Security Training USAID 2000. Information Security.

Slides:



Advertisements
Similar presentations
Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Advertisements

Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Computer and Physical Security Recommendations. Assure that computers and work locations are secured when work areas are not staffed.  Log-off or lock.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
CSP Annual Security Training Miranda Gregory, CSP Analyst Carroll County Department of Citizen Services.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Aaron Cauchi Nurse Informatics
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Viruses.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
©Holm Publications Security Awareness Presentation.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
CYBER CRIME.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Types of Electronic Infection
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
UNCLASSIFIED SECURITY IS A STATE OF MIND United States Agency For International Development M/IRM/ISS William R. Cleveland June.
INTERNET SAFETY FOR KIDS
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Operational Circular No 5 Use of CERN Computing Facilities.
What is Spam? d min.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
Cyber Safety Jamie Salazar.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Security Of Information Systems
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Things To Avoid: 1-Never your password to anyone.
Presentation transcript:

Security Training USAID 2000

Information Security

W H Y ?? u Two Reasons: –It’s a responsibility –It’s the law (Computer Security Act 1987)

Training Objectives u What is Computer Security u The Threats u What is your role as a user?

Computer Security u Definition Measures required to protect against: – unauthorized access (accidental or intentional) – malicious modification of data –destruction of data, networks and computer resources –or denial of service to process data.

Data Classifications lCLASSIFIED (CONFIDENTIAL, SECRET, TOP SECRET)  SENSITIVE BUT UNCLASSIFIED (TECHNICAL, PROPRIETARY, PROGRAM SPECIFIC) lUNCLASSIFIED

Computer Security u Confidentiality u Integrity u Availability

Workstation Protection (1) u Comply with the physical security requirements.

u Never leave your computer unattended while you are logged in –log off at the end of the day u Protect sensitive information –store it in a private area Workstation Protection (2)

Password Requirements –Passwords must be at least six characters (alphanumeric) e.g., I8NY2x Dog&Man3 –Passwords must be changed periodically USAID - Cairo requires every 12 weeks Treat Your Password Like A Toothbrush… Don’t Share It, and Change It Often!

Password Protection u NEVER disclose your password! u Personal passwords must remain private –Don’t let anyone else use it –Don’t write it down –Don’t type a password while others watch –Don’t record password on-line or it –Don’t use easily guessed words, like children’s names, spouse, pet, birthday and phone number

Virus Protection u Run antivirus programs on a regular basis. u Do not use any outside floppies/ disks on your system without running a virus scan first. Many viruses are introduced because virus scanning was not performed. u No illegal duplication of S/W rule - this reduces the spread of virus and avoids legal headaches u Do not boot from diskette if possible

Data and File Backups u Backup your important data u Verify your backups

Internet Security u Do not download and install programs from the Internet without consulting DMS –for example, screen savers, chatting programs u Do not remove the Security wallpaper. This is an Agency requirement u Do not pass on Chain Letters, rumors and jokes

What is the Mission doing to minimize Risk? u Server Protection u Workstation Protection u Firewalls u Backups u Training