Security awareness training is not a substitute for the LEADS Security Policy.
|
|
|
- Helen Watkins
- 10 years ago
- Views:
Transcription
1 Revised 4/2014
2 This training will discuss some of the duties of the Terminal Agency Coordinator (TAC), Local Agency Security Officer (LASO) and provide basic security awareness training. Security awareness training is intended to provide LEADS users information on the threats and risks associated with criminal justice information and basic methods to mitigate these risks. Security awareness training is required within six months of employment and every two years thereafter for all personnel who access LEADS data. This also includes IT personnel with access to systems that transmit, store, or process criminal justice information.
3 Security awareness training is not a substitute for the LEADS Security Policy. LEADS users and IT staff working with equipment that transmits, processes, or stores LEADS data shall follow all requirements outlined in the Security Policy. The Security Policy can be downloaded from the following link on terminals with access to the LEADS network:
4 Computerized Criminal History (CCH) - Is a Ohio fingerprint central repository for arrest, conviction, and disposition data on adults and juveniles arrested for felony and gross misdemeanor offenses. It is frequently used during mandated background checks on individuals seeking employment or licensing for various employed and volunteer positions. Criminal Justice Information (CJI) - The abstract term used to refer to all LEADS provided data necessary for law enforcement and civil agencies to perform their missions including, but not limited to, biometric, identity history, biographic, property, and case/incident data. Law Enforcement Automated Data System (LEADS) - Serves as the electronic communication network for Ohio s criminal justice communities and the gateway to NCIC.
5 National Crime Information Center (NCIC) - A computerized index of open warrants, arrests, stolen property, missing persons, and dispositions regarding felonies and serious misdemeanors. III ( Triple-eye for short) is the Interstate Identification Index. III is national index that holds the (Federal Bureau of Investigation) FBI s (Record of Arrest and Prosecution) RAP sheet that contains information reported by local, state and federal law enforcement agencies across the county. Requests associated to a record housed in a particular state are directed to the originating State as needed.
6 International Justice and Public Safety Network (NLETS) (formerly known as the National Law Enforcement Telecommunications System) links together state, local, and federal law enforcement, criminal justice and public safety agencies for the purpose of exchanging information to support law enforcement. Information from each state s criminal records, driver records, vehicle registration records, INTERPOL, Immigrations and Customs Enforcement (ICE), License Plate Reader (LPR) records, and national Amber Alerts. Phishing The practice of luring unsuspecting Internet users to a fake Web site by using authentic-looking with the real organization's logo, in an attempt to steal passwords, financial or personal information, or introduce a virus attack.
7 The TAC does not have to be a technical person, but will need to be able to work with system administrators and vendors to obtain required information. Appointed by each terminal agency administrator. Directly responsible to the agency administrator for the operation and security of LEADS. Serves as a point of contact for the State ISO and all LEADS staff.
8 Understand how computer systems at the agency are connected to LEADS and assist in maintaining network topology documentation. Submit updated diagrams and documentation for approval prior to making any significant changes to the network topology (adding a new system, external network connection, etc.). Maintain a record of any maintenance on systems by non-agency personnel. Log the name of the technician and the company doing the work, as well as the time they start and finish.
9 Ensure all personnel with access to LEADS systems and data are provided security awareness training. Training must be completed biennially and a record of training must be maintained. For the minimum topics to be covered, please refer to the LEADS Security Policy (section 5.2.1). Ensure only authorized personnel have access to LEADS systems. Personnel who do not have a fingerprint-based background check on file are considered unauthorized and required to be escorted by authorized personnel at all times. Ensure all LEADS equipment and terminals are located in a secure room with limited access.
10 Report all suspected security incidents to LEADS Control at to initiate contact with the State Information Security Officer (ISO). Types of incidents that should be reported include: Theft or intentional damage of LEADS equipment Hacking incidents Virus or malware infections Any other situation that could threaten LEADS Violations of LEADS Administrative Rules and instances of misuse shall be reported to the LEADS Administrative staff at (614)
11 Ensure LEADS Security Policy compliance at the local agency in partnership with the State ISO. Develop a Computer Use and Security Policy. Develop a Media Protection Policy. Develop a Remote Access and Internet Use Policy (if applicable to your agency s operation). Develop an agency Business Continuity/Disaster Recovery Plan. TAC Officers will need agency administrator support with these tasks.
12 In addition to the TAC, each agency with LEADS access shall appoint a LASO. The LASO and the TAC can be the same person. Collaborate with the TAC to report all suspected security incidents to LEADS Control at to initiate contact with the State ISO.
13 Identify who is using the LEADS approved hardware, software, and firmware and ensure no unauthorized individuals or processes have access to the same. Identify and document how equipment is connected to LEADS. Ensure that personnel security screening procedures are being followed as stated in the LEADS Security Policy. Ensure the approved and appropriate security measures are in place and working as expected.
14 State ISO TAC LASO
15 A technical security inspection will be conducted a minimum of once every three years by a member of the LEADS Security staff. Technical security inspections are done on-site and can take one to three hours, depending on the complexity and size of the agency s network. The TAC and LASO are required to be present during the inspection.
16 Agencies scheduled for technical security inspections will receive a Pre-Audit Questionnaire that shall be returned, along with a current network diagram, prior to the inspection date. Please make arrangements for a vendor/it person to be available if you are unable to answer technical questions about your systems or policies.
17 A progressive sanction process has been established to enforce the LEADS Administrative Rules and Security Policy. Agencies found to be out of compliance with the rules and/or policy may be subject to the sanction process. For more information on the progressive sanction process, please refer to the Ohio Revised Code 4501:
18 Criminal Justice Information (CJI) includes any and all data that is transmitted or received through the LEADS. The system configuration often contains sensitive details (descriptions of applications, processes, procedures, data structures, authorization processes, data flow, etc.) Agencies shall protect system documentation from unauthorized access consistent with provisions described in Section Access Control in the LEADS Security Policy.
19 Ensure the computer system is protected with a strong password. Ensure the computer is up-to-date with patches (operating system, applications, anti-virus, and antimalware). Practice smart internet habits when browsing. Be selective of the sites you visit and check the security level of web pages that require you to enter personal information.
20 When entering personal information on a website, verify the website is encrypted (i.e. - uses HTTPS). Systems processing, storing, transmitting CJI are required to be located in a physically secure area. Users shall be given the least amount of privileges required on systems accessing and/or containing CJI. Employ segregation of duties - the concept of having more than one person required to complete a task. This ensures that no single person is in a position to introduce fraudulent or malicious code/data without detection.
21 LEADS printouts contain CJI. The following shall apply when dealing with printed LEADS data: Make printouts unreadable prior to disposal. Before exchanging LEADS data, agencies must have formal agreements in place that specify security controls. Do not , transport or store LEADS information on electronic media unless it is encrypted.
22 The agency shall maintain written documentation of the steps taken to sanitize or destroy electronic media. When hard drives, tape cartridges, USB drives, hard copies, print-outs, and other similar items are no longer needed - all media must be destroyed by shredding, burning, or any other method that renders the data unreadable. The agency shall sanitize, that is, overwrite at least three times or degauss electronic media prior to disposal or release for reuse by unauthorized individuals. Inoperable electronic media shall be destroyed (cut up, shredded, crushed, etc.). Agencies shall ensure the sanitization or destruction is witnessed or carried out by authorized personnel.
23 Smartphones and tablets are examples of handheld devices. Some of the threats to these types of devices are: Loss, theft, or disposal Unauthorized access Malware Spam Electronic eavesdropping Electronic tracking (threat to security of data and safety of law enforcement officer) Cloning (not as prevalent with later generation cellular technologies)
24 To help mitigate the risks to handheld devices, agencies shall at a minimum: Apply available critical patches and upgrades to the operating system Configure for local device authentication Use advanced authentication Encrypt all CJI that resides on the device Erase cached information when sessions are terminated Employ personal firewall software Employ antivirus software
25 Strong passwords are required for all users accessing LEADS systems. Strong passwords are created by using the following guidelines: Contain a minimum of 8 characters Include characters from the following categories: Letters (upper and lower case) Numbers Special Characters Make the password appear to be a random sequence of letters, numbers, and special characters. Dictionary words, proper names or the user ID shall not be used.
26 Ensure all passwords changes are in accordance with Section of the LEADS Security Policy. Passwords should be changed frequently. LEADS requires users to change passwords every 60 days. Do not reuse old passwords. LEADS prohibits reuse of the previous 10 passwords. Passwords shall never be shared or written down.
27 The LEADS network is protected by Cisco Clean Access (CCA). CCA helps ensure LEADS terminals are kept upto-date and in compliance with the Security Policy. Systems are scanned to ensure critical Windows security patches are installed and up-to-date anti-virus software is running upon each login. CCA login sessions expire every seven days so systems can be scanned. Clients must re-authenticate when prompted to maintain connectivity to the secure criminal justice network.
28 Anti-virus software is used to identify and remove computer viruses, spyware, and malware. Most modern anti-virus software can protect against a wide range of worms, rootkits and trojans. All systems with LEADS connectivity are required to employ up-to-date virus protection software.
29 System is slow, freezes or crashes. Unusual error messages are displayed. Excessive uncommanded disk drive activity. Applications don t operate properly. Multiple pop-ups windows appear on the screen.
30 When CJI is transported or at rest (stored electronically) outside of the physically secure location it shall be protected via cryptographic mechanisms (encryption). When encryption is employed, the cryptographic module used shall be certified to meet FIPS standards.
31 Windows Update is a service provided by Microsoft that provides updates for the Microsoft Windows operating system. Security updates are delivered on the second Tuesday of each month (a.k.a. Patch Tuesday). Windows Update can be configured to install updates automatically, ensuring a computer is up-to-date and not vulnerable to known computer worms and malware. All computers are required to be kept up-to-date with the latest security patches and service packs.
32 Social Engineering is the act of exploiting a human user to gain access to restricted systems and information (e.g. - Phishing). Use the following guidelines to prevent being a victim of social engineering: Verify identity of requestors. Be cautious when providing information via or over the phone. Remember, an er/caller may not be entitled to the information but may try to fool you by using lingo and buzz words. Do not share information with persons outside the criminal justice community - such as friends, family, acquaintances, or strangers.
33 Spam is the name given to unsolicited bulk that appears in your inbox. Most spam is advertising from dubious products, getrich-quick schemes, or other attempts to solicit money and/or compromise the computer. Never open unsolicited , attachments, or reply to s from an unknown source.
34 Be aware CJI could be compromised in any of the following ways: Tampering with equipment (server, router, etc.) by employee, vendor or unauthorized person. Theft of laptops, handheld devices, or any other device which is used to access LEADS. Unauthorized remote access. Installing/downloading unauthorized software onto systems and network components. Virus/malware infection. Creation of unauthorized user accounts. Unencrypted transmission of LEADS data over non-criminal justice networks (wireless, county networks, telecom carriers).
35 All devices with access to the LEADS network must have adequate physical security to protect against unauthorized access. LEADS routers, switches, firewalls and interface servers must be located in a locked, limited access room. All visitors and vendors must be accompanied by authorized personnel at all times when accessing secure areas. LEADS terminals must be physically positioned so unauthorized persons are unable to view the screen and must employ session lock mechanisms after a maximum of 30 minutes of inactivity (does not apply to dispatch terminals).
36 A personally owned information system shall not be authorized to access, process, store, or transmit CJI unless the agency has established and documented the specific terms and conditions for personally owned information system usage.
37 Any system that accesses CJI shall display an approved system use notification message that contains the following information: The user is accessing a restricted information system. System usage may be monitored, recorded, and is subject to audit. Unauthorized use of the system is prohibited and may be subject to criminal and/or civil penalties. Use of the system indicates consent to monitoring and recording.
38 If you become aware of any policy violation or a situation where LEADS data has been compromised, immediately contact LEADS Control at and begin gathering information for the Computer Incident Report Form (LEADS Security Policy Appendix E). Depending on the severity of the incident, LEADS Control will direct you to LEADS Security staff or the State ISO.
39 You are the key to security, it begins with you. All users are responsible for adherence to the requirements documented in the LEADS Security Policy. Please refer to the Security Policy or contact LEADS Control at with any questions regarding proper operation or security of computer systems.
How To Protect The Time System From Being Hacked
WISCONSIN TIME SYSTEM Training Materials TIME SYSTEM SECURITY AWARENESS HANDOUT Revised 11/21/13 2014 Security Awareness Handout All System Security The TIME/NCIC Systems are criminal justice computer
Physical Protection Policy Sample (Required Written Policy)
Physical Protection Policy Sample (Required Written Policy) 1.0 Purpose: The purpose of this policy is to provide guidance for agency personnel, support personnel, and private contractors/vendors for the
CJIS Information Security Awareness Training for Texas
CJIS Information Security Awareness Training for Texas Objectives This Information Security Awareness Training is designed to equip those who access the data that moves through TLETS with basic tools needed
GENERAL ORDER DISTRICT OF COLUMBIA I. BACKGROUND
GENERAL ORDER DISTRICT OF COLUMBIA Subject CJIS Security Topic Series Number SPT 302 12 Effective Date March 28, 2014 Related to: GO-SPT-302.08 (Metropolitan Police Department (MPD) Wide Area Network)
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
HIPAA Security Alert
Shipman & Goodwin LLP HIPAA Security Alert July 2008 EXECUTIVE GUIDANCE HIPAA SECURITY COMPLIANCE How would your organization s senior management respond to CMS or OIG inquiries about health information
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Information Technology. Security Awareness Training for Administrative Personnel
Information Technology Security Awareness Training for Administrative Personnel This training information is intended for criminal justice Administrative Personnel without direct access to IDACS/CJIS systems.
Approved By: Agency Name Management
Policy Title: Effective Date: Revision Date: Approval(s): LASO: CSO: Agency Head: Media Protection Policy Every 2 years or as needed Purpose: The intent of the Media Protection Policy is to ensure the
Client Advisory October 2009. Data Security Law MGL Chapter 93H and 201 CMR 17.00
Client Advisory October 2009 Data Security Law MGL Chapter 93H and 201 CMR 17.00 For a discussion of these and other issues, please visit the update on our website at /law. To receive mailings via email,
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Infocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Remote Deposit Quick Start Guide
Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Managed Hosting & Datacentre PCI DSS v2.0 Obligations
Any physical access to devices or data held in an Melbourne datacentre that houses a customer s cardholder data must be controlled and restricted only to approved individuals. PCI DSS Requirements Version
ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
Franciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
PCI Data Security and Classification Standards Summary
PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS.
CJIS SECURITY POLICY: VERSION 5.2 CHANGES AND THE UPCOMING REQUIREMENTS. Alan Ferretti CJIS Information Security Officer Texas Department of Public Safety CJIS Security Policy version 5.2: On 8/9/2013
Security Awareness Training CJIS SECURITY POLICY V5.4 POLICY AREA 2
Security Awareness Training CJIS SECURITY POLICY V5.4 POLICY AREA 2 Level 1: Baseline security awareness training for all authorized personnel with access to CJI. Level 2: Personnel with both physical
Peace Corps Office of the OCIO Information and Information Technology Governance and Compliance Rules of Behavior for General Users
Table of Contents... 1 A. Accountability... 1 B. System Use Notification (Login Banner)... 1 C. Non-... 1 D. System Access... 2 E. User IDs... 2 F. Passwords... 2 G. Electronic Information... 3 H. Agency
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Network and Workstation Acceptable Use Policy
CONTENT: Introduction Purpose Policy / Procedure References INTRODUCTION Information Technology services including, staff, workstations, peripherals and network infrastructures are an integral part of
Section 5 Identify Theft Red Flags and Address Discrepancy Procedures Index
Index Section 5.1 Purpose.... 2 Section 5.2 Definitions........2 Section 5.3 Validation Information.....2 Section 5.4 Procedures for Opening New Accounts....3 Section 5.5 Procedures for Existing Accounts...
Data Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices
Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices Protecting Criminal Justice Information: Achieving CJIS Compliance on Mobile Devices It s common today for law enforcement
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices
SUBJECT: Effective Date Policy Number Security of Mobile Computing, Data Storage, and Communication Devices 8-27-2015 4-007.1 Supersedes 4-007 Page Of 1 5 Responsible Authority Vice Provost for Information
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Procedure Title: TennDent HIPAA Security Awareness and Training
Procedure Title: TennDent HIPAA Security Awareness and Training Number: TD-QMP-P-7011 Subject: Security Awareness and Training Primary Department: TennDent Effective Date of Procedure: 9/23/2011 Secondary
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009
MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009 Current Laws: Identity Crime: A person is guilty of identity
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Lawrence Police Department Administrative Policy. August 2013. A. Access to CJIS sensitive data is only available to authorized users.
Lawrence Police Department Administrative Policy SUBJECT Criminal Justice Information System (CJIS) APPLIES TO All Personnel EFFECTIVE DATE REVISED DATE August 2013 APPROVED BY Chief of Police TOTAL PAGES
Cyber Self Assessment
Cyber Self Assessment According to Protecting Personal Information A Guide for Business 1 a sound data security plan is built on five key principles: 1. Take stock. Know what personal information you have
Alan Ferretti CJIS Information Security Officer
Alan Ferretti CJIS Information Security Officer CJIS Technical Audit Overview Who, What, Why and When Audit Process Review Network Diagram Review Written Policies/Process Available Resources Helps To Know.
Course: Information Security Management in e-governance
Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
NC DPH: Computer Security Basic Awareness Training
NC DPH: Computer Security Basic Awareness Training Introduction and Training Objective Our roles in the Division of Public Health (DPH) require us to utilize our computer resources in a manner that protects
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
Criminal Justice Information Services (CJIS) Security Policy
U. S. Department of Justice Federal Bureau of Investigation Criminal Justice Information Services Division Criminal Justice Information Services (CJIS) Security Policy Version 5.0 Prepared by: CJIS Information
Cyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
Information Security Policy Manual
Information Security Policy Manual Latest Revision: May 16, 2012 1 Table of Contents Information Security Policy Manual... 3 Contact... 4 Enforcement... 4 Policies And Related Procedures... 5 1. ACCEPTABLE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE
SUPREME COURT OF COLORADO OFFICE OF THE CHIEF JUSTICE Directive Concerning the Colorado Judicial Department Electronic Communications Usage Policy: Technical, Security, And System Management Concerns This
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Remote Deposit Terms of Use and Procedures
Remote Deposit Terms of Use and Procedures Use of American National Bank Fox Cities (Bank) Remote Deposit service is subject to the following Terms of Use and Procedures. Bank reserves the right to update
MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)
MIT s Information Security Program for Protecting Personal Information Requiring Notification (Revision date: 2/26/10) Table of Contents 1. Program Summary... 3 2. Definitions... 4 2.1 Identity Theft...
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008
DRAFT National Rural Water Association Identity Theft Program Model September 22, 2008 This model has been designed to help water and wastewater utilities comply with the Federal Trade Commission s (FTC)
Information Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Information Security It s Everyone s Responsibility
Information Security It s Everyone s Responsibility Developed By The University of Texas at Dallas (ISO) Purpose of Training As an employee, you are often the first line of defense protecting valuable
Noncriminal Justice Agency Guide
\ Arkansas Crime Information Center Noncriminal Justice Agency Guide 1 Contents Acronym Glossary... 4 Introduction... 5 Overview & History... 5 Arkansas... 5 Use of Criminal History Record Information
SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS
SHP-570A 1/14 SECURITY and MANAGEMENT CONTROL OUTSOURCING STANDARD For NON-CHANNELERS The goal of this document is to provide adequate security and integrity for criminal history record information (CHRI)
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR
Guide to INFORMATION SECURITY FOR THE HEALTH CARE SECTOR Information and Resources for Small Medical Offices Introduction The Personal Health Information Protection Act, 2004 (PHIPA) is Ontario s health-specific
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
Identity Theft Prevention Program Compliance Model
September 29, 2008 State Rural Water Association Identity Theft Prevention Program Compliance Model Contact your State Rural Water Association www.nrwa.org Ed Thomas, Senior Environmental Engineer All
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users
Fingerprint-Based Background Check Responsibilities for Non-Criminal Justice Agencies and Users Version 1.2 Hawaii Criminal Justice Data Center March 20, 2014 Table of Contents Table of Contents... 2 I.
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL
LAW ENFORCEMENT INFORMATION NETWORK INFORMATION MANUAL The Michigan Law Enforcement Information Network (LEIN) is a statewide computerized information system established in 1967 as a service to Michigan
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008
CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft when he intentionally
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008
COLORADO IDENTITY THEFT RANKING BY STATE: Rank 8, 89.0 Complaints Per 100,000 Population, 4328 Complaints (2007) Updated November 28, 2008 Current Laws: A person commits identity theft if he or she: Knowingly
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
CITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents
Chapter 84 Information Security Rules for Street Hail Livery Technology System Providers Table of Contents 84-01 Scope of the Chapter... 2 84-02 Definitions Specific to this Chapter... 2 83-03 Information
Columbus Police Division Directive. I. Definitions. May 15, 1993 10.01 REVISED. Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 10.01 REVISED TOTAL PAGES Mar. 30, 2014 9 Division Computer Systems I. Definitions A. Executable File A program or file that automatically
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
