Laptop Security in the current IT world W3 group.

Slides:



Advertisements
Similar presentations
© , Actuate Corporation Engineer Orientation IT Facility.
Advertisements

Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
HIPAA Security.
Database Security Policies and Procedures and Implementation for the Disaster Management Communication System Presented By: Radostina Georgieva Master.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
McAfee Files & Folder Encryption As observed at WFO GLD All USB Devices will be encrypted. (Unless a waiver has been approved or lager than 64g.) Use of.
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
K eep I t C onfidential Prepared by: Security Architecture Collaboration Team.
7 Effective Habits when using the Internet Philip O’Kane 1.
For further information computersecurity.wlu.ca
Mr C Johnston ICT Teacher
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Back Up and Recovery Sue Kayton February 2013.
©2011 Kingston Technology Corporation. All rights reserved. All trademarks and registered trademarks are the property of their respective owners. Best.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
New Data Regulation Law 201 CMR TJX Video.
Information Security Information Technology and Computing Services Information Technology and Computing Services
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Information Security Principles Supervised By Ms. Eman El Ajramy Presented by Moamer.T.Sawafiri Steps To Secure Your Data.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
Data Security.
1 Introduction to Security Chapter 11 Information Technology (IT) Security.
I T Essentials I Chapter 9 JEOPARDY.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Desktop Security After completing this lesson, you should be able to do the following: Describe the different types of software and hardware attacks List.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
1.1 System Performance Security Module 1 Version 5.
Anderson School of Management University of New Mexico.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Getting a Grip on Mobile Devices. Last year thousands of travellers left personal items in London taxi cabs.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Data Security.
Advanced file encryption Copyright © 2002 Deerfield.com, All Rights Reserved.
Computer Security By Duncan Hall.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Product Training 1 JetFlash Software Application.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
8 – Protecting Data and Security
Information Protection & Cyber Security
Business Risks of Insecure Networks
 itunes is a kind of media player, media library and a online radio broadcaster and it is developed by the Apple inc.  Through the itunes user can.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Robert Leonard Information Security Manager Hamilton
Malware, Phishing and Network Policies
Back Up and Recovery Sue Kayton October 2015.
12 STEPS TO A GDPR AWARE NETWORK
Solutions to Secure File Deletion
Presentation transcript:

Laptop Security in the current IT world W3 group

Motivation Companies provide laptops to its employees – Work from home – Work during travel As of 2010 about half of adults go online with a laptop ( – Increasing every year – Use work laptops for personal use at home, on travel Usage guidelines and restrictions – Strict at work, not so strict when outside the work domain – Not clear what to do in the event of a security breach

Motivation (contd) Malicious users – A begrudged employee – Rival companies – Countries that access information to gain competitive advantage in world markets Malicious access to laptops – Physical (Stolen laptops, copy data using a USB drive etc.) – Online (Trojan horses, viruses etc.)

Confidentiality Lots of confidential information – Source code – Vital financial information (stock/trade secrets etc.) – Personal Identifiable Information (SSN, DOB etc.) – s (downloaded by client programs like MS Outlook) – Data in re-used laptops Protecting confidential information – Sign NDA – Encryption ( s, data, encrypted folders) – Dont allow USB drives – Guidelines on how to handle sensitive data – Information on what to do in case of a breach – Wipe out hard disks of laptops returned to general employee pool

Authenticity Different ways to authenticate access to laptops – Username/passwords – BIOS passwords – Hard disk passwords – Screen save passwords – Usage of laptop locks

Integrity As important as confidentiality – A malicious user can access data in a laptop and change it A lot of software downloaded from the Internet – Software for office use (Adobe reader, Flash player, Updates etc. ) – Personal use (ITunes, Sticky notes etc. ) – Difficult to distinguish between malicious and authentic sites Ways to guarantee integrity – MD5 checksums for software recommended for install – Allow only admins to install software

Availability Employee Productivity – Directly affected if laptop is not available Availability of critical servers – A malicious user could use botnets to launch DOS attacks on internal critical resources

Conclusion With such prevalent usage of laptops, laptop security is of paramount importance Often not completely thought through At the minimum a disaster recovery plan should be in place – Identify and prioritize threats – Contact information in case of disasters (security breaches) – Details on how to get back the data and recover – Employee education