Security and Network Use at Junction City School District
|
|
- Everett Edwards
- 8 years ago
- Views:
Transcription
1 Security and Network Use at Junction City School District
2 Why do we need to secure our information? Doesn t the state do that for us? The Department of Information Systems does secure our student and personal information from others outside of the school network. But what if someone here at school went to your computer and was able to access everything. They could change grades, find out SSN s, addresses; even remove someone from the system.
3 What can be done to help prevent this? Every computer will have a screensaver lock on it. After 15 min of inactivity, the screensaver will come on and lock the computer. You will have to put your network password in to get back in the computer. Computer that has frequent access to APSCN will have a 5 min screensaver enforced. The computer can be locked manually when you have something important open and need to step away from the computer.
4 What can be done to help prevent this? Every person that uses a computer will have a username and password that adheres to the ADE standards. When a user is finished using the computer, the computer will have to be either logged off or shut down.
5 Login Standards THERE WILL BE NO MORE GENERIC USERNAMES AND NO PASSWORD ENTRIES Each user will have his/her own username and password to log into the network. This password will also be used for your . Passwords will need to change every 90 days for faculty and 180 for students. Each student will have to log out when they are finished with the computer.
6 Password Management Password Standards At least 8 characters in length Mixture of alphanumeric characters Not reused within five password changes Change user password if suspect their password has been compromised
7 Password Selection Eight characters in length (at minimum) Mixture of alphanumeric characters letters, numbers, special characters Both uppercase/lowercase letters (at least three) Digits/punctuation characters (at least two) Not in any dictionary (not any language, slang, dialect, jargon, etc.) No personal information, names of family, etc. Easy to remember Can be typed quickly Put together an acronym that has special meaning to you
8 Password Handling A password you memorize is more secure You should NEVER write down a password, but if you must write down a password, follow a few precautions: Do not identify the password as being a password Do not include the name of the account on the same piece of paper Do not attach the password to a terminal, keyboard, or any part of a computer Mix in some noise characters or scramble the written version of the password in a way that you remember, but make the written version different from the real password Never record a password on-line and never send a password to another person via
9 Password Handling Don t reveal a password over the phone Don t reveal a password in an message Don t reveal a password to the boss Don t talk about a password in front of others Don t hint at the format of a password (e.g., my family name ) Don t reveal a password on questionnaires or security forms Don t share a password with family members Don t reveal a password to co-workers while on vacation
10 Novell Zenworks Zenworks is a content management tool that we can use to better manage the computers and users on the computers. It allows the ability to install programs without having to physically go to the computers. It gives remote access to view or control the computer. It will set up policies to manage individual computers and updates.
11 Novell Zenworks Logging In Zenworks uses the same username and password that you use to log onto the network, so you should never see a ZENworks log in page. If you see a Zenworks log on page, press cancel and notify me.
12 User Management Each person who uses a computer will have to have a username and password that complies with State requirements. Each student will have their own username from 12 th grade down to 4 th grade. K 3 will have a single username and password for all teachers. Only those grade teachers can use those usernames specified for their grade. Each user will have their own home directory on the server. This is used to save important documents and files needed for everyday use. Music, pictures, and large files will need to be saved either on a flash/jump/ usb drive or external hard drive.
13 Computer Protection We do have a centralized managed anti-virus program on the computer, as well as anti-malware/ anti-spyware software. But it may not be able to protect your computer from some viruses, so make sure you know what you are clicking on. You can get viruses and malware/spyware from many places that you wouldn t think of normally.
14 Ways to get Viruses and Malware 1. Go to porn websites. 2. Try to go to Warez and Crack websites. 3. Use music sharing software. 4. Download free screensavers, toolbars, browser helpers, unknown cleaners and that type of thing - especially software offered from pop-up ads. 5. Put on the Webshots screen saver or any other screen saver that updates daily. 6. Run as many things in the background as possible; even for software you use only once in a while. 7. Don t delete drivers from printers you threw away 5 years ago. 8. Download animated cursors. 9. Use the automatic viewer pane in your program. 10. Blindly click on things without reading them. 11. Going to websites that promote 'free' coupons and bargains
15 How to get rid of viruses and malware Programs that we have to scan computers to get rid of the viruses and malware AVG Malwarebytes After scanning the computer, if you still have a virus, notify me so I can perform diagnostics to help remove the problem.
16 Q & A
Siena College Password Management Policy
Siena College Password Management Policy Updated: 5/29/14 Note: Status: Approved. I. Purpose: The purpose of this policy is to establish a standard for the creation of strong passwords, the protection
More informationCAPITAL UNIVERSITY PASSWORD POLICY
1.0 Overview Passwords are an important aspect of computer security. They are the front line of protection for user accounts. A poorly chosen password may result in the compromise of Capital University's
More informationTHE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY
THE PENNSYLVANIA STATE UNIVERSITY OFFICE OF HUMAN RESOURCES PASSWORD USAGE POLICY 1.0 Purpose The purpose of this policy is to establish Office of Human Resources (OHR) standards for creation of strong
More informationState of Vermont. User Password Policy and Guidelines
State of Vermont User Password Policy and Guidelines Date of Rewrite Approval: 10/2009 Originally Approved: 4/08/2005 Approved by: Neale F. Lunderville Policy Number: fib lleul~ 1.0 Introduction... 3 1.1
More informationCal State Fullerton Account and Password Guidelines
Cal State Fullerton Account and Password Guidelines Purpose The purpose of this guideline is to establish a standard for account use and creation of strong passwords which adheres to CSU policy and conforms
More informationInformation Security
Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff
More informationBoston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
More informationBrazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005
Brazosport College VPN Connection Installation and Setup Instructions Draft 2 March 24, 2005 Introduction This is an initial draft of these instructions. These instructions have been tested by the IT department
More informationInformation Security Policy. Policy and Procedures
Information Security Policy Policy and Procedures Issue Date February 2013 Revision Date February 2014 Responsibility/ Main Point of Contact Neil Smedley Approved by/date Associated Documents Acceptable
More informationComputer System Information Century School District 2007-08 Daniel E. Cook
Computer System Information Century School District 2007-08 Daniel E. Cook Account Log On There are various ways to log on to the school s server. Each one has a unique reason. Teacher Log On Teacher Log
More informationPassword Expiration Passwords require a maximum expiration age of 60 days. Previously used passwords may not be reused.
DRAFT 6.1 Information Systems Passwords OVERVIEW Passwords are an important aspect of information security. They are the front line of protection for user accounts. A poorly chosen password may result
More informationMSD IT High Compliance system Fact sheet
MSD IT High Compliance system Fact sheet The MSD IT High Compliance system is a service for Clinical Trials Units (CTUs) and Medical Division Departments or Units who need to securely access critical applications,
More informationQueen's Drive Web Access -
Page 1 Queen's Drive Web Access - To access your networked files (Q: Drive) off-campus Most staff members are still on the Novell system for central file storage and should use Netstorage for remote access
More informationSchools CPD Online General User Guide Contents
Schools CPD Online General User Guide Contents New user?...2 Access the Site...6 Managing your account in My CPD...8 Searching for events...14 Making a Booking on an Event...20 Tracking events you are
More informationIntroduction to Computing @ WSU
Introduction to Computing @ WSU Table of Contents 1 - Information Technology (IT) Security... 2 Information to Remember... 2 2 - Malware... 2 Information to Remember... 3 3 - Firewalls... 3 Information
More informationInformation Security Manager Training
Information Security Manager Training Kent Swagler CCEP Director, Corporate Compliance Direct line (314) 923-3097 Cell (314) 575-8334 kswagler@metrostlouis.org Information Security Manager Training Overview
More informationUsing TS-ACCESS for Remote Desktop Access
Using TS-ACCESS for Remote Desktop Access Introduction TS-ACCESS is a remote desktop access feature available to CUA faculty and staff who need to access administrative systems or other computing resources
More informationJMA Domain Instructions/Policies
JMA Domain Instructions/Policies Login (for faculty and students): If you have used one of our labs before (you have a JMA account), your username is the same. If you have not been in the lab before, your
More informationWindows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
More informationUsing Spy Sweeper for Windows Author: Jocelyn Kasamoto
WIN1048 February 2009 Using Spy Sweeper for Windows Author: Jocelyn Kasamoto Introduction 1 System Requirements 2 Installation Instructions 2 Post Installation Tasks 3 Running Spy Sweeper 3 Subscription
More informationAESDIRECT ACCOUNT ADMINISTRATION USER GUIDE
AESDIRECT ACCOUNT ADMINISTRATION USER GUIDE Updated June 24, 2014 Table of Contents OVERVIEW... 3 AESDirect Roles Defined... 3 Account Administrator... 3 User Managers... 3 Users... 4 AESDIRECT RULES...
More informationOnline School Payments (OSP) User Guide
Online School Payments (OSP) User Guide November, 2013 OSP User Guide Table of Contents Overview...3 Site Information...3 Login to Portal...4 Activity Setup...6 OSP Activity Setup Form...6 Add Activity...7
More information2. _General Help and Technical Support
1. _Welcome Welcome to Business Internet Banking. Our online service is available 06:00 AM ET 12:00 AM (Midnight) ET, seven days a week, so you and your employees can manage your business banking accounts
More informationUSER GUIDE. General Information... 2. The BeAnywhere Service... 2. BeAnywhere Server... 2. BeAnywhere DRIVE... 2. Security... 2
USER GUIDE TABLE OF CONTENTS General Information... 2 The BeAnywhere Service... 2 BeAnywhere Server... 2 BeAnywhere DRIVE... 2 Security... 2 Level 1 User Security... 3 Level 2 Communications Security...
More informationM&T Web InfoPLU$ GETTING STARTED GUIDE
M&T Web InfoPLU$ GETTING STARTED GUIDE Web InfoPLU$ Getting Started Guide Welcome to Web InfoPLU$, M&T s Internet reporting and payment service. The purpose of this guide is to help you log on for the
More informationComputer Security Self-Test: Questions & Scenarios
Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.
More informationUsing the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service.
Using the ScoMIS Remote Access Service (VPN Gateway) to access the ScoMIS SIMS.net Terminal Server Service. The ScoMIS Remote Access Gateway offers a convenient method to connect direct to SIMS.net Terminal
More informationBasic Virus Removal Steps
Basic Virus Removal Steps The following are basic instructions on how to remove most virus and spyware that infect Windows XP/Vista computers. By providing these, we hope that users will be able to remove
More informationRemote Desktop Part II. AHS Computing
Remote Desktop Part II AHS Computing Overview How to become connected at home How to be secure when connecting from home Hazards of home computing How to work from home Troubleshooting issues from home
More informationOSP User Guide. 1 P a g e
Online School Payments (OSP) User Guide February, 2014 OSP User Guide Table of Contents Overview...3 Site Information...3 Login to Portal...4 Activity Setup...6 OSP Activity Setup Form...6 Add Activity...7
More informationAIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security. www.uscyberpatriot.
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE Microsoft Windows Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION
More informationBusiness Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
More informationMortgage Quest WebDesk Setup and Login Instructions
Initial WebDesk Setup Mortgage Quest WebDesk Setup and Login Instructions 1. The following steps need to be performed one time only. 2. Start Microsoft Internet Explorer. 3. Enter the address: http://webdesk.emarketfocus.com/
More informationAccessing your Staff (N and O drive) files from off campus
Accessing your Staff (N and O drive) files from off campus It is possible to access your N and O drive files while you are off campus, for example whilst working from home or travelling. This document
More informationScoMIS Encryption Service
Introduction This guide explains how to implement the ScoMIS Encryption Service for a secondary school. We recommend that the software should be installed onto the laptop by ICT staff; they will then spend
More informationDocument Control Policy & Procedure 15
Bethany Care Ltd Document Control Policy & Procedure 15 Date Created 19/10/2007 Date Reviewed 12/02/2014 Document Review Details Reviewed by Brian Lynch (Quality Assurance) Date of next review February
More informationHow to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
More informationHIPAA Privacy & Security Health Insurance Portability and Accountability Act
HIPAA Privacy & Security Health Insurance Portability and Accountability Act ASSOCIATE EDUCATION St. Elizabeth Medical Center Origin and Purpose of HIPAA In 2003, Congress enacted new rules that would
More informationNETWORK AND INTERNET SECURITY POLICY STATEMENT
TADCASTER GRAMMAR SCHOOL Toulston, Tadcaster, North Yorkshire. LS24 9NB NETWORK AND INTERNET SECURITY POLICY STATEMENT Written by Steve South November 2003 Discussed with ICT Strategy Group January 2004
More informationSafe Practices for Online Banking
November 2012 Follow these guidelines to help protect your information while banking online. At First Entertainment Credit Union, our goal is to provide you with the best all around banking experience.
More information31 Ways To Make Your Computer System More Secure
31 Ways To Make Your Computer System More Secure Copyright 2001 Denver Tax Software, Inc. 1. Move to more secure Microsoft Windows systems. Windows NT, 2000 and XP can be made more secure than Windows
More informationWhen you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
More informationCyber Security Best Practices
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
More informationFranciscan University of Steubenville Information Security Policy
Franciscan University of Steubenville Information Security Policy Scope This policy is intended for use by all personnel, contractors, and third parties assisting in the direct implementation, support,
More informationCITY OF BOULDER *** POLICIES AND PROCEDURES
CITY OF BOULDER *** POLICIES AND PROCEDURES CONNECTED PARTNER EFFECTIVE DATE: SECURITY POLICY LAST REVISED: 12/2006 CHRISS PUCCIO, CITY IT DIRECTOR CONNECTED PARTNER SECURITY POLICY PAGE 1 OF 9 Table of
More informationUsing Virtual Machines
Using Virtual Machines We will use VMs in CIT 130 so that you can access both a Windows 7 and a Linux machine. You will be able to access these from on and off campus (off campus access will require that
More informationWINDOWS 7 & HOMEGROUP
WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows
More informationU.S. Bank Secure Mail
U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email
More information10 Things You Need to Know About Internet Security
INFORMATION SECURITY 10 Things You Need to Know About Internet Security Presented by: Steven Blanc IT Security Officer, Bowdoin College Internet Security Versus Internet Safety Security: We must secure
More informationONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS
$ ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS Boston Private Bank & Trust Company takes great care to safeguard the security of your Online Banking transactions. In addition to our robust security
More informationMarcum LLP MFT Guide
MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9
More informationAdvanced Digital Imaging
Asset Management System User Interface Cabin River Web Solutions Overview The ADI Asset Management System allows customers and ADI to share digital assets (images and files) in a controlled environment.
More informationSecurity Tips You are here: Home» Security Tips
Security Tips You are here: Home» Security Tips Click on a the Security Icon to view detailed information on: Responsibility of the Bank Password Policy Guide Online Security Internet Security Tips Scam
More informationSeven Practices for Computer Security
A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than
More informationInfocomm Sec rity is incomplete without U Be aware,
Infocomm Sec rity is incomplete without U Be aware, responsible secure! HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD [ 2 ] FASTEN
More informationYale Secure File Transfer User Guide
Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Yale Secure File Transfer User Guide This document provides information and detailed steps for using Yale's
More informationUniversity for the Creative Arts. Mobile Working and Remote Access Policy
Mobile Working and Remote Access Policy Version 1.0 Date: 20 July 2009 Document History Version History 1.0 20 July 2009 Approved for publication by the IS Board after E&FC approval in June 2009 Title:
More informationSebastian County Information Systems Department New Hire Orientation Computer Use and Policy. Revised 3/6/2015
Sebastian County Information Systems Department New Hire Orientation Computer Use and Policy Revised 3/6/2015 Agenda Overview Logging in Password Security and Criteria How to change your password Where
More informationDIRECT CERTIFICATION. Patricia Winders Director s Conference July 29, 2014
DIRECT CERTIFICATION Patricia Winders Director s Conference July 29, 2014 Direct Certification Grant USDA Direct Certification Grant ADE, CNU received $944,908 8 Projects were developed to assist schools
More informationData Access Request Service
Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations
More informationPrivacy & Security Standards to Protect Patient Information
Privacy & Security Standards to Protect Patient Information Health Insurance Portability & Accountability Act (HIPAA) 12/16/10 Topics An An Introduction to to HIPAA HIPAA Patient Rights Rights Routine
More informationBest Practices for Information Security
Best Practices for Information Security Suzanne Dmytrenko, Information Privacy Officer Email: suzanne@sfsu.edu. Ph: 415-338-2823 Mig Hofmann, Information Security Officer Email: mig@sfsu.edu. Ph: 415-338-3018
More informationINTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. ccayne@biblio.org
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library ccayne@biblio.org Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
More informationPhotocopying and scanning
Photocopying and scanning Logging in at the copier Scan your card using the Barcode Scanner at the copier Press in the PIN field Enter your PIN, and then press OK. 1 Photocopying 1. Position your document
More informationMalware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
More informationA) What do I do when I get a screen with an error message that reads: Logon with URL parameter not possible; logon cookie is missing?
A) What do I do when I get a screen with an error message that reads: Logon with URL parameter not possible; logon cookie is missing? Go to your Internet explorer then click Help About Internet explorer
More informationBSHSI Security Awareness Training
BSHSI Security Awareness Training Originally developed by the Greater New York Hospital Association Edited by the BSHSI Education Team Modified by HSO Security 7/1/2008 1 What is Security? A requirement
More informationPlease note that all activities on IADT s Wireless Network are subject to IADT s ICT A/AUP and
Guide To: Wireless Printing on IADT Campus Great news, all wireless enabled stadent and staff laptops based around the Microsoft operating systems can now print to IADT printers through the wireless network.
More informationSBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
More informationOnline Valuation Portal User Guide
Online Valuation Portal User Guide Online User Guide Logging in for the first time This guide is designed to help explain how to login in to our updated Online Client Portal. If you are unable to login
More informationCLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3
CLEO ~Remote Access Services Remote Desktop Access User guide CLEO Remote Access Services CLEO Remote Desktop Access User Guide v1.3 August 2007 page 1 of 16 CLEO 2007 CLEO Remote Access Services 3SGD
More informationGetting Started with VMware Horizon View (Remote Access)
Getting Started with VMware Horizon View (Remote Access) In an effort to improve remote access and provide a familiar desktop experience at home, we are transitioning away from Citrix and implementing
More informationThe Care and Feeding of Your Computer Troubleshooting and Maintenance
Keeping It Clean The Care and Feeding of Your Computer Troubleshooting and Maintenance The computer itself: Regularly dust the exterior. You can use a cloth dampened slightly with water, but do not use
More informationYMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY
YMDDIRIEDOLAETH GIG CEREDIGION A CHANOLBARTH CYMRU CEREDIGION AND MID WALES NHS TRUST PC SECURITY POLICY Author Head of IT Equality impact Low Original Date September 2003 Equality No This Revision September
More informationINTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer. CAPTCHAS: type the letters to set up an online account
INTERNET SAFETY: VIRUS: a computer program that can copy itself and infect your computer Malware: Harmful software programs designed to damage your computer without you knowing. Spyware: Undetected programs
More informationRemote Access User Instructions
Remote Access User Instructions NOTE. Accessing the network remotely requires the installation of a digital certificate on your PC. If you are using a CEOM laptop, a Digital Certificate will be already
More informationNCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.
NCS 330 Information Assurance Policies, Ethics and Disaster Recovery NYC University Polices and Standards 4/15/15 Jess Yanarella Table of Contents: Introduction: Part One: Risk Analysis Threats Vulnerabilities
More informationNETWORK SECURITY GUIDELINES
NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus
More informationSTUDENT S INFORMATION SECURITY GUIDE
STUDENT S INFORMATION SECURITY GUIDE April 2013 Table of contents Information security is important - also for you...1 Use strong passwords and keep them safe...2 E-mail use...3 Beware of phishing and
More informationSPICE EduGuide EG0015 Security of Administrative Accounts
This SPICE EduGuide applies to HSC information systems, specifically Administrative login accounts; (aka Admin accounts) and the faculty, staff and students who use them. Admin accounts are logon IDs and
More informationCVM Computer Security Training
CVM Computer Security Training Responsible Computing Practices Veterinary Information Systems March 2008 Agenda Physical Security Responsible Behavior Minimum Computer Security Standards (MCSS) Data Definitions
More information1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.
Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar
More informationFrequently asked questions.
Frequently asked questions. What is Bath Online? Bath Online is the online savings service from Bath Building Society that provides you with 24-hour access to view your existing savings accounts and the
More informationTable of Contents. Changing Your Password in Windows NT p. 1. Changing Your Password in Alpha Connection.. pp. 1-3
Table of Contents Changing Your Password in Windows NT p. 1 Changing Your Password in Alpha Connection.. pp. 1-3 Not Able to Get Outlook Express Mail Because Alpha Connection Password Expires... pp. 3-4
More informationOnline Employment Application Guide: Seattle Public Schools
This guide describes how to apply for jobs using the Seattle Public Schools NEOGOV job application system. The process consists of the following steps: Create an Account Find Jobs Apply for a Job CREATE
More informationManagement Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete
Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.
More informationSecure Global Desktop (SGD)
Secure Global Desktop (SGD) Table of Contents Checking your Java Version...3 Preparing Your Desktop Computer...3 Accessing SGD...5 Logging into SGD...6 Using SGD to Access Your Desktop...7 Using SGD to
More informationUsing the GroupWise Client
Spring 2006 (Our appreciation to Jennifer Sherouse for her assistance in editing and improving this document) Page 1 of 15 What is the GroupWise Client The GroupWise client is a program that installs on
More informationKeeping you and your computer safe in the digital world.
Keeping you and your computer safe in the digital world. After completing this class, you should be able to: Explain the terms security and privacy as applied to the digital world Identify digital threats
More informationNovo Nordisk Secure File Transfer User Guide
hehe Novo Nordisk Secure File Transfer User Guide Table of Contents 1. Purpose of this document... 2 2. Getting Access... 2 3. Installing the Upload/Download Wizard (first time only)... 2 4. Uploading
More informationINTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP)
4510.2 INTERNET AND COMPUTER ACCEPTABLE USE POLICY (AUP) The Board of Education is committed to the optimization of student learning and teaching. The Board considers computers to be a valuable tool for
More informationPOLICY. Number: 7311-25-003 Title: Password Policy
POLICY Number: 7311-25-003 Title: Password Policy Authorization [ ] President and CEO [X] Vice President, Finance and Corporate Services Source: Director, Information Technology Services Cross Index: 7311-25-002,
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationMacScan. MacScan User Guide. Detect, Isolate and Remove Spyware
MacScan MacScan User Guide Detect, Isolate and Remove Spyware Part 1 1.1 Introduction MacScan is a spyware detection utility for Macintosh OS X that finds and removes spyware and other Internet files
More informationInitial Client Setup Manual v. 5.5 InHOUSE Alameda Countywide HMIS System
Initial Client Setup Manual v. 5.5 InHOUSE Alameda Countywide HMIS System Manual written to correspond with ServicePoint software version 5.11.2 10/6/2014 InHOUSE Alameda Countywide HMIS System - ServicePoint
More informationDHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
More informationThose who wish to remotely log on to a Pepperdine Windows desktop computer will also need to have these instructions with them when they connect.
Using Microsoft s Remote Desktop Connection (RDC) program, Pepperdine faculty and staff who use Macintosh and Windows computers can log on to Pepperdine s Remote Access Server (remoteaccess.pepperdine.edu)
More informationGeneral tips for increasing the security of using First Investment Bank's internet banking
General tips for increasing the security of using First Investment Bank's internet banking Dear Clients, First Investment Bank (Fibank, the Bank) provides you with high level of protection and security
More informationBRILL s Editorial Manager (EM) Manual for Reviewers
BRILL s Editorial Manager (EM) Manual for Reviewers Table of Contents Introduction... 2 1. Logging into EM... 2 2. Changing Your Access Codes and Contact Information... 2 3. Agreeing or Declining to Review...
More information...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...
TABLE OF CONTENTS...1 CITRIX REMOTE ACCESS WINDOWS 7...1 TABLE OF CONTENTS...1 ADDING CITRIX.AKERMAN.COM AS A TRUSTED SITE TO INTERNET EXPLORER 8.0...2 INSTALLING THE ENDPOINT ANALYSIS...4 LOGGING OFF
More information