Download presentation
Presentation is loading. Please wait.
Published byLetitia Bradford Modified over 8 years ago
1
Data Protection & Network Security Data Protection Protective Marking Secure Printing Passwords Email & the Internet Viruses Encryption
2
Data Protection Data protection applies to printed documents as well as electronic data Schedule 7 of the DPA: –Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
3
Security Breach Examples Imagine a potential security breach: –Leaving unencrypted data on a USB key –Leaving printed documents on public transport –Losing your phone –Losing your laptop –Disclosing your password
4
Protective Marking Government Protective Marking Scheme labelImpact Level (IL) NOT PROTECTIVELY MARKED0 PROTECT1 or 2 RESTRICTED3 CONFIDENTIAL4 All documents should be marked, in the header, with one of the following labels The equivalent government IL is give for each label Header AVI
5
Decision Flowchart
6
Examples Government Protective Marking Scheme label Example data types Confidential IL4 National Pupil Database Looked-after children Witness protection Restricted IL 3 School MIS (SIMS) Teacher access to learning platform/portals Special educational needs Pupil characteristic Health records Protect IL 1 or 2 General student data Learning platforms/portals Not Protectively Marked IL0 Google search BBC News
7
Document Handling Data or documents marked PROTECT or higher must: –Be secured in a locked cabinet or area –Be protected by a strong password –Have access restricted to appropriate personnel only –Be encrypted before transfer –Not be left in plain view –Be destroyed securely
8
Secure Deletion of Files
9
Printing Risks Risk from low to high: –A printer connected to the machine –A network printer in the same room –A network printer in another room The main risk of printing a document is that it can potentially be seen by unauthorised persons before it can be secured
10
Secured Print Capability It is possible to apply a password to a print job sent to these network printers: –Canon iR C3080/3480/3580 UFR II Office area main block –Canon iR2270/iR2870 UFR II Staff quiet room –Canon iR-ADV C5045/5051 UFR II Reprographics N.B. Student access allowed
11
Identifying Printers
12
Secured Printing Secure AVI
13
Copier – Step 1 Enter Departmental ID as usual
14
Copier – Step 2 Go to the Print Job tab and select job
15
Copier – Step 3 Enter your chosen password and OK
16
Secured Print Password Suggestions for suitable passwords: –Significant date in number form e.g. Tuesday 26th April 2011 could be used in the form 2604 or 260411 or 26042011 –Birth year of partner or children, not your own –Disposable passwords can be short (four figures) but don't use 'obvious' numbers e.g. 1234, 5678, 7777...
17
Network Password Passwords should be at least eight characters long and contain at least one of each of the following characters: –Upper case letter –Lower case letter –Number –Symbol (!£$%^&*()_+@~#<>? etc.) Best password length > 13 characters Best to change at least every ninety days
18
Permutations Available CharactersPermutationsFactor Alphabet2663 x 10 9 1 Add case5230 x 10 12 482 Add numbers62136 x 10 12 2,164 Add special characters955 x 10 15 77,804 +1 character95426 x 10 15 6,768,931 +2 characters9537 x 10 18 582,000,000 14 characters952 x 10 27 28 x 10 15 Based on an 8 character password
19
Avoid Using Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters –12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) Personal information –Your name, birthday, driver's license, passport number, or similar information
20
Memorising Writing a password down is OK but: –Keep it safe and secure –Do not store it near or on the computer Use a formula / mnemonic Where passwords must be changed regularly, add a date to your formula e.g. @mssc#JMU#0711?
21
Top 20 Passwords From rockyou.com server breach:
22
Length & Complexity From rockyou.com server breach:
23
Testing Your Password
24
Email Never provide personal details in an email or in response to an email request Check the sender – does the address look right? Avoid links in emails Does the email 'ring true'? Look out for URLs ending in.tk.cc.info
25
'Reset' Email Example
26
UPS Email Example
27
Internet Beware of pop-ups Beware of obfuscated links Inappropriate web sites Virus scams
28
Pop-up Blocker Under Tools menu in IE8 Make sure it is turned on Close pop-ups with ALT+F4
29
Obfuscated Links Harmful addresses hidden behind innocuous looking links Google image search Link text can be anything Obfuscation
30
Sophos Anti-virus The school's anti-virus program is called: Sophos Endpoint Security and Control It can be identified by the small blue shield logo in the lower right of the screen:
31
Sophos Detection Result
32
Sophos Error If the Sophos shield appears with a white cross on red disc, this means it has experienced an error: OK to ignore this for a short while only Report it to IT support if persistent
33
AVG Anti-virus A very small minority of laptops may be using AVG anti-virus This can be identified by the following logo in the bottom right corner of the screen:
34
Encryption All new PCs in admin areas and laptops have their hard drives encrypted Protect the encryption password with extreme diligence – treat as RESTRICTED Only effective when the machine is off AxCrypt to encrypt files before transmission via email
35
Advice and Support Please visit: support.manorschool.northants.sch.uk Additional information: www.getsafeonline.org www.ico.gov.uk
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.