Computer Security ISO / OHSAS Registration Photo of the Week E. Lessard Collider-Accelerator Department 5-10-11 Take 5 for Safety.

Slides:



Advertisements
Similar presentations
Computer Concepts – Illustrated 8th edition
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Computer Networks TCP/IP Protocol Suite.
Understanding the benefits and the risks. Presented by Corey Nachreiner, CISSP BYOD - Bring Your Own Device or Bring Your Own Danger?
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
ACT User Meeting June Your entitlements window Entitlements, roles and v1 security overview Problems with v1 security Tasks, jobs and v2 security.
Discovering Computers Fundamentals, 2012 Edition
® Microsoft Office 2010 Essential Computer Concepts.
NETWORKS, COMMUNICATIONS, & SAFEGUARDS
VOORBLAD.
Thank you to IT Training at Indiana University Computer Malware.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
SECURITY AND INFORMATION SYSTEMS THE EVOLUTION OF SECURITY SYSTEMS Created By: Jamere Hill Instructor: Kyhia Bostic Section University of Houston.
Lesson 30 Computer Safety and Ethics
Introduction to ikhlas ikhlas is an affordable and effective Online Accounting Solution that is currently available in Brunei.
NSF Audit Accelerator Safety Envelopes Picture of the Week E. Lessard Collider-Accelerator Department Take 5 for Safety.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Crime and Security in the Networked Economy Part 4.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Information Security Technological Security Implementation and Privacy Protection.
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Computer & Network Security
 a crime committed on a computer network, esp. the Internet.
Troubleshooting Windows Vista Security Chapter 4.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Skills and Applications Computer Security.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
(2011) Security Breach Compromises 75,000 Staff/Student Social Security Numbers Image from this Site Presenters: Aron Eisold, Matt Mickelson, Bryce Nelson,
1 3 Computing System Fundamentals 3.7 Utility Software.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Computer Security Sample security policy Dr Alexei Vernitski.
Information Management System Ali Saeed Khan 29 th April, 2016.
Virus Removal Support Services. H OW TO K EEP Y OUR C OMPUTER F REE F ROM V IRUS T HREAT ? Virus can attack your PC any time without any.
Ray Karol 2/26/2013. Annual Audit Next week BNL is conducting the annual internal assessment of our environmental and safety programs and compliance assessments.
Windows Vista Configuration MCTS : Network Security.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Network System Security - Task 2. Russell Johnston.
Presentation transcript:

Computer Security ISO / OHSAS Registration Photo of the Week E. Lessard Collider-Accelerator Department Take 5 for Safety

C-AD Computer Event Malware discovered on April 26, 2011 while installing firewall on.31 subnet; this subnet used by Access Controls Group to talk to the safety system The event involved discovery of a computer on.31 subnet with malware on it that was communicating with a computer in the Ukraine The Ukraine computer was sending back messages Isolated means the system was on C-ADs Access Control List (ACL) and isolation is controlled by the C-AD network group Summer of 2010, CADs network group learned the.31 subnet was not isolated; had to wait until April 26, 2011 to begin to fix Trail shows malware appeared December 10, 2010 on a Human Machine Interface computer in 1004a Trail shows infection came from a Kingston Data Traveler USB flash drive; this virus is not transmitted via internet On April 27, 2011, 1004a computer was disconnected from network On April 28, 2011,.31 subnet isolated – no impact on safety system On April 29, 2011, three more objects on the.31 subnet found with malware 2

Computer Security BNL computer security policy is defense in depth Most secure systems are those not connected to the internet and shielded from any interference (not the real world) On defenses, computer security experts have learned that several low hurdles do not make a high hurdle Computer security experts indicate there is no such thing as secure coding practices Code can be disguised as data Computer malware can be used for sabotage (e.g., Irans uranium centrifuges), not just theft Software defenses Trend antivirus and spyware detection software; checks flash drives automatically Access control lists (ACLs); quick fix but known to have flaws - The owner of the object or the system owner decides who has access Encryption during transmission Hardware defenses Physically isolated from network connections and routing services Secure operating systems used by DoD and DOE for classified data (unique microprocessor, memory management and program that controls all other programs) 3

ISO and OHSAS Registration Audit for OSH/E Programs May 31 through June 3, NSF International auditors on- site for annual OSH/E management system registration audit New approach this year; interviews with scientists and users Interviews at C-AD set up by Tracy Blydenburgh ERL, EBIS and NSRL Afternoon of Wednesday, June 1, 2011 OSH/E refresher training for C-AD workers set up for Tuesdays and Thursdays, weeks of May 16 and May 30, 2011 Snyder, 11:15 am to noon 4

Photo of the Week - Safety Shortcut Extension ladder has no rope and pulley making it difficult to move this ladder Probably why barrel- ladder-stair approach was used Safety shortcuts are usually caused by time pressure Not worth risking your health to gain a few minutes 5