Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme.

Slides:



Advertisements
Similar presentations
Secure and Web Browsing Sébastien Dellabella – Computer Security Team.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Department of Education Policy 311 Acceptable Use of School Computers.
Woodland Hills School District Computer Network Acceptable Use Policy.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Breaking Trust On The Internet
Johnson Logistics Solutions Office of Systems and Information Technology.
Uintah School District Acceptable Use for Computer and Network Access.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Threats to I.T Internet security By Cameron Mundy.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Aaron Cauchi Nurse Informatics
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Acceptable Use Policy.  The District system includes:  A network of computers that serves all the schools  Saved files on a server for student work.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ICT AND BUSINESS AND SOCIETY
1 CERN’s Computer Security Challenges Denise Heagerty CERN Computer Security Officer Openlab Security Workshop, 27 Apr 2004.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Cyber Security Awareness Why people are of N o 1 importance… CERN Computer Security Team (2009) L. Cons, S. Lopienski, S. Lüders, D. Myers “Protecting.
Operational Circular No 5 Use of CERN Computing Facilities.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Problems to Overcome Implementation Issues at CERN Dr. Stefan Lüders (CERN Computer Security Officer) (CS) 2 /HEP Workshop, Kobe (Japan) October 11th 2009.
Randall E. Jackson ED 505 Dr. Ray  Netiquette is essentially manners for the internet. It is rules for how you should behave online.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cyber Security Awareness Academic Freedom vs. Operations vs. Security CERN Computer Security Team (2010) S. Lopienski, S. Lüders, R. Mollon, R. Wartel.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Woodland Hills School District Computer Network Acceptable Use Policy.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
3 rd Control System Cyber-Security Workshop Exchanging ideas on HEP security Dr. Stefan Lüders (CERN Computer Security Officer) 3 rd (CS) 2 /HEP Workshop,
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Cyber Security Awareness Academic Freedom vs. Operations vs. Security CERN Computer Security Team (2010) S. Lopienski, S. Lüders, R. Mollon, R. Wartel.
Dr. Stefan Lüders CERN Computer Security Officer Sign into CERN: CERN IT Services for You!
Technical Implementation: Security Risks
ISMS Information Security Management System
Learn how to protect yourself against common attacks
IT Security  .
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Cyber Security Awareness
Acceptable Use Policy.
BCT 2.00 Analyze Technology Issues
Computer Security.
Social Issues in Computing
Social Issues in Computing
Unit 4 IT Security Kerris Davies.
Woodland Hills School District
Presentation transcript:

Use of CERN’s Computing Facilities Why is security important? What are the rules? HR Induction Programme

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 2 Hacked oscilloscope (running Win XP SP2) Security risks are everywhere !!! Confidential data unprotected Passwords findable on Google: What about yours?

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 3 Be Vigilant & Stay Alert !!! addresses can easily be faked ! Stop “Phishing” attacks: No legitimate person will EVER ask for your credentials ! Do not trust your web browser !

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 4 Responsibility Security is a hierarchical responsibility and that means YOU ARE ALSO RESPONSIBLE !

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 5 Operational Circular N o 5 defines the rules for the use of CERN’s computing facilities.  You should read and understand OC5  You are obliged to sign it electronically  You are obliged to follow the rules! Operational Circular N o 5

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 6 User Responsibilities Protect against unauthorised access to systems and accounts ► passwords must not be divulged or easily guessable ► protect access to unattended equipment Report any unauthorised computer access ► ► Respect confidentiality and copyrights ► illegal or pirated data (software, music, video, etc) is not permitted Personal use remains within defined rules ► rules for personal use are defined in annex of OC5

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 7 Service Rules users must not: ► send mail bombs, SPAM, chain letters or offensive s ► forge or news articles PC users must: ► allow virus checking and other service management software to run on their PC ► act immediately to remove viruses, worms, backdoors and other applications Network users must: ► collaborate to investigate and prevent reoccurrence of problems detrimental to CERN’s network ► not make unauthorised changes to CERN’s network infrastructure File users must: ► protect their data from unauthorised access (correct ACLs) ► respect copyright, license and other agreements

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 8 Rules for Personal Use Personal use is tolerated or allowed provided: ► frequency and duration is limited and minimal resources used ► activity is not illegal, political, commercial, inappropriate, offensive or detrimental to official duties Tolerated: ► personal ► personal browsing of web pages and news groups ► Skype with conditions NOT permitted: ► consultation of pornographic web sites ► installation and/or use of non-CERN software, such as peer- to-peer applications (e.g. KaZaA), IRC, etc. Restrictions are documented at

Dr. Stefan Lüders (CERN IT/CO) ― DESY ― 20. Februar 2007 — “Induction: Computing Rules” — slide 9 Further Information Operational Circular No 5 and its subsidiary service rules are available at: Computer Security information is available at: Questions can be sent to: