Module #1: Introduction to Cyber Security

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Data Storage, Backup, and Security Prepared by: Christopher Eaker, University of Tennessee, Knoxville CC BY-NC.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Protection of personal mobile computer devices Information Security Isaac Fernandes, mci12009 Sofia Nunes, mci12014.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
The Office of Information Technology Information Security Administrator Kenneth Pierce, Vice Provost for IT and Chief Information Officer.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Microsoft Technology Associate
ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 6
Workplace Security for Employees. © Business & Legal Reports, Inc Session Objectives You will be able to: Understand the company’s security policy.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Information Security Information Technology and Computing Services Information Technology and Computing Services
100 % UPTIME SLAs 27 | 8 DATA CLOUD CENTERSPODS SSAE-16, SOC 2 TYPE II, PCI-DSS, HIPAA, HITECH AT101, NIST , SAFE HARBOR COMPLIANT POWER INFRASTRUCTURE.
eScan Total Security Suite with Cloud Security
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Understanding Security Layers
Module #2: What Sensitive Data is and how to handle it Module 2 is approximately 3min and 30 sec.
HIPAA COMPLIANCE WITH DELL
Computer Engineering II Computer and Network Security Rabie A. Ramadan
1.1 System Performance Security Module 1 Version 5.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
1 SECURITY & HIPAA DATA ENSURE INC. 798 PARK AVE. NW SUITE 204 NORTON, VA (276) D E.
Chapter 6 of the Executive Guide manual Technology.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Introduction to Computer Security PA Turnpike Commission.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Information Security What is Information Security?
Desktop Security: Making Sure Your Office Environment is Secure.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Communication in Administration (Security)
KTAC Security Task Force Superintendents Update April 23, 2015.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Information Management System Ali Saeed Khan 29 th April, 2016.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Module 5: Designing Physical Security for Network Resources
Slide Template for Module 4 Data Storage, Backup, and Security
East Carolina University
Data and database administration
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
CYB 110 Competitive Success/snaptutorial.com
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
Data Protection Scenarios
Information Security and Travel-related Security
12 STEPS TO A GDPR AWARE NETWORK
Part 3.
Unit 4 IT Security Kerris Davies.
Lorenzo Biasiolo 3°AI INFORMATION SECURITY.
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
WELCOME AOI Tech Solutions - Network Security.
The Secure Contingency Plan
Presentation transcript:

Module #1: Introduction to Cyber Security Estimated time for Module 1 is 3 minutes

What is Cyber Security? Cyber or Computer Security is the protection of computing systems and the data that these systems store or access. These systems include: PC’s Laptops SmartPhones Mobile Devices Printers

Why is Computer Security Important? Computer Security allows the City of Albuquerque to carry out its mission by: Enabling staff to carry out their jobs, Decreases the threat of current and future vulnerabilities Supporting critical business processes Protecting personal and sensitive information

Why do I need to know about Cyber Security? It is estimated that 10% of security safeguards are technical in nature. Firewalls and Intrusion Detection devices are a few devices that can help prevent approximately 10% of security threats. The additional 90% of safeguards rely on each of us. By understanding and adhering to these safeguards, we can reduce or eliminate most cyber security threats. Example: Locking your car doors is the 10%. Making sure nothing of value is left on the seat, windows are rolled up and parking in a safe area account for the remaining 90%.

The CIA of Cyber Security There are many reasons why you should protect the information you use on your computer. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy (information integrity) Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)

What does this mean to me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is Everyone’s responsibility

Questions Module 1: Introduction to Cyber Security Question #1: Computer Security allows us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes Protect personal and sensitive information All of the above

Questions Module 1: Introduction to Cyber Security Question #1: Computer Security allows us to: The Answer is E, All of the above Computer Security allow us to: A. Enable staff to carry out their jobs, B. Decrease the threat of current and future vulnerabilities C. Support critical business processes Protect personal and sensitive information All of the above

Questions Module 1: Introduction to Cyber Security Question #2: The Integrity of information means: A. Ensuring that your information remains confidential and only those who should access that information, can Knowing that no one has been able to change your information, so you can depend on its accuracy. Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)

Questions Module 1: Introduction to Cyber Security The answer is B. Knowing that your information has not been changed. Confidential: Ensuring that your information remains confidential and only those who should access that information, can Integrity: Knowing that no one has been able to change your information, so you can depend on its accuracy. Availability: Making sure that your information is available when you need it (by making back-up copies and, if appropriate, storing the back-up copies off-site)

This concludes Module 1: Introduction to Cyber Security Continue on to module 2: Sensitive Data Module 2 will provide information on Personal Identifiable Information or PII and best practices in protecting this data from theft.