1 / 11

ABC’s of DHS IT Security & Privacy

ABC’s of DHS IT Security & Privacy. On the next slides are some of the DHS IT Security & Privacy terms and definitions you need to remember. . A. Permissions: to access DHS Information Systems , or granted by owners of PHI.

nuru
Download Presentation

ABC’s of DHS IT Security & Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ABC’s of DHS IT Security & Privacy

  2. On the next slides are some of the DHS IT Security & Privacy terms and definitions you need to remember. 2014 DHS IT Security & Privacy Training

  3. A Permissions: to access DHSInformation Systems, orgranted by owners of PHI Unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of such information B C Hiding data from people who aren’t supposed to see it 2014 DHS IT Security & Privacy Training

  4. D Proves identity with a key pair; a public key and a private key Unauthorized entity from outside DHS which can harm DHS Information Systems E F External storage device; must be obtained from OST 2014 DHS IT Security & Privacy Training

  5. G Visitors who do not have a DHS user ID and password H Federal law designed to protect sensitive protected health information (PHI) I User performing actions which violate DHS policies 2014 DHS IT Security & Privacy Training

  6. J The place you must employ DHS IT Security and Privacy best practices One means of preventing unauthorized physical access to DHS facilities; given only to authorized employees K L DHS employees & contractors must pass IT training every year 2014 DHS IT Security & Privacy Training

  7. M Disclose a minimum amount of protected information to do the job User should have access to onlydata he/she needs to perform a particular task N O DHS data is "owned" by DHS rather than individuals, but accountability for working with that data is assigned to individuals within DHS 2014 DHS IT Security & Privacy Training

  8. Individually identifiable Protected Health Information (PHI) / Personally Identifiable Information (PII) – MUST be protected P Q DHS email spam filter R DHS employees’ duty to protect information privacy and security 2014 DHS IT Security & Privacy Training

  9. Suspected or actual unauthorized attempt to alter, acquire, access, or destroy DHS information S Working on DHS information from a location that is not a DHS facility, such as an employee's home T U Intruders to the DHS Information Systems 2014 DHS IT Security & Privacy Training

  10. V Security weaknesses through which threats impact DHS Information Systems W With fraud and abuse, the three primary impacts of a security incident X DHS users should have NO expectation of privacy on the DHS computers 2014 DHS IT Security & Privacy Training

  11. The user whose actions and inactions are critical to maintaining an effective security environment Y Z A computer that has been taken over by a remote system; often used for sending spam or carrying out network attacks 2014 DHS IT Security & Privacy Training

More Related