Information Assurance: Basic Awareness Training. 28 November 2005

Size: px
Start display at page:

Download "Information Assurance: Basic Awareness Training. 28 November 2005"

Transcription

1 Information Assurance: Basic Awareness Training By 28 November 2005

2 1 Course Introduction Purpose: The purpose of this course is to provide all DOD personnel and Federal employees with a basic awareness of the need for information assurance (IA).? Average time: On average, this course will require approximately minutes to complete.? Learning Objectives: o Identify the purpose of the IA program o Identify 3 of the most prevalent IA threats? Copyright: This course was developed by Amer Technology Inc, copyright 2005, all rights reserved. Page 2 of 40

3 2 About The IA Program 2.1 Purpose of IA The purpose of the IA program is to protect and defend information and information systems by ensuring:? Confidentiality: people who don't have the appropriate clearance, access level and "need to know" do not access the information.? Integrity: information cannot be modified or destroyed.? Availability: information is readily available when needed Page 3 of 40

4 2.2 Requirements? All users of Federal/DOD computer systems are required to be trained in information systems security.? Requirements are specified in many directives, policies, and regulations, including: o Public Law , also known as the Computer Security Act of 1987 o Presidential Decision Directive 63, or PDD 63 o OMB Circular A-130 o DOD Directive Page 4 of 40

5 3 Threats and Vulnerabilities 3.1 Definitions? Vulnerability: a weakness in an information system, cryptographic system, or components that could be exploited.? Threat: a circumstance or event with the potential to cause harm to an information system in the form of destruction, disclosure, adverse modification of data, and/or denial of service. Threats can be further classified into: o Natural or human o Unintentional or intentional o Internal or external Page 5 of 40

6 3.2 Natural Threats A natural or environmental threat is just what it sounds like; its source is either from nature or a system's environment. Natural threats can include lightning, fires, hurricanes, tornadoes, or floods. Environmental threats can include poor building wiring or insufficient cooling for the systems. Page 6 of 40

7 3.3 Human Threats Human threats are threats caused through unintentional or intentional actions. Page 7 of 40

8 3.3.1 Unintentional Threats A human accident, bad habit, carelessness, or misinformation (e.g. accidentally spilling coffee or soda on your keyboard or computer). The unintentional threat occurs more than any other type. Page 8 of 40

9 3.3.2 Intentional Threats An intentional threat can be caused by an insider or outsider, for example: a spy, hacker, corporate raider, or a disgruntled employee.? The insider intentional threat is one of the most challenging security problems today.? Since insiders have working knowledge of and access to their organization's computer resources, the potential for damage is great.? The threat to the Department of Defense information systems is both internal and external.? Intentional threats can be further categorized as internal or external. Page 9 of 40

10 Internal Threats The internal threat is often associated with the disgruntled or greedy employee? An employee, contractor, or someone who has legitimate access to a computer system.? Most insiders misuse or exploit weaknesses in the system.? Others, due to lack of training and awareness, can cause grave damage. Page 10 of 40

11 External Threats The external threat is often associated with hackers or crackers.? We should dismiss the notion that today's hacker is a geeky 14 year old trying to crack one computer at a time as an indoor sport.? Today's hacker is far more advanced in computer skills.? Using hacking tools available on the Internet, this hacker is capable of running automated attack applications against thousands of host computers at a time to identify security weaknesses. Page 11 of 40

12 Social Engineering Social engineering is also considered an intentional threat. It is a term used among hackers for cracking techniques that rely on weakness in human nature rather than software. The goal is to trick people into revealing passwords and other information that compromise the security of your system. Example: Acting as a field service technician or fellow employee with an urgent access problem, the caller attempts to have employees reveal passwords or other sensitive information like operating systems, logon IDs, server names, or application names. Page 12 of 40

13 You can play a vital role in preventing social engineering. Take a moment to review these tips, and remember, ask your Information Systems Security Officer if you need additional guidance.? Social Engineering Prevention Tips? Never, give your password to anyone for any reason.? Verify the identity of all callers.? Don t give out information about other employees, including names and positions.? Never type things into the computer when someone tells you to unless you know exactly what the results of the commands are.? Don t give out the dial-in phone numbers to any computer system unless they are valid users.? Never answer questions from telephone surveys. Tell the caller that employees do not participate in telephone surveys from vendors.? Ask your Information Systems Security Officer (ISSO) for more guidance. Page 13 of 40

14 What should you do if you receive a call that you believe is from an unauthorized person?? If Caller ID is available, write the number down.? Take detailed notes of the conversation.? Immediately contact your ISSO or supervisor once the caller has hung up or after you have placed them on hold. Page 14 of 40

15 4 Internet Security 4.1 Cookies? A cookie is a text file that a web server stores on your hard drive when you visit a site, and retrieves whenever you revisit that site.? When you return to that site, the cookie 'recognizes' you, saving you the trouble of re-registering.? The most serious security problem with cookies has occurred when the cookie has "saved" unencrypted personal information, such as credit card numbers or social security numbers, in order to facilitate future business with that site.? Another problem with cookies is that the site potentially can track your activities on the web. You can set up your browser not to accept cookies. Page 15 of 40

16 4.2 Mobile Code? Mobile code, such as ActiveX and Java, are scripting languages used for Internet applications. o Mobile code embedded in a web page can recognize and respond to user events such as mouse clicks, form input, and page navigation as well as play audio clips. However, mobile code does introduce some security risk. o It can cause hostile programs to be automatically run on your computer without your knowledge, simply because you visited a Web page. o The downloaded program could try to access or damage the data on your machine, or insert a virus.? To protect information systems from the threat of malicious or improper use of mobile code, organizations must assess and control the risks imposed by the technology. o The DOD has developed policy guidance for use of mobile code in DOD information systems. o The guidance categorizes mobile code technologies and restricts their application within DOD based on their potential to cause damage if used maliciously. Page 16 of 40

17 ? Mobile Code Categories: o Category 1 mobile code technologies: Can pose a severe threat to operations Have known security vulnerabilities with few or no countermeasures May be used in DoD information systems only when the mobile code is signed with a DoDapproved PKI code signing certificate and the mobile code is obtained from a trusted source Examples are: ActiveX, Windows Scripting Host, UNIX Shell Scripts, DOS Batch Scripts o Category 2 mobile code technologies: Can pose a moderate threat to information systems May have known security vulnerabilities but also have known countermeasures May be used in DoD information systems if the mobile code is obtained from a trusted source over an assured channel Examples are: Java applets, Visual Basic, LotusScript, PerfectScript, PostScript Page 17 of 40

18 o Category 3 mobile code technologies: Pose a limited risk to information systems Have history of known vulnerabilities but also support security safeguards May be used in DoD information systems Examples are: Javascript, VBScript, PDF, Shockwave/Flash Page 18 of 40

19 ? As a user, you can limit your exposure to mobile code by setting your web browser to warn you prior to accepting cookies, Java and Javascript. o ActiveX security relies entirely on your judgement. ActiveX programs come with digital signatures from the author of the program. o Once your browser has verified the signature, it tells you who signed the program and asks whether or not to run it. o Depending on the trust-worthiness of the source you can either accept the program and let it run on your machine or reject it completely. o Additional actions you can take to lower your risk: For Active X controls, think carefully before accepting a digitally signed program. How trustworthy is the signer? Use up-to-date browser versions and install the security patches offered by the browser vendor Never surf the Internet on a computer that contains sensitive information like personnel, financial or medical records. Page 19 of 40

20 4.3 Distributed Denial of Service Attacks? Another threat in Internet security is the Distributed Denial of Service, or DDoS, attack.? These attacks involve bombarding a web server with huge amounts of data from many different machines and locations in an effort to bring the server down and deny its availability.? The attacks can be launched from systems across the Internet unified in their efforts, or by compromised systems that are controlled by servers which can hide the true origin of the attack. Page 20 of 40

21 4.4 Malicious Code? What is Malicious Code? o Malicious Code is software or firmware capable of performing an unauthorized function on an information system. o It is designed with a malicious intent to deny, destroy, modify or impede systems configuration, programs, data files, or routines. o Malicious Code comes in several forms to include viruses, Trojan horses, Bombs, and Worms. Page 21 of 40

22 ? The Macro Virus o The most common type of viruse today is the macro virus. o A macro virus affects programs used to create documents and spreadsheets, such as Microsoft Word and Excel. o Once infected, every document opened or created with these programs is corrupted, meaning that data could be lost or altered. o Since they infect such commonly used applications, macro viruses can spread quickly. o It is important to remember that viruses work only if you execute them! Page 22 of 40

23 ? How Does it Spread? o Sharing files through the use of diskettes and attachments or downloading files from the Internet are the most common forms of spreading Malicious Code. o It is your responsibility to scan all outside files using current anti-virus software. o Your system may contain a virus even if it appears to be virus free. o Viruses can remain hidden and may show up months later to infect your system. o For this reason, it is essential that you scan your system daily using current anti-virus software. Page 23 of 40

24 4.5 Attachments? It is important that you use caution when opening attachments.? Attachments may contain malicious code that could corrupt files, erase your hard drive, or even allow a hacker to gain access to your computer.? Be especially wary of attachments that end in.exe,.com,.vbs,.bat, or.shs.? Don't assume that an attachment is safe because a friend or coworker sent it.? A good rule of thumb is to save the attachment to your hard drive and scan it with current anti-virus software before opening it. Page 24 of 40

25 4.6 Actions/Responses: If you discover that a virus has infected your system, follow these basic steps.? Remain calm.? Call your help desk for assistance.? Don't the infected file to anyone. Page 25 of 40

26 4.7 Hoaxes? Internet hoaxes are messages written with one purpose; to be sent to everyone you know.? There are many different types of hoaxes. Some of them warn of new viruses, promote moneymaking schemes, or ask for the user to forward the message to all their friends in the name of a fictitious cause. These hoaxes only serve to slow down Internet and service for computer users by clogging networks.? If you receive an message that asks you to forward it to all your friends and coworkers, take the time to check the facts.? For hoax information, visit the U.S. Department of Energy's Computer Incident Advisory Committee site at Page 26 of 40

27 5 Roles and Responsibilities 5.1 Ethics and Computer Misuse? Here are 8 common sense rules to compute by when using a government machine: o Don't use a computer to harm other people. o Don't interfere with other people's computer work. o Don't snoop in other people's files. o Don't use a computer to steal. o Don't use or copy software that you have not purchased. o Don't steal other people's intellectual property. o Don't use a computer to pose as another person. o Don't use other people's computer resources without approval.? Keep in mind that your rights to privacy are limited when using government computer resources. o When you log on to a government system, you give your consent to monitoring. o Everything you do can be monitored. Page 27 of 40

28 ? Some examples of computer misuse are: o viewing or downloading pornography o gambling on the Internet o conducting private commercial business activities or profit-making ventures o loading personal software o making configuration changes. Page 28 of 40

29 5.2 Passwords? The system authenticates the user through his password and determines his right to use the system.? Here are some key points to keep in mind when creating passwords: o Memorize your password. o Don't write down or share passwords. o Choose a password that is easy to remember, hard to guess, and at least six characters in length, mixing letters, numbers, and special characters. o Don't use personal information like the names or birthdays of family members, pets, or the name of your favorite sports team. o Avoid using words or phrases that can be found in a dictionary. o Change your password on a regular basis.? Remember, it is your responsibility to ensure that all activity done under your user ID constitutes appropriate use of DOD information systems resources. Page 29 of 40

30 5.3 Files, Backups, and Storage? It is essential that you back up all important computer files on a regular basis.? These backups will minimize the loss of data if your hard drive crashes or is infected by a virus. o Keep a set of your backup files off-site. o Label the backups to reflect the sensitivity level of the information they contain. o Prevent erasures by keeping diskettes away from magnetic sources such as radios and telephones. o Store in areas such as metal cabinets for greater protection from fire and water damage. Page 30 of 40

31 6 Technology Specific Vulnerabilities 6.1 Introduction? You must also protect information stored or transmitted on devices other than your computer.? These include fax machines, cell phones, laptops, and palm pilots.? You need to be as vigilant about security on these devices as you are with your computer at work. Page 31 of 40

32 6.2 FAX? Be careful with information transmitted over a fax machine.? Make sure that the recipient will be there to pick up the fax immediately if you are sending sensitive information. Page 32 of 40

33 6.3 Cell Phone? Remember that cell phones are nothing more than glorified transmitters.? Anyone with the right equipment could potentially listen to your conversation.? Use a landline for more privacy, and never discuss sensitive information on an unsecure phone. Page 33 of 40

34 6.4 Laptop? The convenience of laptops also makes them vulnerable to theft or security breaches.? Password protect the logon to your laptop.? Be careful what you display on your screen, especially in close quarters such as airplanes.? Be aware of your laptop when traveling to prevent theft. Page 34 of 40

35 6.5 PDA (Personal Digital Assistant)? PDAs, such as PalmPilots or Pocket PCs, pose a security threat for a number of reasons.? Their small size and low cost make them easy to obtain and difficult to control.? They have tremendous connectivity and storage capabilities, and are extremely popular.? It can be very easy for a person to setup a PDA to download information from your computer. Page 35 of 40

36 7 Data Classification 7.1 Introduction? Proper protection of our information is critical to information systems security.? The Department of Defense has three broad categories of information.? DOD categorizes information as Unclassified, For Official Use Only (FOUO) or Sensitive, and Classified. Page 36 of 40

37 7.2 Unclassified? All DOD information, individually or in aggregation, could, given the right set of conditions and circumstances, provide an adversary an insight into our capabilities and intentions and/or impact upon the safety of DOD personnel and, thus, warrants some level of protection.? As a minimum, all DOD unclassified information must be reviewed before it is released in any form outside the U.S. Government.? This type of information still requires security protection. Page 37 of 40

38 7.3 FOUO/Sensitive? FOUO and Sensitive unclassified information can include, but is not limited to, personnel, medical, operational and Privacy Act information.? Don't leave files or media containing sensitive unclassified information where an unauthorized person can see or obtain it.? When not being used, sensitive unclassified information must be stored in a locked drawer or more secure container.? Dispose of it properly. It is a good habit to shred it or put it into a burn bag. Page 38 of 40

39 7.4 Classified? Classified information includes Confidential, Secret, and Top Secret.? Information may be originally classified only by the Secretary of Defense, the Secretaries of the Military Departments, and other officials who have been specifically delegated this authority in writing.? The original classification authority determines which level of classification is to be applied.? If there is significant doubt about the appropriate level of classification, the information shall be classified at the lowest level.? Classified information must be used in an area approved and cleared for that classification level.? When not in use, the classified information must be stored in a GSA-approved vault or container.? Data Classification Summary Page 39 of 40

40 8 Course Summary? Information is a critical asset to the Department of Defense.? It is your responsibility to protect DOD's sensitive and classified information that has been entrusted to you.? Remember, absolutely NO classified information is allowed on an unclassified system.? Please contact your information systems security officer for more information about classification or handling of information. Page 40 of 40

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Lesson 1: Course Introduction

Lesson 1: Course Introduction Lesson 1: Course Introduction Welcome By taking this course, you are meeting the legal requirement for all users of federal information systems to take annual security awareness training. This course is

More information

FY 2010 Information Security Awareness and Rules of Behavior Training

FY 2010 Information Security Awareness and Rules of Behavior Training FY 2010 Information Security Awareness and Rules of Behavior Training This alternate version of the training is for USDA employees, contractors and partners who are unable to complete the training online,

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

NC DPH: Computer Security Basic Awareness Training

NC DPH: Computer Security Basic Awareness Training NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information

Information Technology Cyber Security Policy

Information Technology Cyber Security Policy Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Boston University Security Awareness. What you need to know to keep information safe and secure

Boston University Security Awareness. What you need to know to keep information safe and secure What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately

More information

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

How To Protect Your Information From Being Hacked By A Hacker

How To Protect Your Information From Being Hacked By A Hacker DOL New Hire Training: Computer Security and Privacy Table of Contents Introduction Lesson One: Computer Security Basics Lesson Two: Protecting Personally Identifiable Information (PII) Lesson Three: Appropriate

More information

WEB ATTACKS AND COUNTERMEASURES

WEB ATTACKS AND COUNTERMEASURES WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course

U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course U.S. Department of the Interior's Federal Information Systems Security Awareness Online Course Rules of Behavior Before you print your certificate of completion, please read the following Rules of Behavior

More information

FY2012 Information Security Awareness

FY2012 Information Security Awareness FY2012 Information Security Awareness Oct. 1, 2011 Table of Contents... 5 Key Topics... 5 Social Engineering... 5 Phishing... 5 Mobile Code... 6 Hoaxes... 6 Password Security... 6 Course Overview... 6

More information

Infocomm Sec rity is incomplete without U Be aware,

Infocomm Sec rity is incomplete without U Be aware, Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN

More information

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:

More information

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL

INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL INFORMATION TECHNOLOGY SECURITY POLICY COUNTY OF IMPERIAL 1 INTRODUCTION The County of Imperial Information & Technical Services (ITS) Security Policy is the foundation of the County's electronic information

More information

Data Security Incident Response Plan. [Insert Organization Name]

Data Security Incident Response Plan. [Insert Organization Name] Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Austin Peay State University

Austin Peay State University 1 Austin Peay State University Identity Theft Operating Standards (APSUITOS) I. PROGRAM ADOPTION Austin Peay State University establishes Identity Theft Operating Standards pursuant to the Federal Trade

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

Responsible Access and Use of Information Technology Resources and Services Policy

Responsible Access and Use of Information Technology Resources and Services Policy Responsible Access and Use of Information Technology Resources and Services Policy Functional Area: Information Technology Services (IT Services) Applies To: All users and service providers of Armstrong

More information

Desktop and Laptop Security Policy

Desktop and Laptop Security Policy Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious

More information

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004)

Hamilton College Administrative Information Systems Security Policy and Procedures. Approved by the IT Committee (December 2004) Hamilton College Administrative Information Systems Security Policy and Procedures Approved by the IT Committee (December 2004) Table of Contents Summary... 3 Overview... 4 Definition of Administrative

More information

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Chapter 11 Computers and Society, Security, Privacy, and Ethics Objectives Computers and Society, Security, Privacy, and Ethics Describe the the types of of computer security risks Identify ways to to safeguard against computer viruses, worms, and and Trojan horses

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Information Security Policy. Policy and Procedures

Information Security Policy. Policy and Procedures Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable

More information

CITY OF BOULDER *** POLICIES AND PROCEDURES

CITY OF BOULDER *** POLICIES AND PROCEDURES CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Information Technology Security Policies

Information Technology Security Policies Information Technology Security Policies Randolph College 2500 Rivermont Ave. Lynchburg, VA 24503 434-947- 8700 Revised 01/10 Page 1 Introduction Computer information systems and networks are an integral

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3

The Internet and e-mail 2 Acceptable use 2 Unacceptable use 2 Downloads 3 Copyrights 3 Monitoring 3. Computer Viruses 3 Table of Contents 1 Acceptable use 1 Violations 1 Administration 1 Director and Supervisor Responsibilities 1 MIS Director Responsibilities 1 The Internet and e-mail 2 Acceptable use 2 Unacceptable use

More information

HIPAA Training Part III. Health Insurance Portability and Accountability Act

HIPAA Training Part III. Health Insurance Portability and Accountability Act HIPAA Training Part III Health Insurance Portability and Accountability Act POLICIES & PROCEDURES Goals Learn simple ways to protect information. Learn how to continually give training. Learn how to continually

More information

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by:

Tameside Metropolitan Borough Council ICT Security Policy for Schools. Adopted by: Tameside Metropolitan Borough Council ICT Security Policy for Schools Adopted by: 1. Introduction 1.1. The purpose of the Policy is to protect the institution s information assets from all threats, whether

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

Network and Workstation Acceptable Use Policy

Network and Workstation Acceptable Use Policy CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of

More information

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR

Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

Cyber Security: Beginners Guide to Firewalls

Cyber Security: Beginners Guide to Firewalls Cyber Security: Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers This appendix is a supplement to the Cyber Security: Getting Started

More information

CHAPTER 10: COMPUTER SECURITY AND RISKS

CHAPTER 10: COMPUTER SECURITY AND RISKS CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:

More information

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information

General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information General Rules of Behavior for Users of DHS Systems and IT Resources that Access, Store, Receive, or Transmit Sensitive Information The following rules of behavior apply to all Department of Homeland Security

More information

Welcome to Information Security Training

Welcome to Information Security Training Welcome to Information Security Training Welcome to Georgia Perimeter College s Information Security Training. Information security consists of processes, measures, and technologies employed to protect

More information

Information Security Code of Conduct

Information Security Code of Conduct Information Security Code of Conduct IT s up to us >Passwords > Anti-Virus > Security Locks >Email & Internet >Software >Aon Information >Data Protection >ID Badges > Contents Aon Information Security

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household This appendix is a supplement to the Cyber Security: Getting Started Guide, a non-technical reference essential for business managers, office managers, and operations managers. This appendix is one of

More information

The Ministry of Information & Communication Technology MICT

The Ministry of Information & Communication Technology MICT The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.

More information

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY

HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY HFS DATA SECURITY TRAINING WITH TECHNOLOGY COMES RESPONSIBILITY Illinois Department of Healthcare and Family Services Training Outline: Training Goals What is the HIPAA Security Rule? What is the HFS Identity

More information

Introduction to Computer Security

Introduction to Computer Security Introduction to Computer Security Rev. Sept 2015 What is Computer Security? 2 Computer Security is the protection of computing systems and the data that they store or access 3 Why is Computer Security

More information

UMHLABUYALINGANA MUNICIPALITY ANTIVIRUS MANAGEMENT POLICY

UMHLABUYALINGANA MUNICIPALITY ANTIVIRUS MANAGEMENT POLICY UMHLABUYALINGANA MUNICIPALITY ANTIVIRUS MANAGEMENT POLICY Antivirus Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator Recommended by Director

More information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This

More information

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Cyber Security Beginners Guide to Firewalls A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Multi-State Information Sharing and Analysis Center (MS-ISAC) U.S.

More information

APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW

APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW 84-10-25 DATA SECURITY MANAGEMENT APPLETS AND NETWORK SECURITY: A MANAGEMENT OVERVIEW Al Berg INSIDE Applets and the Web, The Security Issue, Java: Secure Applets, Java: Holes and Bugs, Denial-of-Service

More information

Management and Storage of Sensitive Information UH Information Security Team (InfoSec)

Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Management and Storage of Sensitive Information UH Information Security Team (InfoSec) Who Are We? UH Information Security Team Jodi Ito - Information Security Officer Deanna Pasternak & Taylor Summers

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually.

Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. April 23, 2014 Must score 89% or above. If you score below 89%, we will be contacting you to go over the material individually. What is it? Electronic Protected Health Information There are 18 specific

More information

E-BUSINESS THREATS AND SOLUTIONS

E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were

More information

31 Ways To Make Your Computer System More Secure

31 Ways To Make Your Computer System More Secure 31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows

More information

Rules of the Road for Users of Smithsonian Computers and Networks

Rules of the Road for Users of Smithsonian Computers and Networks Rules of the Road for Users of Smithsonian Computers and Networks Introduction Smithsonian systems, networks and other computer resources are shared among Smithsonian employees, interns, visiting scholars,

More information

Appendix H: End User Rules of Behavior

Appendix H: End User Rules of Behavior Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.

More information

Network Security and the Small Business

Network Security and the Small Business Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,

More information

Retail/Consumer Client. Internet Banking Awareness and Education Program

Retail/Consumer Client. Internet Banking Awareness and Education Program Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet

More information

Chronic Disease Management

Chronic Disease Management RESOURCE AND PATIENT MANAGEMENT SYSTEM Chronic Disease Management (BCDM) Version 1.0 Office of Information Technology (OIT) Division of Information Resource Management Albuquerque, New Mexico Table of

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Cyber Opsec. Protecting Yourself Online. Think. Protect. OPSEC. www.ioss.gov

Cyber Opsec. Protecting Yourself Online. Think. Protect. OPSEC. www.ioss.gov Cyber Opsec Protecting Yourself Online Think. Protect. OPSEC. www.ioss.gov CYBER OPSEC: section 1 Internet Communication in General Our carelessness makes the job easy for the adversary. The Internet was

More information

Learn to protect yourself from Identity Theft. First National Bank can help.

Learn to protect yourself from Identity Theft. First National Bank can help. Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone

More information

Open an attachment and bring down your network?

Open an attachment and bring down your network? Open an attachment and bring down your network? Many people think this will never happen to them, but virus attacks can come from unlikely sources and can strike when you least expect it. They can wreak

More information

California State University, Chico. Information Security Incident Management Plan

California State University, Chico. Information Security Incident Management Plan Information Security Incident Management Plan Version 0.8 January 5, 2009 Table of Contents Introduction... 3 Scope... 3 Objectives... 3 Incident Management Procedures... 4 Roles and Responsibilities...

More information

Internet Security. For Home Users

Internet Security. For Home Users Internet Security For Home Users Basic Attacks Malware Social Engineering Password Guessing Physical Theft Improper Disposal Malware Malicious software Computer programs designed to break into and create

More information

SPICE EduGuide EG0015 Security of Administrative Accounts

SPICE EduGuide EG0015 Security of Administrative Accounts This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and

More information

Data Management & Protection: Common Definitions

Data Management & Protection: Common Definitions Data Management & Protection: Common Definitions Document Version: 5.5 Effective Date: April 4, 2007 Original Issue Date: April 4, 2007 Most Recent Revision Date: November 29, 2011 Responsible: Alan Levy,

More information

TMCEC CYBER SECURITY TRAINING

TMCEC CYBER SECURITY TRAINING 1 TMCEC CYBER SECURITY TRAINING Agenda What is cyber-security? Why is cyber-security important? The essential role you play. Overview cyber security threats. Best practices in dealing with those threats.

More information

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org

INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup

More information

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. Benefits & Features CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere. What can I do with Internet Banking? You can inquire

More information

Estate Agents Authority

Estate Agents Authority INFORMATION SECURITY AND PRIVACY PROTECTION POLICY AND GUIDELINES FOR ESTATE AGENTS Estate Agents Authority The contents of this document remain the property of, and may not be reproduced in whole or in

More information

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15. NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities

More information

FY2015 Information Security Awareness

FY2015 Information Security Awareness FY2015 Information Security Awareness Oct. 1, 2014 Contents... 5 Key Topics... 5 Social Engineering... 5 Phishing... 5 Mobile Code... 6 Hoaxes... 6 Password Security... 6 Course Overview... 6 Lesson 1:

More information

Cybersecurity Best Practices

Cybersecurity Best Practices Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

St. Johns River State College

St. Johns River State College St. Johns River State College 3.11 Technology 3.11.1 Account Management Computer accounts are the means used to grant access to SJR STATE Information Resources. These accounts provide a means of providing

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information