Upload
gertrude-morris
View
218
Download
0
Tags:
Embed Size (px)
Citation preview
We build strong children strong families strong communities
Presented By:
Brad Lawrence
Kent Starling
Treasa McLean
Why Secure the Y?
Background
Lake Wales YMCA 1001 Burns AveExercise Facilities Children CareLaura Motis Executive Director
Security Policy
Limited to nonexistent network security policy
Included in Employee Handbook
No true computer network setup
Member scantron system
Critical areas of concern
Loss of DataData SecurityEmployee Standards
EmployeeHandbook
Delete or Alter Files
Shredder for important papers
Limited Security on specified folders
Backup not secure
No data deletion/alteration monitoring
No digital deletion policy/software
Current Situation
Delete or Alter Files
Software application for digital deletion
Security set at Network Level
Standards for off-site backup storage
Software application – data modification
Digital copies of important documents
Recommendations
Take Pictures of Important Documents
No digital copies of sensitive documents
Cell phones restricted
7 authorized employees have Email Accts
CD Burners/USB ports unsecured
Current Situation
Take Pictures of Important Documents Recommendations
Digital pictures of important documents
Enhance cell phones restricted
Email account monitoring/policy
Limited CD burners/USB ports
Unauthorized Wireless AccessCurrent Situation
Wireless Internet
Executive Director
Verizon
Encrypted NO “freeloaders”
Copying or DownloadingCurrent Situation
Child Care
Financial Department
Offsite Location
Data on Secure Computers
Copying or DownloadingRecommendations
Secure Offsite Location
Secure Computers
Log out of computers
Storage Room Security
User AccountsCurrent Situation
Unauthorized access
No password characteristics requirements
Password security
User AccountsRecommendations
Require passwords to be a minimum length
Keep passwords strictly confidential
Log off when leaving their workstation
Passwords should not be common words or phrases
Viruses, Worms, Trojan Horses,Blended ThreatsCurrent Situation
All internet sites accessible
No personal email restrictions
No restrictions relating to CD’s or disks from home
Viruses, Worms, Trojan Horses,Blended ThreatsRecommendations
Set policy regarding internet and email usage
Website restrictions
Completely restrict personal email
Limited network security
Critical areas of concern Loss of Data Data Security
Employee Security
New Network Security System
Expanded-detailed Security Policy
Conclusion
NetworkSecurityPolicy
Presented By:
Brad Lawrence - Kent Starling - Treasa McLean
Why Secure the Y . . .
To protect our children employeesmembers
and community
Andress, M. (2001, November 19). Effective security starts with policies, InfoWorld. Retrieved August 24, 2006, from http://search.ebscohost.com.
Avolio, F. (2000, March 20). Best practices in network security, Network Computing. Retrieved August 24, 2006, from http://www.networkcomputing.com.
Connolly, P. (2000, July 10). Security starts from within, InfoWorld. Retrieved August 24, 2006, from http://search.ebscohost.com.
Ellis, C. (2003, February). '7 steps' for network security: being prepared and knowledgeable is the best defense against hackers and data thieves - local area networks, Communications News. Retrieved August 24, 2006, from http://findarticles.com.
References
File & disk wipers. (n.d.). Winapplslist.com. Retrieved September 25, 2006, from http://www.winappslist.com/security/file_wipers1.htm.
Forcht, K. and Ayers, W. (2000/2001, Winter). Developing a computer security policy for organizational use and implementation, Journal of Computer Information Systems. Retrieved August 28, 2006, from http://search.ebscohost.com.
Gartenberg, M. (2002, June 24). Being tough, gentle with data security, Computerworld. Retrieved August 28, 2006, from http://search.ebscohost.com.
Hulme, G. (2001, Sept 3). Management takes notice, Information Week. Retrieved August 28, 2006, from http://search.ebscohost.com.
References
Kachapeswaran, A. (2006, May 8). Find more like this Microsoft touts a regimen for small-biz network security, Fort Worth Business Press. Retrieved on September 28, 2006, from http://search.ebscohost.com.
Karygiannis, T. and Owens, L. (n.d.). Wireless network security 802.11 Bluetooth and handheld devices, National Institute of Standards and Technology. Retrieved October 15, 2006, from http://csrc.nist.gov/publications.
MacAfee unveils 2006 consumer security software product line. (2005, October). Productivity Software. Retrieved on September 30, 2006, from http://search.ebscohost.com.
Palmer, M. (2001, May/June). Information security policy framework: best practices for security policy in the e-commerce age, Information Systems Security. Retrieved August 28, 2006, from http://search.ebscohost.com.
References
Securing your wireless network. (n.d.). Practically Networked. Retrieved October 15, 2006, from http://www.practicallynetworked.com.
The 60 minute network security guide. (2002, July 12). National Security Agency, United States of America. Retrieved September 25, 2006, from http://www.nsa.gov.
Using the internet downloading files. (2006, January 19). Sofweb. Retrieved October 15, 2006, from http://www.sofweb.vic.edu.
Viollis, P. and Kane, D. (2005, August 22). Risk control strategies viruses: the new weapon of choice for workplace violence offenders, Computer World.com. http://www.computerworld.com.
References
Wikipedia. (n.d.) Retrieved September 19, 2006, from http://en.wikipedia.org.
Wireless security recommendations for Rutgers. (2006, March 23). 2006 Rutgers. Retrieved October 15, 2006, from http://techdir.rutgers.edu/wireless.
Yasin, R. (2001, January 8). Policy Management Hits the Web, InternetWeek. Retrieved August 28, 2006, from http://search.ebscohost.com.
YMCA.net. (n.d.). Retrieved October 20, 2006, from http://www.ymca.net.
References