Information Security Information Technology and Computing Services Information Technology and Computing Services

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Primary Threats to Computer Security
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Viruses & Destructive Programs
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
eScan Total Security Suite with Cloud Security
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Security Technological Security Implementation and Privacy Protection.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
PLUG IT IN SIX Protecting Your Information Assets.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
INTERNET: The Good, The Bad and The Ugly
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
What is Spam? d min.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Computer Security Sample security policy Dr Alexei Vernitski.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Security Awareness Our security depends on you. What IT Security Protects ECU Campus network and everything attached to it Information –personal data.
3.1 Types of Servers.
TECHNOLOGY GUIDE THREE
3.1 Types of Servers.
Data Compromises: A Tax Practitioners “Nightmare”
3.1 Types of Servers.
Information Security 101 Richard Davis, Rob Laltrello.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Information Security Awareness
Presentation transcript:

Information Security Information Technology and Computing Services Information Technology and Computing Services

Security Fallacies  We have antivirus software, so we are secure  We have a firewall, so we are secure  The most serious threats come from the outside  I don’t care about security because I backup my data daily  Responsibility for security rests with IT Security Staff  We have antivirus software, so we are secure  We have a firewall, so we are secure  The most serious threats come from the outside  I don’t care about security because I backup my data daily  Responsibility for security rests with IT Security Staff

IT Security Components  Firewalls  Intrusion Detection Software  Antivirus Software  Updated OS and Applications  Continual education for staff and users  User cooperation and compliance  Most critical component  Most difficult to achieve  Firewalls  Intrusion Detection Software  Antivirus Software  Updated OS and Applications  Continual education for staff and users  User cooperation and compliance  Most critical component  Most difficult to achieve

Security Threats  Malware-viruses, worms, trojans, spyware  Security patches not applied  Hacking and network scanning  Social engineering  Chat and Instant Messaging software  Weak Passwords  Unawareness, carelessness  Malware-viruses, worms, trojans, spyware  Security patches not applied  Hacking and network scanning  Social engineering  Chat and Instant Messaging software  Weak Passwords  Unawareness, carelessness

What can you do?  Report Incidents (helpdesk)  Passwords  Backups  use and Security  Internet Security  Mobile Devices  Physical Security  Report Incidents (helpdesk)  Passwords  Backups  use and Security  Internet Security  Mobile Devices  Physical Security

 Use/Update antivirus software  Patch OS and Applications  Don’t use P2P file sharing software  Use software firewalls  Use your locks-door and computer  Don’t reveal your password to anybody  Don’t reveal confidential information  Use/Update antivirus software  Patch OS and Applications  Don’t use P2P file sharing software  Use software firewalls  Use your locks-door and computer  Don’t reveal your password to anybody  Don’t reveal confidential information

 Safe Computing  Add-ons to Internet browsers  Add-ons to clients  Aftermarket screensavers  Instant Messenger software  If you have been hacked change all your passwords  Safe Computing  Add-ons to Internet browsers  Add-ons to clients  Aftermarket screensavers  Instant Messenger software  If you have been hacked change all your passwords

Antivirus Policy  All networked machines must run Symantec AV software  Site license for Symantec AV  Free copy for every Windows and Macintosh computer  Free copy to load on home computers  Infected computers will be removed from the network until cleaned  All networked machines must run Symantec AV software  Site license for Symantec AV  Free copy for every Windows and Macintosh computer  Free copy to load on home computers  Infected computers will be removed from the network until cleaned

Mobile Security  Password protection  Encryption  Physical security  WiFi (wireless technologies)  All devices must be registered and authenticated using pirateID  Telecommuting (remote access)  Password protection  Encryption  Physical security  WiFi (wireless technologies)  All devices must be registered and authenticated using pirateID  Telecommuting (remote access)

Data Security  Data and You (protection of sensitive data)  Continuity of Operations / Disaster Recovery (ensure you have a plan)  Identity Theft / Phishing (don’t be a victim)  Physical Security  Data and You (protection of sensitive data)  Continuity of Operations / Disaster Recovery (ensure you have a plan)  Identity Theft / Phishing (don’t be a victim)  Physical Security

HIPAA Privacy & Security  All workforce members must be trained on HIPAA security issues if they access computers that contain EPHI. This training will help to assist you in protecting the confidentiality, security and integrity of EPHI. We all have certain responsibilities in implementing safeguards and actions to protect EPHI.  itcs/itsecurity/HIPAA-Privacy- Security.cfm  All workforce members must be trained on HIPAA security issues if they access computers that contain EPHI. This training will help to assist you in protecting the confidentiality, security and integrity of EPHI. We all have certain responsibilities in implementing safeguards and actions to protect EPHI.  itcs/itsecurity/HIPAA-Privacy- Security.cfm

FERPA  Avoid copying or downloading sensitive data from university systems  If there are no other alternatives then proper security measures must be taken  Avoid using SSN #’s in databases or applications as identifiers  Avoid sending sensitive data un-encrypted  Protect sensitive data  Avoid social engineers that try to get you to share information  Secure your workstations  ECU.cfm  Avoid copying or downloading sensitive data from university systems  If there are no other alternatives then proper security measures must be taken  Avoid using SSN #’s in databases or applications as identifiers  Avoid sending sensitive data un-encrypted  Protect sensitive data  Avoid social engineers that try to get you to share information  Secure your workstations  ECU.cfm

Ways to Protect HOME  WiFi Security  Symantec Antivirus  Backup!  Passwords  Bank and Credit Card Information  Firewall  OS Patches  Instant Messaging   Encryption  WiFi Security  Symantec Antivirus  Backup!  Passwords  Bank and Credit Card Information  Firewall  OS Patches  Instant Messaging   Encryption

Problems or Questions  Don’t call individual ITCS employees  Call IT Support  Single point contact  All calls forwarded to appropriate consultant  Open a Service Request   itcs/safetySecurity.cfm  Don’t call individual ITCS employees  Call IT Support  Single point contact  All calls forwarded to appropriate consultant  Open a Service Request   itcs/safetySecurity.cfm