9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
GHS Computer Technology Parent Information Night Apple Laptop One to One.
Presented by the San Diego Industrial CI Awareness Working Group, an Affiliate of the Industrial Security Awareness Council.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Welcome to the SPH Information Security Learning Module.
PC Security 101 Keeping your data safe. Security is a real concern Identity theft is a hot topic in the news. Data theft is a very real and serious issue.
SECURITY CHECK Protecting Your System and Yourself Source:
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
IT Security is Everyone’s Responsibility Presented by Hooman Moayyed IT Security Awareness Program Manager.
PC Security 101 Keeping your data and your computer safe.
Good Computer Security Practices Basic Security Awareness September 10, 2007 School of Nursing Office of Academic and Administrative Information Systems.
Critical Data Management Indiana University HR Summit April 24, 2014.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Beyond WiFi: Securing Your Mobile Devices Thomas Kuhn Information Technology Assistance Center (iTAC) Kansas State University.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
10 Essential Security Measures PA Turnpike Commission.
INTERNET SAFETY FOR STUDENTS
Information about the computer By Sophia and Christina C.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Securing Information in the Higher Education Office.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1 © 2006 Cisco Systems, Inc. All rights reserved. Catherine B. Nelson Foothill-De Anza College Security Awareness Catherine Blackadar Nelson Security Advisor.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
THIS IS With Hosts... Your On a Date Get Your Party On Virtual Awareness Campus Know How Hall Happenings.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
FINANCIAL MANAGEMENT 29 AUG 05 OC CARUSO. OVERVIEW BUDGETS CREDIT CARDS IDENTITY THEFT IMPORTANT FINANCIAL TOPICS FOR NEW COLLEGE STUDENTS.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Topic 5: Basic Security.
By: Asfa Khan and Huda Mukhtar
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
What are ____ 1 ______? Rules of behavior that you should follow when using computers and the Internet for the rest of your life Plank Jr. High – Tech.
Oswego School District 308 Internet Safety and Ethics Review Plank Jr. High – Tech 6 Mr. Brown.
Prepared by Haverford High School Students “Against All Odds”
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Digital & Internet Safety. Understanding your personal data Defining “Big Data” Protecting your data, computer & devices Avoiding identity theft.
Computer Security Keeping you and your computer safe in the digital world.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Staying Austin College
Chapter 3: IRS and FTC Data Security Rules
Information Security Awareness 101
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Welcome to the SPH Information Security Learning Module
Presentation transcript:

9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness

9/20/07 STLSecurity is Everyone's Responsibility 2 Your Responsibilities Guarding against compromises Storing confidential information Physical security Social engineering Wireless networking Internet and Lost or stolen equipment Unauthorized access to computers

9/20/07 STLSecurity is Everyone's Responsibility 3 Your Responsibilities Continued Passwords Sending confidential information –CIVIL CODE SECTION (Breach Law) Definition –FERPA Definition Traveling with District owned computing devices Resources

9/20/07 STLSecurity is Everyone's Responsibility 4 Beware of the Social Engineer! –Social engineering is still the #1 way to bypass security –Be suspicious if anybody asks you for: Your password Credit card numbers Your co-workers names or extensions Your salary Information about your projects If anybody calls claiming to represent management or to know a colleague

9/20/07 STLSecurity is Everyone's Responsibility 5 Privacy Takes Center Stage Privacy and identity theft is a hot issue Disclosure laws are in effect Phishing through phone calls and Education and vigilance are still the best ways to maintain privacy

9/20/07 STLSecurity is Everyone's Responsibility 6 Physical Security Every Computing Device should be locked to the work surface. Lock up Data Backup CDs, DVDs and USB/Key drives. Secure Areas at the District: –De Anza L7 Data Center; FH ADMIN Data Room –Mechanical and Telecommunication Closets –Admissions and Records –Human Resources –Business Services, etc. If someone needs access, especially a vendor, call ETS for access - Call Center x8324 Don’t prop open doors or let people in behind you. Challenge strangers - if you are uncomfortable with this, call campus police FH x7313, DA x5555 Escort all visitors all the time

9/20/07 STLSecurity is Everyone's Responsibility 7 Basic Desktop/Laptop Security Never turn off the Auto Virus checking or Auto Update for the Virus software. Never turn off the Operating System Auto Update. Screen Lock your system when you walk away from your desk Physically lock all computers (especially laptops) to your work surface with the locking cable that was purchased with your computer. Use a system password upon boot up. Shut down your computer when you leave. If you use sleep mode – make sure you set a password for ‘wakeup’. Keep track of portable devices especially USB Key Drives. Traveling with a laptop, lock in hotel room safe when away from the room or have in you line of sight at all times (Airport security ; Never send a laptop or computing device through checked luggage.) CONTACT ETS FOR ASSISTANCE ON ALL OF THE ABOVE: CALL CENTER: X8324,

9/20/07 STLSecurity is Everyone's Responsibility 8 Shared Resources Awareness Resource sharing can be dangerous if you don’t know your computer is set to share files. This means know your computer’s capabilities and use them cautiously: –If you must share a file only do it when needed, then turn it off. –Never set your computer to share its network connection with other devices using the built in wireless capability. The District Network is a shared resource –Knowing the proper use of a Hardwire network connection vs.. a Wireless connection –Why can’t I use wireless to access the ADMIN system? Be aware of copyright laws vs.. fair use when sharing and showing information collected from the Internet.

9/20/07 STLSecurity is Everyone's Responsibility 9 Account and Password Security Everyone has their own account – it’s your personal identity – don’t share it! Nobody is allowed to know your password except you and don’t write them down on a postit and stick it under your desk. Create Strong Passwords Change them often Use different passwords for work and home

9/20/07 STLSecurity is Everyone's Responsibility 10 Protecting The FHDA Network Do not put the college at risk by bad behavior on the Internet (downloading files which may contain malware or viruses) Do not post information on the Internet that may be confidential, illegal, or violate privacy laws (Its very easy to post something to your district webpage for a class) Do not download software that violates copyright laws Do not unplug District Owned computing devices from the network and connect personally owned machines. If you see it report it to ETS Do not bring in network hubs for extra ports – this can bring down networks, and be hard to track down

9/20/07 STLSecurity is Everyone's Responsibility 11 Review of the District’s Information Security Best Practices Guide Storing confidential information Ensuring the physical security of computers, data, and documents Using the Internet and Responding to lost / stolen equipment or unauthorized access to computers Using passwords

9/20/07 STLSecurity is Everyone's Responsibility 12 Best Practices continued Sending confidential information –1.CIVIL CODE SECTION (Breach Law) Definition –FERPA Definition - accessing at work and from offsite –mail.fhda.edu –meetingmaker.fhda.edu Resources

9/20/07 STLSecurity is Everyone's Responsibility 13 Questions? Call Center x8424