PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
P ASSWORD S ECURITY. I F SOMEONE HAS YOUR PASSWORD, EITHER FROM YOU GIVING IT OUT OR THEM FIGURING OUT, THEY COULD : 1.Send abusive or threatening .
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
10 Essential Security Measures PA Turnpike Commission.
Do you know how to keep yourself safe?
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Security Awareness Norfolk State University Policies.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
Mrs. Dennis South Media Specialist Mrs. Bakanas North & South Media Specialist Mrs. Martinez North Media Specialist Mrs. Kelley Media Assistant Miss VanArtsdalen.
ESCCO Data Security Training David Dixon September 2014.
1.1 System Performance Security Module 1 Version 5.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Privacy and Information Management ICT Guidelines.
Password Fundamentals. UMB-Dental School New Password Policy Passwords must be eight characters or longer. Password must contain characters from three.
Information Security Awareness Training. Why Information Security? Information is a valuable asset for all kinds of business More and more information.
Session 7 LBSC 690 Information Technology Security.
Technology Lab Rules, Procedures, Acceptable Use Policy Review Kindergarten-Second Grade This PowerPoint is meant to be used as a quick review! Students.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Information Systems Security
Topic 5: Basic Security.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
CSCE 201 Identification and Authentication Fall 2015.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Digital Footprints Cyberbullying Passwords The Digital Community Staying Safe Online
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Computer Security Sample security policy Dr Alexei Vernitski.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
JANELL LAYSER Training Manual. AWARENESS! Social Engineers are out there, and everyone should be prepared to deal with them! They can contact you by phone,
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Key words: Secure | Password | Character
Dove science academy Cyber Club
Information Security 101 Richard Davis, Rob Laltrello.
Staying Austin College
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Information Security Awareness 101
DOVE SCIENCE ACADEMY CYBER CLUB
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Epic Introduction Basics
Lesson 2: Epic Security Considerations
Lesson 2: Epic Security Considerations
Epic Introduction Basics
Chapter Goals Discuss the CIA triad
Handling Information Securely
Keeping Our Data Secure
Presentation transcript:

PHYSICAL ITSECURITY scope. 1.What is password security?. 2.Why can't I tell anyone my password? 3.What about writing my password down 4.Social engineering 5. Responsible Use: Ethics in Computer Usage 6.Guidelines for Strong Passwords 7.Laptop security & Firewalls

What is password security?. A password is a string of characters you give to verify that you're you when you log onto a computer system location. Identify and authenticate user,authorised,confidentiality,Intergrity and Non-deniability

Why can't I tell anyone my password Because you don't know where the information will go after it leaves your lips. Even if you only tell one other person, they could tell one other person, and so on, until your password is in the hands of a Cracker. Besides, why do you want to tell someone your password, anyway? You are not allowed to share your username with someone else, so there is no legitimate reason for anybody else to know your password.

What about writing my password down Writing your password on a post-it note and then sticking the note to your terminal is asking for trouble! In general, it is better to remember your password and not write it down anywhere. If you write your password down, make sure that you keep it safe

Social engineering Social engineering is the term used to describe crackers' attempts to get users to tell them about their passwords and other information about the system. Please be aware of the following points

Cont. No member of the system administration staff or other Computing Services staff will ever ask you to reveal your password or any other information about the system. Don't reveal such information to someone you don't know if they call asking for help with the system (ie pretending to be a new user). Report any suspicious questions that anyone asks to Security Services

Responsible Use: Ethics in Computer Usage The integrity of the systems must be respected. This means that users of systems will not divulge passwords, pins, private keys or similar elements to anyone else, and they will not exploit sessions left open or otherwise misappropriate or steal the "identity" of another user. Privacy of other users must not be intruded upon at any time.

Cont. Users must recognize that certain data are confidential and must limit their access to such data to uses in direct performance of their duties. The rules and regulations governing the use of facilities and equipment must be respected. Persons responsible for computing devices connected to the network will ensure that those devices are maintained in a secure state in accord with related policy.policy

Cont. No one shall obtain unauthorized access to other users' accounts and files. The intended use of all accounts, typically for organization, instruction and administrative purposes, must be respected. Commercial use is prohibited. Users shall become familiar with and abide by the guidelines for appropriate usage for the systems and networks that they access.

Guidelines for Strong Passwords mixed-case alphabetic (both lower- and upper-case letters); no alphabetic characters, e.g., digits and/or punctuation (the strongest passwords have both); 8 characters or more; a password that is easy to remember, so you don’t have to write it down; and

Cont a password that you can type quickly, without having to look at the keyboard (this makes it harder for someone to steal your password by watching over your shoulder).

A Simple Technique for Making a Strong But Easy-to-Remember Password Make up a unique sentence and use the first letter of each word in the sentence. Mix up the capitalization. Then throw in a digit and/or punctuation mark somewhere in the middle. For example: – A sentence unique to you might be: “My Volvo’s front muffler leaks too much” – This gives you the password MVfml,t3m

Cont Check your password against the other above guidelines, in case any are violated by accident. For example: – If the sentence had been “How older US educators sit” – This gives you the password HoUSes

Cont However: That password would not be strong enough, because that word happens to appear in dictionaries, and so would be much easier for an intruder to guess. You would definitely need to throw in some digits and/or punctuation to make such a password stronger, or try a new sentence altogether.

Laptop security When not in use keeps your laptop out of sight –store in a filing cabinet /other secure location. Use a docking station that will keep the laptop locked/use a cable lock (almost all laptops come equipped with a universal security slot that allows you to attach it to a heavy/unbreakable object.) Do not leave the laptop on the car seat of a parked car.

Cont….. When travelling use something other than a laptop bag to avoid an obvious target. Always take the laptop as hand luggage when travelling Do not let the laptop out of your sight through air port security check point. Always back up your file

Cont… Never leave a laptop computer with the sensitive information on it in the room unattended in the hotels, rather don’t take it on trip, but if you must take laptop use an encryption to protect your laptop (GITO may be contacted in this regard)/download all the information on the memory stick and keep it in your possession at all times.

Cont Official are encourage to limit taking home laptops, if need arise ensure that you take all necessary protection measures to secure it e.g. Locking the laptop in lockable safe/steel cabinet with reinforce rod. Tempering with tag fitted on laptops and other electronic equipments is forbidden

Firewalls