General Awareness Training

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Information Privacy and Data Protection Lexpert Seminar David YoungDecember 9, 2013 Breach Prevention – Due Diligence and Risk Reduction.
Protecting Personal Information Guidance for Business.
SL21 Information Security Board Mission, Goals and Guiding Principles.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Information Security Policies and Standards
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Data Management Awareness January 23, University of Michigan Administrative Information Services Data Management Awareness Unit Liaisons January.
Why Comply with PCI Security Standards?
Session 3 – Information Security Policies
Incident Response Updated 03/20/2015
Website Hardening HUIT IT Security | Sep
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Practical Information Management
Program Objective Security Basics
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
What does “secure” mean? Protecting Valuables
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
General Awareness Training Security Awareness Module 3 Take Action! Where To Go for Help.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Chapter 2 Securing Network Server and User Workstations.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
CONTROLLING INFORMATION SYSTEMS
SAFEGUARDING YOUR ASSETS AND PREVENTING FRAUD
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Personal data protection in research projects
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Welcome to the ICT Department Unit 3_5 Security Policies.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
PCI-DSS Security Awareness
Fusion Center ITS security and Privacy Operations Joe Thomas
Chapter 8 – Administering Security
Critical Security Controls
Protection of CONSUMER information
Compliance with hardening standards
Data Compromises: A Tax Practitioners “Nightmare”
Information Security Board
Chapter 3: IRS and FTC Data Security Rules
I have many checklists: how do I get started with cyber security?
Andy Hall – Cyber & Tech INSURANCE Specialist
Security Awareness Training: System Owners
Chapter 4 Criminal Law and Procedure
Red Flags Rule An Introduction County College of Morris
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
Introduction to the PACS Security
Laws Against Computer Hacking
Presentation transcript:

General Awareness Training * 07/16/96 General Awareness Training Security Awareness Module 2 What is a Security Incident? How Vulnerable am I? *

What is a Security Incident? Computer or Network based activity which results (or may result) in: IDENTITY THEFT Additional Information PERSONAL LITIGATION TOWARD YOU Additional Information LOSS OF SENSITIVE DATA OR APPLICATIONS Additional Information USE OF YOUR COMPUTER TO COMMIT A CRIME Additional Information USE OF YOUR COMPUTER TO COMMIT MISCHIEF Additional Information LOSS OF DATA CONFIDENCE Additional Information UNABLE TO USE YOUR COMPUTER Additional Information LOST WORK TIME Additional Information

How vulnerable am I? Extremely likely unless your computer is properly protected and secured.

How vulnerable am I? IDENTITY THEFT Use of personal information to commit fraud Use of your computer to commit mischief, misdemeanor crimes, or felony crimes Can be physical access or network access to your computer Lack of “due diligence” makes you responsible Use of your computer accounts to commit mischief, misdemeanor crimes, felony crimes Theft of your information (data) and used by others or merging of copyright material with your information Return What can you do to minimize the threat of identity theft? Additional Information

Personal Actions to Mitigate Identify Theft Perform Vulnerability Assessment Minimize Computer Service Available Install and maintain anti-virus, spyware and firewall software Implement system and security logs and review daily Use patch management software to maintain operating system Establish STRONG passwords and change them frequently Encrypt all sensitive data stored on system Encrypt all sensitive data transfers Return

How Vulnerable am I? PERSONAL LITIGATION TOWARD YOU If your identity (computer or accounts) is used in the commission of a crime, you are directly responsible If your computer or accounts are “owned” by the University and therefore, the State of Texas, the crime also involves the use of state property If your computer accesses another computer without permission it is a felony. If you change information on someone else’s computer without permission, it is a felony The University network is state property. Illegal access to the UH network is a felony The legal defense and costs for a security breach is your responsibility Return What can you do to mitigate potential litigation towards you Additional Information

Personal Actions to Mitigate Litigation Towards YOU Understand principle of “Due Diligence” Assume separation of function across business functions Establish and review access controls frequently to application and data Document machine processes and procedures Assume viable backup and recovery Comply with Federal, State and Institutional requirements Return

How Vulnerable am I? LOSS OF SENSITIVE DATA OR APPLICATIONS It is the data application owner’s responsibility legally to protect sensitive data or applications If sensitive data or applications are inadvertently or intentionally altered or stolen it is the owner’s responsibility to notify affected parties and remediate the damage Classification of data is the owner’s responsibility Backup/Recovery and availability of data and applications are the owner’s responsibility Return What can you do to prevent loss of sensitive data or applications Additional Information

Protect against loss of Sensitive Data or Applications Document Data and Application classification in accordance with University of Houston policies Establish and frequently review Compliance with Federal, State and Institutional policies Access logs for sensitive data or application Business Continuity Plan for system recovery Encryption of sensitive data Return

How Vulnerable am I? USE OF YOUR COMPUTER TO COMMIT A CRIME The user of the computer is directly responsible for the consequences of using the computer. Criminal defense and liability are the user’s responsibility Data and application owners of a computer used in security incident are responsible for adhering to the applicable university policies, state and federal laws Return What you can do to prevent use of your computer to commit a crime Additional Information

Personal Actions to reduce exposure of your computer to commit a crime Assure completion of actions resulting from system vulnerability assessment Assure completion of actions resulting from system compliance assessment Analyze system logs daily and report suspicious activity to system administrator Review changes to system configuration Return

How Vulnerable am I? USE OF YOUR COMPUTER TO COMMIT MISCHIEF Use of a computer or account for the purpose of mischief is usually not classified as a crime but can result in many wasted hours of staff time SPAM is a good example of mischief it is often offensive and definitely is expensive to try and defend Return What can you do to prevent use of your computer to commit mischief Additional Information

Personal Actions to prevent use of your computer to commit mischief Review changes to system configuration Review activity of spyware Be cognizant of your surroundings and make personal and departmental hygiene changes Share your information security responsibility and reduce liability Do not write down your password and leave it easily accessible by others (like under your computer keyboard) Return

How Vulnerable am I? LOSS OF DATA CONFIDENCE Validation of data integrity is required by data owners Verification of data transactions is the responsibility of the data owners What can you do to prevent loss of data. Additional Information

UNABLE TO USE YOUR COMPUTER How Vulnerable am I? UNABLE TO USE YOUR COMPUTER Loss of computer, application, or data availability is a security incident Recovery from the lost of “availability” must be reported Return What can you do to prevent being unable to use your computer Additional Information

Personal Actions to prevent loss of Data confidence and unable to use your computer Credit card information should not be stored on individual computers Storage of social security numbers should be minimized Do not use simply, easy-to-guess passwords Use passwords that include numbers and letters Immediately contact IT if you believe that has been a breach of computer security Return

How Vulnerable am I? LOST WORK TIME Security incidents require significant numbers of people and time to remediate “damaged” computers and notify those affected Legal response to security incidents can absorb significant amounts of time Forensic studies to investigate security incidents require significant amounts of time Time lost must be reported for each security incident Return Personal actions to prevent lost of work time due to a data security incident. Additional Information

Personal Actions to prevent loss work time Do not use simply, easy-to-guess passwords Use passwords that include numbers and letters Use passwords on all secure systems and files and change frequently Use passwords for sensitive files or documents Immediately contact IT if you believe there has been a breach of computer security Seek more information as it is appropriate for your position Return