1 / 14

Information Security

Information Security . Information Technology and Computing Services http://www.ecu.edu/itcs. Security Fallacies. We have antivirus software, so we are secure We have a firewall, so we are secure The most serious threats come from the outside

Jimmy
Download Presentation

Information Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Information Security Information Technology and Computing Services http://www.ecu.edu/itcs

  2. Security Fallacies • We have antivirus software, so we are secure • We have a firewall, so we are secure • The most serious threats come from the outside • I don’t care about security because I backup my data daily • Responsibility for security rests with IT Security Staff

  3. IT Security Components • Firewalls • Intrusion Detection Software • Antivirus Software • Updated OS and Applications • Continual education for staff and users • User cooperation and compliance • Most critical component • Most difficult to achieve

  4. Security Threats • Malware-viruses, worms, trojans, spyware • Security patches not applied • Hacking and network scanning • Social engineering • Chat and Instant Messaging software • Weak Passwords • Unawareness, carelessness

  5. What can you do? • Report Incidents (helpdesk) • Passwords • Backups • E-mail use and Security • Internet Security • Mobile Devices • Physical Security

  6. Use/Update antivirus software • Patch OS and Applications • Don’t use P2P file sharing software • Use software firewalls • Use your locks-door and computer • Don’t reveal your password to anybody • Don’t reveal confidential information

  7. Safe Computing • Add-ons to Internet browsers • Add-ons to e-mail clients • Aftermarket screensavers • Instant Messenger software • If you have been hacked change all your passwords

  8. Antivirus Policy • All networked machines must run Symantec AV software • Site license for Symantec AV • Free copy for every Windows and Macintosh computer • Free copy to load on home computers • Infected computers will be removed from the network until cleaned

  9. Mobile Security • Password protection • Encryption • Physical security • WiFi (wireless technologies) • All devices must be registered and authenticated using pirateID • Telecommuting (remote access)

  10. Data Security • Data and You (protection of sensitive data) • Continuity of Operations / Disaster Recovery (ensure you have a plan) • Identity Theft / Phishing (don’t be a victim) • Physical Security

  11. HIPAA Privacy & Security • All workforce members must be trained on HIPAA security issues if they access computers that contain EPHI. This training will help to assist you in protecting the confidentiality, security and integrity of EPHI. We all have certain responsibilities in implementing safeguards and actions to protect EPHI. • http://www.ecu.edu/cs-itcs/itsecurity/HIPAA-Privacy-Security.cfm

  12. FERPA • Avoid copying or downloading sensitive data from university systems • If there are no other alternatives then proper security measures must be taken • Avoid using SSN #’s in databases or applications as identifiers • Avoid sending sensitive data un-encrypted • Protect sensitive data • Avoid social engineers that try to get you to share information • Secure your workstations • http://www.ecu.edu/cs-itcs/itsecurity/FERPA-ECU.cfm

  13. Ways to Protect yourself @ HOME • WiFi Security • Symantec Antivirus • Backup! • Passwords • Bank and Credit Card Information • Firewall • OS Patches • Instant Messaging • E-mail • Encryption

  14. Problems or Questions • Don’t call individual ITCS employees • Call IT Support Services @ 328-9866 • Single point contact • All calls forwarded to appropriate consultant • Open a Service Request • www.ecu.edu/9866 • http://www.ecu.edu/cs-itcs/safetySecurity.cfm

More Related