Information Systems Security 365/765 UW-Madison
-
Upload
nicholas-davis -
Category
Documents
-
view
128 -
download
2
description
Transcript of Information Systems Security 365/765 UW-Madison
![Page 1: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/1.jpg)
Information Security 365/765, Fall Semester, 2014
Course Instructor, Nicholas DavisLecture 7, Physical Security
![Page 2: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/2.jpg)
Today’s CandyToday’s CandyTwizzlersTwizzlers
Twizzlers is a brand of candy in the United States and Canada. Twizzlers is the product of Y&S Candies, Inc., of Lancaster, Pennsylvania, now a subsidiary of The Hershey Company. In 1908 a plant was opened in Montreal and in 1929 the Twizzler brand was established
04/13/23 UNIVERSITY OF WISCONSIN 2
![Page 3: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/3.jpg)
Physical SecurityPhysical Security
It used to be easy, way back in the 1960sToday, with IT assets on every desk, we have:TheftFraudVandalismSabotageAccidents
04/13/23 UNIVERSITY OF WISCONSIN 3
![Page 4: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/4.jpg)
Let’s Watch an InterestingLet’s Watch an InterestingVideo About the History of Video About the History of
Physical SecurityPhysical Securityhttps://www.youtube.com/watch?v=-
eVSR9tder0
20 Minutes
04/13/23 UNIVERSITY OF WISCONSIN 4
![Page 5: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/5.jpg)
Funny Cartoon VideoFunny Cartoon VideoBut, it Makes a Good PointBut, it Makes a Good Point
https://www.youtube.com/watch?v=tmOGJVDvJaQ
2 minutes
04/13/23 UNIVERSITY OF WISCONSIN 5
![Page 6: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/6.jpg)
Four Major PhysicalFour Major PhysicalSecurity ThreatsSecurity Threats
Natural environmentalSupply systemHuman madePolitically motivated
Good security program protects against all of these, in layers
04/13/23 UNIVERSITY OF WISCONSIN 6
![Page 7: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/7.jpg)
Physical ThreatsPhysical ThreatsNatural / EnvironmentalNatural / Environmental
Floods, earthquakes, storms, volcanoes
04/13/23 UNIVERSITY OF WISCONSIN 7
![Page 8: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/8.jpg)
Physical ThreatsPhysical ThreatsSupply SystemSupply System
Power, communications, supply of water, etc.
04/13/23 UNIVERSITY OF WISCONSIN 8
![Page 9: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/9.jpg)
Physical ThreatsPhysical ThreatsHuman MadeHuman Made
Unauthorized access, damage by angry employees, employee errors and accidents, vandalism, fraud, theft
04/13/23 UNIVERSITY OF WISCONSIN 9
![Page 10: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/10.jpg)
Physical ThreatsPhysical ThreatsPolitically Motivated Politically Motivated
ThreatsThreatsStrikes, riots, civil disobedience, terrorist attacks, bombings
04/13/23 UNIVERSITY OF WISCONSIN 10
![Page 11: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/11.jpg)
What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan
Crime and disruption through deterrence
Fences, security guards, warning signs, etc.
04/13/23 UNIVERSITY OF WISCONSIN 11
![Page 12: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/12.jpg)
What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan
Reduction of damage through use of delaying mechanisms
Layers of defenses that slow down the adversary, such as locks, security personnel, barriers
04/13/23 UNIVERSITY OF WISCONSIN 12
![Page 13: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/13.jpg)
What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan
Crime or disruption detection
Smoke detectors, motion detectors, surveillance cameras, etc
04/13/23 UNIVERSITY OF WISCONSIN 13
![Page 14: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/14.jpg)
What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan
Incident assessment
Response of personnel to quickly evaluate situation and damage level
04/13/23 UNIVERSITY OF WISCONSIN 14
![Page 15: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/15.jpg)
What Constitutes a GoodWhat Constitutes a GoodSecurity PlanSecurity Plan
Rapid response procedures
Fire suppression systems, emergency response systems, law enforcement notification
04/13/23 UNIVERSITY OF WISCONSIN 15
![Page 16: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/16.jpg)
5 Core Steps in a Physical5 Core Steps in a PhysicalSecurity SystemSecurity System
DeterDelayDetectAssessRespond
04/13/23 UNIVERSITY OF WISCONSIN 16
![Page 17: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/17.jpg)
Sidewalk, Lights andSidewalk, Lights andLandscaping For ProtectionLandscaping For Protection
04/13/23 UNIVERSITY OF WISCONSIN 17
![Page 18: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/18.jpg)
Physical Access ControlPhysical Access ControlFor VisitorsFor Visitors
Limit the number of entry pointsForce all guests to sign-in at a common locationReduce entry points even more, after hours and on weekendsValidate a government issued picture ID before allowing entryRequire all guests to be escorted by a full time employeeEncourage employees to question strangers
04/13/23 UNIVERSITY OF WISCONSIN 18
![Page 19: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/19.jpg)
Natural SurveillanceNatural Surveillance
Natural Surveillance is the intentional and visible surveillance, to make potential criminals aware that they are being watch and make all others feel safe
04/13/23 UNIVERSITY OF WISCONSIN 19
![Page 20: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/20.jpg)
Territorial ReinforcementTerritorial Reinforcement
Building facilities in such a way as you make people feel secure, open, visible, strong, etc.
04/13/23 UNIVERSITY OF WISCONSIN 20
![Page 21: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/21.jpg)
Selecting a Facility SiteSelecting a Facility Site
Visibility – Terrain, neighbors, populationSurrounding area – Crime, riots, police, medical, fire, other hazzardsAccessibility – Road access, traffic, airport access, etcNatural Disasters – floods, tornadoes, earthquakes, rain, etc
04/13/23 UNIVERSITY OF WISCONSIN 21
![Page 22: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/22.jpg)
Entry PointsEntry Points
Windows and doors are the standard access points. They should be secure, strong, foolproof
Walls should be at least as strong as the doors and windows
04/13/23 UNIVERSITY OF WISCONSIN 22
![Page 23: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/23.jpg)
A Human TrapA Human Trap
Only allows one person into a secure area at a timeOpen first door, enterWait for first door to closeEnter second door to secure areaOnly enough space for one person at a time
04/13/23 UNIVERSITY OF WISCONSIN 23
![Page 24: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/24.jpg)
Don’t Forget AboutDon’t Forget Aboutthe Ceilingthe Ceiling
04/13/23 UNIVERSITY OF WISCONSIN 24
![Page 25: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/25.jpg)
In Computer FacilitiesIn Computer FacilitiesWater Detectors Are Water Detectors Are
ImportantImportantWater detectors should be placed under raised floors and on ceilings
04/13/23 UNIVERSITY OF WISCONSIN 25
![Page 26: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/26.jpg)
Laptops Are One of theLaptops Are One of theMost Frequently Stolen Most Frequently Stolen
Physical AssetsPhysical AssetsInventory the laptopsHarden the Operating systemPassword protect BIOSRegister laptops with vendorDon’t check laptop as baggage!Don’t leave laptop unattendedEngrave the laptop visiblyUse a physical cable and lockBackup dataEncrypt hard diskStore in secure place when not in use
04/13/23 UNIVERSITY OF WISCONSIN 26
![Page 27: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/27.jpg)
Electric PowerElectric Power
Electricity is the lifeline of the companyUse multiple supply circuits coming into the facilityFilter power for a clean electrical signal, important for computersHave a backup generator, test it regularlyHave an appropriately sized battery backup power supply (UPS)Test EVERYTHING, test OFTEN
04/13/23 UNIVERSITY OF WISCONSIN 27
![Page 28: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/28.jpg)
Keep All Wiring OrganizedKeep All Wiring OrganizedOn Computer EquipmentOn Computer Equipment
Reduces confusionMakes troubleshooting easierLower risk of fire hazardLower risk of electrical interferenceLooks professional and trustworthy, in case visitors come throughUse shielded cabling to stop electrical interferenceDon’t run electrical wiring close to fluorescent lighting
04/13/23 UNIVERSITY OF WISCONSIN 28
![Page 29: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/29.jpg)
An Example of WhatAn Example of WhatNot to DoNot to Do
04/13/23 UNIVERSITY OF WISCONSIN 29
![Page 30: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/30.jpg)
Make Sure All Utility LinesMake Sure All Utility LinesHave Emergency Shutoff Have Emergency Shutoff
ValvesValves
04/13/23 UNIVERSITY OF WISCONSIN 30
![Page 31: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/31.jpg)
Static Electricity, theStatic Electricity, theInvisible EnemyInvisible Enemy
Protect against static electricity, which can destroy computer equipment:Antistatic flooringHumidity levels should be kept moderateUse proper electrical groundingNo carpeting, ever!!!Use anti-static bands on wrist when working on a computer server04/13/23 UNIVERSITY OF WISCONSIN 31
![Page 32: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/32.jpg)
HVAC – Heating, HVAC – Heating, Ventilation,Ventilation,
Air ConditioningAir ConditioningImportant to have commercial grade systems to keep temperature are proper level, and keep air filtered and circulating
04/13/23 UNIVERSITY OF WISCONSIN 32
![Page 33: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/33.jpg)
Every Good CompanyEvery Good CompanyIs Full of LiebertIs Full of Liebert
04/13/23 UNIVERSITY OF WISCONSIN 33
![Page 34: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/34.jpg)
Water Sprinkler SystemsWater Sprinkler Systems
There are two types:Wet Pipe – always contains waterAdvantage – always ready for useDisadvantage – most costly, possibility of accidental release of waterDry Pipe – has to be connected to a tankAdvantage – no risk of accidental water releaseDisadvantage – not ready immediately
04/13/23 UNIVERSITY OF WISCONSIN 34
![Page 35: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/35.jpg)
Other Security ControlsOther Security Controls
Fences – different heights, strengthsBollards – those odd looking posts in front of Best BuyLighting – one of the best deterrents around, cheap and effectiveLocks – usually easy to defeat, but good as once layer of security for defense in depth strategyCCTV – Efficient for monitoring04/13/23 UNIVERSITY OF WISCONSIN 35
![Page 36: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/36.jpg)
Auditing Physical AccessAuditing Physical AccessCritical Pieces of Critical Pieces of
InformationInformationThe date and time of the access attemptThe entry point at which access was attemptedThe user ID associated with the access attemptAny unsuccessful attempts, especially if done during unauthorized hours
04/13/23 UNIVERSITY OF WISCONSIN 36
![Page 37: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/37.jpg)
Tests and DrillsTests and Drills
Need to be developedMust be put into action, at least once per year, generally speakingMust be documentedMust be put in easily accessible placesPeople must be assigned specific tasksPeople should be taught and informed on how to fulfill specific tasksDetermine in advance what will determine success
04/13/23 UNIVERSITY OF WISCONSIN 37
![Page 38: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/38.jpg)
A Note About Credit CardA Note About Credit CardReader Physical SecurityReader Physical Security
https://www.youtube.com/watch?v=XipjYIbBj7k
Physical access to credit card transaction equipment is one of the greatest physical security threats facing most small businesses in the United States, but most people never give it a second thought
04/13/23 UNIVERSITY OF WISCONSIN 38
![Page 39: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/39.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 39
![Page 40: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/40.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 40
![Page 41: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/41.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 41
![Page 42: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/42.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 42
![Page 43: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/43.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 43
![Page 44: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/44.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 44
![Page 45: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/45.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 45
![Page 46: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/46.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 46
![Page 47: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/47.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 47
![Page 48: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/48.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 48
![Page 49: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/49.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 49
![Page 50: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/50.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 50
![Page 51: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/51.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 51
![Page 52: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/52.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 52
![Page 53: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/53.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 53
![Page 54: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/54.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 54
![Page 55: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/55.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 55
![Page 56: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/56.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 56
![Page 57: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/57.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 57
![Page 58: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/58.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 58
![Page 59: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/59.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 59
![Page 60: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/60.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 60
![Page 61: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/61.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 61
![Page 62: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/62.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 62
![Page 63: Information Systems Security 365/765 UW-Madison](https://reader036.fdocuments.in/reader036/viewer/2022062405/5580b5e5d8b42ac6088b4b2e/html5/thumbnails/63.jpg)
04/13/23 UNIVERSITY OF WISCONSIN 63