tag:blogger.com,1999:blog-81189410539082354172024-03-06T21:02:19.157+01:00iCode Information Security BlogiCode Information Security BlogiCode Information Securityhttp://www.blogger.com/profile/04119332135194223712noreply@blogger.comBlogger5125tag:blogger.com,1999:blog-8118941053908235417.post-3703321510981031822016-05-09T14:10:00.001+02:002016-05-09T14:10:05.070+02:00<div style="text-align: left;">
<b><span style="background-color: red; color: white;"> New video from iCode Security Awareness Series 1 - Episode 1 </span></b></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/pBD02IYreKo/0.jpg" src="https://www.youtube.com/embed/pBD02IYreKo?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div>
<br />iCode Information Securityhttp://www.blogger.com/profile/04119332135194223712noreply@blogger.com0tag:blogger.com,1999:blog-8118941053908235417.post-78523337964248134212016-05-02T23:32:00.003+02:002016-05-02T23:32:56.393+02:00Présentation de iCode Information Security<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="font-family: Trebuchet MS, sans-serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: left;">
<span style="font-family: Trebuchet MS, sans-serif;"><b>Nouvelle vidéo de présentation générale de iCode.</b></span></div>
<div class="separator" style="clear: both; text-align: left;">
<i style="text-align: right;"><span style="color: red;">Security is not an option!</span></i></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/sFZBmalpW_o/0.jpg" src="https://www.youtube.com/embed/sFZBmalpW_o?feature=player_embedded" frameborder="0" allowfullscreen></iframe></div>
<br />
<br />iCode Information Securityhttp://www.blogger.com/profile/04119332135194223712noreply@blogger.com0tag:blogger.com,1999:blog-8118941053908235417.post-29011200339032848932016-04-21T17:05:00.002+02:002016-04-21T17:05:55.380+02:00iCode Enterprise Security Architecture Framework<div class="MsoNormal">
<span class="hps">La
sécurité</span> du système
d’information <span class="hps">est conçue afin de</span> <span class="hps">protéger
les actifs</span> de l’entreprise. <span class="hps">Le principal atout</span> <span class="hps">au sein d’une</span> <span class="hps">entreprise étant son système
d’information,</span> s<span class="hps">i</span> <span class="hps">celui-ci</span>
<span class="hps">est compromis</span> d’une quelconque<span class="hps"> façon</span>,
il y aura <span class="hps">une certaine forme d'</span>impact voire des dommages
sur les affaires de l’entreprises.</div>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Les avantages offerts par
la sécurité du système d'information nécessitent des investissements en temps,
efforts et argent. Investir dans la sécurité peut souvent être difficile à
justifier face à d'autres investissements. Mais la vraie valeur d’un actif
n’est parfois comprise et appréciée que si une fois un incident ait lieu.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
La proposition de valeur
de la sécurité du système d'information doit prendre en compte et soutenir la
stratégie de l'entreprise. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Les processus de sécurité
sont la base sur laquelle la sécurité du système d'information repose pour son
efficacité et la réactivité aux incidents. Les processus de sécurité doivent
être définis, être ratifié par les structures de gouvernance pertinentes et
être continuellement mûris. <o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
L'acquisition de
technologies de sécurité doit être considérée comme un moyen de soutenir et
d'automatiser les processus de sécurité définis. Bien qu'un certain nombre de
technologies aient besoin d’être mis en œuvre immédiatement, beaucoup de
technologies plus sophistiquées doivent être acquise une fois que tous les
autres aspects organisationnels aient été abordés de manière adéquate (par
exemple l'organisation, les personnes, les processus et la stratégie
d'entreprise).<br />
<br />
La sécurité du système d'information ne peut être entreprise comme un rôle à
temps partiel au sein de l'organisation. La gestion efficace de la sécurité de
l'information exige souvent des changements à la structure organisationnelle
ainsi que la création des rôles et des postes de travail. Cette structure
organisationnelle doit refléter le contexte de l’entreprise et doit également
inclure un niveau de séparation des fonctions permettant de fournir les
garanties, freins et contrepoids nécessaires.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span class="hps">Consciente
de tout cela, iCode a développé un cadre innovant appelé « iCode
Enterprise Security Architecture Framework » (ESAF)</span> <span class="hps">afin d’aider ses clients à bien
protéger leurs actifs et pour qu’ils ne soient pas</span> <span class="hps">vulnérables</span>
<span class="hps">aux diverses menaces tout en maîtrisant leurs coûts</span>. <o:p></o:p></div>
<div class="MsoNormal">
<span class="hps">iCode
ESAF</span> <span class="hps">aide les
clients à</span> <span class="hps">prévenir contre les éventuels dommages</span> <span class="hps">aux actifs</span> <span class="hps">en construisant des</span> <span class="hps">contrôles de sécurité</span> <span class="hps">en blocs</span>, <span class="hps">une</span> <span class="hps">protection multicouche</span> <span class="hps">contre les</span> <span class="hps">menaces perçues, une organisation
efficace</span> <span class="hps">et une stratégie détaillée</span> <span class="hps">et rentable</span> de <span class="hps">mise en œuvre</span>.<br />
<br />
<span class="hps"><span lang="EN-US">iCode ESAF</span></span><span lang="EN-US"> <span class="hps">comprend</span> <span class="hps">tous les types de</span>
<span class="hps">contrôles :<o:p></o:p></span></span></div>
<div class="MsoListParagraphCxSpFirst" style="line-height: 115%; margin-bottom: 10.0pt; mso-add-space: auto; mso-list: l1 level1 lfo2; text-indent: -18.0pt;">
</div>
<ul>
<li><span class="hps" style="line-height: 115%; text-indent: -18pt;"><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;"> </span></span></span><span class="hps" style="line-height: 115%; text-indent: -18pt;">organisationnels :</span><span style="line-height: 115%; text-indent: -18pt;"> </span><span class="hps" style="line-height: 115%; text-indent: -18pt;">incluant modèles d’organisation, politique, processus, rôles et
responsabilités, procédures, programmes d’éducation, KGO, KPI, etc.</span></li>
<li><span class="hps" style="line-height: 115%; text-indent: -18pt;">Informationnels : incluant Modélisations des menaces, Classifications,
SLA, etc.</span></li>
<li><span style="color: #ff9900; font-family: Symbol; line-height: 115%; text-indent: -18pt;"><span style="font-family: 'Times New Roman'; font-size: 7pt; line-height: normal;"> </span></span><span style="line-height: 115%; text-indent: -18pt;">et </span><span class="hps" style="line-height: 115%; text-indent: -18pt;">techniques : Classifications,
Modélisations des menaces, Modélisation de la confiance, standards techniques,
services et technologies de sécurité, architecture des contrôles techniques,
profils de sécurité, </span><span style="line-height: 115%; text-indent: -18pt;">etc.</span></li>
</ul>
<div class="MsoNormal">
Nous
développons une architecture de sécurité efficace et prescriptive. Les normes
jouent un rôle très important dans son développement et sa mise en application.<o:p></o:p></div>
<div class="MsoNormal">
<span class="hps">Il existe
trois</span> <span class="hps">types de
standards</span>:<o:p></o:p></div>
<div class="MsoListParagraphCxSpFirst" style="margin-left: 72.0pt; mso-add-space: auto; mso-list: l2 level2 lfo4; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]--><span class="hps">Les standards organisationnels</span> auxquels <span class="hps">les processus métiers
doivent se conformer,</span><o:p></o:p></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-left: 72.0pt; mso-add-space: auto; mso-list: l2 level2 lfo4; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]--><span class="hps">Les standards techniques</span> auxquels <span class="hps">les produits et leurs</span>
<span class="hps">implémentations</span> <span class="hps">doivent se conformer,</span><o:p></o:p></div>
<div class="MsoListParagraphCxSpLast" style="margin-left: 72.0pt; mso-add-space: auto; mso-list: l2 level2 lfo4; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;">·<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]--><span class="hps">Les standards produits ce sont les
offres spécifiques</span> <span class="hps">que</span> <span class="hps">le client a</span> <span class="hps">choisis
parmi des</span> <span class="hps">produits</span> <span class="hps">conformes aux
standards techniques</span>.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Dans
le processus de développement de l’architecture les standards sont adoptés
selon : <o:p></o:p></div>
<div class="MsoListParagraphCxSpFirst" style="margin-left: 72.0pt; mso-add-space: auto; mso-list: l4 level2 lfo5; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: FR;">·<span style="font-family: 'Times New Roman'; font-size: 7pt;">
</span></span><!--[endif]-->la Conformité par rapport aux réglementations, politiques et normes en
vigueurs,<o:p></o:p></div>
<div class="MsoListParagraphCxSpMiddle" style="margin-left: 72.0pt; mso-add-space: auto; mso-list: l4 level2 lfo5; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: FR;">·<span style="font-family: 'Times New Roman'; font-size: 7pt;">
</span></span><!--[endif]-->les Relations avec les standards existants au sein du client,<o:p></o:p></div>
<div class="MsoListParagraphCxSpLast" style="margin-left: 72.0pt; mso-add-space: auto; mso-list: l4 level2 lfo5; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; font-family: Symbol; mso-ansi-language: FR; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: FR;">·<span style="font-family: 'Times New Roman'; font-size: 7pt;">
</span></span><!--[endif]-->et les directions technologiques en général.<o:p></o:p></div>
<div class="MsoNormal">
<o:p> </o:p> </div>
<div class="MsoNormal">
Les
Préférences de standards sont attribuées selon l’ordre suivant :<o:p></o:p></div>
<div class="MsoListParagraphCxSpFirst" style="mso-list: l0 level1 lfo6; text-indent: -18.0pt;">
<!--[if !supportLists]--><span style="color: #ff9900; mso-ansi-language: FR; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-language: FR; mso-fareast-theme-font: minor-latin;">1.<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]-->La préférence la plus
élevée est attribuée aux règlementations en vigueurs (de jure). Exemple : <span style="background: yellow; mso-highlight: yellow;">loi de commerce électronique,
loi de protection des données privées, loi de protection du dossier patient
médical, loi anti-terroriste</span>, etc. <o:p></o:p></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo6; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="color: #ff9900; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-language: FR; mso-fareast-theme-font: minor-latin;">2.<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]-->La deuxième préférence est
attribuée aux normes parrainées par des organismes de normalisation (de jure). <span lang="EN-US">Exemple : <span style="background: yellow; mso-highlight: yellow;">ISO 27001 27002 27005, PCI-DSS,
SAS70, SOX, IEEE, Bale</span>, etc.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpMiddle" style="mso-list: l0 level1 lfo6; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="color: #ff9900; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-language: FR; mso-fareast-theme-font: minor-latin;">3.<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]-->La deuxième préférence est
attribuée aux normes bénéficiant d'un soutien large au sein du marché (de
facto). <span lang="EN-US">Exemple : <span style="background: yellow; mso-highlight: yellow;">COBIT5, SABSA, OWASP, CSA, NIST,
TM Forum</span>, etc.<o:p></o:p></span></div>
<div class="MsoListParagraphCxSpLast" style="mso-list: l0 level1 lfo6; text-indent: -18.0pt;">
<!--[if !supportLists]--><span lang="EN-US" style="color: #ff9900; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin; mso-fareast-font-family: Calibri; mso-fareast-language: FR; mso-fareast-theme-font: minor-latin;">4.<span style="font-family: 'Times New Roman'; font-size: 7pt;"> </span></span><!--[endif]-->La dernière préférence
étant attribuée aux standards propriétaires. <span lang="EN-US">Exemple : Cryptage Propriétaire.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div align="left" class="Normal">
<span class="hps">Nous développons</span> aussi <span class="hps">un guide</span> <span class="hps">rentable</span> <span class="hps">et détaillée pour</span> la mise en
œuvre de l’organisation, <span class="hps">l'acquisition</span>, le déploiement <span class="hps">et l'exploitation d’éventuelles</span> <span class="hps">technologies</span>
<span class="hps">et services de sécurité</span> <span class="hps">dans le but</span>
<span class="hps">de traiter</span> <span class="hps">rapidement</span> <span class="hps">les</span> <span class="hps">vulnérabilités les plus</span> <span class="hps">flagrantes</span> <span class="hps">d'abord,</span> <span class="hps">puis
de passer</span> <span class="hps">en phases</span> <span class="hps">prioritaires</span>
<span class="hps">d'amélioration continue</span>.<o:p></o:p></div>
<!--EndFragment--><br />iCode Information Securityhttp://www.blogger.com/profile/04119332135194223712noreply@blogger.com0tag:blogger.com,1999:blog-8118941053908235417.post-57188102366612437612012-02-28T11:54:00.003+01:002012-03-13T13:21:02.845+01:00<div class="separator" style="clear: both; text-align: left;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC3tZeTQ2MsywzvQsSaD4UWFU_jfaWh2sxbF0u2zI2L2GPhp31EKobEnJVDX5HcMcwHIlcA-bwhuW9sebmTgvLy0f_A60mDzbTUQo3SDS2S5ZtQ5KDmJa6E5ONwGx1KhXhUVwU50Ws_Tn2/s1600/Paloalto_logo.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><br /></a></div>
<div class="js-tweet-text">
<a class="twitter-timeline-link" data-display-url="icodesecurity.com" data-expanded-url="http://www.icodesecurity.com" data-ultimate-url="http://www.icodesecurity.com/" href="http://www.icodesecurity.com/" rel="nofollow" target="_blank" title="http://www.icodesecurity.com"></a><br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6BfQdebcJ7JZNH-tCc82EuZ0y-NKgHDXC3F7_A9eZNMn5I8IpobIGZnMhU8crojDO_BMppxiKEvaz_50dtCiL6x_V6sdegjSEITC1ttX_ih6tPld6XqssG71CvNvmO-3qaTLDjAav11Ti/s1600/Paloaltoevent.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6BfQdebcJ7JZNH-tCc82EuZ0y-NKgHDXC3F7_A9eZNMn5I8IpobIGZnMhU8crojDO_BMppxiKEvaz_50dtCiL6x_V6sdegjSEITC1ttX_ih6tPld6XqssG71CvNvmO-3qaTLDjAav11Ti/s320/Paloaltoevent.jpg" width="179" /></a><br />
<br />
<br />
iCode & Paloalto Networks ensemble pour présenter<br />
"<span style="color: red; font-family: Times,"Times New Roman",serif; font-size: small;"><b>NEXT GENERATION FIREWALLS & MODERN THREATS</b></span>" <br />
à l'Hôtel le Concorde - Tunis - 27 Mars 2012 <br />
<a class="twitter-timeline-link" data-display-url="icodesecurity.com" data-expanded-url="http://www.icodesecurity.com" data-ultimate-url="http://www.icodesecurity.com/" href="http://www.icodesecurity.com/" rel="nofollow" target="_blank" title="http://www.icodesecurity.com">http://www.icodesecurity.com</a><br />
<br />
<br />
<br />
</div>
<div class="stream-item-footer">
<div class="context">
</div>
<a class="details with-icn js-details" href="https://twitter.com/#">
<span class="js-icon-container">
</span>
<b>
<span class="view-open js-view-details">
</span>
</b>
</a>
</div>iCode Information Securityhttp://www.blogger.com/profile/04119332135194223712noreply@blogger.com0tag:blogger.com,1999:blog-8118941053908235417.post-9179236308836458592012-02-27T23:44:00.002+01:002012-03-13T13:10:01.894+01:00b<div class="MsoNormal">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbC99adjpLGDx8D3HjG4aK3hQP9MBCUA0lhTL-W0bO1B0DHEWtQDGmtox5Q_s2A2n8Tw9eS8bHbyi_ItcmxUk5AYE_88m72nSEa9R3VGh9JONMoEIWKc1lnq0RumqFnzd7_Apncc1w5ioY/s1600/Imperva_Logo.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="62" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbC99adjpLGDx8D3HjG4aK3hQP9MBCUA0lhTL-W0bO1B0DHEWtQDGmtox5Q_s2A2n8Tw9eS8bHbyi_ItcmxUk5AYE_88m72nSEa9R3VGh9JONMoEIWKc1lnq0RumqFnzd7_Apncc1w5ioY/s200/Imperva_Logo.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkYfHbX_90sMp8ysCIgbiUg2m-wWpjTQCzTEcbT2GuEGvGZYCYGuRxVhizlkdw95cLPuDGtBWg5RmOhonQPBgtyJBcQumkw0RMG74-FLHiCwE6Jk62ppDhgpiafdfiHgLjyBmM80RXOk9J/s1600/SA400157.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><b><span style="color: #2207c7; font-size: 14pt;"></span></b></a><b><span style="color: #2207c7; font-size: 14pt;"><a href="http://www.icodesecurity.com/"><span style="color: #2207c7;">iCode et IMPERVA</span></a></span></b><span style="color: #1d1b11; font-size: 12pt;"> ensemble on présenté une conférence sur</span><i> </i><b><i><span style="color: red; font-size: 12pt;">« Next Generation
Application & Data Security »</span></i></b><i><b> </b><span style="color: #1d1b11; font-size: 12pt;"><b>le mardi
06/03/2012. </b></span></i></div>
<br />
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEqlSavUWyz-Wqojbl_bWin2Lw6SNJCJcHpje5BWRhvIbYmwOsKqc4hIAJ08BhFVyXXbFbE9pg8K_hG2VbrUPDoK-YyW_ijRk6QxO0tFJbcf7JHl27FKkwGJIP-gGAIkzzX9_MtQ_pfNj1/s1600/SA400173.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEqlSavUWyz-Wqojbl_bWin2Lw6SNJCJcHpje5BWRhvIbYmwOsKqc4hIAJ08BhFVyXXbFbE9pg8K_hG2VbrUPDoK-YyW_ijRk6QxO0tFJbcf7JHl27FKkwGJIP-gGAIkzzX9_MtQ_pfNj1/s200/SA400173.JPG" width="150" /></a></div>
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkYfHbX_90sMp8ysCIgbiUg2m-wWpjTQCzTEcbT2GuEGvGZYCYGuRxVhizlkdw95cLPuDGtBWg5RmOhonQPBgtyJBcQumkw0RMG74-FLHiCwE6Jk62ppDhgpiafdfiHgLjyBmM80RXOk9J/s1600/SA400157.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPuejC72azwa57VO88p_io9NijdM8BjUjk9itw2-sXeM4qjM8Q5-DuefA9TqCm3bsFpOlQA7XVSj_KqFyLO9z6qY2c281HKqQsBtVzMeYbmLX3sCussumDcuJqYmbpNaRkRjrRhuJnygok/s1600/SA400162.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPuejC72azwa57VO88p_io9NijdM8BjUjk9itw2-sXeM4qjM8Q5-DuefA9TqCm3bsFpOlQA7XVSj_KqFyLO9z6qY2c281HKqQsBtVzMeYbmLX3sCussumDcuJqYmbpNaRkRjrRhuJnygok/s200/SA400162.jpg" width="200" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMe8uPeCTL_B_nNv11uXDhZ_k4XCSIQPzpVDsARu4zPGRbYv8ocVxi7L1MQMDjPAaD0WF19Lu7zm7PXD1VJxZyAj31jETWycvu1XSckzH2GR6oGTK4RAEwYZ1BRBSJM9qoWNSj_5VxgbEG/s1600/SA400172.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMe8uPeCTL_B_nNv11uXDhZ_k4XCSIQPzpVDsARu4zPGRbYv8ocVxi7L1MQMDjPAaD0WF19Lu7zm7PXD1VJxZyAj31jETWycvu1XSckzH2GR6oGTK4RAEwYZ1BRBSJM9qoWNSj_5VxgbEG/s200/SA400172.JPG" width="200" /></a><br />
<span id="goog_699206830"></span><span id="goog_699206831"></span><div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
</div>
<br />
<div style="text-align: center;">
<br />
<i><span style="color: #1d1b11; font-size: 12pt;"><b></b></span></i></div>
</div>iCode Information Securityhttp://www.blogger.com/profile/04119332135194223712noreply@blogger.com1