SlideShare a Scribd company logo
1 of 42
Download to read offline
!
!"              #

                            $ %     &

    #       '      ()
                   )*

+ ,                     !

        '
-           '. /




                                2
%   0



                                             !                 "
                        #        $# %                # &       #
         # '                 (                             !       (
          "        )**           %+      ,!               -.           /
        0)         1      2       !                  0
        3            1 44
                        56       !
                        !        768 )96                  6 8 9    !


          "                                          5*
          "         !            )       :       !
               !
         )%+;           *        !               6 8<
            ,!                       "       :
           #
Why BT for Security?

                                             Industry-leading resources
 1,400 global practitioners           Comprehensive event                      Operating 9 world            Over 100 registered patents,
 with over 125 accredited            correlation platforms and                class SOCs globally            190 security papers and
   security professionals                 reporting tools                           24/7/365                     numerous books
         in the US


                                               With proven experience
   6,000 security              BT has delivered                                           Monitoring 550           Filters over 75,000
                              security services to       Over 1,500 firewalls            networks with data
 engagements in the                                                                                                viruses from client
                               over 75% of the           under management             from over 150 countries
   US since 1994                                                                                                  networks each month
                                 Fortune 500                                            and 335,000 devices


                                Delivering an integrated services portfolio
                                                                         Incorporating industry-
                                     From assessment to
                                                                          leading technology &
                                     mitigation, on a global
                                                                       services, with Counterpane
                                              basis
                                                                               at the core


                                                 Third party validation
                                                                                           Many accreditations, including BS
              Leadership position in                     Highest capability                27001/ISO 17799, SAS70-II, FIPS
          Gartner’s 2007 North American                   maturity rating                    140-2, CERT, FIRST, CLAS,
             MSSP Magic Quadrant                            from NSA                                 SANS GIAC
                                                                                                     and CHECK
1
1
           ,
2

1
1   '   3# 4




               5
1


1                 !                       5
    &   ' &                           " % "
              "           "   &               6

                      6
1
                                  6




                              6
1            ! 77
                )


1            !              -           /    & "   &
        !           &                    !             6

            - /                     &
    &                           6

                                    8 0




                        7
1 8 0 9& &

                      -       /
 $                                !           6
 $ 2 , :'
        ;      6
 $                        <
   -)) = => ; ;
   ) =(: 7 = = /
 $
     &            -       /
 $ ?&             "                   &


 $                                        ,   (6:
     .@   ( .@
           6A 6




                              8
18 0


               &

 $ 9
                   ! 6
 $     !
                         ! 6




           9
??? ; ( 7
     ) 67

 ??? ; ($
      )              !        &   ???
    ;( 7
    ) 67
     $ ( .@
        6:
     $ (
    ;( 7
    ) 67
     $ A .@
     $ A:
    ;( 7
    ) 67
     $ ( .@
        6:
     $ 77
    ;( 7
    ) 67
     $ ( .@
        6:
     $ A:
    ;( 7 '
    ) 67
     $ (6:    A .@
     $ B)
        )
                         10
; ( 7& 6 1 '+
 ) 67


 ; ( 7'
  ) 67                                   ???
 1 '+
 $               ;( 7
                  ) 67                         1 '+
 $ 1 '+                  "      '
   B)
    )                                          18 0
 $                           1 '+        !
           &
 1 '+

 $ ?                     &
        1 '+             -
                         1      /
               ;( 7 ,
               ) 67       6

                                    11
!

&       !

<           ! !
    5




                  12
1


    $                    ,
    $
    $       C

    $
    $   !            D




                13
1                          &


                      !$         !
          @   D                  !
1         8 0               6
0                            6
            !     =
    $ 1
    $ +
    $
                                     &   6



                           14
1         ?, &               &   - ? /
                                 1

              !                           6          !    ,       =
    $                            6
    $              6
    $         &        6
E                                             18 0        6
2              :
    $     :                                    '              !
                   F       -F/       6
    $     :                                          <6
2         B'
          (                               !-         B/
                                                      (
    $
    $ 2                          !F           - F/
?&                 " ?
                    1                &
                                     15
1 '+                               -
                                   1              /


 1
 1? 6
 $ 1 !              ;( 7"
                     ) 67          6
 $                                                1? D
 $ ?<                                            G
 8          '                 =1       (6
 1              1 (                                   ??? ; ( 7
                                                           ) 67
 1      '        !  H)                           I
 $     =3
       3        6    6 6 !3    3 &     3)>)3)
                                        ()3;B3           '   '   ' 'H '
                                                                     )    3




                                            16
1


1                                                     "    &
                                           '       ! ! 6
    $ %   &                                    1?
    $ %   &                !- 6
                             6                      1?     /
    $ %   &   +   '        !


1                     1?     =
    $                         ;( J
                               ) 67                  !-        /
                  -           /
    $         !                                !
    $             @           @        &           -F/
    $

                                  17
1       (


                         &          1 '+
                         ???D ; ( 7
                               ) 67
2                                    "'
                                      :       !"
!                    1
                %E               &        ?    -? /

    $   ?            '
    $   ?                !       '            -    '
            /                !




                                     18
1? 4


+                     "
       1?           B")>
                    7()6
+                       "
1?     I    B"))
             )(76




                    19
=            1


"
    ?<


                      ; ( 71 8 0
                       ) 67
    & 6(
     7                         ? &                 - ?/
                                                      6

      &
                  ,          ! 18 0                 &
                        !6
         =3
         3    6              6   3    3   K   K1    K     6

                                 20
?         &                   $                4


                  &                                        6
    $ %               5                                !
              &                                    6
    $         &
                      "                                        & 6
    $
                          "            F   2       " 5
                                                     &     6




                                  21
#                   #
$               3
$                                        !
$                                                !       ?
$           &       '                                &

$   %
$

        &
$           !               &       "
$                                                    18 0
$
$                               '            &
                                    22
0                            !&               6
$               !                                  8 0
        6
    &           "
                             !
$ %
            !                        !6
0 &                 &
$                                            ! "   "
        "   0                    6
0
$                   "                6
$       &                                @             6

                        23
,
$               @                 &                             !
                !&                 !                    6
$                        @
                                                                ?
            6
$                                  @                                6

    ,                                  '                    !
$       ,                         @
                     &                          &   6
$
                "            ?6
$   ,                                       &
    ,            6
                                       24
1       !                                       =
$
$                                         ?6
                             !   &              "
                     !               @
    &                                          ?6
            !                             ,
                         !           ?6




                25
&                     @ -
                        / 8 0
                         1               @   D   !6
                          =
$         18 0                   !   &
$           !        18 0                !
$ &              6




                            26
1



    9                     =
    $       9
    $   9
    $                              - ."   %   " 6/
    $                 3
    $
    $           9
            ?
    $             9       "
                & "



                              27
!$           , 7 6B
                          6 6(


                                  !   ?
$                    -
        /                &            ?6
F
    !
$                -
        /                &            ?6




            28
!

    ,                     !               "
                                      ?       6
        &                 @
        ?&                            !
                                  6
1                =
$                             !                   ?
             !
$       ;( 7
        ) 67
$
$
          ,          76
                      )


                          29
$   , ( 67
                                            6 67

              &       '
                      !
$        "0                    "
        "                      ! " 6
?                 &
                                                    6
    &                                           &
,                              ,            6




                          30
&   $       , > 6B
                                      6 67


                                 "
    &   6
F                                    "        "
        &                        6
$
$   !
            !            !   &

$           3
$               &




                    31
7 67$ 1
         7                                          !


%
             @
$       ,
$                         3                         &       6
F                                 @                 ,       "
             3
            & 6
                  3                            "&
                                           6
F                 @           D                         - , 7 6>
                                                           6 ( /
$                                              &        @
    &                 6
                                      32
1           3                             $       , 7 6:
                                                   6 7

2           3                    &
                     ?
            6
    $            !
                !
    $                    !                        !

        ,                        6
E
    $           3
                6
    $ ?<         3                            3   &
            "                "        &
                     6
                                 33
#                                                     $       , 7 67
                                                               6 7
%                      "                 "        !                     "
                                                          ,
                        @                         6
2                      @            ,
     &
    $ 7 67%
       7
          @        ,                                          3
               &       6
    $ 7 67 F
       7                            @                     ,         "
               3
        & 6
    $ 7 67
       7                   3                     "&
                               6
    $ 7 67 F
       7                   @    D                                 - ,       7 6>
                                                                             ( /
                               &             @                    &             6
                                    34
'
$ L                    !
$
$
        & 6
(             )
$ .
$             ,   ,        6
$ L                    "       =

                  &            &



                  35
!                   !
$ 8
$ 2         +                   &       +        !
$ 9             ;( 7
                 ) 67


$               !                   !                    1
        1                   &           ! &                  !
                !           !


$ 0
$ ?                 '                                <           &
$                   &
                                            36
1


                                      "       "
        !"#"     "                        $   $ 6
    $                         !           6
    $        '                    !


    $    D           &




                         37
1


              1?
               8?
    $ E       !         !             8?
    $                   8?        "
2 1           1     (
    $     1   (
    $




                             38
1                                  %

0
    $       6                  6                                     6    6
1?               !                                               E
    $       =3
            3             !6                6                        6!       6
            !'      -              '                         /
    $       6        ! 6
                      '                                              6    6
        %       0          !
    $       6                      !6   3

    $                &
    $       6         6            3    3       K        6


                                                    39
40
!
                         6
    &                            6
,                            &
        &
                     &               &
            !




                41
#3 $


       !"   "       "        #

 %      &
  6 ! 6   3 3           !
  6   6 3       !




                        42

More Related Content

What's hot

Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresmeadriana barba
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewindalpsmsi
 
Document1
Document1Document1
Document1M3y3aM
 
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...Acquanews
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The CloudNeustar, Inc.
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเราพัน พัน
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launchedYING CHIEH YU
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual engguestc4cf6a1
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materialstinoserracompany
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandIlkka Kakko
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseHeather Piwowar
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate developmentLE HAI TRIEU
 

What's hot (18)

Susceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludismeSusceptibilité familiale et éthnique au paludisme
Susceptibilité familiale et éthnique au paludisme
 
Libro deapoyometminjaresme
Libro deapoyometminjaresmeLibro deapoyometminjaresme
Libro deapoyometminjaresme
 
4. alps computerize motor rewind
4. alps computerize motor rewind4. alps computerize motor rewind
4. alps computerize motor rewind
 
Document1
Document1Document1
Document1
 
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
A Eficiencia Da Hidroterapia Em Paciente Portador De Artrogripose Multipla Co...
 
How To Trust The Cloud
How To Trust The CloudHow To Trust The Cloud
How To Trust The Cloud
 
How to Trust the Cloud
How to Trust the CloudHow to Trust the Cloud
How to Trust the Cloud
 
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
23ประชาคมอาเซียนมีผลอย่างไรต่อชีวิตของเรา
 
Aesthetics in Software Testing
Aesthetics in Software TestingAesthetics in Software Testing
Aesthetics in Software Testing
 
Six-Core AMD Opteron launched
Six-Core AMD Opteron launchedSix-Core AMD Opteron launched
Six-Core AMD Opteron launched
 
Colegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de MoussyColegio Nº 1 - Martín de Moussy
Colegio Nº 1 - Martín de Moussy
 
Farmer's manual eng
Farmer's manual   engFarmer's manual   eng
Farmer's manual eng
 
Alumnes, Programari I Materials
Alumnes, Programari I MaterialsAlumnes, Programari I Materials
Alumnes, Programari I Materials
 
OECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, FinlandOECD, Higher education workshop, Helsinki, 2007, Finland
OECD, Higher education workshop, Helsinki, 2007, Finland
 
Attività didattiche
Attività didatticheAttività didattiche
Attività didattiche
 
Data Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuseData Citation from the perspective of tracking data reuse
Data Citation from the perspective of tracking data reuse
 
04 face- nose- palate development
04 face- nose- palate development04 face- nose- palate development
04 face- nose- palate development
 
Green grocersppt
Green grocerspptGreen grocersppt
Green grocersppt
 

Viewers also liked

Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 

Viewers also liked (8)

Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 

Similar to Webinar - Getting a handle on wireless security for PCI DSS Compliance

设计的约定
设计的约定设计的约定
设计的约定chen meng
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio templateJanine Soika
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenAshley Walker
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor NetworksDiego Pizzocaro
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010guest69ba7b
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industrykateimbach
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsurbed
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Componentsdsingleterry
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?abroekhuis
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerSkills Matter
 
20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_selfgarrett honeycutt
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Cisco Russia
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6umapst
 

Similar to Webinar - Getting a handle on wireless security for PCI DSS Compliance (20)

Pilot Interim Results
Pilot Interim ResultsPilot Interim Results
Pilot Interim Results
 
设计的约定
设计的约定设计的约定
设计的约定
 
Dramatically increase revenue on verio template
Dramatically increase revenue on verio templateDramatically increase revenue on verio template
Dramatically increase revenue on verio template
 
Developer Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu AhonenDeveloper Tools, Nokia Platforms Santtu Ahonen
Developer Tools, Nokia Platforms Santtu Ahonen
 
Lenz Karte
Lenz KarteLenz Karte
Lenz Karte
 
EB-85 A
EB-85 AEB-85 A
EB-85 A
 
Science Fiction Sensor Networks
Science Fiction Sensor NetworksScience Fiction Sensor Networks
Science Fiction Sensor Networks
 
Km Zonalito Feb 2010
Km Zonalito Feb 2010Km Zonalito Feb 2010
Km Zonalito Feb 2010
 
Investment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile IndustryInvestment in the Silicon Valley Mobile Industry
Investment in the Silicon Valley Mobile Industry
 
Low Carbon Housing for Non-experts
Low Carbon Housing for Non-expertsLow Carbon Housing for Non-experts
Low Carbon Housing for Non-experts
 
Development Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business ComponentsDevelopment Made Simple with no Coding: Developing Reusable Business Components
Development Made Simple with no Coding: Developing Reusable Business Components
 
ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?ApacheCon NA11 - Apache Celix, Universal OSGi?
ApacheCon NA11 - Apache Celix, Universal OSGi?
 
Javaee glassfish jcertif2010
Javaee glassfish jcertif2010Javaee glassfish jcertif2010
Javaee glassfish jcertif2010
 
All about Apache ACE
All about Apache ACEAll about Apache ACE
All about Apache ACE
 
OSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle ManagerOSGI workshop - Become A Certified Bundle Manager
OSGI workshop - Become A Certified Bundle Manager
 
Device deployment
Device deploymentDevice deployment
Device deployment
 
20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self20110611 expanded intro-to_puppet_for_self
20110611 expanded intro-to_puppet_for_self
 
Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500Архитектура коммутаторов Cisco Catalyst 6500
Архитектура коммутаторов Cisco Catalyst 6500
 
Coanda Effect UAV
Coanda Effect UAVCoanda Effect UAV
Coanda Effect UAV
 
LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6LAMP_TRAINING_SESSION_6
LAMP_TRAINING_SESSION_6
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professionalBen Rothke
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssBen Rothke
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010Ben Rothke
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security PostureBen Rothke
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben RothkeBen Rothke
 
Rothke Securing Your Wireless Access Network
Rothke   Securing Your Wireless Access NetworkRothke   Securing Your Wireless Access Network
Rothke Securing Your Wireless Access NetworkBen Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 
Rothke stimulating your career as an information security professional
Rothke  stimulating your career as an information security professionalRothke  stimulating your career as an information security professional
Rothke stimulating your career as an information security professional
 
Ben Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction PracticesBen Rothke - Effective Data Destruction Practices
Ben Rothke - Effective Data Destruction Practices
 
Virtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci DssVirtualization, Cloud Computing And The Pci Dss
Virtualization, Cloud Computing And The Pci Dss
 
Ben Rothke RSA PK 2010
Ben Rothke   RSA PK 2010Ben Rothke   RSA PK 2010
Ben Rothke RSA PK 2010
 
Rothke Using Kazaa To Test Your Security Posture
Rothke   Using Kazaa To Test Your Security PostureRothke   Using Kazaa To Test Your Security Posture
Rothke Using Kazaa To Test Your Security Posture
 
In Sync Network Time Ben Rothke
In Sync Network Time   Ben RothkeIn Sync Network Time   Ben Rothke
In Sync Network Time Ben Rothke
 
Rothke Securing Your Wireless Access Network
Rothke   Securing Your Wireless Access NetworkRothke   Securing Your Wireless Access Network
Rothke Securing Your Wireless Access Network
 

Recently uploaded

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfJamie (Taka) Wang
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...DianaGray10
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URLRuncy Oommen
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 

Recently uploaded (20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
activity_diagram_combine_v4_20190827.pdfactivity_diagram_combine_v4_20190827.pdf
 
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
Connector Corner: Extending LLM automation use cases with UiPath GenAI connec...
 
Designing A Time bound resource download URL
Designing A Time bound resource download URLDesigning A Time bound resource download URL
Designing A Time bound resource download URL
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 

Webinar - Getting a handle on wireless security for PCI DSS Compliance

  • 1. !
  • 2. !" # $ % & # ' () )* + , ! ' - '. / 2
  • 3. % 0 ! " # $# % # & # # ' ( ! ( " )** %+ ,! -. / 0) 1 2 ! 0 3 1 44 56 ! ! 768 )96 6 8 9 ! " 5* " ! ) : ! ! )%+; * ! 6 8< ,! " : #
  • 4. Why BT for Security? Industry-leading resources 1,400 global practitioners Comprehensive event Operating 9 world Over 100 registered patents, with over 125 accredited correlation platforms and class SOCs globally 190 security papers and security professionals reporting tools 24/7/365 numerous books in the US With proven experience 6,000 security BT has delivered Monitoring 550 Filters over 75,000 security services to Over 1,500 firewalls networks with data engagements in the viruses from client over 75% of the under management from over 150 countries US since 1994 networks each month Fortune 500 and 335,000 devices Delivering an integrated services portfolio Incorporating industry- From assessment to leading technology & mitigation, on a global services, with Counterpane basis at the core Third party validation Many accreditations, including BS Leadership position in Highest capability 27001/ISO 17799, SAS70-II, FIPS Gartner’s 2007 North American maturity rating 140-2, CERT, FIRST, CLAS, MSSP Magic Quadrant from NSA SANS GIAC and CHECK
  • 5. 1 1 , 2 1 1 ' 3# 4 5
  • 6. 1 1 ! 5 & ' & " % " " " & 6 6 1 6 6
  • 7. 1 ! 77 ) 1 ! - / & " & ! & ! 6 - / & & 6 8 0 7
  • 8. 1 8 0 9& & - / $ ! 6 $ 2 , :' ; 6 $ < -)) = => ; ; ) =(: 7 = = / $ & - / $ ?& " & $ , (6: .@ ( .@ 6A 6 8
  • 9. 18 0 & $ 9 ! 6 $ ! ! 6 9
  • 10. ??? ; ( 7 ) 67 ??? ; ($ ) ! & ??? ;( 7 ) 67 $ ( .@ 6: $ ( ;( 7 ) 67 $ A .@ $ A: ;( 7 ) 67 $ ( .@ 6: $ 77 ;( 7 ) 67 $ ( .@ 6: $ A: ;( 7 ' ) 67 $ (6: A .@ $ B) ) 10
  • 11. ; ( 7& 6 1 '+ ) 67 ; ( 7' ) 67 ??? 1 '+ $ ;( 7 ) 67 1 '+ $ 1 '+ " ' B) ) 18 0 $ 1 '+ ! & 1 '+ $ ? & 1 '+ - 1 / ;( 7 , ) 67 6 11
  • 12. ! & ! < ! ! 5 12
  • 13. 1 $ , $ $ C $ $ ! D 13
  • 14. 1 & !$ ! @ D ! 1 8 0 6 0 6 ! = $ 1 $ + $ & 6 14
  • 15. 1 ?, & & - ? / 1 ! 6 ! , = $ 6 $ 6 $ & 6 E 18 0 6 2 : $ : ' ! F -F/ 6 $ : <6 2 B' ( !- B/ ( $ $ 2 !F - F/ ?& " ? 1 & 15
  • 16. 1 '+ - 1 / 1 1? 6 $ 1 ! ;( 7" ) 67 6 $ 1? D $ ?< G 8 ' =1 (6 1 1 ( ??? ; ( 7 ) 67 1 ' ! H) I $ =3 3 6 6 6 !3 3 & 3)>)3) ()3;B3 ' ' ' 'H ' ) 3 16
  • 17. 1 1 " & ' ! ! 6 $ % & 1? $ % & !- 6 6 1? / $ % & + ' ! 1 1? = $ ;( J ) 67 !- / - / $ ! ! $ @ @ & -F/ $ 17
  • 18. 1 ( & 1 '+ ???D ; ( 7 ) 67 2 "' : !" ! 1 %E & ? -? / $ ? ' $ ? ! ' - ' / ! 18
  • 19. 1? 4 + " 1? B")> 7()6 + " 1? I B")) )(76 19
  • 20. = 1 " ?< ; ( 71 8 0 ) 67 & 6( 7 ? & - ?/ 6 & , ! 18 0 & !6 =3 3 6 6 3 3 K K1 K 6 20
  • 21. ? & $ 4 & 6 $ % 5 ! & 6 $ & " & 6 $ " F 2 " 5 & 6 21
  • 22. # # $ 3 $ ! $ ! ? $ & ' & $ % $ & $ ! & " $ 18 0 $ $ ' & 22
  • 23. 0 !& 6 $ ! 8 0 6 & " ! $ % ! !6 0 & & $ ! " " " 0 6 0 $ " 6 $ & @ 6 23
  • 24. , $ @ & ! !& ! 6 $ @ ? 6 $ @ 6 , ' ! $ , @ & & 6 $ " ?6 $ , & , 6 24
  • 25. 1 ! = $ $ ?6 ! & " ! @ & ?6 ! , ! ?6 25
  • 26. & @ - / 8 0 1 @ D !6 = $ 18 0 ! & $ ! 18 0 ! $ & 6 26
  • 27. 1 9 = $ 9 $ 9 $ - ." % " 6/ $ 3 $ $ 9 ? $ 9 " & " 27
  • 28. !$ , 7 6B 6 6( ! ? $ - / & ?6 F ! $ - / & ?6 28
  • 29. ! , ! " ? 6 & @ ?& ! 6 1 = $ ! ? ! $ ;( 7 ) 67 $ $ , 76 ) 29
  • 30. $ , ( 67 6 67 & ' ! $ "0 " " ! " 6 ? & 6 & & , , 6 30
  • 31. & $ , > 6B 6 67 " & 6 F " " & 6 $ $ ! ! ! & $ 3 $ & 31
  • 32. 7 67$ 1 7 ! % @ $ , $ 3 & 6 F @ , " 3 & 6 3 "& 6 F @ D - , 7 6> 6 ( / $ & @ & 6 32
  • 33. 1 3 $ , 7 6: 6 7 2 3 & ? 6 $ ! ! $ ! ! , 6 E $ 3 6 $ ?< 3 3 & " " & 6 33
  • 34. # $ , 7 67 6 7 % " " ! " , @ 6 2 @ , & $ 7 67% 7 @ , 3 & 6 $ 7 67 F 7 @ , " 3 & 6 $ 7 67 7 3 "& 6 $ 7 67 F 7 @ D - , 7 6> ( / & @ & 6 34
  • 35. ' $ L ! $ $ & 6 ( ) $ . $ , , 6 $ L " = & & 35
  • 36. ! ! $ 8 $ 2 + & + ! $ 9 ;( 7 ) 67 $ ! ! 1 1 & ! & ! ! ! $ 0 $ ? ' < & $ & 36
  • 37. 1 " " !"#" " $ $ 6 $ ! 6 $ ' ! $ D & 37
  • 38. 1 1? 8? $ E ! ! 8? $ 8? " 2 1 1 ( $ 1 ( $ 38
  • 39. 1 % 0 $ 6 6 6 6 1? ! E $ =3 3 !6 6 6! 6 !' - ' / $ 6 ! 6 ' 6 6 % 0 ! $ 6 !6 3 $ & $ 6 6 3 3 K 6 39
  • 40. 40
  • 41. ! 6 & 6 , & & & & ! 41
  • 42. #3 $ !" " " # % & 6 ! 6 3 3 ! 6 6 3 ! 42