Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.

Slides:



Advertisements
Similar presentations
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Advertisements

Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
LittleOrange Internet Security an Endpoint Security Appliance.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
Program Objective Security Basics
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Staying Safe Online Keep your Information Secure.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Small Business Security Keith Slagle April 24, 2007.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network System Security - Task 2. Russell Johnston.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
bitdefender virus protection
Internet Safety.
Securing Information Systems
Chapter 40 Internet Security.
Securing Information Systems
Information Technology Acceptable Use An Overview
Managing Windows Security
What they are and how to protect against them
Fusion Center ITS security and Privacy Operations Joe Thomas
Class Name: Online Safety & Privacy Basics
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Overview 1. Phishing Scams
Cyber Security By: Pratik Gandhi.
Business Risks of Insecure Networks
Firewalls.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Securing Information Systems
Columbus State University
Security in Networking
Information Security Session November 11, 2004
Call AVG Antivirus Support | Fix Your PC
Robert Leonard Information Security Manager Hamilton
Risk of the Internet At Home
Information Security Session October 24, 2005
Information Security Session October 23, 2006
Lesson 2: Epic Security Considerations
Contact Center Security Strategies
Information Security Awareness
Cybersecurity Am I concerned?
Fire-wall.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information.
Chapter # 3 COMPUTER AND INTERNET CRIME
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Division of Engineering Computing Services
Presentation transcript:

Leaders’ Forum, March 16, 2006 The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information

The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information Today’s Speakers: Arni Stinnissen, Detective Staff Sergeant, Electronic Crimes Section OPP Debbie Jones, Director of Information Technology, Western

IT Security @ Western is a shared responsibility Debbie Jones Director, Information Technology Services

Photos courtesy Flickr.com

Western’s Layered Security

Gateway Routers Provides routing and denial of routing by IP or port Block certain Denial of Service attacks Block port based scans Blocks attacks against specific ports such as email, some microsoft ports and sql database ports

Gateway Intrusion Protection Can block or log traffic by IP, port, pattern or protocol First line of defense against new viruses Identifies certain traffic patterns and automatically blocks Detects and automatically blocks on-campus and off-campus scanning or network problems

Firewall Registered Services Ensure protocol integrity Restrict what machines on campus receive special traffic (email, ftp, http, database requests..) Ensure protocol integrity Allows for fine grained rules for accepting or rejecting specific types of traffic Customizable for different networks on campus

Trend Antivirus Email Scanner Rejects certain types of attachments that are high risk of carrying malicious code Detects viruses in incoming emails and strips the virus attachment off

Anti Spam Technology Spam can be a nuisance (like junk mail), or a threat laced with viruses, malware, phishing or links to unsavoury web sites Western’s spam control Of the 8.3 million email connections per week, 68% were rejected and a further 5% were tagged as SPAM

Spam Tagging

Ramp Provides locking and unlocking of infected systems on campus Provides the setting of service specific protection Provides systems administrators with a quarantined network for new or infected machines Provides systems administrators access to security scans

Trend Antivirus Anti-Spyware Campus wide license Protects PC’s from known viruses and malware ITS Server automatically updates 4,800 PCs at Western 8 servers in other areas update another 3,000 PCs PC-cillin is on 7,000 home computers and 5,000 residence computers

Operating System Patches Operating Systems are vulnerable and hackers continually find new ways of ‘sneaking in’ Patches close the vulnerabilities to prevent them from being exploited by hackers and worms ITS server automatically sends patches to over 5,000 desktops on campus

Protecting Western ITS Network Security office nso@uwo.ca Responsible for maintaining a secure and stable network and data infrastructure for campus. Implements and supports the ‘many layers’ of protection Monitors network activity for anomalies and deals with problems Responds to security incidents or calls for help Makes new tools available to campus ITS Computer Wellness Clinics Laptops and computers may be brought to the clinic to be cleaned of viruses and malware (by appointment, weekdays 8:30-4:30) Book an appointment by emailing computer.wellness@uwo.ca System Administrators all around campus All of the heros across campus that maintain and protect computers with appropriate anti-virus software and security patches.

Working Group on Information Security (WGIS) Members provide broad expertise and input into IT Security Issues Graduate students Campus system administrators Faculty members Information Technology Services USC PeopleSoft Resource Group Office of the Registrars Housing Internal Audit Campus Police General Counsel Research Services Human Resources Communications and Public Affairs Terms of reference include: Responsibility for drafting and recommending IT security policies Responsibility for IT security awareness on campus started “ Computer Wellness Campaign” last September

Western Policies Provides structure Establishes campus wide practices and understanding Clarifies roles Assigns responsibility Empowers Information Technology Services, Unit Heads and Systems Administrators to protect the network integrity and security

Excerpts - Computing Resources Policy Information Technology Services shall be responsible for establishing, maintaining, implementing, administering, and interpreting organization-wide information systems security standards, guidelines, and procedures. Unit Heads, including Directors, are responsible for ensuring that security policy is implemented within the unit. System Administrators will work closely with ITS and ensure that systems they administer are operated in accordance with all applicable Information Security Standards and Policies Any person, group, or custodian accessing University information must recognize the responsibility to preserve the security and confidentiality of this information.

Computer Wellness Campaign Website http://wellness.uwo.ca Posters in Middlesex College, USC, Office of the Registrar, Libraries, Genlabs, all Food Services Areas & Residences Poster set as background in the Genlabs & the Sun Rays in the Western Libraries. Film Western airing the poster at the beginning of each film. CHRW Audiozine and advertisements Mass Mailer sent to all Western Students, Staff & Faculty Articles in the Western News and Gazette Links off http://www.uwo.ca

Western’s Layered Security

How can you protect Western?

How can you protect Western? Understand the policies and best practices Read the Security related policies and best practices at http://www.uwo.ca/univsec/mapp/ MAPP 1.13 Code of Behaviour for use of Computing Resources MAPP 1.20 Computing Resources Security MAPP 1.21 Wireless Networking Policy Visit the Computer Wellness Site at http://wellness.uwo.ca for more information

How can you protect Western? Ensure your system is protected Your system should always be protected with the latest anti-virus software and security patches. Think of it as a seatbelt and…. Buckle up! Know who is responsible and can help you if the system is not protected or has been compromised (or locked off the network)

How can you protect Western? Don’t download freeware at work It may not be as ‘free’ as you think. Spyware, malware, trojans & keystroke loggers are often hidden within ‘freeware’. Remember Don’t take gifts from strangers! If you need additional software installed, contact your Systems Administrator for assistance

How can you protect Western? Don’t surf suspicious websites Limit your web surfing to known University or commercial websites. Always X out, don’t click ‘OK’ or ‘NO’ or ‘unsubscribe’ Practice safe and responsible surfing

How can you protect Western? Use strong passwords Keep your passwords in a secure place Avoid common words: hackers can crack dictionary passwords Passwords are like underwear They protect privacy They should never be shared The longer, the better

How can you protect Western? Protect the data you use Think before storing, publishing or sharing data Is the data sensitive? Does it need to be portable? Who should see it? How have you protected it so that only those that should see it have access? Mobile data on laptops and USB keys is at risk - Leave it, Lose it.

How can you protect YOUR information? Recognize phishing and don’t fall for it Phishing can come through emails or web sites Phishers are getting better, scams are getting trickier to detect Be suspicious when personal or private information is involved and Don’t Get Phished When in doubt, ask

And let’s not forget your Home Computer!

It’s the Internet - Expect the unexpected What’s next? It’s the Internet - Expect the unexpected

Thank you! Arni Stinnissen - Arni.Stinnissen@jus.gov.on.ca Debbie Jones - debbie@uwo.ca Questions? computer.wellness@uwo.ca http://wellness.uwo.ca

Discuss what stood out for you The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information Table Dialogue: Take 15 minutes to Discuss what stood out for you Formulate a question to pose to Arni or Debbie Thank you to Arni and Debbie: With your table facilitators, please Take 15 minutes to Discuss what stood out for you Formulate a question to pose to Arni or Debbie 1:35 Facilitate the Q & A session, handing the microphone to Arni or Deb as appropriate. 1:50 Hand over to Dr. Davenport for his reflections (see next slide and Dr. Davenport’s notes) At 1:57, thank Dr. Davenport and continue with the last 3 slides.

(President and ViceChancellor) The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information Paul Davenport (President and ViceChancellor) - Reflections… Thank you, Gitta: (7 minutes) What stood out for me as I listened… Before I hand back to Gitta to close the meeting, I’d like to take this opportunity to thank ITS, the Working Group on Information Security, the Computer Wellness Campaign Group, and you as leaders for the effort to keep Western’s vital information and intellectual property safe. In particular, I’d like to thank Ellen Smout of ITS, who has been central to this work and has contributed behind the scenes on the presentations we had today. Ellen is unable to be here today as planned because her father, Dr. Marvin Smout, passed away on March 11; the family was holding its memorial reception at Museum London over the lunch hour today. Dr. Smout was a memorable figure in the Western community and in the London community. He received his M.D. from Western and taught here from 1962-1991. He was Chief of Anatomic Pathology at Victoria Hospital for 25 years, and , in his time, taught pathology to over 2,400 Western students. We extend our condolences to Ellen and her family. (Hand back to Gitta)

The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information Inform staff Establish safeguards Approve data access Deal with security violations Communicate to HR, ITS, etc. any staff changes that affect access Create a contact list of people responsible for all computers in your area Identify to ITS your technical contact (System Administrator) and a supervisory contact

The Invisible Risk: Leaders’ Role in Protecting Western’s Electronic Information …Next Steps To Support Your Leadership Role: See your “Meeting in a Bag” kit -- some resources for ensuring your unit teams know about the risks, ways to minimize them, and their accountabilities. Thank you for your leadership in keeping Western’s data, Western’s work, and Western’s people safe!

Thank You… Computer Wellness Committee Elgin Austen Jim Dunkin Wendy Kennedy Scott May Geoff Pimlatt Peggy Roffey Ellen Smout

Thank you… Forum Facilitators: Carol Abraham Stephanie Hayne Jennifer Ashenden Brian Jeffs Krys Chelchowski Ruta Lawrence Chris Costello Scott May Debra Dawson Graham Newbigging Frank DeGurse Peggy Roffey Andrew Fuller Malcolm Ruddock Paul Greenwood Nancy Stewart Lori Gribbon Glen Tigert Nancy Griffiths Peggy Wakabayashi

Next Leaders’ Forum April 27, 2006, 12:00-2:00 p.m Great Hall