Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Training USAID 2000. Information Security.

Similar presentations


Presentation on theme: "Security Training USAID 2000. Information Security."— Presentation transcript:

1 Security Training USAID 2000

2 Information Security

3 W H Y ?? u Two Reasons: –It’s a responsibility –It’s the law (Computer Security Act 1987)

4 Training Objectives u What is Computer Security u The Threats u What is your role as a user?

5 Computer Security u Definition Measures required to protect against: – unauthorized access (accidental or intentional) – malicious modification of data –destruction of data, networks and computer resources –or denial of service to process data.

6 Data Classifications lCLASSIFIED (CONFIDENTIAL, SECRET, TOP SECRET)  SENSITIVE BUT UNCLASSIFIED (TECHNICAL, PROPRIETARY, PROGRAM SPECIFIC) lUNCLASSIFIED

7

8 Computer Security u Confidentiality u Integrity u Availability

9 Workstation Protection (1) u Comply with the physical security requirements.

10 u Never leave your computer unattended while you are logged in –log off at the end of the day u Protect sensitive information –store it in a private area Workstation Protection (2)

11 Password Requirements –Passwords must be at least six characters (alphanumeric) e.g., I8NY2x Dog&Man3 –Passwords must be changed periodically USAID - Cairo requires every 12 weeks Treat Your Password Like A Toothbrush… Don’t Share It, and Change It Often!

12 Password Protection u NEVER disclose your password! u Personal passwords must remain private –Don’t let anyone else use it –Don’t write it down –Don’t type a password while others watch –Don’t record password on-line or e-mail it –Don’t use easily guessed words, like children’s names, spouse, pet, birthday and phone number

13 Virus Protection u Run antivirus programs on a regular basis. u Do not use any outside floppies/ disks on your system without running a virus scan first. Many viruses are introduced because virus scanning was not performed. u No illegal duplication of S/W rule - this reduces the spread of virus and avoids legal headaches u Do not boot from diskette if possible

14 Data and File Backups u Backup your important data u Verify your backups

15 Internet Security u Do not download and install programs from the Internet without consulting DMS –for example, screen savers, chatting programs u Do not remove the Security wallpaper. This is an Agency requirement u Do not pass on Chain Letters, rumors and jokes

16 What is the Mission doing to minimize Risk? u Server Protection u Workstation Protection u Firewalls u Backups u Training


Download ppt "Security Training USAID 2000. Information Security."

Similar presentations


Ads by Google