Mod 6 Legal Ethical and Professional Issues in Information Security
Mod 6 Legal Ethical and Professional Issues in Information Security
Information Security
Maintenance
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 1
Module Objectives
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 3
Security Management Maintenance Models
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 4
NIST SP 800-100 Information Security
Handbook: A Guide for Managers (1 of 5)
• Provides managerial guidance for establishing and implementing an information
security program.
• Provides 13 areas of information security management.
− Specific monitoring activities for each task
− Tasks should be done on an ongoing basis.
− Not all issues are negative.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 5
NIST SP 800-100 Information Security
Handbook: A Guide for Managers (2 of 5)
• Information security governance
− Agencies should monitor the status of their programs to ensure
Ongoing information security activities providing appropriate support.
Policies and procedures are current.
Controls are accomplishing their intended purpose.
• System Development Life Cycle is the overall process of developing, implementing,
and retiring information systems through a multistep process.
• Awareness and training
− Tracking system should capture key information on program activities.
− Tracking compliance involves assessing the status of the program.
− Security policies must continue to evolve.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 6
NIST SP 800-100 Information Security
Handbook: A Guide for Managers (3 of 5)
• Capital planning and investment control
− Departments required to allocate funding toward highest-priority investments
− Designed to facilitate the expenditure of agency funds
• Interconnecting systems
− The direct connection of two or more information systems for sharing data and other
information resources
− Can expose the participating organizations to risk
− If one of the connected systems is compromised, interconnection could be used as conduit.
• Performance measures
− Metrics should be used for monitoring the performance of information security controls.
− Six-phase iterative process
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 7
Information Security Measures Development
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 8
Implementing the Information Security
Measurement Program
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 9
NIST SP 800-100 Information Security
Handbook: A Guide for Managers (4 of 5)
• Security planning
− One of the most crucial ongoing responsibilities in security management
• Information technology contingency planning
− Consists of a process for recovery and documentation of procedures
• Risk management
− Ongoing effort
− Tasks include performing risk identification, analysis, and management
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 10
NIST SP 800-100 Information Security
Handbook: A Guide for Managers (5 of 5)
• Certification, accreditation, and security assessments
− An essential component of any security program
− The status of security controls is checked regularly
− Auditing to review a system’s use to determine if misuse/malfeasance has
occurred
• Security services and products acquisition
• Incident response: incident response life cycle
• Configuration (or change) management: manages the effects of changes in
configurations, five-step process
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 11
Information Security Services Life Cycle
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 12
The Security Maintenance Model
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 13
The Maintenance Model
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 14
Monitoring the External Environment (1 of 2)
• Provides early awareness of new and emerging threats, threat agents, vulnerabilities,
and attacks so organization can mount an effective defense.
• Entails collecting intelligence from data sources and giving that intelligence context and
meaning for use by organizational decision makers.
• Data sources:
− Acquiring threat and vulnerability data is not difficult.
− Turning data into information decision makers can use is challenging.
− External intelligence comes from vendors, computer emergency response teams
(CERTs), public network sources, or membership sites.
− Regardless of where or how external monitoring data are collected must be
analyzed in the context of the organization’s security environment to be useful
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 15
External Monitoring
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 16
Monitoring the External Environment (2 of 2)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 18
Knowledge Check Activity 1: Answer
Answer: b. False
The steps to maintain an informed awareness of the state of all the organization’s
networks, information systems, and information security defenses are internal
monitoring. External monitoring is oriented to monitor activity, report results, and
escalate warnings.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 19
Monitoring the Internal Environment (1 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 20
Internal Monitoring
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 21
Monitoring the Internal Environment (2 of 3)
• Detecting differences
− Difference analysis is the procedure that compares the current state of
network segment against the known previous state of same segment
− Unexpected differences between the current state and the baseline state
could indicate trouble
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 23
Planning and Risk Assessment (1 of 4)
• Primary objective is to keep a lookout over the entire information security program
• Accomplished by identifying and planning ongoing information security activities that
further reduce risk
• Primary objectives
− Establishing a formal information security program review process
− Instituting formal project identification, selection, planning, and management
processes
− Coordinating with IT project teams to introduce risk assessment and review for all IT
projects
− Integrating a mindset of risk assessment throughout organization
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 24
Planning and Risk Assessment (2 of 4)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 25
Planning and Risk Assessment (3 of 4)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 26
Planning and Risk Assessment (4 of 4)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 29
Vulnerability Assessment and Remediation
(3 of 9)
• Process of identifying and documenting specific and provable flaws in the
organization’s information asset environment
• Five following vulnerability assessment processes can help many organizations
balance intrusiveness of vulnerability assessment with the need for stable and effective
production environment
• Penetration testing (pen test)
− A level beyond vulnerability testing
− Security tests and evaluations that simulate attacks by a malicious external source
(hacker)
− Performed periodically as part of a full security audit
− Conducted one of two ways: black box or white box
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 30
Vulnerability Assessment and Remediation
(4 of 9)
• Internet vulnerability assessment is designed to find and document vulnerabilities
present in an organization’s public network
− Steps in the process include:
Planning, scheduling, and notification
Target selection
Test selection
Scanning
Analysis
Record keeping
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 31
Vulnerability Assessment and Remediation
(5 of 9)
• Intranet vulnerability assessment
− Designed to find and document the selected vulnerabilities likely present on
the internal network
− Attackers are often internal members of the organization, affiliates of
business partners, or automated attack vectors (such as viruses and worms)
− This assessment is usually performed against critical internal devices with a
known, high value by using selective penetration testing
− Steps in the process are almost identical to the steps in the Internet
vulnerability assessment
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 32
Vulnerability Assessment and Remediation
(6 of 9)
• Platform security validation
− Designed to find and document vulnerabilities that may be present because
misconfigured systems are in use within the organization
− Misconfigured systems fail to comply with company policy or standards
− Automated measurement systems are available to help with the intensive process
of validating the compliance of platform configuration with policy
• Wireless vulnerability assessment
− Designed to find and document vulnerabilities that may be present in wireless local
area networks of the organization
− Since attackers from this direction are likely to take advantage of any flaw,
assessment is usually performed against all publicly accessible areas using every
possible wireless penetration testing approach
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 33
Vulnerability Assessment and Remediation
(7 of 9)
• Documenting vulnerabilities
− Vulnerability database should provide details about reported vulnerability as well as a link to
the information assets
− Low-cost and ease of use makes relational databases a realistic choice
− Vulnerability database is an essential part of effective remediation
• Remediating vulnerabilities
− Objective is to repair flaws causing a vulnerability instance or remove risk associated with
vulnerability
− As a last resort, informed decision makers with proper authority can accept risk
− Important to recognize that building relationships with those who control information assets
is key to success
− Success depends on the organization adopting team approach to remediation, in place of
cross-organizational push and pull
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 34
Vulnerability Assessment and Remediation
(8 of 9)
• Acceptance or transference of risk
− In some instances, risk must be either simply acknowledged as part of the
organization’s business process or transferred to another organization via
insurance
− Management must be assured that decisions made to accept risk or buy
insurance were made by properly informed decision makers
− Information security must make sure the right people make risk assumption
decisions with complete knowledge of the impact of the decision
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 35
Vulnerability Assessment and Remediation
(9 of 9)
• Threat removal
− In some circumstances, threats can be removed without repairing
vulnerability
− Other vulnerabilities may be mitigated by inexpensive controls
• Vulnerability repair
− Best solution in most cases is to repair vulnerability
− Applying patch software or implementing a workaround often accomplishes
this
− Most common repair is the application of a software patch
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 36
Knowledge Check Activity 2
The final process in the vulnerability assessment and remediation domain is the
_____ phase.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 37
Knowledge Check Activity 2: Answer
The final process in the vulnerability assessment and remediation domain is the
_____ phase.
Answer: remediation
Remediation cannot be undertaken until all vulnerabilities are identified,
categorized, classified and prioritized.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 38
Readiness and Review (1 of 2)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 39
Readiness and Review (2 of 2)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 40
Physical Security (1 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 41
Physical Security (2 of 3)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 42
Physical Security (3 of 3)
• Community roles
− General management is responsible for facility security
− IT management and professionals are responsible for environmental and
access security
− Information security management and professionals perform risk
assessments and implementation reviews
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 43
Physical Access Controls
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 44
Physical Security Controls (1 of 8)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 46
Physical Security Controls (3 of 8)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 47
Tailgating
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 48
Physical Security Controls (4 of 8)
• Electronic Monitoring
− Equipment can record events in areas where other types of physical controls
are impractical
− Cameras with video recorders, including closed-circuit television (CCT)
systems
− Drawbacks
Passive and does not prevent access or prohibited activity
Recordings often are not monitored in real time and must be reviewed to
have any value
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 50
Physical Security Controls (6 of 8)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 51
Physical Security Controls (7 of 8)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 52
Physical Security Controls (8 of 8)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 53
Failure of Supporting Utilities and
Structural Collapse
• Supporting utilities (heating, ventilation, air conditioning, power, water) have
significant impact on continued safe operation of a facility
• Each utility must be properly managed to prevent potential damage to
information and information systems
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 54
Heating, Ventilation, and Air Conditioning
• Areas within heating, ventilation, and air conditioning (HVAC) systems that can
cause damage to information systems include
− Temperature and Filtration
− Humidity and Static Electricity
• Ventilation shafts
− Ductwork is small in residential buildings but large enough in commercial
buildings for an individual to climb through
− If ducts are large, security can install wire mesh grids at various points to
compartmentalize the runs
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 55
Power Management and Conditioning (1 of 2)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 58
Knowledge Check Activity 3: Answer
Answer: grounded
Grounding ensures that the returning flow of current is properly discharged to the
ground. If the grounding elements of the electrical system are not properly
installed, anyone who touches a computer or other electrical device could
become a ground source, which can cause damage to the equipment and injury
or death to the person.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 59
Interception of Data
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 60
Securing Mobile and Portable Systems
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 61
Remote Computing Security
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 63
Summary (1 of 7)
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 66
Summary (4 of 7)
• The maintenance model recommended in this module is made up of five subject areas
or domains: external monitoring, internal monitoring, planning and risk assessment,
vulnerability assessment and remediation, and readiness and review.
• The objective of the external monitoring domain in the maintenance model is to provide
early awareness of new and emerging threats, threat agents, vulnerabilities, and
attacks so that an effective and timely defense can be mounted.
• The objective of the internal monitoring domain is an informed awareness of the state
of the organization’s networks, information systems, and information security defenses.
The security team documents and communicates this awareness, particularly when it
concerns system components that face the external network.
• The primary objective of the planning and risk assessment domain is to keep an eye on
the entire information security program.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 67
Summary (5 of 7)
• The primary objectives of the vulnerability assessment and remediation domain are to identify
specific, documented vulnerabilities and remediate them in a timely fashion.
• The primary objectives of the readiness and review domain are to keep the information security
program functioning as designed and keep improving it over time.
• Physical security requires the design, implementation, and maintenance of countermeasures
that protect the physical resources of an organization.
• An organization’s policy should guide the planning for physical security throughout the
development life cycle.
• In facilities management, a secure facility is a physical location that has controls to minimize the
risk of attacks from physical threats. A secure facility can use natural terrain, traffic flow, and
urban development, and can complement these environmental elements with protection
mechanisms such as fences, gates, walls, guards, and alarms.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 68
Summary (6 of 7)
• As with any phase of the security process, the implementation of physical security must
be constantly documented, evaluated, and tested. Once the physical security of a
facility is established, it must be diligently maintained.
• Data can be intercepted electronically and manually. The three routes of data
interception are direct observation, interception of data transmission, and interception
of electromagnetic radiation.
• With the increased use of laptops, tablets, and smartphones, organizations should be
aware that mobile computing requires even more security than the average in-house
system.
• Remote site computing requires a secure extension of the organization’s internal
networks and special attention to security for any connected home or off-site computing
technology.
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 70
Self-Assessment
• You learned about Capability Maturity Model Integration (CMMI) on page 490 of
the textbook.
• From what you learned about CMM in general and CMMI in particular, should a
company try to gain higher levels of CMMI as a goal? What would be the benefit
of achieving an improved CMMI score?
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 7th Edition. © 2022 Cengage. All Rights Reserved. May not be
scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part. 71