EITS Update BAAF 10.17.12. / 203 4 5 Major Threat Types Malicious Software Human Error Technology Hacks Social Engineering / 206.

Slides:



Advertisements
Similar presentations
Laptop Security in the current IT world W3 group.
Advertisements

1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Network Detective Prepared For: ABC Corp Prepared By: Roger G. Best.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Factors to be taken into account when designing ICT Security Policies
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Banner 7 Upgrade General Training San Mateo Banner Facts… SMCCD started with Banner 1 in 1995 Introduced WebSMART in 2001 Can support over 300 simultaneous.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
SEC835 Database and Web application security Information Security Architecture.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
Mobile Device Management Central Management of Wintel Laptop Software and Hardware in a Secure Environment.
An Update: UGA’s New Student Information System. Project Overview ConnectUGA is the project name for the Banner software implementation of the new student.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
The University of Georgia. /1002 Ensure that the University is appropriately managing risk to information assets and information services.
Office of the CIO EITS The University of Georgia.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Module 6: Designing Security for Network Hosts
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Introduction.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Statistics Canada1 Statistics Canada’s strategic approach to IT Security OECD Conference on IT Security Paris, April 19th and 20th, 2001 Dave Venables.
Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
Frontline Enterprise Security
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
Internet safety By Suman Nazir
Introduction to RIA InsourceExpress Software ACCT6351.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2003 McGraw-Hill Australia Pty Ltd, PPTs t/a Accounting Information & Reporting Systems by A. Aseervatham and D. Anandarajah. Slides prepared by Kaye.
Windows Administration How to protect your computer.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
An Update: UGA’s New Student Information System. Project Overview ConnectUGA is the project name for the Banner software implementation of the new student.
THE UNIVERSITY OF GEORGIA Office of the Chief Information Officer Enterprise Information Technology Services Identity Management Brief Presentation to.
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Managing Windows Security
East Carolina University
WLAN(stands for wireless LANs)
Handling Personal Data
Student and Financial Aid Systems Transformation Project
National Cyber Security Month
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Homeland Security: Computer Protection
MIE Conference Session: Telling your Financial Story
Answer the questions to reveal the blocks and guess the picture.
Year 10 ICT ECDL/ICDL IT Security.
How to Fix Windows 10 Update Error 0x ?.
How to allow USB Flash Drive Scan in Avast Antivirus.
McAfee Issue Updating the antivirus with the most recent version accessible Activate security software suite.
GCED Exam Braindumps
Unit 1.6 Systems security Lesson 3
Security Awareness Training: System Owners
Prepared By : Binay Tiwari
12 STEPS TO A GDPR AWARE NETWORK
Implementing Client Security on Windows 2000 and Windows XP Level 150
Unit 4 IT Security Kerris Davies.
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
What is Phishing? Pronounced “Fishing”
Troubleshoot AOL Desktop Gold Problems Get services.com.
Online Safety; Privacy and Sharing
Online Safety; Privacy and Sharing
Presentation transcript:

EITS Update BAAF

/ 203

4

5

Major Threat Types Malicious Software Human Error Technology Hacks Social Engineering / 206

What is UGA doing? Securing Mainframe Transfers SSN Distributed Systems Removal – eCheck and WebDFS Securing Administrative Information Data Loss Prevention Banner / 207

Timeline / Securing Administrative Information Student and Financial Aid Systems Transformation Project- ConnectUGA Secure Mainframe Transfers Finished SSN Distributed Systems Removal Data Loss Prevention

What do you need to do? Be Aware. Be Thoughtful. Be Proactive Remove SSNs from your desktop Limit handling SSNs as much as possible Ensure your passwords are strong Ensure passwords and security questions do not contain commonly known or acquired information Report any potential security issues to Office of Information Security / 209