 195 10 procedures procedure NNS cord-023944-pufcn56j 195 11 and and CC cord-023944-pufcn56j 195 12 services service NNS cord-023944-pufcn56j 195 13 ( ( -LRB- cord-023944-pufcn56j 195 14 target target NNP cord-023944-pufcn56j 195 15 area area NN cord-023944-pufcn56j 195 16 : : : cord-023944-pufcn56j 195 17 infrastructore infrastructore NNP cord-023944-pufcn56j 195 18 ) ) -RRB- cord-023944-pufcn56j 195 19 . . . cord-023944-pufcn56j 196 1 7 7 CD cord-023944-pufcn56j 196 2 . . . cord-023944-pufcn56j 197 1 Optimize optimize VB cord-023944-pufcn56j 197 2 resources resource NNS cord-023944-pufcn56j 197 3 by by IN cord-023944-pufcn56j 197 4 establishing establish VBG cord-023944-pufcn56j 197 5 an an DT cord-023944-pufcn56j 197 6 exchange exchange NN cord-023944-pufcn56j 197 7 platform platform NN cord-023944-pufcn56j 197 8 within within IN cord-023944-pufcn56j 197 9 the the DT cord-023944-pufcn56j 197 10 information information NN cord-023944-pufcn56j 197 11 security security NNP cord-023944-pufcn56j 197 12 commuuity commuuity NNP cord-023944-pufcn56j 197 13 ( ( -LRB- cord-023944-pufcn56j 197 14 target target NNP cord-023944-pufcn56j 197 15 area area NN cord-023944-pufcn56j 197 16 : : : cord-023944-pufcn56j 197 17 information information NNP cord-023944-pufcn56j 197 18 security security NNP cord-023944-pufcn56j 197 19 organization organization NNP cord-023944-pufcn56j 197 20 ) ) -RRB- cord-023944-pufcn56j 197 21 . . . cord-023944-pufcn56j 198 1 Some some DT cord-023944-pufcn56j 198 2 of of IN cord-023944-pufcn56j 198 3 these these DT cord-023944-pufcn56j 198 4 goals goal NNS cord-023944-pufcn56j 198 5 sound sound VBP cord-023944-pufcn56j 198 6 simple simple JJ cord-023944-pufcn56j 198 7 , , , cord-023944-pufcn56j 198 8 some some DT cord-023944-pufcn56j 198 9 of of IN cord-023944-pufcn56j 198 10 them -PRON- PRP cord-023944-pufcn56j 198 11 are be VBP cord-023944-pufcn56j 198 12 quite quite RB cord-023944-pufcn56j 198 13 complex complex JJ cord-023944-pufcn56j 198 14 . . . cord-023944-pufcn56j 199 1 If if IN cord-023944-pufcn56j 199 2 we -PRON- PRP cord-023944-pufcn56j 199 3 map map VBP cord-023944-pufcn56j 199 4 the the DT cord-023944-pufcn56j 199 5 new new JJ cord-023944-pufcn56j 199 6 technology technology NN cord-023944-pufcn56j 199 7 trends trend NNS cord-023944-pufcn56j 199 8 which which WDT cord-023944-pufcn56j 199 9 have have VBP cord-023944-pufcn56j 199 10 been be VBN cord-023944-pufcn56j 199 11 touched touch VBN cord-023944-pufcn56j 199 12 in in IN cord-023944-pufcn56j 199 13 the the DT cord-023944-pufcn56j 199 14 very very JJ cord-023944-pufcn56j 199 15 begiuuing begiuuing NN cord-023944-pufcn56j 199 16 , , , cord-023944-pufcn56j 199 17 then then RB cord-023944-pufcn56j 199 18 one one PRP cord-023944-pufcn56j 199 19 can can MD cord-023944-pufcn56j 199 20 see see VB cord-023944-pufcn56j 199 21 that that IN cord-023944-pufcn56j 199 22 some some DT cord-023944-pufcn56j 199 23 goals goal NNS cord-023944-pufcn56j 199 24 can can MD cord-023944-pufcn56j 199 25 be be VB cord-023944-pufcn56j 199 26 achieved achieve VBN cord-023944-pufcn56j 199 27 by by IN cord-023944-pufcn56j 199 28 simple simple JJ cord-023944-pufcn56j 199 29 directives directive NNS cord-023944-pufcn56j 199 30 of of IN cord-023944-pufcn56j 199 31 the the DT cord-023944-pufcn56j 199 32 management management NN cord-023944-pufcn56j 199 33 and and CC cord-023944-pufcn56j 199 34 executive executive JJ cord-023944-pufcn56j 199 35 management management NN cord-023944-pufcn56j 199 36 support support NN cord-023944-pufcn56j 199 37 and and CC cord-023944-pufcn56j 199 38 some some DT cord-023944-pufcn56j 199 39 need need VBP cord-023944-pufcn56j 199 40 further further JJ cord-023944-pufcn56j 199 41 elaboration elaboration NN cord-023944-pufcn56j 199 42 . . . cord-023944-pufcn56j 200 1 For for IN cord-023944-pufcn56j 200 2 exarople exarople NN cord-023944-pufcn56j 200 3 , , , cord-023944-pufcn56j 200 4 the the DT cord-023944-pufcn56j 200 5 role role NN cord-023944-pufcn56j 200 6 concept concept NN cord-023944-pufcn56j 200 7 is be VBZ cord-023944-pufcn56j 200 8 a a DT cord-023944-pufcn56j 200 9 task task NN cord-023944-pufcn56j 200 10 which which WDT cord-023944-pufcn56j 200 11 requires require VBZ cord-023944-pufcn56j 200 12 an an DT cord-023944-pufcn56j 200 13 organization organization NN cord-023944-pufcn56j 200 14 to to TO cord-023944-pufcn56j 200 15 document document VB cord-023944-pufcn56j 200 16 its -PRON- PRP$ cord-023944-pufcn56j 200 17 business business NN cord-023944-pufcn56j 200 18 processes process NNS cord-023944-pufcn56j 200 19 and and CC cord-023944-pufcn56j 200 20 the the DT cord-023944-pufcn56j 200 21 roles role NNS cord-023944-pufcn56j 200 22 that that WDT cord-023944-pufcn56j 200 23 are be VBP cord-023944-pufcn56j 200 24 required require VBN cord-023944-pufcn56j 200 25 in in IN cord-023944-pufcn56j 200 26 executing execute VBG cord-023944-pufcn56j 200 27 the the DT cord-023944-pufcn56j 200 28 business business NN cord-023944-pufcn56j 200 29 processes process NNS cord-023944-pufcn56j 200 30 . . . cord-023944-pufcn56j 201 1 Also also RB cord-023944-pufcn56j 201 2 , , , cord-023944-pufcn56j 201 3 if if IN cord-023944-pufcn56j 201 4 an an DT cord-023944-pufcn56j 201 5 enterprise enterprise NN cord-023944-pufcn56j 201 6 defines define VBZ cord-023944-pufcn56j 201 7 which which WDT cord-023944-pufcn56j 201 8 of of IN cord-023944-pufcn56j 201 9 the the DT cord-023944-pufcn56j 201 10 business business NN cord-023944-pufcn56j 201 11 processes process NNS cord-023944-pufcn56j 201 12 are be VBP cord-023944-pufcn56j 201 13 the the DT cord-023944-pufcn56j 201 14 most most RBS cord-023944-pufcn56j 201 15 critical critical JJ cord-023944-pufcn56j 201 16 ones one NNS cord-023944-pufcn56j 201 17 from from IN cord-023944-pufcn56j 201 18 a a DT cord-023944-pufcn56j 201 19 global global JJ cord-023944-pufcn56j 201 20 perspective perspective NN cord-023944-pufcn56j 201 21 then then RB cord-023944-pufcn56j 201 22 business business NN cord-023944-pufcn56j 201 23 continuity continuity NN cord-023944-pufcn56j 201 24 activities activity NNS cord-023944-pufcn56j 201 25 can can MD cord-023944-pufcn56j 201 26 also also RB cord-023944-pufcn56j 201 27 be be VB cord-023944-pufcn56j 201 28 strearulined strearuline VBN cord-023944-pufcn56j 201 29 . . . cord-023944-pufcn56j 202 1 Finally finally RB cord-023944-pufcn56j 202 2 , , , cord-023944-pufcn56j 202 3 if if IN cord-023944-pufcn56j 202 4 a a DT cord-023944-pufcn56j 202 5 mapping mapping NN cord-023944-pufcn56j 202 6 between between IN cord-023944-pufcn56j 202 7 business business NN cord-023944-pufcn56j 202 8 processes process NNS cord-023944-pufcn56j 202 9 and and CC cord-023944-pufcn56j 202 10 applications application NNS cord-023944-pufcn56j 202 11 is be VBZ cord-023944-pufcn56j 202 12 achieved achieve VBN cord-023944-pufcn56j 202 13 by by IN cord-023944-pufcn56j 202 14 the the DT cord-023944-pufcn56j 202 15 first first JJ cord-023944-pufcn56j 202 16 two two CD cord-023944-pufcn56j 202 17 goals goal NNS cord-023944-pufcn56j 202 18 then then RB cord-023944-pufcn56j 202 19 standardization standardization NN cord-023944-pufcn56j 202 20 on on IN cord-023944-pufcn56j 202 21 the the DT cord-023944-pufcn56j 202 22 application application NN cord-023944-pufcn56j 202 23 level level NN cord-023944-pufcn56j 202 24 could could MD cord-023944-pufcn56j 202 25 be be VB cord-023944-pufcn56j 202 26 an an DT cord-023944-pufcn56j 202 27 outcome outcome NN cord-023944-pufcn56j 202 28 as as RB cord-023944-pufcn56j 202 29 well well RB cord-023944-pufcn56j 202 30 . . . cord-023944-pufcn56j 203 1 However however RB cord-023944-pufcn56j 203 2 , , , cord-023944-pufcn56j 203 3 there there EX cord-023944-pufcn56j 203 4 are be VBP cord-023944-pufcn56j 203 5 areas area NNS cord-023944-pufcn56j 203 6 which which WDT cord-023944-pufcn56j 203 7 need need VBP cord-023944-pufcn56j 203 8 special special JJ cord-023944-pufcn56j 203 9 attention attention NN cord-023944-pufcn56j 203 10 : : : cord-023944-pufcn56j 203 11 if if IN cord-023944-pufcn56j 203 12 we -PRON- PRP cord-023944-pufcn56j 203 13 look look VBP cord-023944-pufcn56j 203 14 at at IN cord-023944-pufcn56j 203 15 a a DT cord-023944-pufcn56j 203 16 common common JJ cord-023944-pufcn56j 203 17 infrastructure infrastructure NN cord-023944-pufcn56j 203 18 concept concept NN cord-023944-pufcn56j 203 19 today today NN cord-023944-pufcn56j 203 20 then then RB cord-023944-pufcn56j 203 21 we -PRON- PRP cord-023944-pufcn56j 203 22 must must MD cord-023944-pufcn56j 203 23 be be VB cord-023944-pufcn56j 203 24 aware aware JJ cord-023944-pufcn56j 203 25 that that IN cord-023944-pufcn56j 203 26 a a DT cord-023944-pufcn56j 203 27 switch switch NN cord-023944-pufcn56j 203 28 to to IN cord-023944-pufcn56j 203 29 IPv6 ipv6 PRP cord-023944-pufcn56j 203 30 will will MD cord-023944-pufcn56j 203 31 on on IN cord-023944-pufcn56j 203 32 the the DT cord-023944-pufcn56j 203 33 one one CD cord-023944-pufcn56j 203 34 hand hand NN cord-023944-pufcn56j 203 35 solve solve VB cord-023944-pufcn56j 203 36 old old JJ cord-023944-pufcn56j 203 37 problems problem NNS cord-023944-pufcn56j 203 38 like like IN cord-023944-pufcn56j 203 39 the the DT cord-023944-pufcn56j 203 40 searuless searuless NNP cord-023944-pufcn56j 203 41 integration integration NN cord-023944-pufcn56j 203 42 of of IN cord-023944-pufcn56j 203 43 virtual virtual JJ cord-023944-pufcn56j 203 44 private private JJ cord-023944-pufcn56j 203 45 network network NN cord-023944-pufcn56j 203 46 into into IN cord-023944-pufcn56j 203 47 the the DT cord-023944-pufcn56j 203 48 infrastructore infrastructore NN cord-023944-pufcn56j 203 49 but but CC cord-023944-pufcn56j 203 50 will will MD cord-023944-pufcn56j 203 51 bring bring VB cord-023944-pufcn56j 203 52 up up RP cord-023944-pufcn56j 203 53 new new JJ cord-023944-pufcn56j 203 54 ones one NNS cord-023944-pufcn56j 203 55 which which WDT cord-023944-pufcn56j 203 56 were be VBD cord-023944-pufcn56j 203 57 solved solve VBN cord-023944-pufcn56j 203 58 by by IN cord-023944-pufcn56j 203 59 techniques technique NNS cord-023944-pufcn56j 203 60 that that WDT cord-023944-pufcn56j 203 61 can can MD cord-023944-pufcn56j 203 62 not not RB cord-023944-pufcn56j 203 63 be be VB cord-023944-pufcn56j 203 64 used use VBN cord-023944-pufcn56j 203 65 any any DT cord-023944-pufcn56j 203 66 more more JJR cord-023944-pufcn56j 203 67 . . . cord-023944-pufcn56j 204 1 For for IN cord-023944-pufcn56j 204 2 exarople exarople NN cord-023944-pufcn56j 204 3 , , , cord-023944-pufcn56j 204 4 IPv6 ipv6 RB cord-023944-pufcn56j 204 5 does do VBZ cord-023944-pufcn56j 204 6 not not RB cord-023944-pufcn56j 204 7 allow allow VB cord-023944-pufcn56j 204 8 hiding hide VBG cord-023944-pufcn56j 204 9 a a DT cord-023944-pufcn56j 204 10 network network NN cord-023944-pufcn56j 204 11 layout layout NN cord-023944-pufcn56j 204 12 via via IN cord-023944-pufcn56j 204 13 network network NN cord-023944-pufcn56j 204 14 address address NN cord-023944-pufcn56j 204 15 translation translation NN cord-023944-pufcn56j 204 16 and and CC cord-023944-pufcn56j 204 17 private private JJ cord-023944-pufcn56j 204 18 IP ip NN cord-023944-pufcn56j 204 19 addressing address VBG cord-023944-pufcn56j 204 20 but but CC cord-023944-pufcn56j 204 21 requires require VBZ cord-023944-pufcn56j 204 22 more more RBR cord-023944-pufcn56j 204 23 stringent stringent JJ cord-023944-pufcn56j 204 24 methods method NNS cord-023944-pufcn56j 204 25 . . . cord-023944-pufcn56j 205 1 in in IN cord-023944-pufcn56j 205 2 addition addition NN cord-023944-pufcn56j 205 3 , , , cord-023944-pufcn56j 205 4 some some DT cord-023944-pufcn56j 205 5 upcoming upcoming JJ cord-023944-pufcn56j 205 6 or or CC cord-023944-pufcn56j 205 7 newly newly RB cord-023944-pufcn56j 205 8 introduced introduce VBN cord-023944-pufcn56j 205 9 technologies technology NNS cord-023944-pufcn56j 205 10 have have VBP cord-023944-pufcn56j 205 11 not not RB cord-023944-pufcn56j 205 12 sufficiently sufficiently RB cord-023944-pufcn56j 205 13 been be VBN cord-023944-pufcn56j 205 14 evaluated evaluate VBN cord-023944-pufcn56j 205 15 : : : cord-023944-pufcn56j 205 16 if if IN cord-023944-pufcn56j 205 17 we -PRON- PRP cord-023944-pufcn56j 205 18 look look VBP cord-023944-pufcn56j 205 19 at at IN cord-023944-pufcn56j 205 20 virtualization virtualization NN cord-023944-pufcn56j 205 21 then then RB cord-023944-pufcn56j 205 22 we -PRON- PRP cord-023944-pufcn56j 205 23 can can MD cord-023944-pufcn56j 205 24 simplify simplify VB cord-023944-pufcn56j 205 25 backup backup NN cord-023944-pufcn56j 205 26 for for IN cord-023944-pufcn56j 205 27 many many JJ cord-023944-pufcn56j 205 28 virtual virtual JJ cord-023944-pufcn56j 205 29 servers server NNS cord-023944-pufcn56j 205 30 at at IN cord-023944-pufcn56j 205 31 once once RB cord-023944-pufcn56j 205 32 but but CC cord-023944-pufcn56j 205 33 are be VBP cord-023944-pufcn56j 205 34 confronted confront VBN cord-023944-pufcn56j 205 35 with with IN cord-023944-pufcn56j 205 36 the the DT cord-023944-pufcn56j 205 37 risk risk NN cord-023944-pufcn56j 205 38 that that IN cord-023944-pufcn56j 205 39 a a DT cord-023944-pufcn56j 205 40 recovery recovery NN cord-023944-pufcn56j 205 41 of of IN cord-023944-pufcn56j 205 42 data datum NNS cord-023944-pufcn56j 205 43 for for IN cord-023944-pufcn56j 205 44 a a DT cord-023944-pufcn56j 205 45 specific specific JJ cord-023944-pufcn56j 205 46 virtual virtual JJ cord-023944-pufcn56j 205 47 server server NN cord-023944-pufcn56j 205 48 is be VBZ cord-023944-pufcn56j 205 49 substantially substantially RB cord-023944-pufcn56j 205 50 more more RBR cord-023944-pufcn56j 205 51 complex complex JJ cord-023944-pufcn56j 205 52 . . . cord-023944-pufcn56j 206 1 And and CC cord-023944-pufcn56j 206 2 similar similar JJ cord-023944-pufcn56j 206 3 problems problem NNS cord-023944-pufcn56j 206 4 arise arise VBP cord-023944-pufcn56j 206 5 with with IN cord-023944-pufcn56j 206 6 virus virus NN cord-023944-pufcn56j 206 7 protection protection NN cord-023944-pufcn56j 206 8 ; ; : cord-023944-pufcn56j 206 9 it -PRON- PRP cord-023944-pufcn56j 206 10 needs need VBZ cord-023944-pufcn56j 206 11 to to TO cord-023944-pufcn56j 206 12 be be VB cord-023944-pufcn56j 206 13 understood understand VBN cord-023944-pufcn56j 206 14 that that IN cord-023944-pufcn56j 206 15 if if IN cord-023944-pufcn56j 206 16 different different JJ cord-023944-pufcn56j 206 17 operating operating NN cord-023944-pufcn56j 206 18 systems system NNS cord-023944-pufcn56j 206 19 are be VBP cord-023944-pufcn56j 206 20 hosted host VBN cord-023944-pufcn56j 206 21 as as IN cord-023944-pufcn56j 206 22 guest guest NN cord-023944-pufcn56j 206 23 operating operating NN cord-023944-pufcn56j 206 24 systems system NNS cord-023944-pufcn56j 206 25 within within IN cord-023944-pufcn56j 206 26 a a DT cord-023944-pufcn56j 206 27 virtual virtual JJ cord-023944-pufcn56j 206 28 server server NN cord-023944-pufcn56j 206 29 then then RB cord-023944-pufcn56j 206 30 virus virus NN cord-023944-pufcn56j 206 31 protection protection NN cord-023944-pufcn56j 206 32 can can MD cord-023944-pufcn56j 206 33 not not RB cord-023944-pufcn56j 206 34 be be VB cord-023944-pufcn56j 206 35 established establish VBN cord-023944-pufcn56j 206 36 on on IN cord-023944-pufcn56j 206 37 the the DT cord-023944-pufcn56j 206 38 hosting host VBG cord-023944-pufcn56j 206 39 virtual virtual JJ cord-023944-pufcn56j 206 40 machine machine NN cord-023944-pufcn56j 206 41 . . . cord-023944-pufcn56j 207 1 And and CC cord-023944-pufcn56j 207 2 there there EX cord-023944-pufcn56j 207 3 are be VBP cord-023944-pufcn56j 207 4 technologies technology NNS cord-023944-pufcn56j 207 5 waiting wait VBG cord-023944-pufcn56j 207 6 whose whose WP$ cord-023944-pufcn56j 207 7 potential potential NN cord-023944-pufcn56j 207 8 is be VBZ cord-023944-pufcn56j 207 9 not not RB cord-023944-pufcn56j 207 10 yet yet RB cord-023944-pufcn56j 207 11 sufficiently sufficiently RB cord-023944-pufcn56j 207 12 examined examine VBN cord-023944-pufcn56j 207 13 If if IN cord-023944-pufcn56j 207 14 we -PRON- PRP cord-023944-pufcn56j 207 15 look look VBP cord-023944-pufcn56j 207 16 at at IN cord-023944-pufcn56j 207 17 the the DT cord-023944-pufcn56j 207 18 Domain Domain NNP cord-023944-pufcn56j 207 19 Name Name NNP cord-023944-pufcn56j 207 20 Service Service NNP cord-023944-pufcn56j 207 21 Security Security NNP cord-023944-pufcn56j 207 22 Extensions Extensions NNPS cord-023944-pufcn56j 207 23 ( ( -LRB- cord-023944-pufcn56j 207 24 DNSSEC DNSSEC NNP cord-023944-pufcn56j 207 25 ) ) -RRB- cord-023944-pufcn56j 207 26 then then RB cord-023944-pufcn56j 207 27 we -PRON- PRP cord-023944-pufcn56j 207 28 easily easily RB cord-023944-pufcn56j 207 29 notice notice VBP cord-023944-pufcn56j 207 30 that that IN cord-023944-pufcn56j 207 31 this this DT cord-023944-pufcn56j 207 32 approach approach NN cord-023944-pufcn56j 207 33 helps help VBZ cord-023944-pufcn56j 207 34 fighting fight VBG cord-023944-pufcn56j 207 35 hackers hacker NNS cord-023944-pufcn56j 207 36 who who WP cord-023944-pufcn56j 207 37 misuse misuse VBP cord-023944-pufcn56j 207 38 the the DT cord-023944-pufcn56j 207 39 DNS dns NN cord-023944-pufcn56j 207 40 for for IN cord-023944-pufcn56j 207 41 attacking attacking NN cord-023944-pufcn56j 207 42 networks network NNS cord-023944-pufcn56j 207 43 but but CC cord-023944-pufcn56j 207 44 it -PRON- PRP cord-023944-pufcn56j 207 45 also also RB cord-023944-pufcn56j 207 46 allows allow VBZ cord-023944-pufcn56j 207 47 prohibiting prohibit VBG cord-023944-pufcn56j 207 48 phishing phishe VBG cord-023944-pufcn56j 207 49 attacks attack NNS cord-023944-pufcn56j 207 50 which which WDT cord-023944-pufcn56j 207 51 might may MD cord-023944-pufcn56j 207 52 damage damage VB cord-023944-pufcn56j 207 53 the the DT cord-023944-pufcn56j 207 54 reputation reputation NN cord-023944-pufcn56j 207 55 of of IN cord-023944-pufcn56j 207 56 an an DT cord-023944-pufcn56j 207 57 organization organization NN cord-023944-pufcn56j 207 58 . . . cord-023944-pufcn56j 208 1 And and CC cord-023944-pufcn56j 208 2 there there EX cord-023944-pufcn56j 208 3 are be VBP cord-023944-pufcn56j 208 4 more more JJR cord-023944-pufcn56j 208 5 ways way NNS cord-023944-pufcn56j 208 6 how how WRB cord-023944-pufcn56j 208 7 this this DT cord-023944-pufcn56j 208 8 DNSSEC DNSSEC NNP cord-023944-pufcn56j 208 9 infrastructure infrastructure NN cord-023944-pufcn56j 208 10 can can MD cord-023944-pufcn56j 208 11 be be VB cord-023944-pufcn56j 208 12 used use VBN cord-023944-pufcn56j 208 13 in in IN cord-023944-pufcn56j 208 14 establishing establish VBG cord-023944-pufcn56j 208 15 trust trust NN cord-023944-pufcn56j 208 16 for for IN cord-023944-pufcn56j 208 17 an an DT cord-023944-pufcn56j 208 18 organization organization NN cord-023944-pufcn56j 208 19 and and CC cord-023944-pufcn56j 208 20 within within IN cord-023944-pufcn56j 208 21 an an DT cord-023944-pufcn56j 208 22 organization organization NN cord-023944-pufcn56j 208 23 . . . cord-023944-pufcn56j 209 1 We -PRON- PRP cord-023944-pufcn56j 209 2 have have VBP cord-023944-pufcn56j 209 3 outlined outline VBN cord-023944-pufcn56j 209 4 in in IN cord-023944-pufcn56j 209 5 this this DT cord-023944-pufcn56j 209 6 article article NN cord-023944-pufcn56j 209 7 which which WDT cord-023944-pufcn56j 209 8 pillars pillar NNS cord-023944-pufcn56j 209 9 of of IN cord-023944-pufcn56j 209 10 an an DT cord-023944-pufcn56j 209 11 organization organization NN cord-023944-pufcn56j 209 12 should should MD cord-023944-pufcn56j 209 13 be be VB cord-023944-pufcn56j 209 14 looked look VBN cord-023944-pufcn56j 209 15 at at IN cord-023944-pufcn56j 209 16 when when WRB cord-023944-pufcn56j 209 17 developing develop VBG cord-023944-pufcn56j 209 18 an an DT cord-023944-pufcn56j 209 19 information information NN cord-023944-pufcn56j 209 20 security security NN cord-023944-pufcn56j 209 21 strategy strategy NN cord-023944-pufcn56j 209 22 . . . cord-023944-pufcn56j 210 1 We -PRON- PRP cord-023944-pufcn56j 210 2 have have VBP cord-023944-pufcn56j 210 3 also also RB cord-023944-pufcn56j 210 4 touched touch VBN cord-023944-pufcn56j 210 5 areas area NNS cord-023944-pufcn56j 210 6 of of IN cord-023944-pufcn56j 210 7 new new JJ cord-023944-pufcn56j 210 8 technologies technology NNS cord-023944-pufcn56j 210 9 which which WDT cord-023944-pufcn56j 210 10 may may MD cord-023944-pufcn56j 210 11 influence influence VB cord-023944-pufcn56j 210 12 such such PDT cord-023944-pufcn56j 210 13 a a DT cord-023944-pufcn56j 210 14 strategy strategy NN cord-023944-pufcn56j 210 15 . . . cord-023944-pufcn56j 211 1 However however RB cord-023944-pufcn56j 211 2 , , , cord-023944-pufcn56j 211 3 we -PRON- PRP cord-023944-pufcn56j 211 4 have have VBP cord-023944-pufcn56j 211 5 not not RB cord-023944-pufcn56j 211 6 sufficiently sufficiently RB cord-023944-pufcn56j 211 7 discussed discuss VBN cord-023944-pufcn56j 211 8 which which WDT cord-023944-pufcn56j 211 9 are be VBP cord-023944-pufcn56j 211 10 the the DT cord-023944-pufcn56j 211 11 critical critical JJ cord-023944-pufcn56j 211 12 success success NN cord-023944-pufcn56j 211 13 factor factor NN cord-023944-pufcn56j 211 14 whenever whenever WRB cord-023944-pufcn56j 211 15 developing develop VBG cord-023944-pufcn56j 211 16 and and CC cord-023944-pufcn56j 211 17 implementing implement VBG cord-023944-pufcn56j 211 18 an an DT cord-023944-pufcn56j 211 19 information information NN cord-023944-pufcn56j 211 20 security security NN cord-023944-pufcn56j 211 21 strategy strategy NN cord-023944-pufcn56j 211 22 . . . cord-023944-pufcn56j 212 1 We -PRON- PRP cord-023944-pufcn56j 212 2 strongly strongly RB cord-023944-pufcn56j 212 3 believe believe VBP cord-023944-pufcn56j 212 4 that that IN cord-023944-pufcn56j 212 5 a a DT cord-023944-pufcn56j 212 6 well well RB cord-023944-pufcn56j 212 7 - - HYPH cord-023944-pufcn56j 212 8 accepted accept VBN cord-023944-pufcn56j 212 9 information information NN cord-023944-pufcn56j 212 10 security security NN cord-023944-pufcn56j 212 11 strategy strategy NN cord-023944-pufcn56j 212 12 is be VBZ cord-023944-pufcn56j 212 13 tightly tightly RB cord-023944-pufcn56j 212 14 aligned align VBN cord-023944-pufcn56j 212 15 with with IN cord-023944-pufcn56j 212 16 the the DT cord-023944-pufcn56j 212 17 business business NN cord-023944-pufcn56j 212 18 strategy strategy NN cord-023944-pufcn56j 212 19 and and CC cord-023944-pufcn56j 212 20 has have VBZ cord-023944-pufcn56j 212 21 full full JJ cord-023944-pufcn56j 212 22 support support NN cord-023944-pufcn56j 212 23 by by IN cord-023944-pufcn56j 212 24 executive executive JJ cord-023944-pufcn56j 212 25 management management NN cord-023944-pufcn56j 212 26 . . . cord-023944-pufcn56j 213 1 We -PRON- PRP cord-023944-pufcn56j 213 2 have have VBP cord-023944-pufcn56j 213 3 noticed notice VBN cord-023944-pufcn56j 213 4 that that IN cord-023944-pufcn56j 213 5 information information NN cord-023944-pufcn56j 213 6 security security NN cord-023944-pufcn56j 213 7 can can MD cord-023944-pufcn56j 213 8 play play VB cord-023944-pufcn56j 213 9 an an DT cord-023944-pufcn56j 213 10 important important JJ cord-023944-pufcn56j 213 11 role role NN cord-023944-pufcn56j 213 12 in in IN cord-023944-pufcn56j 213 13 modernizing modernize VBG cord-023944-pufcn56j 213 14 IT it PRP cord-023944-pufcn56j 213 15 if if IN cord-023944-pufcn56j 213 16 the the DT cord-023944-pufcn56j 213 17 influence influence NN cord-023944-pufcn56j 213 18 of of IN cord-023944-pufcn56j 213 19 information information NN cord-023944-pufcn56j 213 20 security security NN cord-023944-pufcn56j 213 21 and and CC cord-023944-pufcn56j 213 22 potential potential JJ cord-023944-pufcn56j 213 23 drawbacks drawback NNS cord-023944-pufcn56j 213 24 are be VBP cord-023944-pufcn56j 213 25 clearly clearly RB cord-023944-pufcn56j 213 26 pointed point VBN cord-023944-pufcn56j 213 27 out out RP cord-023944-pufcn56j 213 28 and and CC cord-023944-pufcn56j 213 29 discussed discuss VBN cord-023944-pufcn56j 213 30 in in IN cord-023944-pufcn56j 213 31 depth depth NN cord-023944-pufcn56j 213 32 . . . cord-023944-pufcn56j 214 1 There there EX cord-023944-pufcn56j 214 2 is be VBZ cord-023944-pufcn56j 214 3 a a DT cord-023944-pufcn56j 214 4 common common JJ cord-023944-pufcn56j 214 5 understanding understanding NN cord-023944-pufcn56j 214 6 among among IN cord-023944-pufcn56j 214 7 many many JJ cord-023944-pufcn56j 214 8 information information NN cord-023944-pufcn56j 214 9 security security NN cord-023944-pufcn56j 214 10 expert expert NN cord-023944-pufcn56j 214 11 who who WP cord-023944-pufcn56j 214 12 say say VBP cord-023944-pufcn56j 214 13 that that IN cord-023944-pufcn56j 214 14 " " `` cord-023944-pufcn56j 214 15 with with IN cord-023944-pufcn56j 214 16 an an DT cord-023944-pufcn56j 214 17 up up NN cord-023944-pufcn56j 214 18 - - HYPH cord-023944-pufcn56j 214 19 to to IN cord-023944-pufcn56j 214 20 - - HYPH cord-023944-pufcn56j 214 21 date date NN cord-023944-pufcn56j 214 22 information information NN cord-023944-pufcn56j 214 23 security security NN cord-023944-pufcn56j 214 24 strategy strategy NN cord-023944-pufcn56j 214 25 we -PRON- PRP cord-023944-pufcn56j 214 26 can can MD cord-023944-pufcn56j 214 27 do do VB cord-023944-pufcn56j 214 28 business business NN cord-023944-pufcn56j 214 29 which which WDT cord-023944-pufcn56j 214 30 was be VBD cord-023944-pufcn56j 214 31 either either CC cord-023944-pufcn56j 214 32 impossible impossible JJ cord-023944-pufcn56j 214 33 or or CC cord-023944-pufcn56j 214 34 prohibited prohibit VBN cord-023944-pufcn56j 214 35 in in IN cord-023944-pufcn56j 214 36 the the DT cord-023944-pufcn56j 214 37 past past JJ cord-023944-pufcn56j 214 38 " " `` cord-023944-pufcn56j 214 39 DNS DNS NNP cord-023944-pufcn56j 214 40 SECurity SECurity NNP cord-023944-pufcn56j 214 41 Extensions Extensions NNPS cord-023944-pufcn56j 214 42 Technical Technical NNP cord-023944-pufcn56j 214 43 Overview Overview NNP cord-023944-pufcn56j 214 44 International International NNP cord-023944-pufcn56j 214 45 Organization Organization NNP cord-023944-pufcn56j 214 46 for for IN cord-023944-pufcn56j 214 47 Standardization Standardization NNP cord-023944-pufcn56j 214 48 -ISO -ISO HYPH cord-023944-pufcn56j 214 49 27002 27002 CD cord-023944-pufcn56j 214 50 : : : cord-023944-pufcn56j 214 51 Code Code NNP cord-023944-pufcn56j 214 52 of of IN cord-023944-pufcn56j 214 53 Practice Practice NNP cord-023944-pufcn56j 214 54 for for IN cord-023944-pufcn56j 215 1 Information Information NNP cord-023944-pufcn56j 215 2 Security Security NNP cord-023944-pufcn56j 215 3 Management Management NNP cord-023944-pufcn56j 215 4 A A NNP cord-023944-pufcn56j 215 5 Simplified simplify VBN cord-023944-pufcn56j 215 6 APFroach APFroach NNP cord-023944-pufcn56j 215 7 for for IN cord-023944-pufcn56j 215 8 Classifying classify VBG cord-023944-pufcn56j 215 9 Applications Applications NNPS cord-023944-pufcn56j 215 10 ' ' POS cord-023944-pufcn56j 215 11 at at IN cord-023944-pufcn56j 215 12 ISSE ISSE NNP cord-023944-pufcn56j 215 13 2010 2010 CD cord-023944-pufcn56j 215 14 Data Data NNP cord-023944-pufcn56j 215 15 Breach Breach NNP cord-023944-pufcn56j 215 16 Investigations Investigations NNPS cord-023944-pufcn56j 215 17 Report Report NNP