information security training 101 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Information Security Training 101 PowerPoint Presentation
Download Presentation
Information Security Training 101

Loading in 2 Seconds...

play fullscreen
1 / 13

Information Security Training 101 - PowerPoint PPT Presentation

  • Uploaded on

Information Security Training 101. March 2011 . Columbia University’s approach to Information Security . Columbia University values the ability to openly communicate and share information as appropriate.  The University information is an important asset that needs to be protected. 

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
Download Presentation

PowerPoint Slideshow about 'Information Security Training 101' - pallavi

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
columbia university s approach to information security
Columbia University’s approach to Information Security
  • Columbia University values the ability to openly communicate and share information as appropriate. 
  • The University information is an important asset that needs to be protected. 
  • Any person/organization (i.e., including, but are not limited to staff, faculty, students, those working on behalf of the University, guests, tenants, visitors, and individuals authorized by affiliated institutions and organizations) that uses or provides information resources has a responsibility to maintain and safeguard these assets. 
  • Users are required to abide by the Columbia University policies.
Columbia University Information Security Office (CISO)Your one stop shop for data security assistance
  • The CISO defines and implements University-wide policies, procedures, standards, and functions spanning across , IT Governance, Network Security, Application Security, and Identity & Access Management
  • The CISO also promotes campus wide security awareness and culture (through participation in technology deployments, trainings, presentations, meetings, and communications with various stakeholders)
  • - Monitors network for signs of compromised systems
  • - Investigates security violations
  • Liaison with law enforcement, General Counsel, Deans
  • - Manages login services
  • Manages user account provisioning
  • Manages user entitlement and privileges
  • Supports the physical security system (i.e., Lenel)

Manages security and access to the HR system (PAC) and mainframe systems

  • Manages security policies, standards, and guidelines
  • Manages security awareness program

CISO Contact info:

Email –

what is information security
What is information security?

Information security is protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, reading, inspection, recording or destruction

The core principles of information security are:

  • Confidentiality - to prevent the disclosure of information to unauthorized individuals or systems
  • Integrity - to ensure that data is accurate and complete and it cannot be modified by unauthorized person(s)
  • Availability - to ensure the information is available when it is needed, where it is needed, and by whom it is needed
  • Accountability - to ensure users are responsible for their actions
why is information security important
Why is information security important?
  • Information is a valued University asset that needs to be protected
  • Federal and state laws mandate the need and level of protection required - Examples of laws applicable to the University’s information are:
    • Family Educational Rights and Privacy Act (FERPA) – student privacy protection
    • Health Insurance Portability and Accountability Act of 1996 (HIPAA) – health information protection
    • Federal Trade Commission (FTC) “Red Flags Rules” - a program to detect, prevent, and mitigate instances of identity theft
    • Payment Card Industry Data Security Standard (PCI DSS) - credit card information protection
    • New York State Information Security Breach and Notification Act – requirement to notify NYS Attorney General Office of Social Security Number (SSN) breach
  • Confidential/Sensitive information includes and not limited to:
      • Personally Identifiable Information (PII) - SSN, credit card, bank account #s
      • Student and staff records - medical, personnel, payroll records
      • University-proprietary data - research, course materials, budgets, strategies

The University is committed to safeguarding the security and confidentiality of personal and confidential information in compliance with applicable laws and Columbia University policies

columbia university s it policies
Columbia University’s IT Policies
  • Compliance with the Columbia University IT Policies
  • You are expected to review and understand all the policies - a few important policies you should read immediately are:
      • The Acceptable Use of IT Resources (Network and Computing) Policy – proper use of Columbia University’s network and computing technology
      • The Data Classification Policy – confidential/sensitive data types and protection requirements
      • The Social Security Number (SSN) and Unique Person Number (UPN) Usage policy - proper use and protection of Social Security Number
      • The Electronic Data Security Breach Reporting and Response policy - reporting security incidents and breaches
      • The Data Sanitization/Disposal of Electronic Equipment Policy - proper data sanitization and disposal
      • The Desktop and Laptop Security Policy – safe computing standards to provide data protection on desktops and laptops
      • The Remote Access Policy – security measures required to remotely connect to Columbia University's networks
tools available to you from cuit for data protection
Tools available to you from CUIT for data protection
  • Symantec Antivirus - to protect a computer from viruses and spyware
  • CUSpider - to detect SSN information saved on your computer
  • GuardianEdge – to protect computers that contain sensitive files via full disk encryptionSend request to
  • Connected Backup – to backup your data
  • Winzip – to password protect sensitive files
  • DBAN - to ensure that all data is securely erased from the computer's hard drive before disposal
  • PC PhoneHome – to assist in the recovery of a lost or stolen laptop
what you need to know and do
What you need to know and do?

Your user ID and Password

  • Your account is your responsibility - do not share with others
  • Make your passwords complex (e.g. combination of alphabets, numbers, and special characters)
  • Do not use your user ID (UNI) or your name as your password
  • Do not use any dictionary word in any language as your password, a dictionary word followed by or preceded by numbers and other non-alpha characters is NOT accepted
  • Protect your passwords and treat them as valuable as the PIN for your ATM card
  • Do not use the save password feature on applications because others who have access to your computer will also have access to your account
  • Do not use your University ID (UNI) and password for access to third-party systems (e.g., online shopping, newspapers, travel web sites)
  • If you must write your password down, never leave the password near your computer and never write your ID and password on the same piece of paper and keep it secure
what you need to know and do continue
What you need to know and do? (continue)

Safe Computing

  • Read andadhere to theAcceptable Use of IT Resources (Network and Computing) Policyand the Desktop and Laptop Security Policy
  • Activate and maintain the automatic software updates, anti-virus and anti-malware protection, and firewall on your personal computers
    • Ask your IT support if you have a managed computer
  • Be aware of information stealing methods such as: social engineering, phishing scams to obtain personal and sensitive information, and shoulder surfing
  • Archive and back-up important files and data and protect the backups from theft and physical damage
  • Be cautious when using the Internet and visiting any site that could be infected with malware
  • Log off after using any applications and close the browser completely if using web application
  • Enable password-protected screen savers when leaving your computer even for a short time
  • Protect your portable devices (e.g., laptops, PDAs, USB sticks/drives, etc.) from loss or theft
  • See more tips on safe computing
what you need to know and do continue1
What you need to know and do? (continue)

Safe Remote Access

  • Read and adhere to the Remote Access Policy
  • If you are using home machine not managed by Columbia then
    • activate and maintain the automatic software updates for anti-virus and malware software to perform continuous and/or scheduled scanning and keep it up-to-date
    • enable the built-in firewall that is included in major operating systems (i.e., Windows and Macs)
    • activate and maintain the automatic software updates for vendor applications and apply them
    • do not install file sharing software on your computer because it will share files on your computer as a defaultif not configured correctly
  • Use Columbia University’s VPN (Virtual Private Network) connection when remotely accessing CU’s non Web enabled applications
what you need to know and do continue2
What you need to know and do? (continue)

Safe Email Use

    • Read and adhere to the Columbia email policy Email Usage and Retention Policy
  • Use your Columbia University email account for all official University correspondence
  • Do not open email attachments from unknown sources or unexpected attachments from known sources
  • Do not respond to email requests for personal and private information
  • Do not type sensitive/confidential information within email text because email is like a “postcard”
  • If you need to send sensitive information in an email, it must be sent as an encrypted/password-protected file attachment
  • Never include the password in the email – it must be sent separately
  • Do not send nuisance email or other online messages such as chain letters or obscene, harassing, offensive or other unwelcome messages
what you need to know and do continue3
What you need to know and do? (continue)

Sensitive Information Handling

  • Read and adhere to the Data Classification Policyand the Social Security Number (SSN) and Unique Person Number (UPN) Usagepolicy
  • While granting / approving access to your staff, restrict access based on “need to know and need to do” basis and periodically review
  • Educate staff about confidential/sensitive information protection and individual accountability
  • Do not copy, reproduce, store any confidential/sensitive information on your desktop, laptop, portable media devices or print form except required in your official job capacity
  • Protectallconfidential/sensitive information in any format to prevent unauthorized disclosure
  • Dispose of sensitive information properly - the Data Sanitization/Disposal of Electronic Equipment Policy
  • Handle credit card information properly - the Office of the Treasurer credit card processing website

  • Handle health care information properly - the CUMC Health Insurance Portability & Accountability Act (HIPAA) Information website
a few information security reminders
A Few Information Security Reminders

Maintain Logical Security - Protect Your User Account and Do Not Share Your Password

Use Complex Password

Encryption - Keep Your Data Private and Protect Your Sensitive Files

Computers Usage - Signoff After Using Application and Enable Password Protected Screen Saver

E-mail Usage - DO NOT Type Sensitive and Confidential Information in Email Text

Disposing, Recycling or Donating Computers - Erase All Data from Hard Drives & Destroy CDs, DVDs; Shred Confidential / Sensitive Documents

Maintain Physical Security - Keep Office, Desk, and Cabinets Locked and Secured