Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Invasion of Smart Phones in Clinical Areas Chrissy Kyak Privacy Officer University of Maryland Upper Chesapeake Health.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
7 Effective Habits when using the Internet Philip O’Kane 1.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Security for Today’s Threat Landscape Kat Pelak 1.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Critical Data Management Indiana University HR Summit April 24, 2014.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Program Objective Security Basics
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
IT Security for Users By Matthew Moody.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Chapter 2 Securing Network Server and User Workstations.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Computer Security Sample security policy Dr Alexei Vernitski.
2015Computer Services – Information Security| Information Security Training Budget Officers.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Personal Data Protection and Security Measures
DATA SECURITY FOR MEDICAL RESEARCH
Staying Austin College
Digital $$ Quiz Test your knowledge.
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
G061 - Network Security.
Presentation transcript:

Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016

Agenda ➢ Data Protection ➢ Data Classification ➢ Good Practices for IT Security

Data Protection ➢ Data is one of the most valuable assets of the University ➢ Data could be any factual information that is stored in computer, USB drive, Cloud storage and paper. ➢ Risks to the data: 1. Theft 2. Loss 3. Leakage 4. Tamper

Data Classification

The importance of data classification Allow us to identify the data Manage the data better Employ appropriate level of security to the data

Three-level Data Classification In order to handle data properly, data should be classified into sensitivity levels. Public Sensitive Restricted

Three-level Classification Public Data is generally open to the public. No existing local, national or international legal restrictions on access. Examples: 1.events and activities information 2.communication notices 3.publications

Three-level Classification Sensitive Data is “for Official Use Only” Protected from unauthorized access due to proprietary, ethical or privacy considerations Examples: 1.Student data; 2.University partner or sponsor information where no confidentiality agreement exists

Three-level Classification Restricted Data is protected by regulations, University policies or contractual agreement Unauthorized access may result in significant financial risk or negative impacts on the reputation of the University Examples: 1.Personal Information 2.Payment Records 3.Medical Records

Data Handling ➢ Different level of precautions and security controls are applied based on the data classification. ➢ Data with higher sensitivity level requires higher level of protection. Public Sensitive Restricted

Data Handling Security ControlPublic LevelSensitive LevelRestricted Level Access ControlNo restrictionAAA (Authentication, authorization, accounting) AAA, Confidentiality agreement Copying/PrintingNo restrictionLimitedLimited with label “Confidential” Network SecurityNo protectionFirewall, IPS, Allow remote Access Firewall, IPS, No remote Access System SecurityBest practicesHardeningHardening with specific security Physical SecurityLockedLocked, CCTVData Centre Data StorageMonthly BackupDaily Backup Encryption Data loss prevention AuditingNo LoggingLoginsLogins, access and changes

Good practices for IT Security

Workstation ➢ Use complex password, at least 10 characters with combinations of alphanumeric and special characters ➢ Enable login password and screen saver password ➢ Screen lock or logout your computer when unattended ➢ Do not install Peer-to-Peer(P2P) software on computer that handles confidential data ➢ Physically secure the notebook PC, tablet PC ➢ Avoid using public computer to access confidential files ➢ Using VPN or other secure channel for remotely access from the outside of the university

Storage Data could be stored on personal PC, file server, mobile phone, Network Attached Storage(NAS), Cloud storage, … etc. ➢ Apply access control Require user ID and password Read, write, deny access Logging ➢ Use encryption ➢ Backup regularly

Removable Storage ➢ Use encryption with password protected ➢ Erase the data after use ➢ Don’t leave USB drive unattended ➢ Keep it safe ➢ Don’t use USB drive from unknown source. ➢ Only store sensitive data on portable devices or media when absolutely necessary ➢ Report to supervisor if lost USB drive that contains sensitive data Guidelines on storing and accessing personal data on portable storage devices and personally owned computersGuidelines on storing and accessing personal data on portable storage devices and personally owned computers (Newly updated on Mar 2015)

Cloud storage Before uploading data to Cloud storage, you should consider: ➢ Privacy and confidentiality ➢ Data Encryption ▪ being uploaded to, or downloaded from, and stored in the cloud ➢ Exposure of data ▪ to operator, local and foreign government or agency

Social Networks Online Social networking sites are useful to stay connected with others, but you should be wary about how much personal information you post. “Stay Smart. Mind Your Digital Footprint” – by PCPD “Stay Smart. Mind Your Digital Footprint” Privacy and security settings Once posted, always posted Keep personal information personal

Mobile Security “New Technology, old Privacy and Security issue” ➢ Lost or stolen mobile devices ▪Enable screen lock ▪Encrypt the data, such as and documents ▪Use Remote Wipe and Anti-Virus ▪Be aware the automatically login of company and file server ➢ Malware and virus ▪Steal bank details, Company Data, Personal identities and addresses ➢ Be aware apps sources and rights ▪Install from trusted sources only ▪Be aware the requested application permissions

Phishing is the act of attempting to acquire information such as usernames and password by pretending from a trusted entity, e.g. ITS or other department of the University ➢ Signs of a phishing Unofficial “From” address Urgent actions required Generic greeting Link to a fake website, sometimes with legitimate links ➢ What to do if you received phishing Delete these suspicious s Don’t reply or click any link on them Refer to HKU Spam report web site Phishing

Phishing Hyperlink Sample of phishing

Ransomware is malicious software which encrypts files until a ransom is paid, and in some cases, normal use of the infected computers cannot be resumed even a ransom is paid. Ransomware

Ransomware typically propagates in the form of a Trojan horse which enters a computer through a downloaded file s with malicious attachments malicious website network vulnerability Ransomware Your PC is locked and files are encrypted To get the key to unlock your PC and decrypt files, you have to pay HK$10,000.

1.Regularly backup your PC data and keep a recent backup copy off- line 2.For suspicious s, attachments/files and unsolicited Web sites, please do not open them. 3.Do not enable macros in document attachments received via . 4.Ensure anti-virus software is installed on your PCs and keep it up-to- date with the latest virus signature. 5.Keep the operating systems of your PCs up-to-date. 6.Limit the privilege and access right of shared network drives Refer to HKU ITS web site Security Measures for Protecting PC

Thank You