Dial-in Access Policy By Matt Lynott. Reasoning The reason for this policy is to define appropriate dial-in access and its use by authorized personnel.

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
Section Six: Foreign Ownership, Control, or Influence (FOCI)
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
The Islamic University of Gaza
Information Security Policies and Standards
Chapter 1  Introduction 1 Overview  What is a secure computer system?  Concerns of a secure system o Data: Privacy, Integrity, Availability o Users:
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Information Security Policies: User/Employee use policies.
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
Session 3 – Information Security Policies
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Computer Security: Principles and Practice
Security Information Management Firewall Management, Intrusion Detection, and Intrusion Prevention Intrusion Detection Busters Katherine Jackowski Elizabeth.
Information Asset Classification
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
INTELLECTUAL PROPERTY TRADE SECRETS COPYRIGHTS PATENTS.
1 Conservation Transaction Plug-In (CTP) Tool Overview March 23 & 25, 2010 Tim Pilkowski State Conservation Agronomist Annapolis, MD USDA is an equal opportunity.
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Joseph Kummer Terri Berry Brad White.  1. Specific instances of employee hacking and the consequences which resulted therefrom.  2. How employees utilize.
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 14 – Human Factors.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Chapter 6 of the Executive Guide manual Technology.
Module 8: Designing Network Access Solutions. Module Overview Securing and Controlling Network Access Designing Remote Access Services Designing RADIUS.
Mobile Banking By: Chenyu Gong, Jalal Hafidi, Harika Malineni.
Instructional & Information Technology Services Fall, Activities and Updates Teresa Macklin Information Security Officer Information Security.
VPN Security Policy By: Fred Cicilioni. VPN, or Virtual Private Network, is a protocol that allows remote access, allowing the user to connect to all.
Safeguarding your Business Assets through Understanding of the Win32 API.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
Module 11: Designing Security for Network Perimeters.
IT Employee Termination Policy
Generally Accepted Recordkeeping Principles: The Principle of Transparency Alaska Chapter of ARMA International Presented by: Tara Carey, ARMA Board Member.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS.
Chapter 3 “A Case Study of Effectively Implemented Information Systems Security Policy[1]” John Doran, CST554, Spring 2008.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Developing a Network Security Policy By: Chris Catalano.
Payment Card Industry (PCI) Rules and Standards
Blackboard Security System
Policies and Procedures
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Team 1 – Incident Response
Recommending a Security Strategy
Privacy and Security in the Employment Relationship
Rights Management Services (RMS)
BOMGAR REMOTE SUPPORT Karl Lankford
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
A+ A+ CORPORATION PRESENTS: INFORMATION TECHNOLOGY DEPARTMENT
Information Sensitivity
General Data Protection Regulations 2018
Colorado “Protections For Consumer Data Privacy” Law
Session 1 – Introduction to Information Security
Personal Mobile Device Acceptable Use Policy Training Slideshow
Anatomy of a Common Cyber Attack
Presentation transcript:

Dial-in Access Policy By Matt Lynott

Reasoning The reason for this policy is to define appropriate dial-in access and its use by authorized personnel The reason for this policy is to define appropriate dial-in access and its use by authorized personnel

The Policy employees and authorized third parties (customers, vendors, etc.) of a company can use dial-in connections to gain access to the corporate network. Dial- in access should be strictly controlled, using one-time password authentication. employees and authorized third parties (customers, vendors, etc.) of a company can use dial-in connections to gain access to the corporate network. Dial- in access should be strictly controlled, using one-time password authentication.

Cont.. It is the responsibility of employees with dial-in access privileges to ensure a dial-in connection to a company is not used by non-employees to gain access to company information system resources. An employee who is granted dial-in access privileges must remain constantly aware that dial-in connections between their location and the company are literal extensions of the company’s corporate network, and that they provide a potential path to the company's most sensitive information. The employee and/or authorized third party individual must take every reasonable measure to protect the company's assets. It is the responsibility of employees with dial-in access privileges to ensure a dial-in connection to a company is not used by non-employees to gain access to company information system resources. An employee who is granted dial-in access privileges must remain constantly aware that dial-in connections between their location and the company are literal extensions of the company’s corporate network, and that they provide a potential path to the company's most sensitive information. The employee and/or authorized third party individual must take every reasonable measure to protect the company's assets.

Cell phone use within the policy Analog and non-GSM digital cellular phones cannot be used to connect to company's corporate network, as their signals can be readily scanned and/or hijacked by unauthorized individuals. Only GSM standard digital cellular phones are considered secure enough for connection to company's network. Analog and non-GSM digital cellular phones cannot be used to connect to company's corporate network, as their signals can be readily scanned and/or hijacked by unauthorized individuals. Only GSM standard digital cellular phones are considered secure enough for connection to company's network.

Dial-in accounts Dial-in accounts are considered 'as needed' accounts. Account activity is monitored, and if a dial-in account is not used for a period of six months the account will expire and no longer function. If dial-in access is subsequently required, the individual must request a new account. Dial-in accounts are considered 'as needed' accounts. Account activity is monitored, and if a dial-in account is not used for a period of six months the account will expire and no longer function. If dial-in access is subsequently required, the individual must request a new account.

Violating the Policy Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment. Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.