How Not to Have Your Research Stolen or Corrupted Security Best Practices and Resources at Brandeis Melanie Radik and Raphael Fennimore Library & Technology.

Slides:



Advertisements
Similar presentations
Supporting The Mobile Client: Expanding Our Borders John Guidone Manager, Desktop Technologies and Dawn E. Colonese Manager, Help Desk & Client Access.
Advertisements

Objectives Overview Define an operating system
GRAD 521, Research Data Management Winter 2014 – Lecture 7 Amanda L. Whitmire, Asst. Professor.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
Information Security Awareness:
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Penn State University College Of Education Understanding College of Education Resources.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Password Management Programs By SIR Phil Goff, Branch 116 Area 2 Computers and Technology April 18,
Internet safety By Lydia Snowden.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter Three OPERATING SYSTEMS.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Using SWHS: The AUP [Acceptable Use Policy]
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
OFFICE OF BUDGET AND FINANCE Information Security Office ISC Meeting August 21, 2015 Information Security Office
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Explain the purpose of an operating system
TECHNOLOGY GUIDE THREE Protecting Your Information Assets.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Types of Electronic Infection
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
How Not to Lose the Only Copy of Your Research Storage and Backup Tools at Brandeis Melanie Radik and Raphael Fennimore Library & Technology Services Workshops.
How Not to Be the Only One Who Knows About Your Research Sharing and Archiving for Posterity Melanie Radik and Raphael Fennimore Library & Technology Services.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Joe Budzyn Jeff Goeke-Smith Jeff Utter. Risk Analysis  Match the technologies used with the security need  Spend time and resources covering the most.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
UNIVERSITY OF GEORGIA Presented by: EITS Staff Summer 2016 Orientation: Parent Presentation.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Your data, protected and under control wherever they go SealPath Enterprise – IRM
Computer Security  Computer Security:  Password Strength  Windows Screen Saver  Deleting browser cache  Deleting browser cookies  Securing MS Office.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Discovering Computers 2012: Chapter 8
How Not to Have Your Research Stolen or Corrupted
TECHNOLOGY GUIDE THREE
OWASP CONSUMER TOP TEN SAFE WEB HABITS
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
 Security is a must today. If your device is not secure with updated antivirus then it is surely vulnerable to the attacks of dangerous viruses, spyware.
Cybersecurity for Everyone
IT Management, Simplified
IT Management, Simplified
Presentation transcript:

How Not to Have Your Research Stolen or Corrupted Security Best Practices and Resources at Brandeis Melanie Radik and Raphael Fennimore Library & Technology Services Workshops Brandeis University September 29, 2015

Best Practice Overview Everyone strong passwords password protect all devices secure wireless update software and OS antivirus manage permissions for networked files physically secure all devices Advanced encryption electronic signatures watermarking firewalls intrusion detection software

Creating Passphrases Passphrase requirements o length o variety of characters o change it regularly Protect all devices o laptop or desktop o tablet o phone o USB drive

Managing Passphrases Use different ones for each account o banking vs. social media vs. , etc. o isolates hacking breach o allows for easier site-based creation Secure your passphrase list o don’t write it down unless kept locked up o don’t use browser auto-fill o Lastpass or KeePass More on passphrases in Brandeis Knowledge Base (KB)

Secure Wireless Wireless on campus o secure = eduroam o not secure = brandeis_guest, brandeis_open Wireless off campus o password protect home wireless o Junos Pulse VPN: more details in KBmore details in KB o Wormhole, wormhole.brandeis.edu: more details in KBmore details in KB  Remote Desktop setup details available in KBavailable in KB

Keep Things Up-To-Date Things to update o Operating systems on all devices o Installed software and plug-ins o home wireless router Routines to implement o when a program asks to update, let it o shut down your computer and programs on a regular basis o uninstall programs you no longer use Tech Help Desk is available to help troubleshoot

Malware Protection Antivirus software o Symantec Endpoint Protection (SEP) More info in KB More info in KB  Download from: brandeis.onthehub.com o Malwarebytes More info in KB More info in KB  Premium licensed for university-owned computers  personal computers eligible for discounted Premium or download free version at o AdBlock Plus  available free, o More on malware and anti-virus tools in KB More on malware and anti-virus tools in KB

Who Has Access? Manage permissions o Google Apps (Drive, Sites, etc.) o Brandeis networked drives o User accounts on devices Physical security o Who has the key? o Rooms locked or devices cable locked? (Both!) o Mobile devices require extra care

Mandated Security for Data Official policies dictate the security you must provide for: Personally Identifiable Information (PII) o Brandeis policy on PII Brandeis policy on PII o Massachusetts regulations Massachusetts regulations o HIPPAA (federal) HIPPAA (federal) data concerning National Security (DOD research) Trade Secrets, Patents, Copyright, Licensing The IRB board oversees research compliance with security as part of its approval process.

High-Security Storage Network Shares o data encryption while data is at rest or in transit o access allowed only on Brandeis secure network or through approved VPN o robust permissions management Brandeis Box o data encryption while data is at rest or in transit o support for WebDAV and FTPS o robust permissions management o apps for mobile devices

Encryption Protects information by encoding the data in an unreadable format, which can be decoded with a key. Full Disk Encryption o Bitlocker - Windows Bitlocker o TruCrypt - Windows, Mac, or Linux TruCrypt Folder-Specific Encryption o FileVault - Mac FileVault o Encrypted File System (EFS) - Windows Encrypted File System (EFS) o WinZip WinZip

Electronic Signatures A digital signature typically consists of three algorithms; ●A key generation algorithm outputs the private key and a corresponding public key. ●A signing algorithm that, given a message and a private key, produces a signature. ●A signature verifying algorithm that, given the message, public key and signature, either accepts or rejects the message's claim to authenticity. Public Key Encryption can be used on , PDFs, Word docs, any electronically generated document.

Watermarking Embeds a digital marker for authorship in ‘noisy’ files; audio, video, graphic images (usually not text files) Only perceptible under certain conditions, i.e. after using some algorithm, and imperceptible otherwise Can raise an alert if alterations made to original file Can be used in distribution of works to track source Example of commercially available tool: o Digimarc Digimarc

Firewalls Monitor network traffic o block hackers o block viruses and malware Software-based o Windows, Mac, Linux all have built-in settings Hardware-based o home router Remote Desktop Access involves adjusting firewallsRemote Desktop Access o check out Remote Desktop Access best practices at Brandeis Remote Desktop Access best practices at Brandeis o consult the Tech Help Desk with any problems

Intrusion Detection Systems Brandeis maintains a Network Intrusion Detection System (NIDS) Host-based Intrusion Detection Systems (HIDS) o Snort Snort o OSSEC OSSEC o OSSIM OSSIM