Incident Security & E-Mail Confidentiality Integrity Availability.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Welcome to the SPH Information Security Learning Module.
Maintaining Security While Using Computers What all of Our Computer Users Need to Know.
USDA Rules of Behavior User Training
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
ILONA GAVRONSKA GROUP IL-41 INTERNATIONAL LAW DEPARTMENT KYIV NATIONAL ACADEMY OF SCIENCES OF UKRAINE KYIV UNIVERSITY OF LAW.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Sensitive Data Accessibility Financial Management College of Education Michigan State University.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Chapter 11 Security and Privacy: Computers and the Internet.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
HIPAA Privacy & Security Kay Carolin Barbara Ann Karmanos Cancer Center March 2009.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Computer Viruses. – A computer virus is an application program designed and written to destroy other programs. – It has the ability to:  Link itself.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Protecting Personal Information at Fermilab. Outline F Why must we protect personal information? F What is Protected Personally Identifiable Information.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
A New Way to Work For the New Century. As a result of several years’ work by you and your co-workers, we have...
Incident Security & Confidentiality Integrity Availability.
Introduction to Student Name Student Class.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Chapter 2 Securing Network Server and User Workstations.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
By: Asfa Khan and Huda Mukhtar
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
Red Flags Rule An Introduction County College of Morris
Welcome to the SPH Information Security Learning Module
Part 3.
Information Security Awareness
General Data Protection Regulation Q & A Session
Presentation transcript:

Incident Security & Confidentiality Integrity Availability

Objectives Logical Security Anti-Virus Software Usernames and Passwords Secure Screen Savers Physical Security Securing the work area Other Security Individual Computer User’s Statement Of Responsibility Issues

Logical Security

Anti-Virus Software Every computer must run an anti- virus software package with virus definition files being no more than 7 days old Configured to download and update automatically unless otherwise configured by a CTSP Incident personnel may not unload or disable anti-virus software All portable media must be scanned before use

Anti-Virus Software User responsibilities Never open file attachments from unknown, suspicious, or untrustworthy source Delete spam and junk Never download files from untrustworthy sources Do not install software without first contacting the incident CTSP Should a virus be detected, disconnect computer from the network and immediately notify a CTSP

Usernames and Passwords Do not share passwords Password complexity enabled 8 characters with at least 1 uppercase, 1 lowercase, 1 number and 1 punctuation One logon per ID

Secure Screen Saver All computers must have a locking password protected screen saver enabled Timeout is 15 minutes Users will logout of shared machines when stepping away for long periods of time

System Settings Login Banner Government owned equipment will display a standard or Agency specific banner at login Leased computers will display a standard banner:

System Settings “You are about to access a computer that is owned or leased by the United States government that is intended for authorized use and users only. You should have no expectation of privacy in your use of this network. Use of this network constitutes consent to monitoring, retrieval, and disclosure of any information stored within the network for any purpose including criminal prosecution.”

Data Backups: Incident Data Incident CTSP’s are responsible for backing up data residing on all servers Ultimately, your data is your responsibility to secure Back it up - Lock it up. All media that contains backed up data must be secured.

Data Backups: I-Suite Under no circumstances shall I-Suite backups remain in the possession of any individual for “historical purposes” Database and data backups (not repository or documentation box copies) will be deleted and destroyed at the end of an incident

Data Security: Access Control Users can expect access to be limited to the data that is relevant to their position Additional security measures shall be provided for sensitive data Do not distribute data (files and photos) to individuals. Information generated on a fire belongs to the hosting agency. Have management approval for all users accessing the Incident network

Data Security: PII All Federal agencies require employees to take awareness training in dealing with Personally Identifiable Information (PII) This training emphasizes the importance of protecting PII data

Data Security: PII Incident Management Teams collect PII data from resources at Check-in. What is considered PII? Full name Telephone number Street address address Vehicle registration plate number Driver's license number Face, fingerprints, or handwriting Credit card numbers

Data Security: PII What is not considered PII? First or last name, if common Country, state, or city of residence Age, especially if non-specific Gender or race Name of the school attending Name of employer Grades, salary, or job position Criminal record Non-PII data does not imply non- private information

Data Security: Scrubbing Deleted files are not erased Scrubbing is the process of writing random characters over the entire hard drive All leased computers when being returned must be scrubbed Free space (as opposed to whole disk) scrubbers are acceptable

Physical Security

Securing the Work Area Equipment containing sensitive data will be secured at all times Pay special attention to high traffic areas Common areas in leased facilities should not be considered secure Provide specific security measures for equipment during non-business hours

Other Security Procedures

Individual Security Responsibilities Individual Computer User’s Statement of Responsibility Report the loss or theft of data and equipment immediately: Inform the C&G and Security Inform the administrative agency Inform the agency that owned or rented if the loss was equipment Provide for continuity of operations Document all actions

Issues

Legally all for the Interior needs to be backed up indefinitely due to the Cobell Lawsuit ( Other Agencies also have backup requirements for Using Yahoo, HotMail, Gmail, or other free web based solutions does not meet this requirement

Issues Use of the Dispatch Messaging System (DMS) meets the needs of the court DMS is an system that is used by all Dispatch offices All sent through DMS is archived DMS is available to all Area Command Teams and Incident Management Teams

Issues For example, the Northern Rockies Teams: Type 1 Team Type 2 Team

Issues All Type 1 & 2 Teams already have these accounts Some Area Command Teams have these accounts If you need an account contact Steve Simon

Questions?