Download presentation
Presentation is loading. Please wait.
Published byPreston Palmer Modified over 9 years ago
1
Security Training USAID 2000
2
Information Security
3
W H Y ?? u Two Reasons: –It’s a responsibility –It’s the law (Computer Security Act 1987)
4
Training Objectives u What is Computer Security u The Threats u What is your role as a user?
5
Computer Security u Definition Measures required to protect against: – unauthorized access (accidental or intentional) – malicious modification of data –destruction of data, networks and computer resources –or denial of service to process data.
6
Data Classifications lCLASSIFIED (CONFIDENTIAL, SECRET, TOP SECRET) SENSITIVE BUT UNCLASSIFIED (TECHNICAL, PROPRIETARY, PROGRAM SPECIFIC) lUNCLASSIFIED
8
Computer Security u Confidentiality u Integrity u Availability
9
Workstation Protection (1) u Comply with the physical security requirements.
10
u Never leave your computer unattended while you are logged in –log off at the end of the day u Protect sensitive information –store it in a private area Workstation Protection (2)
11
Password Requirements –Passwords must be at least six characters (alphanumeric) e.g., I8NY2x Dog&Man3 –Passwords must be changed periodically USAID - Cairo requires every 12 weeks Treat Your Password Like A Toothbrush… Don’t Share It, and Change It Often!
12
Password Protection u NEVER disclose your password! u Personal passwords must remain private –Don’t let anyone else use it –Don’t write it down –Don’t type a password while others watch –Don’t record password on-line or e-mail it –Don’t use easily guessed words, like children’s names, spouse, pet, birthday and phone number
13
Virus Protection u Run antivirus programs on a regular basis. u Do not use any outside floppies/ disks on your system without running a virus scan first. Many viruses are introduced because virus scanning was not performed. u No illegal duplication of S/W rule - this reduces the spread of virus and avoids legal headaches u Do not boot from diskette if possible
14
Data and File Backups u Backup your important data u Verify your backups
15
Internet Security u Do not download and install programs from the Internet without consulting DMS –for example, screen savers, chatting programs u Do not remove the Security wallpaper. This is an Agency requirement u Do not pass on Chain Letters, rumors and jokes
16
What is the Mission doing to minimize Risk? u Server Protection u Workstation Protection u Firewalls u Backups u Training
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.