16
Securi Securi ty ty Traini Traini ng ng USAID 2000

Security Training USAID 2000. Information Security

Embed Size (px)

Citation preview

Page 1: Security Training USAID 2000. Information Security

Security Security TrainingTraining

USAID

2000

Page 2: Security Training USAID 2000. Information Security

Information Security

Page 3: Security Training USAID 2000. Information Security

W H Y ?? Two Reasons:

– It’s a responsibility

– It’s the law

(Computer Security Act

1987)

Page 4: Security Training USAID 2000. Information Security

Training Objectives

What is Computer Security

The Threats

What is your role as a user?

Page 5: Security Training USAID 2000. Information Security

Computer Security Definition

Measures required to protect against:– unauthorized access (accidental or intentional)– malicious modification of data– destruction of data, networks and computer

resources– or denial of service to process data.

Page 6: Security Training USAID 2000. Information Security

Data Classifications

CLASSIFIED

(CONFIDENTIAL, SECRET, TOP SECRET)

SENSITIVE BUT UNCLASSIFIED

(TECHNICAL, PROPRIETARY, PROGRAM SPECIFIC)

UNCLASSIFIED

Page 7: Security Training USAID 2000. Information Security
Page 8: Security Training USAID 2000. Information Security

Computer Security

Confidentiality

Integrity

Availability

Page 9: Security Training USAID 2000. Information Security

Workstation Protection (1)

Comply with the physical security requirements.

Page 10: Security Training USAID 2000. Information Security

Never leave your computer unattended while you are logged in

– log off at the end of the day

Protect sensitive information

– store it in a private area

Workstation Protection (2)

Page 11: Security Training USAID 2000. Information Security

Password Requirements

– Passwords must be at least six characters

(alphanumeric)

• e.g., I8NY2x Dog&Man3

– Passwords must be changed periodically

• USAID - Cairo requires every 12 weeks

• Treat Your Password Like A Toothbrush… Don’t

Share It, and Change It Often!

Page 12: Security Training USAID 2000. Information Security

Password Protection NEVER disclose your password! Personal passwords must remain private

– Don’t let anyone else use it

– Don’t write it down

– Don’t type a password while others watch

– Don’t record password on-line or e-mail it

– Don’t use easily guessed words, like children’s names, spouse, pet, birthday and phone number

Page 13: Security Training USAID 2000. Information Security

Virus Protection Run antivirus programs on a regular basis. Do not use any outside floppies/ disks on your

system without running a virus scan first. Many viruses are introduced because virus scanning was not performed.

No illegal duplication of S/W rule - this reduces the spread of virus and avoids legal headaches

Do not boot from diskette if possible

Page 14: Security Training USAID 2000. Information Security

Data and File Backups

Backup your important data

Verify your backups

Page 15: Security Training USAID 2000. Information Security

Internet Security

Do not download and install programs from the Internet without consulting DMS– for example, screen savers, chatting programs

Do not remove the Security wallpaper. This is an Agency requirement

Do not pass on Chain Letters, rumors and jokes

Page 16: Security Training USAID 2000. Information Security

What is the Mission doing to minimize Risk?

Server Protection

Workstation Protection

Firewalls

Backups

Training