Presentation is loading. Please wait.

Presentation is loading. Please wait.

For further information

Similar presentations

Presentation on theme: "For further information"— Presentation transcript:

1 For further information

2 Laurier Security Guidelines Wireless networks Internet Browsing Firewall Rules Desktop Configuration Encryption of mobile devices

3 Desktop Configuration Virus software installed and up to date Personal Firewall Configured Automatic Software Updates Configured Screensaver Lockout Configured






9 System Preference--Sharing

10 Click Start in Firewall Tab

11 Choose Software Update in System Preferences, check Check for updates: and choose Daily from the drop box next to it, check Download important updates in the background box

12 Require services such as ssh, ftp, SQL be open to the Internet Constant Internet scanning of ports such as ssh for brute force password attacks and vulnerabilities in SQL software ITS offers port and vulnerability scan service Send name and IP number of server to

13 Screensaver Lockout Protects your computer while it is not attended Requires a password and a timeout period

14 Right click on Desktop, choose Properties from the drop down menu

15 In Display Properties window, click on Screen Saver tab, check On resume, password protect, and choose the proper wait time, click OK

16 In Mac OS X, choose Desktop & Screen Saver from System Preferences, choose proper screen saver and start time

17 In Mac OS X, choose Security from System Preferences, check Require password to wake this computer from sleep or screen saver box

18 Encryption for Mobile Devices laptops, usb drives easily lost or stolen

19 Date: 10/31/2007 Ferris State University is alerting applicants that their personal information was stored on a laptop stolen from a recruiter's car. The laptop contained the names, address, dates of birth, telephone numbers, e-mail address and academic information on 18,000 2007 and 2008 applicants. According to university officials, the information on the laptops is protected by two levels of user identification and passwords so the risk of identity theft is low. However, the university wants to make sure students are aware of the risks and what steps they can take to protect themselves. Toward this end, the university has created a web site - - as well as a phone line - 800-433-7747 - to help answer questions and provide information.

20 Date: 10/17/2007 The University of Cincinnati is alerting students after a flash drive containing student data, including names and Social Security numbers, was stolen. The drive, containing information on more than 7,000 graduate and undergraduate students, was stolen from the desk of an employee. According to university officials, there has been no evidence that the information has been misused. The university has sent letters to all affected students and has also alerted the three major credit bureaus.

21 Confidential information on mobile devices must be protected Login passwords and file passwords help but are not enough True security for confidential information requires that the information be encrypted TrueCrypt









30 For further information

Download ppt "For further information"

Similar presentations

Ads by Google