Presentation is loading. Please wait.

Presentation is loading. Please wait.

We build strong children strong families strong communities Presented By: Brad Lawrence Kent Starling Treasa McLean Why Secure the Y?

Similar presentations


Presentation on theme: "We build strong children strong families strong communities Presented By: Brad Lawrence Kent Starling Treasa McLean Why Secure the Y?"— Presentation transcript:

1 We build strong children strong families strong communities Presented By: Brad Lawrence Kent Starling Treasa McLean Why Secure the Y?

2 Outline Introduction Background Security Policy Recommendations Conclusion

3 Introduction What is the YMCA? What do they do? When were they founded?

4 Background Lake Wales YMCA 1001 Burns Ave Exercise Facilities Children Care Laura Motis Executive Director

5 Security Policy Limited to nonexistent network security policy Included in Employee Handbook No true computer network setup Member scantron system Critical areas of concern Loss of Data Data SecurityEmployee Standards Employee Handbook

6 Delete or Alter Files Shredder for important papers Limited Security on specified folders Backup not secure No data deletion/alteration monitoring No digital deletion policy/software Current Situation

7 Delete or Alter Files Software application for digital deletion Security set at Network Level Standards for off-site backup storage Software application – data modification Digital copies of important documents Recommendations

8 Take Pictures of Important Documents No digital copies of sensitive documents Cell phones restricted 7 authorized employees have Email Accts CD Burners/USB ports unsecured Current Situation

9 Take Pictures of Important Documents Recommendations Digital pictures of important documents Enhance cell phones restricted Email account monitoring/policy Limited CD burners/USB ports

10 Unauthorized Wireless Access Current Situation Wireless Internet Executive Director Verizon Encrypted NO “freeloaders”

11 Unauthorized Wireless Access Recommendations Risk Management Encryption New Network System

12 Copying or Downloading Current Situation Child Care Financial Department Offsite Location Data on Secure Computers

13 Copying or Downloading Recommendations Secure Offsite Location Secure Computers Log out of computers Storage Room Security

14 User Accounts Current Situation Unauthorized access No password characteristics requirements Password security

15 User Accounts Recommendations Require passwords to be a minimum length Keep passwords strictly confidential Log off when leaving their workstation Passwords should not be common words or phrases

16 Viruses, Worms, Trojan Horses, Blended Threats Current Situation All internet sites accessible No personal email restrictions No restrictions relating to CD’s or disks from home

17 Viruses, Worms, Trojan Horses, Blended Threats Recommendations Set policy regarding internet and email usage Website restrictions Completely restrict personal email

18 Limited network security Critical areas of concern Loss of Data Data Security Employee Security New Network Security System Expanded-detailed Security Policy Conclusion Network Security Policy

19 Presented By: Brad Lawrence - Kent Starling - Treasa McLean Why Secure the Y... To protect our children employees members and community

20

21 Andress, M. (2001, November 19). Effective security starts with policies, InfoWorld. Retrieved August 24, 2006, from http://search.ebscohost.com. Avolio, F. (2000, March 20). Best practices in network security, Network Computing. Retrieved August 24, 2006, from http://www.networkcomputing.com. Connolly, P. (2000, July 10). Security starts from within, InfoWorld. Retrieved August 24, 2006, from http://search.ebscohost.com. Ellis, C. (2003, February). '7 steps' for network security: being prepared and knowledgeable is the best defense against hackers and data thieves - local area networks, Communications News. Retrieved August 24, 2006, from http://findarticles.com. References

22 File & disk wipers. (n.d.). Winapplslist.com. Retrieved September 25, 2006, from http://www.winappslist.com/security/file_wipers1.htm. Forcht, K. and Ayers, W. (2000/2001, Winter). Developing a computer security policy for organizational use and implementation, Journal of Computer Information Systems. Retrieved August 28, 2006, from http://search.ebscohost.com. Gartenberg, M. (2002, June 24). Being tough, gentle with data security, Computerworld. Retrieved August 28, 2006, from http://search.ebscohost.com. Hulme, G. (2001, Sept 3). Management takes notice, Information Week. Retrieved August 28, 2006, from http://search.ebscohost.com. References

23 Kachapeswaran, A. (2006, May 8). Find more like this Microsoft touts a regimen for small-biz network security, Fort Worth Business Press. Retrieved on September 28, 2006, from http://search.ebscohost.com. Karygiannis, T. and Owens, L. (n.d.). Wireless network security 802.11 Bluetooth and handheld devices, National Institute of Standards and Technology. Retrieved October 15, 2006, from http://csrc.nist.gov/publications. MacAfee unveils 2006 consumer security software product line. (2005, October). Productivity Software. Retrieved on September 30, 2006, from http://search.ebscohost.com. http://search.ebscohost.com Palmer, M. (2001, May/June). Information security policy framework: best practices for security policy in the e-commerce age, Information Systems Security. Retrieved August 28, 2006, from http://search.ebscohost.com. References

24 Securing your wireless network. (n.d.). Practically Networked. Retrieved October 15, 2006, from http://www.practicallynetworked.com. The 60 minute network security guide. (2002, July 12). National Security Agency, United States of America. Retrieved September 25, 2006, from http://www.nsa.gov. Using the internet downloading files. (2006, January 19). Sofweb. Retrieved October 15, 2006, from http://www.sofweb.vic.edu. Viollis, P. and Kane, D. (2005, August 22). Risk control strategies viruses: the new weapon of choice for workplace violence offenders, Computer World.com. http://www.computerworld.com. References

25 Wikipedia. (n.d.) Retrieved September 19, 2006, from http://en.wikipedia.org. Wireless security recommendations for Rutgers. (2006, March 23). 2006 Rutgers. Retrieved October 15, 2006, from http://techdir.rutgers.edu/wireless. Yasin, R. (2001, January 8). Policy Management Hits the Web, InternetWeek. Retrieved August 28, 2006, from http://search.ebscohost.com. YMCA.net. (n.d.). Retrieved October 20, 2006, from http://www.ymca.net. References


Download ppt "We build strong children strong families strong communities Presented By: Brad Lawrence Kent Starling Treasa McLean Why Secure the Y?"

Similar presentations


Ads by Google