What is Information Security?

Slides:



Advertisements
Similar presentations
10 Things You Can do to Secure Your PC Presented by Peter Nowak OIS Client Services Manager.
Advertisements

Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
10 Essential Security Measures PA Turnpike Commission.
Quiz Review.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Security for Seniors SeniorNet Help Desk
Program Objective Security Basics
You will find applications that are installed on the computer. Go to Start – Programs (depending on view Start – All Programs). All applications installed.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
ISO17799 / BS ISO / BS Introduction Information security has always been a major challenge to most organizations. Computer infections.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Trend Micro Support for Installing the Latest Version Security 2016.
Welcomes you.  Norton antivirus is a type of anti-malware software developed by semantic corporation since  It provides the feature of spam.
ISMS Information Security Management System
Introduction to NC WISE
Joseph J. Malone Security for Seniors Joseph J. Malone
Three steps to prevent Malware infection
Securing Network Servers
Chapter 5 Electronic Commerce | Security Threats - Solution
What they are and how to protect against them
Technology Skills for Life, Career, and Academic Success
DATA SECURITY FOR MEDICAL RESEARCH
Class Name: Online Safety & Privacy Basics
Chapter 6 Application Hardening
Unit 4 IT Security.
Administrative Practices Outcome 1
Documentation & Troubleshooting Guide
I S P S loss Prevention.
Chapter 5 Electronic Commerce | Security Threats - Solution
Protecting Client Confidentiality for Volunteers and Agency Staff
Phishing, what you should know
Answer the questions to reveal the blocks and guess the picture.
Arab Open University (AOU)
Protect Your Computer Against Harmful Attacks!
Basic Computer Maintenance
Things To Avoid: 1-Never your password to anyone.
How to allow USB Flash Drive Scan in Avast Antivirus.
HOW TO BETTER USE AVG ANTIVIRUS TIPS AND TRICKS. By default automatic healing of viruses is not enabled in AVG Antivirus, we require to enable it in order.
Robert Leonard Information Security Manager Hamilton
office.com/setup installation and Activation
office.com/setup download,installation and Activation support guide
Risk of the Internet At Home
Protecting Your Identity:
Windows xp PART 1 DR.WAFAA SHRIEF.
Information Security Awareness
Protecting Yourself from Fraud including Identity Theft
Cybersecurity Am I concerned?
Top Ten Cyber Security Hygiene Tips
REDCap and Data Governance
9 ways to avoid viruses and spyware
Good Spirit School Division
Premier Employee Program Version 4.0
Chapter 9: Configuring Internet Explorer
Session 1 – Introduction to Information Security
Presentation transcript:

What is Information Security? Information security consists of preserving the following elements: Confidentiality: ensuring that information can only be accessed by those with the proper authorization Integrity: safeguarding the accuracy and completeness of information and the ways in which it is processed Availability: ensuring that authorized users have access to information and associated assets whenever required Information can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by post or using electronic means, shown on films, or spoken in conversation. Whatever form the Information takes, whatever the means by which it is shared or stored, it should always be appropriately protected.

Conficker- The Computer Worm How can it spread? OS patches missing Through file sharing and via removable drives, such as USB drives How can you find out if its Conficker? When the drive is used, the AutoPlay dialog box will show one additional option. Can also disable important services on your computer. What can you do to protect your computer? OS should be up-to-date with latest security updates (Microsoft Patch: MS08-067) Antivirus software should be up-to-date with latest virus definition Sharing of drives should be forbidden Administrator password should be set

Always lock your PC before you leave your desk Press CTRL+ALT+DEL Shut down your PC and monitor before leaving from work everyday Do not share your password with anyone, not even your colleague Do not download any unauthorized software on your PC Do not store personal data on your PC

Always lock your PC before you leave your desk (Press CTRL+ALT+DEL) Do’s Always lock your PC before you leave your desk (Press CTRL+ALT+DEL) Shut down your PC and monitor before leaving from work everyday Don’ts Do not share your password with anyone, not even your colleague Do not download any unauthorized software on your PC Do not store personal data on your PC

Anti Virus: Installed? Updated? Ensure that Anti-Virus is installed on your machine Ensure that virus definitions are up-to-date

How to Identify a Phishing Attack Likely Phishing Attack Request for personal financial information Alarming claims like Warning Email That Your Account is compromised Generic greeting like ‘Dear valued customer’ Misspellings or substitute characters (e.g.:’1nformati0n’): These are generally inserted in an attempt to bypass anti-spam software Secure URL starting with https:// Look in the Browser Status Bar: The actual location to which a URL points may be different what you see in your browser Padlock Icon: Also look for a small padlock icon on the browser’s status bar

You are responsible for….. Print outs that lie unattended………… Do not leave any print outs lying unattended Collect the prints immediately Shred/ Discard/Tear-off the pages which are not of any use Take print outs only if it is absolutely necessary

(e.g.: pnb123,pnb_123, etc.) Do not have default passwords for your machines Keep separate passwords for login and mailbox (alpha numeric, special characters, length of at least 8 characters) Strength of password should be high