IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information.

Slides:



Advertisements
Similar presentations
Presented By Krypto Security Software, LLC. What is BackStopp is a simple but effective tool to help an organization protect its mobile data in the event.
Advertisements

Wireless Service Innovation Service a wireless network customer by locating a lost or stolen device and provide the ability to protect data.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
SECURITY CHECK Protecting Your System and Yourself Source:
Trends for 2008 And Trivia from 2007 Terry Bledsoe January 17, 2008.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
7 Effective Habits when using the Internet Philip O’Kane 1.
For further information computersecurity.wlu.ca
Protecting Your Identity: What to Know, What to Do.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
What is identity theft, and how can you protect yourself from it?
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Using internet and cell phones safely
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
IT GOVERNANCE COMMITTEE MEETING February 19, 2008.
Nevada Digital Summit David Podwojski Director, Public Sector Citrix Systems, Inc.
Tips and Techniques: How to Protect Yourself and Others Better Jeanne Smythe February 20, 2004.
Introduction to Computers Essential Understanding of Computers and Computer Operations.
Unit 3—Part A Computer Memory
Data Protection Act.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
New Data Regulation Law 201 CMR TJX Video.
Internet safety By Lydia Snowden.
Securing Information in the Higher Education Office.
Personnel Trends Terry Bledsoe March 31, 2008.
Social Security  1935 – Retirement Insurance  1939 – Survivors Insurance  1956 – Disability Insurance History of Social Security.
Protecting Yourself Online (Information Assurance)
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
WirelessED Created by Consumer Action. Sponsored by © Consumer Action 2011 Learning About Wireless Services.
Court IT Issues Windows XP Problem April 8, 2014 Microsoft Ends Security Updates April 9, 2014 XP Computers will contract an OS Infection as soon.
How can you protect yourself from online identity theft?
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Steps To Set Up Your Home Wireless Network You can use a wireless network to share Internet access, files, printers, and more. Or you can use it to surf.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 ©2014 NEFE High School Financial Planning Program® | Lesson 2-5: Identity.
Security considerations for mobile devices in GoRTT
Donald Constant. Digital Citizenship  For teachers and students, digital citizenship changes as new technology tools are used by the educational world.
Be Cautious of Identity Theft By: Sydney Langley.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Unit 2—Part A Computer Memory Computer Technology (S1 Obj 2-3)
Computer security By Isabelle Cooper.
Desktop Security: Making Sure Your Office Environment is Secure.
By: Asfa Khan and Huda Mukhtar
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Jeff loses his identity! Lesson 8: Identity Theft.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Identity Theft One of America's fastest growing crimes.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Confidentiality, Integrity, Awareness What Does It Mean To You.
Information Security Everyday Best Practices Lock your workstation when you walk away – Hit Ctrl + Alt + Delete Store your passwords securely and don’t.
Legal Requirements for Becoming a Licensed Freight Broker LogisticsAcademy.org LinkedIn YouTube Google+
Protecting PHI & PII 12/30/2017 6:45 AM
Protecting Your Identity:
Information Security Seminar
Week 4 Introduction to computers : reviews
© EIT, Author Gay Robertson, 2017
Cybersecurity Awareness
Unit 3—Part A Computer Memory
Protecting Your Identity:
Red Flags Rule An Introduction County College of Morris
Unit 3—Part A Computer Memory
Presentation transcript:

IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Tidbits of Information

WHO IS PROVIDING WIRELESS COVERAGE FOR THE OLYMPICS? Beijing Metro Chooses Andrew for Wireless Coverage In Advance of Olympics CommScope

700 MHz Channels 52 to 69 Reserve Bid $4.6 Billion Bidders: AT&T, Google, and Verizon “open access” Public Safety Access Verizon $4.7 Billion

G Phone Open Handset Alliance ??? Core Business

Linux Vista “open applications”

7

Tidbits that make you think or sweat! The cost of a GigaByte of storage in 2007 was $.50. It costs less to store 50 pages of printed text than the paperclip to hold them together. In two to three years the iPod could have the capacity to store every song ever recorded. 281 exabytes of information was created in 2007, that is 48 GB for every person across the globe. The cost of a transistor today is cent.

Tidbits that make you think or sweat! RFID chips are the size of a grain of salt. Technology exists in the Research Triangle to detect a tumor the size of that grain of salt. The US is 14 th in the world in average broadband speed and 26 th in coverage. Approximately 1/3 of Catawba County citizens do not have affordable broadband coverage.

Tidbits that make you think or sweat! And what if they detect the tumor? It would take years at today’s broadband speeds in the US to send the image to your doctor.

IT GOVERNANCE COMMITTEE MEETING May 15, 2008 Information Security

26% Percent of identity theft attributed to government.

A laptop containing thousands of people's personal information is missing in Cabarrus County They don’t know if it was stolen or destroyed in traffic contains names, address, phone numbers and social security numbers of approximately 28,000 people

The identity theft risk from a stolen Wake County EMS laptop is far worse than originally estimated 5,000 people whose personal information -- including Social Security numbers, addresses and ages -- included personal information of more than 3,400 EMS and firefighters from across the county Wake EMS officials waited eight days to officially report the loss to WakeMed police

$350 Average cost of clean up per account. Does not include onsite resources.

10% Number of Public Access Points that are not really Public Access Points

USB One of the two biggest sources.

1 Number of incidences reported to CC.

$ $ $ $ $ $ $ FINANCIALLY MOTIVATED No more glory in hacking, undetected, thief in the night ……………..

ISSUES MOVING TO THE FOREFRONT ISSUES. ISSUES. ISSUES. ISSUES.

The new personal computer….. The simple cell phone is a relic Laptops replace desktops personal use / business use

No Well Defined Slots Work is an Activity, Not a Place Old Rules Become Unrealistic Trusting People

What is attached to the network? What is the employee really doing? Programs? Stored Data?

Mobile Computer Equipment Policy Not enough but helpful.

? ? ? What about your service providers? Insurance/benefits……… Are they carrying your employees around on a laptop?...

? ? ? Where’s the data? BRIC….. What about something as simple as Anti-Virus software? Is it up-to- date?

Exercise/Discussion Do you work with an application vendor? Does this vendor have access to your system? Does the vendor abide by strict security practices? Where is your data stored? Who has access to it?

Shut down accounts Network Access Phone System Secure equipment Secure data stored on remote/mobile equipment Make sure public record files are obtained Signed statement that all data has been returned Termination……

Self Organizing Groups 4 groups One person with laptop Same size (within 1) Equal area representation Pick a spot and setup a work area

Groups Employees Citizens Vendors Crooks

Information Leakage Employee What could you do or fail to do to cause information theft? Remember, you represent all employees. Citizen What could you do to cause your information to be exposed? You represent the public. Vendor How could you be putting employee’s and the public’s data at risk? You represent all vendors we do business with, large and small. Crook How might you steal information from the county? Okay, you know who you represent.

? ? ? ? ? ? ? WHAT CAN WE DO TO PROTECT THE PUBLIC’S DATA AND EMPLOYEE DATA? ???????????????????????????????????……………..

IT NEXT MEETING – JUNE 19TH Meeting Time: 1:30 – 3:30