SlideShare uma empresa Scribd logo
1 de 20
Cyber Security Awareness
Training by Cyber security
Infotech(CSI)
Table of Contents
• Cyber Security Highlights.
– User Accounts.
– Baseline Configurations.
– Configuration Management.
– Contingency Plans and Backups.
– Mobile Devices and Portable Storage.
– Login Banners.
– Physical Security.
– Sensitive and Personally Identifiable Information (PII).
• Network and Internet Access.
• Appropriate Use.
• Computer Software Licenses.
• Cyber Security Incidents.
• Cyber Attack.
• Social Engineering and Internet Safety.
Roles and Responsibilities
• Users.
– Follow security procedures, report security problems, and complete required computer
security training.
• Privileged Users.
– Administer their own systems, including patch and configuration management.
• Group Administrators.
– Manage computers and implement the cyber security program within their group.
• Assistant Cyber Security Managers (ACSM).
– Program point of contact.
– Implement the cyber security program within their program.
• Cyber Security Team.
– Manage day-to-day operation of the cyber security program.
• Directors / Associate Directors.
– Responsible for the Laboratory’s cyber security program.
– Establish the program’s overall goals, objectives and priorities.
User Accounts
• Central accounts through the IS office provide access to:
– Workstations.
– E-mail (including webmail).
– Remote connectivity (VPN, SSH, modem/dialup).
– Central services (Central File Services, administrative applications, web publishing, etc.).
• Passwords are keys to computing resources, just as door keys are for
facilities.
• Different passwords should be used to access Internet resources (i.e. an
ISU or hotmail account). To facilitate this, the use of a cryptographic
password safe is recommended.
• The DOE requires that passwords:
– Be at least 8 characters long.
– Not be based on the username or a dictionary word.
– Be changed every 180 days, or when a compromise is suspected.
– Contain mixed case, symbols, and digits.
– Contain a nonnumeric character in the first and last position.
Baseline Configurations
• Baseline Configurations must be applied to all computers attached to the
Ames Laboratory network.
• Pre-baselined systems are available to all users from the storeroom.
Administrative users must purchase these systems or provide justification
outlining why the provided systems are not sufficient.
Baseline Configurations
(continued)
• Baseline requirements include
– Anti-virus software.
– Anti-spyware software.
– Current patches for operating systems and applications.
• If a workstation is in use and the operating system is no longer supported by
the vendor, it must be isolated from other Laboratory computers. Contact
the IS office (4-8348; is@ameslab.gov) for assistance.
Configuration Management
• Users are responsible for ensuring that changes to the system do not
diminish security and that changes to the system are reflected in system
documentation.
• Examples of risky system changes include:
– Installing third party software.
– Providing physical system access to others.
– Installing or configuring hardware devices.
Contingency Plans and Backups
• Contingency Plans.
– Users should document the procedures, equipment, and personnel necessary to recover
computing capabilities and data in the event that computer system operations are disrupted.
• Significant computing resources should have a written contingency plan including:
– System backup details.
– System recovery checklist/guide.
– Key personnel.
– System configuration data such as key applications and configuration settings.
• Backups.
– Backups are critical to contingency preparedness. Backups should:
• Be stored securely.
• Be periodically tested for usability.
• Be documented (what is backed up, the backup schedule, and the data recovery procedures).
– It is important to differentiate data which should be backed up from data considered
temporary, or an acceptable loss.
Mobile Device and Portable Storage
• Users of mobile devices (e.g. laptops, PDAs) and portable media (e.g. USB
keys) are responsible for the security of these devices when used in other
environments. Users are encouraged to:
– Make complete backups of data prior to travel,
– Utilize central imaging and scanning facilities for laptops and removable media,
– Keep laptops within sight at all times during travel,
– Be aware of the physical and network environment when using the laptop or sending
information over untrusted networks.
• Pre-verified USB keys are available from the storeroom for purchase. Use
of other USB keys is also permitted with approval on a case-by-case basis.
A USB scanning station is available in the IS office.
• Moderate data must be encrypted if stored on mobile devices or portable
storage.
Login Banners
• The DOE requires login banners on:
– All interactive access points (e.g. console login, SSH, and web site access).
– All non-interactive access points that provide a human readable response.
• Banners are displayed prior to system resource access, and users must
acknowledge compliance before accessing those resources.
• Systems which do not support pre-login banners must display a warning at
or immediately after login.
• If electronic banners and warnings are not supported at all, clearly visible
printed banners may be used for console access.
Physical Security
• Ames Laboratory is an open campus with unlocked buildings during the day.
Students and the general public may use buildings at any time.
• It is important the computers and data are secured. For instance:
– Lock office and laboratory doors if unattended.
– Ensure that computer screens are password protected when users are not at the terminal.
– Report suspicious activity or unrecognized people in laboratory spaces.
Moderate Data and PII
• Users are responsible for the identification and safe handling of Sensitive
but Unclassified Information (SUI) and Personally Identifiable Information
(PII).
• These data types include:
– Projects covered by Non-Disclosure Agreements (NDA’s).
– Work for Others confidentiality agreements.
– Law enforcement sensitive data.
– Official Use Only.
– Data including personal information such as Social Security Numbers, medical data, birth
date, and other non-public information on individuals.
Network and Internet Access
• Network access is provided to users and visitors upon request. To request
network access, use the IP request form available from the IS office.
• All network users are required to read, sign, and return the Rules of
• An individual site security plan may be required for Foreign Nationals.
Appropriate Use
• The DOE grants employees permission to use computing resources for
limited personal use provided that such activity is not for personal financial
gain, illegal, or detrimental to Ames Laboratory’s mission.
• Specifically, users may not:
– Access pornographic web sites and material.
– Develop applications for personal gain.
– Illegally download copyrighted material.
– Access potentially offensive material.
– Perform personal activities that cause congestion, delays or disruptions of service to others.
– Install applications which are considered dangerous, including peer to peer (P2P) software,
vulnerability scanning tools, and other software listed at:
Appropriate Use
(continued)
• As indicated in the login banner, users of computer and network resources
do not have a right to, or expectation of, privacy at any time, including when
they are accessing the Internet applications such as social networking sites
or personal e-mail.
• In addition, while activities such as the use of social networking sites, online
radio, or chat programs are not prohibited, users may be asked to limit such
activity if they expose the laboratory to elevated risks.
• If circumstances create a need for an exception from these constraints,
contact the IS office (4-8348; is@ameslab.gov).
Computer Software Licenses
• It is the responsibility of each computer user to follow the licensing
agreement of all software that is being used and to keep documentation
including:
– Sales receipts.
– Original diskettes.
– Purchase orders.
– Registration certificates.
– License codes.
• It is illegal to make or use unlicensed copies of software. Ignorance is no
excuse under the Copyright Protection Act. Violation of licensing
agreements is punishable by fines and/or imprisonment.
• It is Ames Laboratory’s policy to adhere to all copyright agreements of
software owned by or used by Ames Laboratory personnel.
Cyber Security Incidents
• A Cyber Security Incident is an adverse event that threatens the security
of information resources.
– Incidents must be reported immediately to a group administrator, ACSM, or the IS office with
your name and computer system’s IP address (similar to 147.155.xxx.xxx).
– An investigative team will examine the system, acquire an image, and provide further
assistance to facilitate data and system recovery.
• Examples of reportable Cyber Security Incidents include:
– Compromise/Intrusion: Intentional or unintentional instances of system compromise by
unauthorized users.
– Malicious Code: Instances of malicious code such as viruses, Trojan horses, or worms.
– Unauthorized Use: Use of a computer to obtain data without authorization, obtaining or
using illegal material, or hacking.
– Loss or Theft: The physical loss or theft of any computer system; the loss or theft of digital
media containing Sensitive but Unclassified Information (SUI).
– Information Compromise: Any unauthorized disclosure of information.
Cyber Attack
• How to Recognize a Cyber Attack
– Signs indicating a computer system is under attack may include:
• Unusually sluggish or non-responsive applications.
• Unexpected changes in system behavior.
• Persistent pop-up messages.
• Missing or corrupt data.
• How to Prevent a Cyber Attack
– Use plug-ins to block ads (Ad-Block Plus).
– Use GPG for sender verification with e-mail.
– Ensure anti-virus is turned on.
Social Engineering and Internet Safety
• Web.
– Avoid ‘high-risk’ sites: gambling, pornography, ‘ad-supported’, etc.
– Read prompts and pop-ups; understand what you click
– Never use your Ames Laboratory password with Internet servers.
• E-Mail.
– Phishing attacks and other forms of social engineering are also cyber attacks.
– Any publicly available information may be used to make a message appear legitimate,
including:
• Logos.
• personal e-mail addresses.
• official documents.
Social Engineering and Internet Safety
(continued)
• Social Media.
– Phishing and other social engineering attacks commonly occur via social media.
– Limit broadcasts of work place, job duties and other personal information.

Mais conteúdo relacionado

Mais procurados

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Mais procurados (20)

Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Social engineering
Social engineering Social engineering
Social engineering
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 

Destaque

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Destaque (20)

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 

Semelhante a Cyber security awareness training by cyber security infotech(csi)

Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
Imran Khan
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
Venkat Alagarsamy
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
Nicholas Davis
 

Semelhante a Cyber security awareness training by cyber security infotech(csi) (20)

security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Unit v
Unit vUnit v
Unit v
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Computer security
Computer securityComputer security
Computer security
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 

Mais de Cyber Security Infotech

Mais de Cyber Security Infotech (6)

Trends that state the future of mobile application development
Trends that state the future of mobile application developmentTrends that state the future of mobile application development
Trends that state the future of mobile application development
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Introduction to induction heating by stead fast engineers
Introduction to induction heating by stead fast engineersIntroduction to induction heating by stead fast engineers
Introduction to induction heating by stead fast engineers
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Cyber security awareness training by cyber security infotech(csi)

  • 1. Cyber Security Awareness Training by Cyber security Infotech(CSI)
  • 2. Table of Contents • Cyber Security Highlights. – User Accounts. – Baseline Configurations. – Configuration Management. – Contingency Plans and Backups. – Mobile Devices and Portable Storage. – Login Banners. – Physical Security. – Sensitive and Personally Identifiable Information (PII). • Network and Internet Access. • Appropriate Use. • Computer Software Licenses. • Cyber Security Incidents. • Cyber Attack. • Social Engineering and Internet Safety.
  • 3. Roles and Responsibilities • Users. – Follow security procedures, report security problems, and complete required computer security training. • Privileged Users. – Administer their own systems, including patch and configuration management. • Group Administrators. – Manage computers and implement the cyber security program within their group. • Assistant Cyber Security Managers (ACSM). – Program point of contact. – Implement the cyber security program within their program. • Cyber Security Team. – Manage day-to-day operation of the cyber security program. • Directors / Associate Directors. – Responsible for the Laboratory’s cyber security program. – Establish the program’s overall goals, objectives and priorities.
  • 4. User Accounts • Central accounts through the IS office provide access to: – Workstations. – E-mail (including webmail). – Remote connectivity (VPN, SSH, modem/dialup). – Central services (Central File Services, administrative applications, web publishing, etc.). • Passwords are keys to computing resources, just as door keys are for facilities. • Different passwords should be used to access Internet resources (i.e. an ISU or hotmail account). To facilitate this, the use of a cryptographic password safe is recommended. • The DOE requires that passwords: – Be at least 8 characters long. – Not be based on the username or a dictionary word. – Be changed every 180 days, or when a compromise is suspected. – Contain mixed case, symbols, and digits. – Contain a nonnumeric character in the first and last position.
  • 5. Baseline Configurations • Baseline Configurations must be applied to all computers attached to the Ames Laboratory network. • Pre-baselined systems are available to all users from the storeroom. Administrative users must purchase these systems or provide justification outlining why the provided systems are not sufficient.
  • 6. Baseline Configurations (continued) • Baseline requirements include – Anti-virus software. – Anti-spyware software. – Current patches for operating systems and applications. • If a workstation is in use and the operating system is no longer supported by the vendor, it must be isolated from other Laboratory computers. Contact the IS office (4-8348; is@ameslab.gov) for assistance.
  • 7. Configuration Management • Users are responsible for ensuring that changes to the system do not diminish security and that changes to the system are reflected in system documentation. • Examples of risky system changes include: – Installing third party software. – Providing physical system access to others. – Installing or configuring hardware devices.
  • 8. Contingency Plans and Backups • Contingency Plans. – Users should document the procedures, equipment, and personnel necessary to recover computing capabilities and data in the event that computer system operations are disrupted. • Significant computing resources should have a written contingency plan including: – System backup details. – System recovery checklist/guide. – Key personnel. – System configuration data such as key applications and configuration settings. • Backups. – Backups are critical to contingency preparedness. Backups should: • Be stored securely. • Be periodically tested for usability. • Be documented (what is backed up, the backup schedule, and the data recovery procedures). – It is important to differentiate data which should be backed up from data considered temporary, or an acceptable loss.
  • 9. Mobile Device and Portable Storage • Users of mobile devices (e.g. laptops, PDAs) and portable media (e.g. USB keys) are responsible for the security of these devices when used in other environments. Users are encouraged to: – Make complete backups of data prior to travel, – Utilize central imaging and scanning facilities for laptops and removable media, – Keep laptops within sight at all times during travel, – Be aware of the physical and network environment when using the laptop or sending information over untrusted networks. • Pre-verified USB keys are available from the storeroom for purchase. Use of other USB keys is also permitted with approval on a case-by-case basis. A USB scanning station is available in the IS office. • Moderate data must be encrypted if stored on mobile devices or portable storage.
  • 10. Login Banners • The DOE requires login banners on: – All interactive access points (e.g. console login, SSH, and web site access). – All non-interactive access points that provide a human readable response. • Banners are displayed prior to system resource access, and users must acknowledge compliance before accessing those resources. • Systems which do not support pre-login banners must display a warning at or immediately after login. • If electronic banners and warnings are not supported at all, clearly visible printed banners may be used for console access.
  • 11. Physical Security • Ames Laboratory is an open campus with unlocked buildings during the day. Students and the general public may use buildings at any time. • It is important the computers and data are secured. For instance: – Lock office and laboratory doors if unattended. – Ensure that computer screens are password protected when users are not at the terminal. – Report suspicious activity or unrecognized people in laboratory spaces.
  • 12. Moderate Data and PII • Users are responsible for the identification and safe handling of Sensitive but Unclassified Information (SUI) and Personally Identifiable Information (PII). • These data types include: – Projects covered by Non-Disclosure Agreements (NDA’s). – Work for Others confidentiality agreements. – Law enforcement sensitive data. – Official Use Only. – Data including personal information such as Social Security Numbers, medical data, birth date, and other non-public information on individuals.
  • 13. Network and Internet Access • Network access is provided to users and visitors upon request. To request network access, use the IP request form available from the IS office. • All network users are required to read, sign, and return the Rules of • An individual site security plan may be required for Foreign Nationals.
  • 14. Appropriate Use • The DOE grants employees permission to use computing resources for limited personal use provided that such activity is not for personal financial gain, illegal, or detrimental to Ames Laboratory’s mission. • Specifically, users may not: – Access pornographic web sites and material. – Develop applications for personal gain. – Illegally download copyrighted material. – Access potentially offensive material. – Perform personal activities that cause congestion, delays or disruptions of service to others. – Install applications which are considered dangerous, including peer to peer (P2P) software, vulnerability scanning tools, and other software listed at:
  • 15. Appropriate Use (continued) • As indicated in the login banner, users of computer and network resources do not have a right to, or expectation of, privacy at any time, including when they are accessing the Internet applications such as social networking sites or personal e-mail. • In addition, while activities such as the use of social networking sites, online radio, or chat programs are not prohibited, users may be asked to limit such activity if they expose the laboratory to elevated risks. • If circumstances create a need for an exception from these constraints, contact the IS office (4-8348; is@ameslab.gov).
  • 16. Computer Software Licenses • It is the responsibility of each computer user to follow the licensing agreement of all software that is being used and to keep documentation including: – Sales receipts. – Original diskettes. – Purchase orders. – Registration certificates. – License codes. • It is illegal to make or use unlicensed copies of software. Ignorance is no excuse under the Copyright Protection Act. Violation of licensing agreements is punishable by fines and/or imprisonment. • It is Ames Laboratory’s policy to adhere to all copyright agreements of software owned by or used by Ames Laboratory personnel.
  • 17. Cyber Security Incidents • A Cyber Security Incident is an adverse event that threatens the security of information resources. – Incidents must be reported immediately to a group administrator, ACSM, or the IS office with your name and computer system’s IP address (similar to 147.155.xxx.xxx). – An investigative team will examine the system, acquire an image, and provide further assistance to facilitate data and system recovery. • Examples of reportable Cyber Security Incidents include: – Compromise/Intrusion: Intentional or unintentional instances of system compromise by unauthorized users. – Malicious Code: Instances of malicious code such as viruses, Trojan horses, or worms. – Unauthorized Use: Use of a computer to obtain data without authorization, obtaining or using illegal material, or hacking. – Loss or Theft: The physical loss or theft of any computer system; the loss or theft of digital media containing Sensitive but Unclassified Information (SUI). – Information Compromise: Any unauthorized disclosure of information.
  • 18. Cyber Attack • How to Recognize a Cyber Attack – Signs indicating a computer system is under attack may include: • Unusually sluggish or non-responsive applications. • Unexpected changes in system behavior. • Persistent pop-up messages. • Missing or corrupt data. • How to Prevent a Cyber Attack – Use plug-ins to block ads (Ad-Block Plus). – Use GPG for sender verification with e-mail. – Ensure anti-virus is turned on.
  • 19. Social Engineering and Internet Safety • Web. – Avoid ‘high-risk’ sites: gambling, pornography, ‘ad-supported’, etc. – Read prompts and pop-ups; understand what you click – Never use your Ames Laboratory password with Internet servers. • E-Mail. – Phishing attacks and other forms of social engineering are also cyber attacks. – Any publicly available information may be used to make a message appear legitimate, including: • Logos. • personal e-mail addresses. • official documents.
  • 20. Social Engineering and Internet Safety (continued) • Social Media. – Phishing and other social engineering attacks commonly occur via social media. – Limit broadcasts of work place, job duties and other personal information.