1 / 16

Security Training

Security Training. USAID 2000. Information Security. W H Y ??. Two Reasons: It’s a responsibility It’s the law (Computer Security Act 1987). Training Objectives. What is Computer Security The Threats What is your role as a user?. Computer Security. Definition

percival
Download Presentation

Security Training

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Training USAID 2000

  2. Information Security

  3. W H Y ?? • Two Reasons: • It’s a responsibility • It’s the law (Computer Security Act 1987)

  4. Training Objectives • What is Computer Security • The Threats • What is your role as a user?

  5. Computer Security • Definition Measures required to protect against: • unauthorized access (accidental or intentional) • malicious modification of data • destruction of data, networks and computer resources • or denial of service to process data.

  6. Data Classifications • CLASSIFIED (CONFIDENTIAL, SECRET, TOP SECRET) • SENSITIVE BUT UNCLASSIFIED (TECHNICAL, PROPRIETARY, PROGRAM SPECIFIC) • UNCLASSIFIED

  7. Computer Security • Confidentiality • Integrity • Availability

  8. Workstation Protection (1) • Comply with the physical security requirements.

  9. Workstation Protection (2) • Never leave your computer unattended while you are logged in • log off at the end of the day • Protect sensitive information • store it in a private area

  10. Password Requirements • Passwords must be at least six characters (alphanumeric) • e.g., I8NY2x Dog&Man3 • Passwords must be changed periodically • USAID - Cairo requires every 12 weeks • Treat Your Password Like A Toothbrush… Don’t Share It, and Change It Often!

  11. Password Protection • NEVER disclose your password! • Personal passwords must remain private • Don’t let anyone else use it • Don’t write it down • Don’t type a password while others watch • Don’t record password on-line or e-mail it • Don’t use easily guessed words, like children’s names, spouse, pet, birthday and phone number

  12. Virus Protection • Run antivirus programs on a regular basis. • Do not use any outside floppies/ disks on your system without running a virus scan first. Many viruses are introduced because virus scanning was not performed. • No illegal duplication of S/W rule - this reduces the spread of virus and avoids legal headaches • Do not boot from diskette if possible

  13. Data and File Backups • Backup your important data • Verify your backups

  14. Internet Security • Do not download and install programs from the Internet without consulting DMS • for example, screen savers, chatting programs • Do not remove the Security wallpaper. This is an Agency requirement • Do not pass on Chain Letters, rumors and jokes

  15. What is the Mission doing to minimize Risk? • Server Protection • Workstation Protection • Firewalls • Backups • Training

More Related