James Page Information Security. Levels of Data  Level 3  Publicly available data  Level 2  University Sensitive data  Student Records  Employee.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Secure Your Store Understand the measures used in securing a retail store.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Proper Pager Use. FAQs What do I do if my pager battery is low or expired? What do I do if my pager is broken or malfunctioning?What do I do if my pager.
Property Theft FY 2014 July - May Reported Thefts Unfounded Actual UGA as Victim Total Loss $321,058.
Go to At the bottom of the page you will find the link to access HALOS Click to Access HALOS.
KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Saturday, 09 September 2006 ©RSH Number Prime Numbers and Prime factors.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
Remote On-line Backup Service. How safe is your business data?
Internet Security and Identity Theft Brad Weaver January 17, 2007.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Instructions for people experiencing problems accessing secure pages on the Finance website using their unipass.
Brooke Banks Information Security. Security is your business.
PERSONAL RECORDS.  What is Personal Identification?  Do you have any forms of Personal Identification? Is so, What?  When would you need Personal Identification?
Difficult Employees. Examples of poor performance?  Habitual lateness/absence  Unfair & deceptive tactics  Insubordination  Breaking policy  Theft.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
LYDIA MARTIN SARAH MCALLISTER STEPHANIE SEDMAK TYPES OF BUSINESS RISKS.
Internet safety By Lydia Snowden.
TRACs Security Awareness FY2009 Office of Information Technology Security 1.
Securing Information in the Higher Education Office.
Emergency Records Organizer. Purpose of Keeping Emergency Records Record information that will be needed in one of the following situations: You or a.
General Awareness Training
University of Miami Police Department www.miami.edu/police.
Chapter 13 Security Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives State the major responsibility.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
1 Unit 6 – Various Required Reporting. Unit 6 Various Required Reporting Goals: What is reportable in PEMS Escalation / actionable report vs. Escalation.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
Rapid Security Risk Analysis Farrokh Alemi, Ph.D. Georgetown University.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Computer Viruses Standard A-4 (Safety Unit). Need to Know 1.Computer Crimes 2.Types of Computer Crimes 3.Computer Virus 4.Types of Infections 5.How computer.
Analyzing Technology Issues Unit 2.00 Computer Basics Objectives 2.01 & 2.01 PowerPoint Part A.
Course # Unit 6 - Various Required Reporting.
Data Breach: How to Get Your Campus on the Front Page of the Chronicle?
Data Security.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES 1 The Technical Services Stuff in IT Services A brief tour of the technical and service offering plethora.
Desktop Security: Making Sure Your Office Environment is Secure.
Incident Security & Confidentiality Integrity Availability.
Hospitality Operations Objective 3.04 Security. Objective Security  State the major responsibility of the Security Department The protection of.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
H UMAN R ISKS By: Rachel, Melika, & Mellisa. H UMAN R ISKS Risks caused by human mistakes or dishonesty, or other risks that can be controlled by humans.
TOP 10 DHS IT SECURITY & PRIVACY BEST PRACTICES #10 Contact The Office of Systems & Technology for appropriate ways to proceed if you need access to.
Loss caused by customer theft, fraudulent payment, or nonpayment is a human risk.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Welcome to the DDN Campus Parent Portal Hanson School District School District.
Information Security Awareness Training
An Introduction to Phishing and Viruses
Purpose Review and discuss the IT Policy and Procedure for Incident Handling and Response. Topics Incident Management Policy Incident Response Procedure.
East Carolina University
how to prevent them from being successful
INFORMATION TECHNOLOGY
University of Miami Police Department
Spyware.
Data Protection Scenarios
Join In Be Secure Presentation
BCT 2.00 Analyze Technology Issues
Computers Vocabulary.
Security of Data  
Information Security Casebook
Mohammad Alauthman Computer Security Mohammad Alauthman
Part 1 Security Action Plan Template.
Mouse Skills Moving a mouse on flat surface makes the pointer on the screen to move in the same direction as the mouse itself. To make the selection, the.
Presentation transcript:

James Page Information Security

Levels of Data  Level 3  Publicly available data  Level 2  University Sensitive data  Student Records  Employee Records  Level 1  Social Security Numbers  Credit Card Numbers  Medical/Psychological records  Passwords or credentials

Event and Incident Response  Threats to personal safety  University Police or 911  Security event or incident  ITSS Help Desk or  Information Security Office or    Example security events  Systems working slower then usual;  Files disappear or their properties suddenly change;  Mouse cursor moves by itself;  Theft or loss of computing equipment;  Theft or loss of hardcopies with level 1 or 2 data.

Contact Us  James Page   