HEALTH SCIENCE CENTER HANDBOOK OF OPERATING PROCEDURES



Similar documents
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Best Practices for PCI DSS V3.0 Network Security Compliance

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

UCIT INFORMATION SECURITY STANDARDS

Configuring Switch Ports and VLAN Interfaces for the Cisco ASA 5505 Adaptive Security Appliance

Innovative Defense Strategies for Securing SCADA & Control Systems

Office of Information Technology Service Catalog FY2015

Owner of the content within this article is Written by Marc Grote

Office of Information Technology Service Catalog FY2015

Credit Card Security

UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Recommended IP Telephony Architecture

Simplifying Payment Card Industry Compliance

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.1 April 2015

Associate in Science Degree in Computer Network Systems Engineering

Scalable Secure Remote Access Solutions

How To Protect Your School From A Breach Of Security

E-commerce Production Firewalls

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Laney Information Technology Services

Altus UC Security Overview

Teleworking Technology Guide and Checklist. UW Information Technology. November 2012

Knowledgebase Solution

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2

1B1 SECURITY RESPONSIBILITY

Technology Innovation Programme

POLICY. Number: Title: Password Policy

Information Technology Services in UB Owned, Controlled and Managed Space

Blacklisting Procedure

Building Secure Networks for the Industrial World

Security Awareness. Wireless Network Security

Network Service Policy

Information Resources Security Guidelines

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

DEPARTMENT OF INFORMATION TECHNOLOGY

Viterbo University Credit Card Processing & Data Security Procedures and Policy

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.0 November 2013

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

PCI Compliance Report

FIREWALLS & CBAC. philip.heimer@hh.se

Information Security Network Connectivity Process

Network Security Topologies. Chapter 11

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Wright State University Information Security

Payment Card Industry (PCI) Data Security Standard Report on Compliance. Template for Report on Compliance for use with PCI DSS v3.0. Version 1.

Achieving PCI-Compliance through Cyberoam

Cornerstones of Security

Firewalls. Chapter 3

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Networking Basics and Network Security

HEC Security & Compliance

performs a variety of complicated tasks, may lead and direct the work of others, may report directly to a project

Payment Card Industry Data Security Standard C-VT Guide

SECTION 1: INTRODUCTION

EZblue BusinessServer The All - In - One Server For Your Home And Business

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

ADMINISTRATIVE POLICY # (2014) Remote Access. Policy Number: ADMINISTRATIVE POLICY # (2014) Remote Access

PCI Compliance. by: David Koston

Firewall and Router Policy

Session 14: Functional Security in a Process Environment

Top 10 Questions to Ask when Choosing a Secure File Transfer Solution

CTS2134 Introduction to Networking. Module Network Security

modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:

Access control policy: Role-based access

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Lab Configuring Access Policies and DMZ Settings

E-Commerce Security Perimeter (ESP) Identification and Access Control Process

Secure Auditor PCI Compliance Statement

CENG Information Technology Services University of North Texas

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

Payment Card Industry (PCI) Data Security Standard

Security Design.

Information & Telecommunication Technology

Cisco Networking Professional-6Months Project Based Training

Infrastructure Support Engineer Job Profile

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Evaluating Internal and Outsourced Models for Network Monitoring

Chapter 7. Firewalls

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

Payment Card Industry (PCI) Data Security Standard

Ranch Networks for Hosted Data Centers

Network Security Guidelines. e-governance

NETWORK INFRASTRUCTURE USE

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Network System Management. Creating an Active Directory Domain

Network Access Security. Lesson 10

Information Pack. Network Administrator. Thank you for your interest in applying for the position Network Administrator with the City of Ballarat.

CompTIA Network+ (Exam N10-005)

March

IT LABOR CATEGORY REQUIREMENTS AND DESCRIPTIONS

Transcription:

DEFINITIONS Definitions ACCESS CONTROL EXECUTIVE (ACE): Each department has a designated ACE, who is responsible for managing the departmental users who have been granted access to PeopleSoft applications, the Document Review System, Data Warehouse, PeopleSoft business systems, and/or other business system databases. CARDHOLDER DATA: At a minimum, cardholder data contains the full credit card primary account number (PAN). Cardholder data may also appear in the form of the full PAN plus any of the following: Cardholder name Expiration date Service code (the three- or four-digit security code on the back of the credit card; AMEX is on the front) CHIEF INFORMATION SECURITY OFFICER (CISO): Responsible to the Information Resources Manager (IRM)/Vice President and Chief Information (VP/CIO) for administering the information security functions within the University, including UT Medicine. The CISO is the University s primary internal and external point of contact for information security matters. CLIENT SUPPORT SERVICES (CSS): The Department of Client Support Services (CSS) was created to optimize and manage the client service functions of Information Management and Services (IMS). These functions include, but are not limited to, all help desk functions, billing for communications and customer support services, end user training and support, enterprise level computer support services and software (including Microsoft), phones and other telecommunication devices, Technical Support Representative (TSR) program, account management, and the Health Science Center Computer Store. The main goal for CSS is to provide exemplary customer support to students, staff, and faculty. CSS will concentrate on creating a one stop customer service center for IMS by leveraging teamwork, technology, expert knowledge, professionalism, and the commitment to excellence. Page 1 of 5

DATA OWNER: In most cases the data owner is the head of the department of division (Dean, Chair or Director). In most research organizations, or departments with a research mission, the data owner is the Principal Investigator that is responsible for the research study. DEMILITARIZED ZONE (DMZ): A networking term used to describe an isolated network segment that has open access to the public network (Internet) but very restricted access inside the firewall to the protected side of the computer network. The DMZ serves as a security buffer between the two sides. FILE TRANSFER PROTOCOL (FTP): A server/client application for transferring files between network devices. IMS SERVICE DESK: The consolidation of help desks for Information Management and Services, managed by CSS. This is the direct link for TSRs to report timely information about information resource issues, as well as a focal point for customers for the following services: Computer support (e-mail, malware, technical support) Telephone support (telephones, new service, calling cards, repair) Mobile device support (cell phones, wireless access) Networking support (new service, connectivity) Password reset Blackboard support INFORMATION RESOURCES MANAGER (IRM): Responsible to the State of Texas for management of the University s information resources. The IRM has been given the authority and the accountability by the State of Texas to implement security policies, procedures, practice standards, and guidelines to protect the information resources of the University. The IRM for the Health Science Center is the Vice President and Chief Information. Page 2 of 5

INFORMATION SECURITY COUNCIL: Information Security policy development is supported by the Information Security Council (ISC), a sub-committee of the Computing Resources Committee (CRC). As a standing Health Science Center committee, the CRC serves as the vehicle to present security policies to the Executive Committee for institutional approval and commitment. INFORMATION SECURITY FUNCTION (ISF): Led by the Chief Information Security, the ISF is responsible for security and risk management programs to protect information resource assets at the Health Science Center. INFORMATION SECURITY: The Department of Information Security includes the CISO and Information Security analysts who are responsible for the tactical and operational execution of the Information Security functions within the University, including UT Medicine. INTERNET PROTOCOL (IP): The communication standard used by the local computer network and the Internet. INTERNET SERVICE PROVIDER (ISP): The organization that provides user access to the Internet. OWNER: A person who: Has title to the property, possession of the property, whether lawful or not, or a greater right to possession of the property than the actor; Has the right to restrict access to the property; or, Is the licensee of data or computer software. SECURE SHELL (SSH): A server/client application for securely connecting at a terminal level, generally at a command line interface, between a client and a host. The Telnet application does a similar function, over an insecure transport. SYSTEM ADMINISTRATOR: An employee of the Health Science Center whose responsibilities include system, site, or network Page 3 of 5

administration. System Administrators perform functions including, but not limited to, installing hardware and software, managing a computer or network, ensuring appropriate security is in place, and keeping information resources effective and operational. SYSTEMS AND NETWORK OPERATIONS (SNO): The Department of Systems and Network Operations (SNO) provides information technology infrastructure services that include local and wide area network connectivity, data center management, and telephony. SNO works closely with ISA in implementing and monitoring security policies and procedures. SYSTEM USER: Any individual who uses University information resources. TECHNICAL SUPPORT REPRESENTATIVE (TSR): The departmental representative assigned the responsibility of receiving computer technology and security-related information from SNO, CSS, and Information Security, and distributing that information as appropriate within their department. All TSRs should have a working knowledge of basic computer concepts. TECHNICAL SUPPORT REPRESENTATIVE (TSR)/ADVANCED: A TSR who has received significant training, more technical proficiency in the department s environment, and information technology support duties as a primary job responsibility. Advanced TSRs may, at the discretion of the Dean, Chair or Director, be designated to receive additional security and related information from CSS and distribute that information as appropriate within their department. TECHNICAL SUPPORT REPRESENTATIVE (TSR)/SYSTEM ADMINISTRATOR: An advanced TSR who is also a System Administrator. TELECOMMUNICATIONS CUSTOMER SERVICE SPECIALIST: Staff that provide networking, telephone, and pager customer services (service desk) within SNO. USER: An individual or automated application or process that is authorized access to the resource by the owner, in accordance with the owner s procedures and rules. Page 4 of 5

VENDOR: Someone who exchanges goods or services for money. VIRTUAL LOCAL AREA NETWORK (VLAN): Constructs multiple private, logical network segments on a single physical transport media by means of Ethernet frame identifier (IEEE 802.10 specification). VIRTUAL PRIVATE NETWORK (VPN): The networking software and hardware necessary to provide a secure transport of information between computers. Page 5 of 5