information security
Download
Skip this Video
Download Presentation
Information Security

Loading in 2 Seconds...

play fullscreen
1 / 14

Information Security - PowerPoint PPT Presentation


  • 77 Views
  • Uploaded on

Information Security . Information Technology and Computing Services http://www.ecu.edu/itcs. Security Fallacies. We have antivirus software, so we are secure We have a firewall, so we are secure The most serious threats come from the outside

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Information Security' - Jimmy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
information security

Information Security

Information Technology and Computing Services

http://www.ecu.edu/itcs

security fallacies
Security Fallacies
  • We have antivirus software, so we are secure
  • We have a firewall, so we are secure
  • The most serious threats come from the outside
  • I don’t care about security because I backup my data daily
  • Responsibility for security rests with IT Security Staff
it security components
IT Security Components
  • Firewalls
  • Intrusion Detection Software
  • Antivirus Software
  • Updated OS and Applications
  • Continual education for staff and users
  • User cooperation and compliance
    • Most critical component
    • Most difficult to achieve
security threats
Security Threats
  • Malware-viruses, worms, trojans, spyware
  • Security patches not applied
  • Hacking and network scanning
  • Social engineering
  • Chat and Instant Messaging software
  • Weak Passwords
  • Unawareness, carelessness
what can you do
What can you do?
  • Report Incidents (helpdesk)
  • Passwords
  • Backups
  • E-mail use and Security
  • Internet Security
  • Mobile Devices
  • Physical Security
slide6
Use/Update antivirus software
  • Patch OS and Applications
  • Don’t use P2P file sharing software
  • Use software firewalls
  • Use your locks-door and computer
  • Don’t reveal your password to anybody
  • Don’t reveal confidential information
slide7
Safe Computing
  • Add-ons to Internet browsers
  • Add-ons to e-mail clients
  • Aftermarket screensavers
  • Instant Messenger software
  • If you have been hacked change all your passwords
antivirus policy
Antivirus Policy
  • All networked machines must run Symantec AV software
  • Site license for Symantec AV
    • Free copy for every Windows and Macintosh computer
    • Free copy to load on home computers
  • Infected computers will be removed from the network until cleaned
mobile security
Mobile Security
  • Password protection
  • Encryption
  • Physical security
  • WiFi (wireless technologies)
    • All devices must be registered and authenticated using pirateID
  • Telecommuting (remote access)
data security
Data Security
  • Data and You (protection of sensitive data)
  • Continuity of Operations / Disaster Recovery (ensure you have a plan)
  • Identity Theft / Phishing (don’t be a victim)
  • Physical Security
hipaa privacy security
HIPAA Privacy & Security
  • All workforce members must be trained on HIPAA security issues if they access computers that contain EPHI. This training will help to assist you in protecting the confidentiality, security and integrity of EPHI. We all have certain responsibilities in implementing safeguards and actions to protect EPHI.
  • http://www.ecu.edu/cs-itcs/itsecurity/HIPAA-Privacy-Security.cfm
ferpa
FERPA
  • Avoid copying or downloading sensitive data from university systems
  • If there are no other alternatives then proper security measures must be taken
  • Avoid using SSN #’s in databases or applications as identifiers
  • Avoid sending sensitive data un-encrypted
  • Protect sensitive data
  • Avoid social engineers that try to get you to share information
  • Secure your workstations
  • http://www.ecu.edu/cs-itcs/itsecurity/FERPA-ECU.cfm
ways to protect yourself @ home
Ways to Protect yourself @ HOME
  • WiFi Security
  • Symantec Antivirus
  • Backup!
  • Passwords
  • Bank and Credit Card Information
  • Firewall
  • OS Patches
  • Instant Messaging
  • E-mail
  • Encryption
problems or questions
Problems or Questions
  • Don’t call individual ITCS employees
  • Call IT Support Services @ 328-9866
    • Single point contact
    • All calls forwarded to appropriate consultant
  • Open a Service Request
    • www.ecu.edu/9866
    • http://www.ecu.edu/cs-itcs/safetySecurity.cfm
ad