Data Protection & Network Security Data Protection Protective Marking Secure Printing Passwords Email & the Internet Viruses Encryption.

Slides:



Advertisements
Similar presentations
Welcome to the SPH Information Security Learning Module.
Advertisements

Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
Health Insurance Portability & Accountability Act “HIPAA” To every patient, every time, we will provide the care that we would want for our own loved ones.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Perimeter Church Perimeter Network Introduction 2005.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Critical Data Management Indiana University HR Summit April 24, 2014.
Tom Parker Project Manager Identity Management Team IT Security Group.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
10 Essential Security Measures PA Turnpike Commission.
Online banking Using the internet for your banking.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
Computer Settings and Printing Tips Pennsylvania’s Protection From Abuse Database.
Hello Employee, Welcome to MStreamIT!
Protecting Sensitive Information PA Turnpike Commission.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Information guide.
Manasota.score.org 11 SCORE Tailored Seminars & Workshops: An Overview SCORE Office Information V
etiquette Etiquette s always go to any of the following: Staff
1.1 System Performance Security Module 1 Version 5.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
University Health Care Computer Systems Fellows, Residents, & Interns.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Security Training USAID Information Security.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Forms Training. Tested Formatted The Template Library.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Things To Avoid: 1-Never your password to anyone.
Welcome to FOCUS FOCUS website:
Welcome to the SPH Information Security Learning Module
Understanding Data Protection
Handling Information Securely
NVOC Single Sign-On (SSO) for Students!
Presentation transcript:

Data Protection & Network Security Data Protection Protective Marking Secure Printing Passwords & the Internet Viruses Encryption

Data Protection Data protection applies to printed documents as well as electronic data Schedule 7 of the DPA: –Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

Security Breach Examples Imagine a potential security breach: –Leaving unencrypted data on a USB key –Leaving printed documents on public transport –Losing your phone –Losing your laptop –Disclosing your password

Protective Marking Government Protective Marking Scheme labelImpact Level (IL) NOT PROTECTIVELY MARKED0 PROTECT1 or 2 RESTRICTED3 CONFIDENTIAL4 All documents should be marked, in the header, with one of the following labels The equivalent government IL is give for each label Header AVI

Decision Flowchart

Examples Government Protective Marking Scheme label Example data types Confidential IL4 National Pupil Database Looked-after children Witness protection Restricted IL 3 School MIS (SIMS) Teacher access to learning platform/portals Special educational needs Pupil characteristic Health records Protect IL 1 or 2 General student data Learning platforms/portals Not Protectively Marked IL0 Google search BBC News

Document Handling Data or documents marked PROTECT or higher must: –Be secured in a locked cabinet or area –Be protected by a strong password –Have access restricted to appropriate personnel only –Be encrypted before transfer –Not be left in plain view –Be destroyed securely

Secure Deletion of Files

Printing Risks Risk from low to high: –A printer connected to the machine –A network printer in the same room –A network printer in another room The main risk of printing a document is that it can potentially be seen by unauthorised persons before it can be secured

Secured Print Capability It is possible to apply a password to a print job sent to these network printers: –Canon iR C3080/3480/3580 UFR II Office area main block –Canon iR2270/iR2870 UFR II Staff quiet room –Canon iR-ADV C5045/5051 UFR II Reprographics N.B. Student access allowed

Identifying Printers

Secured Printing Secure AVI

Copier – Step 1 Enter Departmental ID as usual

Copier – Step 2 Go to the Print Job tab and select job

Copier – Step 3 Enter your chosen password and OK

Secured Print Password Suggestions for suitable passwords: –Significant date in number form e.g. Tuesday 26th April 2011 could be used in the form 2604 or or –Birth year of partner or children, not your own –Disposable passwords can be short (four figures) but don't use 'obvious' numbers e.g. 1234, 5678,

Network Password Passwords should be at least eight characters long and contain at least one of each of the following characters: –Upper case letter –Lower case letter –Number –Symbol etc.) Best password length > 13 characters Best to change at least every ninety days

Permutations Available CharactersPermutationsFactor Alphabet2663 x Add case5230 x Add numbers62136 x ,164 Add special characters955 x , character95426 x ,768, characters9537 x ,000, characters952 x x Based on an 8 character password

Avoid Using Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters – , , abcdefg, or adjacent letters on your keyboard (qwerty) Personal information –Your name, birthday, driver's license, passport number, or similar information

Memorising Writing a password down is OK but: –Keep it safe and secure –Do not store it near or on the computer Use a formula / mnemonic Where passwords must be changed regularly, add a date to your formula

Top 20 Passwords From rockyou.com server breach:

Length & Complexity From rockyou.com server breach:

Testing Your Password

Never provide personal details in an or in response to an request Check the sender – does the address look right? Avoid links in s Does the 'ring true'? Look out for URLs ending in.tk.cc.info

'Reset' Example

UPS Example

Internet Beware of pop-ups Beware of obfuscated links Inappropriate web sites Virus scams

Pop-up Blocker Under Tools menu in IE8 Make sure it is turned on Close pop-ups with ALT+F4

Obfuscated Links Harmful addresses hidden behind innocuous looking links Google image search Link text can be anything Obfuscation

Sophos Anti-virus The school's anti-virus program is called: Sophos Endpoint Security and Control It can be identified by the small blue shield logo in the lower right of the screen:

Sophos Detection Result

Sophos Error If the Sophos shield appears with a white cross on red disc, this means it has experienced an error: OK to ignore this for a short while only Report it to IT support if persistent

AVG Anti-virus A very small minority of laptops may be using AVG anti-virus This can be identified by the following logo in the bottom right corner of the screen:

Encryption All new PCs in admin areas and laptops have their hard drives encrypted Protect the encryption password with extreme diligence – treat as RESTRICTED Only effective when the machine is off AxCrypt to encrypt files before transmission via

Advice and Support Please visit: support.manorschool.northants.sch.uk Additional information: