Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities
|
|
|
- Felicity Garrison
- 10 years ago
- Views:
Transcription
1 Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Information Security in Universities
2 Agenda Information Security Management in Universities Recent Information Security Incidents Information Security Risk Management Information Asset in Universities Information Security Risk Assessment Information Security Controls Information Security Awareness Case Study IT Outsourcing 1
3 Recent Information Security Incidents Recent Information Security Incidents in Universities Hackers target leading climate research unit Computer data breach at EIU investigated Personal The data system is of one of the world's leading climate always research valuable units has been breached by hackers. to hackers s reportedly from the University of East Anglia's Climatic Research Unit (CRU), including personal exchanges, appeared on the internet on Thursday. A university spokesman confirmed the system had been hacked and that information was taken and published without permission. Mr Cluley added that universities were vulnerable to attacks by hackers because so many people required access to IT systems. Source: BBC Nov 20, 2009 Difficult to manage user access rights in universities CHARLESTON -- An investigation into a breach of computer security at Eastern Illinois University has not yet determined if personal data was stolen from a list of about 9,000 people, a university official said Friday. Eastern has mailed letters to 9,000 former, prospective and current undergraduate students regarding the breach of files that contain personal information... A machine was compromised by a virus so we don t believe it was a targeted attack against the university data system, said Adam Dodge, assistant director of information security for Eastern Information Technology Services. Virus is a key threat That caused the university s Office of Admissions server to be infected with a number of viruses, to including the universities several that could allow an external person to access because the server. access to the internet cannot be controlled, mainly Source: Journal Gazette Times-Courier due Dec to 04, academic 2009 freedom issue 2
4 Recent Information Security Incidents Recent Information Security Incidents in Universities UC Berkeley computers hacked, 160,000 at risk Hackers broke into the University of California at Berkeley's health services center computer and potentially stole the personal information of more than 160,000 students, alumni, and others, the university announced Friday. Health services hold At particular risk of massive identity amount theft are some of 97,000 individuals whose personal Social Security numbers were accessed information the breach, which but it's still unclear whether hackers were able to match up those is easily SSNs with overlooked. individual names, Shelton Waggener, UCB's chief technology officer, said in a press conference Friday afternoon. Hacking incident on J-school Web server triggers notices to affected Hackers applicants tend to attack universities because they know the security is weak. BERKELEY University of California, Berkeley, officials announced today (Tuesday, Aug. 11) that the campus will be notifying approximately 490 individuals of a computer security incident involving the Graduate School of Journalism. Campus officials discovered during a computer security check that a hacker had gained access to the journalism school's primary Web server. The server contained much of the same material visible on the public face of the Web site. However, the server also contained a database with Social Security numbers and/or dates of birth belonging to 493 individuals who applied for admission to the journalism school between September 2007 and May Although there is no evidence that the intruder stole or even viewed information from the database containing the Social Security numbers, it is possible that such action could have occurred, campus computer security experts said. Consequently, UC Berkeley decided to err on the side of caution and notify the 493 student applicants of the incident. Letters are being sent out this week from the journalism school. Source: BBC Nov 20, 2009 Source: Journal Gazette Times-Courier Dec 04,
5 Recent Information Security Incidents Statistics from Technology Crime Division of the HK Police: Title of Offence Unauthorised Access to Computer by telecommunication Access to Computer with Criminal Dishonest Intent Criminal Damage Obtaining Property by Deception Obtaining Services by Deception Thefts (E-banking related) Others Total Source: Jan
6 Recent Information Security Incidents Why Universities? Hacking for challenge/ fun (external and student hackers / professional and script kiddies) Scale of universities helps creating noise in community (reputation attack) Universities computers- a great candidate for zombie machines Relatively weak security perimeter Enormous personal information Valuable research data There is always a motivation Statistics on Data leakage Incidents 5
7 Information Security Risk Management Identify Information Assets Risk Assessment Security Control Security Awareness 6
8 Information Assets in Universities Information Asset - definable piece of information, stored in any form, that has value to the organisation Personal Information Student records Employee records Payroll information Information security is all about protecting the CIA of information assets Academic Information Student grade information Research data University policies Confidential data obtained from third parties 7
9 Information Assets in Universities More information assets. University web sites Software and applications Computer servers and terminals Network and network devices IT service provider of outsourced services
10 Information Assets in Universities Threats to Information Asset
11 Information Assets in Universities Threats Deliberate actions by people inside your organisation outside your organisation (e.g. hackers attack) Accidental actions by people inside your organisation outside your organisation (e.g. dumping students personal data into rubbish bin) System problems hardware software malicious code Other (e.g. computer virus) Other events power cut telecommunications failure natural disaster Other Information Asset Outcomes Disclosure of asset Modification of the asset Destruction or loss of the asset, the hardware it it resides upon, or the software that interacts with it it Interruption of access to the asset Financial and Reputation Loss 10
12 Identification Information Assets Process Step 1: Identify the boundaries of what is to be protected Step 2: Identify the information assets and the media/systems in which they are handled Step 3: Identify relationships between the assets/media/ systems and the organisational objectives Step 4: Identify those critical to organisational objectives Student s personal data Student s phone number stored in PC of individuals Objective : Compliancepersonal data protection What will happen if there is a security breach to the C, I or A of this data? Considerations: Nature: location, assets and technology Types of information that are sensitive and confidential Considerations: Users given access to the information How that information is provided Considerations: Organisational objectives How they are affected by information assets Considerations: Likelihood and the impact of the information assets affecting the organisational objectives 11
13 Information Security Risk Assessment Risk Assessment- Assignment of value for potential harm/ loss Quantitative Qualitative $ $ $ $ $ Annualised Loss Expectancy (ALE) Annualised Rate of Occurrence (ARO) Single Loss Expectancy (SLE) Asset Valuation (AV) Exposure Factor (EF) $ $ $ $ $ SLE = AV x EF ALE = SLE x ARO 12
14 Information Security Risk Assessment Risk Assessment- Example Asset Asset Valuation Vulnerabilities & Threats Impact Occurrence ALE University Website Lost of productivity; cost of information; cost of rebuilding services =$30,000 Vulnerabilities: Outdated patch, unnecessary services Threats: Unauthorised intrusion; defacement Unavailability of website and student portal ARO = 2 / Year EF = 40% = AV x EF x ARO = $30,000 x 40% x 2 = $24,000 Quantitative -How much to pay for countermeasure? Avg. = 2.3 Qualitative - How to prioritise for resource allocation? 13
15 Information Security Risk Assessment Cost of Security Control Potential Loss 14
16 Areas of Information Security Risk in Universities Category Examples of Risk Recommendations Lack of information Establish information classification and handling classification procedures Sensitive information being Raise user awareness disclosed to the public Information Handling Logical Access Network Security Outsourcing Shared accounts Weak password settings Abuse of super user accounts External / Internal threats (e.g. Hacking, denial of service, viruses, malware) Wireless network sniffing Compliance risk Lack of security controls in third party services Implement strong password policies and configurations. Restrictions and policy on the use of privileged/administrator accounts. Promotion of user awareness on the concept of accountability. Segregate the network into different segments. Installation of devices such as firewall and Intrusion Detection System. Periodic firewall log review. Installation of virus and spyware detection systems. Perform periodic scanning on network and computers. Non-disclosure agreement Include clauses regarding security requirements in the SLA 15
17 Areas of Information Security Risk in Universities Category Examples of Risk Recommendations User Account Access / Administration Excess access rights granted User access review Classify data and create data ownerships. Segregation of duties. Physical Security Incident Management Information Security Awareness Loss of portable devices Decentralised location of computer servers Stealing of hardware Vandalism Errors overlooked or not resolved on a timely basis Lack of accountability Social engineering Difficulties in promoting security awareness to academic staff and students Portable device encryption Security guards. Swipe card/biometrically controlled access points. Access control lists. Perimeter controls. Escalation procedures. Investigation procedures. Defined roles and responsibilities. Regular information Security Awareness Training. Management commitment in building good security culture. 16
18 Information Security Controls Information Security Triad Foundation Availability Integrity -HARDWARE- -NETWORK- -SOFTWARE- Confidentiality Physical People Procedures 17
19 Information Security Controls General Users IT Professionals Physical People Procedures Are your thumb-drives secured? Do you keep your office door locked always? Are you aware of your role? Do you know about YOUR information? Do you know what to do when there is a security incident? Do you know the POLICY? Are the data centre secured? Do you have sufficient offsite backups? Are there security professionals in the team? Are the users well trained? Are the policies/ procedures up-to-date? How do you communicate them to the users? FOUNDATION 18
20 Information Security Controls Types of Information Security Controls Know when it occurs Administrative Logical Physical Detective Corrective Preventive Rectify when it occurs Limitations No 100% assurance Breakdown e.g. misunderstand/ mistake Involve human judgement Management override Collusion Avoid its occurrence 19
21 Sample Information Security Controls Detective Corrective Preventive Administrative Rotation of duties Management review of data, configuration, procedures and routines Risk management IT audit, control evaluation Business continuity plan Disaster recovery plan Separation of duties Security training Well communicated security policy User account administration Logical Network Intrusion Detection System System logs System integrity check Network Intrusion Prevention System Anti-virus software Access control Data encryption (storage and in-transit) Authentication Anti-virus software Physical Camera & alarms Security guards Regular asset count Emergency power supply Physical access control (e.g. swipe cards, biometric locks) to computer facilities Environment controls (e.g. fire, water, temperature, humidity ) Offsite backup
22 Sample Information Security Controls Detective Corrective Preventive Administrative Logical Physical Rotation of duties Management review of data, configuration, procedures and routines Risk management IT audit, control evaluation Network Intrusion Detection System System logs System integrity check Business continuity plan Disaster recovery plan Network Intrusion Prevention System Anti-virus software Not just the responsibility of IT Centre! Camera & alarms Security guards Regular asset count Emergency power supply Separation of duties Security training Well communicated security policy User account administration Access control Data encryption (storage and in-transit) Authentication Anti-virus software Physical access control (e.g. swipe cards, biometric locks) to computer facilities Environment controls (e.g. fire, water, temperature, humidity ) Offsite backup
23 Evaluation of Information Security Controls Regular evaluation of information security controls Changing environment technology, people, threats, information sharing Evaluation of adequacy in design of existing controls Identify needs to additional controls and the cost vs benefit Evaluation of operating effectiveness of existing controls Management awareness and risk acceptance Plan for improvement actions Reasons not having regular information security evaluation Lack of resources (human resources, budget ) Trusted environment (e.g. employees, students) Unlikely outbreak of security incidents/ breaches The consequence of not having regular security evaluation can be very costly 22
24 Information Security Awareness Management Teaching Staff Administrative Staff Students Knowledge & Attitude Security Risk & Protection of Assets SECURITY AWARENESS PROGRAM 23
25 Information Security Awareness Topics Sensitive information comes in contact with the individual Roles and responsibility in information security Data owner identify, classify and protect information Students Appropriate use of computer facility and network Handling procedure for sensitive information E.g. Media of transmission and cryptographic requirement Knowledge of security issues E.g. Identification of phishing , potential damage of malwares, existence of social engineering Consequences 24
26 Information Security Awareness Security Awareness for: MANAGEMENT Involvement of IT management in senior management communication Understanding the importance of information security before the incidents happen Raising awareness of the needs for management support over institution-wide security awareness programme IT CENTRE Realising the senior management concern over information security Allocating resources for security awareness programmes Obtaining knowledge of up-to-date security threats Promoting the culture of security awareness within the university STAFF / STUDENTS Knowing information security via IT centre Understanding their roles in information security (e.g. regular reminders, training, campus security awareness campaign) Top down support for security awareness within University 25
27 Case Study IT Outsourcing IT Outsourcing Background University Outsourcing (partially) storage, spam filtering and online organiser anywhere Service Provider- Unqualified SAS70 Type II Certification What are the security concerns? 26
28 Case Study IT Outsourcing IT Outsourcing- Security Concerns Asset Identification correspondences Sensitive information ( contents/ attachments) Contacts information Vulnerabilities Unencrypted data transfer/ storage System security weaknesses (e.g. outdated patches) Different legal/ regulatory requirements over personal data Other concerns Uncontrollable/ unknown security standard Inability to review the security standard of the service provider Inadequate planning 27
29 Case Study IT Outsourcing IT Outsourcing- Best Practice Planning The Border- define the service to be outsourced (just ? Online organiser?) Compatibility with existing process and infrastructure Risk Assessment Evaluation of certification/ accreditation (e.g. SAS70, ISO27001) Agreement Ability to perform on-site due diligence Security review (by service provider or independent party) Service level agreement (security standard) Non-disclosure agreement On-going Annual security assessment/ certification review Perform on-site due diligence Monitoring service level 28
30 Summary Information Security in University Universities are valuable targets Information Security Management Identifying Information Assets Risk Assessment Security Controls Security Awareness Case Studies & Best Practice- IT Outsourcing 29
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session Two Data Handling in University Case Study- Information Security in University Agenda Case Study Background
BCS IT User Syllabus IT Security for Users Level 2. Version 1.0
BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training- Session One Information Security- Perspective for Management Information Security Management Program Concept
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
OCR LEVEL 3 CAMBRIDGE TECHNICAL
Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY
Risk Assessment Guide
KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
Guide to Vulnerability Management for Small Companies
University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Network Security Policy
IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
by: Scott Baranowski Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy
Community Bank Auditors Group Best Practices in Auditing Record Retention, Safeguarding Paper Documents, GLBA and Privacy June 10, 2015 MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
The Ministry of Information & Communication Technology MICT
The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.
University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template
University of California, Riverside Computing and Communications IS3 Local Campus Overview Departmental Planning Template Last Updated April 21 st, 2011 Table of Contents: Introduction Security Plan Administrative
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
2 0 1 4 F G F O A A N N U A L C O N F E R E N C E
I T G OV E R NANCE 2 0 1 4 F G F O A A N N U A L C O N F E R E N C E RAJ PATEL Plante Moran 248.223.3428 [email protected] This presentation will discuss current threats faced by public institutions,
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
External Supplier Control Requirements
External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
CONTENTS. Security Policy
CONTENTS PHYSICAL SECURITY (UK) PHYSICAL SECURITY (CHICAGO) PHYSICAL SECURITY (PHOENIX) PHYSICAL SECURITY (SINGAPORE) SYSTEM SECURITY INFRASTRUCTURE Vendor software updates Security first policy CUSTOMER
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
How To Protect Decd Information From Harm
Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the
Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree
Cyber Security: Potential Threats Impacting Organizations January 10, 2015 Scott Petree Agenda 2 Data Security Trends Root Causes of Cyber Attacks How Can We Fix This? Secure Infrastructure User Awareness
Information Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
DBC 999 Incident Reporting Procedure
DBC 999 Incident Reporting Procedure Signed: Chief Executive Introduction This procedure is intended to identify the actions to be taken in the event of a security incident or breach, and the persons responsible
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
So the security measures you put in place should seek to ensure that:
Guidelines This guideline offers an overview of what the Data Protection Act requires in terms of information security and aims to help you decide how to manage the security of the personal data you hold.
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
ICT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 1.0 Ratified By Date Ratified Author(s) Responsible Committee / Officers Issue Date Review Date Intended Audience Impact Assessed CCG Committee
SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA
SITA Information Security SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA September, 2012 Contents 1. Introduction... 3 1.1 Overview...
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Name: Position held: Company Name: Is your organisation ISO27001 accredited:
Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Privacy + Security + Integrity
Privacy + Security + Integrity Docufree Corporation Data Security Checklist Security by Design Docufree is very proud of our security record and our staff works diligently to maintain the greatest levels
Service Children s Education
Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
Hengtian Information Security White Paper
Hengtian Information Security White Paper March, 2012 Contents Overview... 1 1. Security Policy... 2 2. Organization of information security... 2 3. Asset management... 3 4. Human Resources Security...
RISK ASSESSMENT GUIDELINES
RISK ASSESSMENT GUIDELINES A Risk Assessment is a business tool used to gauge risks to the business and to assist in safeguarding against that risk by developing countermeasures and mitigation strategies.
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
INFORMATION SECURITY FOR YOUR AGENCY
INFORMATION SECURITY FOR YOUR AGENCY Presenter: Chad Knutson Secure Banking Solutions, LLC CONTACT INFORMATION Dr. Kevin Streff Professor at Dakota State University Director - National Center for the Protection
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited
Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One
Joint Universities Computer Centre Limited ( JUCC ) Information Security Awareness Training - Session One End User Security, IS Control Evaluation & Self- Assessment Information Security Trends and Countermeasures
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
EXIN Information Security Foundation based on ISO/IEC 27002. Sample Exam
EXIN Information Security Foundation based on ISO/IEC 27002 Sample Exam Edition June 2016 Copyright 2016 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
SecurityMetrics Vision whitepaper
SecurityMetrics Vision whitepaper 1 SecurityMetrics Vision: Network Threat Sensor for Small Businesses Small Businesses at Risk for Data Theft Small businesses are the primary target for card data theft,
Unit 3 Cyber security
2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected]
Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology [email protected] Meaning Why is Security Audit Important Framework Audit Process Auditing Application Security
How To Ensure Network Security
NETWORK SECURITY POLICY Policy approved by: Assurance Committee Date: 3 December 2014 Next Review Date: December 2016 Version: 1.0 Page 1 of 12 Review and Amendment Log/Control Sheet Responsible Officer:
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established
Network Security ProPosal Form Important Please answer all questions from each section and complete in block capitals. Tick the appropriate boxes where necessary and supply any further information requested.
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
UBC Incident Response Plan
UBC Incident Response Plan Contents 1. Rationale... 1 2. Objective... 1 3. Application... 1 4. Definitions... 1 4.1 Types of Incidents... 1 4.2 Incident Severity... 2 4.3 Information Security Unit... 2
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
ULH-IM&T-ISP06. Information Governance Board
Network Security Policy Policy number: Version: 2.0 New or Replacement: Approved by: ULH-IM&T-ISP06 Replacement Date approved: 30 th April 2007 Name of author: Name of Executive Sponsor: Name of responsible
Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS
INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS Effective Date June 9, 2014 INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS OF THE HELLER SCHOOL FOR SOCIAL POLICY AND MANAGEMENT Table of Contents 1.
A practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Music Recording Studio Security Program Security Assessment Version 1.1
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
Security Basics: A Whitepaper
Security Basics: A Whitepaper Todd Feinman, David Goldman, Ricky Wong and Neil Cooper PricewaterhouseCoopers LLP Resource Protection Services Introduction This paper will provide the reader with an overview
Information Incident Management Policy
Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY Version 3.0 Ratified By Date Ratified April 2013 Author(s) Responsible Committee / Officers Issue Date January 2014 Review Date Intended Audience Impact
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs)
IT NETWORK AND INFRASTRUCTURE FILE SERVER POLICY (for Cheshire CCGs) Version 3.2 Ratified By Date Ratified November 2014 Author(s) Responsible Committee / Officers Issue Date November 2014 Review Date
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
SNAP WEBHOST SECURITY POLICY
SNAP WEBHOST SECURITY POLICY Should you require any technical support for the Snap survey software or any assistance with software licenses, training and Snap research services please contact us at one
Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord
Building The Human Firewall Andy Sawyer, CISM, C CISO Director of Security Locke Lord Confidentiality, Integrity, Availability Benchmarks of Cybersecurity: Confidentiality Information is protected against
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN
BALTIMORE CITY COMMUNITY COLLEGE INFORMATION TECHNOLOGY SECURITY PLAN FEBRUARY 2011 TABLE OF CONTENTS PURPOSE... 4 SCOPE... 4 INTRODUCTION... 4 SECTION 1: IT Security Policy... 5 SECTION 2: Risk Management
Information Technology Services Information Security Incident Response Plan
Information Technology Services Information Security Incident Response Plan Authors: Peter Hamilton Security Manager Craig Collis Head of Risk, Quality and Continuity Date:1/04/2014 Version:1.3 Status:Final
Regulations on Information Systems Security. I. General Provisions
Riga, 7 July 2015 Regulations No 112 (Meeting of the Board of the Financial and Capital Market Commission Min. No 25; paragraph 2) Regulations on Information Systems Security Issued in accordance with
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
1B1 SECURITY RESPONSIBILITY
(ITSP-1) SECURITY MANAGEMENT 1A. Policy Statement District management and IT staff will plan, deploy and monitor IT security mechanisms, policies, procedures, and technologies necessary to prevent disclosure,
