Personal Data Protection and Security Measures

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Social Engineering Training. Training Goals Increase Laboratory Awareness. Provide the tools required to identify, avoid and report advanced Social Engineering.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Critical Data Management Indiana University HR Summit April 24, 2014.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Information Security Awareness:
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
IT Security for Users By Matthew Moody.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Types of Electronic Infection
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Secure . is a means of exchanging digital messages from an author to one or more recipients – it is instant with no delay or postal costs.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Kaspersky Small Office Security INTRODUCING New for 2014!
Computer Security Sample security policy Dr Alexei Vernitski.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Technical Implementation: Security Risks
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Chapter 40 Internet Security.
What is Information Security?
Information Technology Acceptable Use An Overview
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Trend Micro Consumer 2010 Easy. Fast. Smart.
DATA SECURITY FOR MEDICAL RESEARCH
Administrative Practices Outcome 1
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Staying Austin College
Cybersecurity Awareness
Welcome to the SPH Information Security Learning Module
Digital $$ Quiz Test your knowledge.
Staying safe on the internet
Protecting Your Information Assets
Part 3.
Information Security Awareness
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
How to keep the bad guys out and your data safe
Premier Employee Program Version 4.0
G061 - Network Security.
Personal Mobile Device Acceptable Use Policy Training Slideshow
Protecting Student Data
School of Medicine Orientation Information Security Training
Presentation transcript:

Personal Data Protection and Security Measures IT Services - Information Security Team 20 & 27 April 2017

Agenda Data Protection Data Classification Good Practices for IT Security

Data Protection Data is one of the most valuable assets of the University Data can be any information (including fact, opinion, statistics, record and research information) that is stored in computer, USB drive, Cloud storage and on paper. Risks to the data: Theft Loss Leakage Tamper

Data Classification

The importance of data classification Allow us to identify the sensitivity level of data Manage the data better Employ appropriate level of security to the data

Four-level Data Classification In order to handle data properly, data should be classified into different sensitivity levels. Restricted Confidential Internal Public

Four-level Data Classification Restricted Very sensitive in nature, strictly restricted by the University, the government or any other agreements between the University and 3rd parties Critical to the University’s capacity to conduct her business Disclosure of such data to unauthorized parties could have significant adverse impact to University’s reputation Examples: Examination papers Privileged accounts/passwords

Four-level Data Classification Confidential Intended for use by specific group of authorized personnel within the University and business partners Unauthorized disclosure of such data would adversely affect the business performance Data should not be copied or removed from the University’s control without specific authorization by the Data/Information Owner/designee. Examples: Staff and student data disciplinary details; Unpublished research information

Four-level Data Classification Internal Related to non-sensitive operational data/information. Intended for use within by members of the University and authorized services providers. Disclosure of such data/information could have moderate adverse impact. Examples: Staff handbooks Policies/manuals/procedures Training materials

Four-level Data Classification Public Data approved by the appropriate University authority for public consumption Examples: Programme and admission information Published academic literature Press releases

Data Handling Different level of precautions and security controls are applied based on the data classification. Data with higher sensitivity level requires higher level of protection.

Good practices for IT Security

Workstation (PC) Use complex password, at least 10 characters with combinations of alphanumeric and special characters Enable PC login password and screen saver password Screen lock or logout your PC when unattended Do not install Peer-to-Peer(P2P) software on PC that handles confidential data Physically secure the notebook PC, tablet PC Avoid using public computer to access confidential files Using VPN or other secure channel for remotely access from the outside of the university

Storage Data could be stored on personal PC, file server, mobile phone, Network Attached Storage(NAS), Cloud storage, files and folders… etc. Apply access control Require user ID and password Read, write, deny access Logging Use encryption Backup regularly

Physical Security DON’T leave your PC unattended without physical protection. Protection measures: Lock your office door. Use cable chain lock. Enable screensaver.

Removable Storage Use encryption and password protected Erase the data after use (best reformat the USB drive) Don’t leave USB drive unattended Keep it safe Don’t use USB drive from unknown source Only store sensitive data on portable devices or media when absolutely necessary For storing personal data, seek permission Report to supervisor if lost USB drive that contains sensitive data Guidelines on Electronic Communications and Storing Personal Data on Portable Storage Devices, Personally-owned Computers and Public Cloud Services (http://www.its.hku.hk/about/policies/personal-data-guidelines)

Removable Storage Data Leakage Prevention (“DLP”) Protection (See Code of Practice) USB PSDs are required to be initialized before any write access of the device and only read access is allowed. Logon HKU Portal Search for “DLP” Click on the link “DLP for PSD”

Email & File Protection Information Rights Management (IRM) Solution allows individuals to set access permissions to files and email messages. only authorized person is granted access (permission) to an IRM- controlled document. Prevent content from unauthorized forwarding (applicable to mail message), editing, printing, faxing, saving, or copying (cutting and pasting) the content Support major platforms: Windows(Full features), MacOS, Android, iOS User Guide: http://www.its.hku.hk/documentation/guide/communication/irm Training: http://www.its.hku.hk/whats-new/20170215/irm-staff-email

IRM – Typical Usage Scenarios User A shares a protected file to User B User A send a protected email message to User B User B User A Tools to view protected file File needs protection Protected file RMS Sharing App User A User B Email message needs protection Protected Email Message RMS Sharing App

Cloud storage Before uploading data to Cloud storage, you should consider: Privacy and confidentiality Data Encryption uploaded to, downloaded from, and stored in the cloud Exposure of data to cloud operator, local and foreign government or agency References Guidelines for Using External Web 2.0 Services (http://moodle-support.hku.hk/teacher/web20guide) PCPD Information Leaflet – Cloud Computing (https://www.pcpd.org.hk/english/resources_centre/pu blications/files/IL_cloud_e.pdf)

Social Networks Online Social networking sites are useful to stay connected with others, but you should be wary about how much personal information you post. “Stay Smart. Mind Your Digital Footprint” – by PCPD Privacy and security settings Once posted, always posted Keep personal information personal

Mobile Security “New Technology, old Privacy and Security issue” Lost or stolen mobile devices Enable screen lock Encrypt the data, such as email and documents Use Remote Wipe and Anti-Virus Beware of automatically login of company email & file server Malware and virus Steal bank details, company data, personal identities & email addresses Beware of apps sources and access rights Install from trusted sources only Beware of app requests of excessive permissions of devices

Phishing Email Phishing is the act of attempting to acquire information such as usernames and password by pretending from a trusted entity, e.g. ITS or other department of the University Signs of a phishing email: Unofficial “From” address Urgent actions required Generic greeting Link to a fake website, sometimes with legitimate links What to do if you received phishing email Delete these suspicious emails Don’t reply or click any link on them Check HKU Spam Report website http://www.its.hku.hk/spam-report

Non-HKU Hyperlink Http://evil.com/cheat_u/login.htm Phishing email Sample of phishing email Non-HKU Hyperlink Http://evil.com/cheat_u/login.htm

Ransomware Ransomware is malicious software which encrypts files & waits for a paid ransom, and in some cases, normal use of the infected computers cannot be resumed even a ransom is paid.

Your PC is locked and files are encrypted: Ransomware Ransomware typically propagates in the form of a Trojan horse which enters a computer through a downloaded file emails with malicious attachments malicious website network vulnerability Your PC is locked and files are encrypted: To get the key to unlock your PC and decrypt files, you have to pay HK$10,000.

Security Measures for Protecting PC Regularly backup your PC data and keep a recent backup copy off-line. Ensure anti-virus software is installed on your PCs and keep it up-to-date with the latest virus signature. Keep the operating systems of your PCs up-to-date. For suspicious emails, attachments/files and unsolicited web sites, please do not open them. Do not enable macros in document attachments received via email. Limit the privilege & access right of shared network drives. Refer to HKU ITS web site http://www.its.hku.hk/faq/infosec/awareness/ransomware

Thank You