Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Hart District Acceptable Use Policy Acceptable Use Policy.
Annual Security Refresher Briefing Note: All classified markings contained within this presentation are for training purposes.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Section Four: Employee and Visitor Access Controls Note: All classified markings contained within this presentation are for training purposes only.
Boyertown Area School District Acceptable Use Policy.
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Information Systems Security Officer
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
INTERNET and CODE OF CONDUCT
Security Policies Group 1 - Week 8 policy for use of technology.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Virtual Private Network
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
New Data Regulation Law 201 CMR TJX Video.
Section Eight: Communication Security (COMSEC) Note: All classified markings contained within this presentation are for.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Section Ten: Security Violations and Deviations Note: All classified markings contained within this presentation are for training purposes only.
Mobile Computing: Security Issue Group 4 Members: 黃昱翔 梁振堃 郭雅恬 劉俊宏 王雋為 王瓊儀 李晏榕 黃筱涵 許椀淇.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
CPS Acceptable Use Policy Day 2 – Technology Session.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
An Educational Computer Based Training Program CBTCBT.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
HQ Expectations of DOE Site IRBs Reporting Unanticipated Problems and Review/Approval of Projects that Use Personally Identifiable Information Libby White.
Section Five: Security Inspections and Reviews Note: All classified markings contained within this presentation are for training purposes only.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Computer & Network Security
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Information Systems Security
Information Security Training for People who Supervise Computer Users.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
Network Security & Accounting
Scott Charney Cybercrime and Risk Management PwC.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
Development of a Clean Room/Highly Restricted Zone June 12, 2012 Thomas Garrubba - CVS Caremark; Manager, Technical Assessments Group ©2011 The Shared.
CONTROLLING INFORMATION SYSTEMS
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
ITACS L.L.P. Policy And Procedures Group 1. Objective: To establish companywide policy with regards to personal device usage both on and off of the company.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
District Updates  1. Crisis Go App  2. Bullying Refresher  3. Social Media Policy  4. Teacher Web Pages.
BizSmart Lunch & Learn Webinar Information Security and Protecting your business With the increased risk of some sort of cyber- attack over the past few.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Access to Electronic Media Acceptable Use Policy August 8, 2016 Somerset Independent Schools.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Blackboard Security System
Crosby ISD Acceptable Use Policy Training
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Presentation transcript:

Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.

Protect {Company}, U.S. Government Sponsor, industry, and partner information from unauthorized disclosure Protect computer systems and networks from unauthorized access/compromise Maintain confidentiality, integrity and availability of information and systems Provide clear and concise direction to personnel regarding proper methods of protecting information and information systems Culpability for cyber security incidents now a key component of security clearance determination Information Systems Security Why do we need IT security procedures?

Malware/Spyware Incidents ‒Most entry points are from users unknowingly surfing compromised web sites Improper use of IT systems ‒Connecting personal media (i.e., thumb drives, cameras, cell phones, etc.) ‒Viewing/Creating Pornography ‒Visiting inappropriate web sites ‒Downloading/installing prohibited software Information Systems Security Common IT Security Incidents

Information Systems Security Acceptable Use of Information Systems {Company} systems are for official use in support of its mission ‒“ Occasional and limited” personal use is acceptable ‒All electronic information and communications are subject to monitoring ‒“No expectation of privacy” Personnel must – Access “authorized” systems only – Process {Company} data on {Company} systems only – Connect {Company} devices/media to {Company} systems only No connecting personal iPods, media players, cameras, disk drives or USB drives

Data Preservation ‒Intentional alteration or destruction of data, systems, or media is prohibited ‒System maintenance or upgrades acceptable ‒Anti-forensics software not authorized ‒Encryption keys must be made available Ethical and Professional Conduct ‒Offensive, harassing, obscene, or threatening communications ‒Violation of copyright laws ‒Visiting inappropriate Websites ‒Commercial or promotional activities prohibited ‒All software must be professional in nature and support {Company} business needs Violations will result in management review and possible disciplinary action to include termination Information Systems Security Acceptable Use of Information Systems

Information Systems Security Protecting Networks and Information Systems Access to {Company} networks and systems require a background investigation Direct dial-in to networked systems is not authorized (e.g., connecting a modem to your desktop) All users must Lock/Log out of system before leaving systems unattended Keep antivirus software current All external communications must go through the {Company} firewall Network bridging is prohibited ‒Network bridging can occur when a user has accessed the {Company} using one computer while still connected to another  Two network cards in use on a single machine (i.e. connections to the Local Area Network (LAN) and the External Network simultaneously)  Connecting to a wireless network while connected to the LAN via a wired connection  Using software products that enable remote access to/from {Company} computer systems and the Internet

Information Systems Security Classified Information Systems Classified information systems (IS) must be certified and accredited through the Security Department before use – Systems must be labeled with the highest classification level that can be processed on them All users of a classified IS must know: ‒The programs (contracts) authorized for processing ‒The highest level of classified information which can be processed ‒Users must protect their passwords for the systems at the same level as the system it is used for ‒Hard copy and media handling and marking procedures ‒The required notifications to be made prior to any hardware, software, location, or security-relevant configuration changes No classified processing on unclassified systems Timing is a critical factor if suspected or actual classified contamination occurs ‒Immediate reporting limits further distribution and costs

Remote access to classified systems is prohibited unless documented and approved Remote access to unclassified systems requirements (Tailor to your facility policy) ‒Department of Defense (DoD) Security clearance ‒{Company}-owned equipment only ‒Two-factor authentication ‒One-time passwords ‒Virtual Private Network ‒Personal Firewall Solution Information Systems Security Remote Access to Networks and Information Systems

Information Systems Security Disposition of Computers Decommissioned or unused equipment must be returned to Security Department to – Ensure system hard drives are Overwritten Degaussed Destroyed – Ensure no media is left in the systems

Information Systems Security Wireless Technology Wireless devices are prohibited in all areas processing classified data and must be disabled during classified discussions, briefings and presentations No wireless device usage within 10 ft “3-meters” of Secure Areas Any wireless device accessing {Company} networks or processing its information must be {Company}-owned Bluetooth may not be used at any time while at the facility ‒Exceptions: mice or pointers used to advance slides Personal cell phones are permitted in the unclassified areas of the facility with specified restrictions The introduction of wireless devices by external personnel and visitors is restricted Users should exercise professional behavior when using authorized wireless devices

Embedded cameras ‒Can be carried by employees and “cleared” visitors ‒Prohibited for Foreign Nationals ‒Camera functionality cannot be used on {Company} property Standalone cameras ‒{Company}-owned only ‒DoD Clearance required Personally owned ‒Prohibited from {Company} facilities Camera use within the {Company} is audited periodically by the Security Department Information Systems Security Camera Uses and Restrictions