Information Security The Responsibility of Security Lies on The Shoulders of Each and Every User……. R. LaRocca 1997 Robert LaRocca - Director Information.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Introducing K12Planet.com What is K12Planet.com? Who can access it? Is it secure? What do I need to use it? Can I control the information I see?
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
University of Missouri System 1 Security – Defending your Customers from Themselves StateNets Annual Meeting February, 2004.
Protecting Our Personal Space Security in a Virtual World.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
INFORMATION SECURITY STUDENT GUIDE. There is only one true way to secure a computer. 1.Cut off all the cables, bury the computer in concrete 2.Put the.
PBA. Observations  Growth, projects, busy-ness –Doing an incredible amount of work  Great Quality of work  Concern about being perfect  Attitudes.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
Technology Solutions Conference School Security Technology Solutions Conference School Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Cyber crime & Security Prepared by : Rughani Zarana.
Module 14: Configuring Server Security Compliance
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Chapter 7 Networks and the Internet Networks Sharing resources among multiple computers (workstations) Local Area Networks Wide Area Networks.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Note1 (Admi1) Overview of administering security.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Woodland Hills School District Computer Network Acceptable Use Policy.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Joseph J. Malone Security for Seniors Joseph J. Malone
Trend Micro Consumer 2010 Easy. Fast. Smart.
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Critical Security Controls
Secure Software Confidentiality Integrity Data Security Authentication
Wireless Network Security
Teaching Internet Safety
MEASURE I CITIZEN’S OVERSIGHT COMMITTEE MEETING
BOMGAR REMOTE SUPPORT Karl Lankford
PBA.
ISMS Information Security Management System
Information Security Awareness
Intrusion Detection system
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Designing IIS Security (IIS – Internet Information Service)
In the attack index…what number is your Company?
Woodland Hills School District
Presentation transcript:

Information Security The Responsibility of Security Lies on The Shoulders of Each and Every User……. R. LaRocca 1997 Robert LaRocca - Director Information Technology Security Linda Mainord – Chief Technology Officer Joseph Moore – Chief Operations Officer

Topics for Discussion: Reasons Why Information Security is Critical to District Operations 1.Keep Kids Safe 2.Data Protection 3.Prevent Misuse of Resources 4.Prevent Interruption of Operations 5. What IT Security Has Accomplished 6.How We Are Addressing The Issues

Keep Kids Safe Parents trust us to keep their children safe during the hours they are in our care. This is simply a non-negotiable requirement that we have to meet.

Data Protection As schools strive to increase student achievement by collecting data about learning performance, the resulting data systems become increasingly tempting targets for illegal activity by those seeking to change or steal sensitive and restricted information. (Live password cracking demonstration)

Prevent Misuse of Resources Teachers, applications and educational resources are allocated to promote learning within and beyond school walls. But without security these resources can be easily highjacked and used for launching denial of service attacks, for promulgating viruses, personal business, and other inappropriate activity. The growing use of wireless connectivity makes this an even greater challenge.

Prevent Interruption of Operations If our technology systems are not functional, they are not processing teaching, learning, administration, or any other aspect of the educational process. Without continually enhancing the evolvement of security, the responsibility of maintaining systems operational will quickly overwhelm critical resources within our district.

Through Board Action and Approval We Have Accomplished: IPS – Intrusion Prevention Scanning –Live Demo –Our Network is attacked approximately 16,000 times a day Scanning –Removing Viruses and Spam From –100,000 s per week are sent to the district – (Phishing Demo) –60,000 are blocked as spam or unacceptable DeskTop Security – Patching, Service Packs, Removing Unauthorized Files, Asset Inventory, Application Deployment (Sample Hacking tool Report)

Internet Filtering – Lexicons, Abuse, Appeals Redundant Firewalls – Hot Failover Virus Protection – 700 Servers and 65,000 Desktops are Updated Daily Enterprise Backups – 176+ Locations, –All critical Applications = 37 Terabytes of data (37,000,000,000,000 TB) Web Caching – 60% of Schools are installed –Throughput speed has doubled, access time has been cut in half. Accomplishments (cont.)

How We Continue To Address The Issues Awareness Program –Monthly Security Web Articles –Posters –Bulletins –Site Visits –Security Week – Hack Me Contest – Student Security Video –Reward program – Students who discover vulnerabilities Token Security For Administrators ( Provide Sample ) Student IDs and Identity Mgmt– Accountability, Responsibility Centralization – Monitoring, Access, and Maintenance Auditing Critical Applications – Logging, Reporting Investing In Leading Edge Technology Strict Password Rules and Expirations BOARD SUPPORT!!!!