First Line of Defense: People

1. Insiders and Social Engineering

2. Dumpster Diving

3. Information Security Policies

4. Information Security Plan

Second Line of Defense: Technology

1. Authentication and Authorization

2. Identity Theft and Phishing

3. Pharming

4. Sock Puppet Marketing and Prevention

Prevention, Detection, and Response

Conclusion