SlideShare a Scribd company logo
1 of 20
Cyber Security Awareness
Training by Cyber security
Infotech(CSI)
Table of Contents
• Cyber Security Highlights.
– User Accounts.
– Baseline Configurations.
– Configuration Management.
– Contingency Plans and Backups.
– Mobile Devices and Portable Storage.
– Login Banners.
– Physical Security.
– Sensitive and Personally Identifiable Information (PII).
• Network and Internet Access.
• Appropriate Use.
• Computer Software Licenses.
• Cyber Security Incidents.
• Cyber Attack.
• Social Engineering and Internet Safety.
Roles and Responsibilities
• Users.
– Follow security procedures, report security problems, and complete required computer
security training.
• Privileged Users.
– Administer their own systems, including patch and configuration management.
• Group Administrators.
– Manage computers and implement the cyber security program within their group.
• Assistant Cyber Security Managers (ACSM).
– Program point of contact.
– Implement the cyber security program within their program.
• Cyber Security Team.
– Manage day-to-day operation of the cyber security program.
• Directors / Associate Directors.
– Responsible for the Laboratory’s cyber security program.
– Establish the program’s overall goals, objectives and priorities.
User Accounts
• Central accounts through the IS office provide access to:
– Workstations.
– E-mail (including webmail).
– Remote connectivity (VPN, SSH, modem/dialup).
– Central services (Central File Services, administrative applications, web publishing, etc.).
• Passwords are keys to computing resources, just as door keys are for
facilities.
• Different passwords should be used to access Internet resources (i.e. an
ISU or hotmail account). To facilitate this, the use of a cryptographic
password safe is recommended.
• The DOE requires that passwords:
– Be at least 8 characters long.
– Not be based on the username or a dictionary word.
– Be changed every 180 days, or when a compromise is suspected.
– Contain mixed case, symbols, and digits.
– Contain a nonnumeric character in the first and last position.
Baseline Configurations
• Baseline Configurations must be applied to all computers attached to the
Ames Laboratory network.
• Pre-baselined systems are available to all users from the storeroom.
Administrative users must purchase these systems or provide justification
outlining why the provided systems are not sufficient.
Baseline Configurations
(continued)
• Baseline requirements include
– Anti-virus software.
– Anti-spyware software.
– Current patches for operating systems and applications.
• If a workstation is in use and the operating system is no longer supported by
the vendor, it must be isolated from other Laboratory computers. Contact
the IS office (4-8348; is@ameslab.gov) for assistance.
Configuration Management
• Users are responsible for ensuring that changes to the system do not
diminish security and that changes to the system are reflected in system
documentation.
• Examples of risky system changes include:
– Installing third party software.
– Providing physical system access to others.
– Installing or configuring hardware devices.
Contingency Plans and Backups
• Contingency Plans.
– Users should document the procedures, equipment, and personnel necessary to recover
computing capabilities and data in the event that computer system operations are disrupted.
• Significant computing resources should have a written contingency plan including:
– System backup details.
– System recovery checklist/guide.
– Key personnel.
– System configuration data such as key applications and configuration settings.
• Backups.
– Backups are critical to contingency preparedness. Backups should:
• Be stored securely.
• Be periodically tested for usability.
• Be documented (what is backed up, the backup schedule, and the data recovery procedures).
– It is important to differentiate data which should be backed up from data considered
temporary, or an acceptable loss.
Mobile Device and Portable Storage
• Users of mobile devices (e.g. laptops, PDAs) and portable media (e.g. USB
keys) are responsible for the security of these devices when used in other
environments. Users are encouraged to:
– Make complete backups of data prior to travel,
– Utilize central imaging and scanning facilities for laptops and removable media,
– Keep laptops within sight at all times during travel,
– Be aware of the physical and network environment when using the laptop or sending
information over untrusted networks.
• Pre-verified USB keys are available from the storeroom for purchase. Use
of other USB keys is also permitted with approval on a case-by-case basis.
A USB scanning station is available in the IS office.
• Moderate data must be encrypted if stored on mobile devices or portable
storage.
Login Banners
• The DOE requires login banners on:
– All interactive access points (e.g. console login, SSH, and web site access).
– All non-interactive access points that provide a human readable response.
• Banners are displayed prior to system resource access, and users must
acknowledge compliance before accessing those resources.
• Systems which do not support pre-login banners must display a warning at
or immediately after login.
• If electronic banners and warnings are not supported at all, clearly visible
printed banners may be used for console access.
Physical Security
• Ames Laboratory is an open campus with unlocked buildings during the day.
Students and the general public may use buildings at any time.
• It is important the computers and data are secured. For instance:
– Lock office and laboratory doors if unattended.
– Ensure that computer screens are password protected when users are not at the terminal.
– Report suspicious activity or unrecognized people in laboratory spaces.
Moderate Data and PII
• Users are responsible for the identification and safe handling of Sensitive
but Unclassified Information (SUI) and Personally Identifiable Information
(PII).
• These data types include:
– Projects covered by Non-Disclosure Agreements (NDA’s).
– Work for Others confidentiality agreements.
– Law enforcement sensitive data.
– Official Use Only.
– Data including personal information such as Social Security Numbers, medical data, birth
date, and other non-public information on individuals.
Network and Internet Access
• Network access is provided to users and visitors upon request. To request
network access, use the IP request form available from the IS office.
• All network users are required to read, sign, and return the Rules of
• An individual site security plan may be required for Foreign Nationals.
Appropriate Use
• The DOE grants employees permission to use computing resources for
limited personal use provided that such activity is not for personal financial
gain, illegal, or detrimental to Ames Laboratory’s mission.
• Specifically, users may not:
– Access pornographic web sites and material.
– Develop applications for personal gain.
– Illegally download copyrighted material.
– Access potentially offensive material.
– Perform personal activities that cause congestion, delays or disruptions of service to others.
– Install applications which are considered dangerous, including peer to peer (P2P) software,
vulnerability scanning tools, and other software listed at:
Appropriate Use
(continued)
• As indicated in the login banner, users of computer and network resources
do not have a right to, or expectation of, privacy at any time, including when
they are accessing the Internet applications such as social networking sites
or personal e-mail.
• In addition, while activities such as the use of social networking sites, online
radio, or chat programs are not prohibited, users may be asked to limit such
activity if they expose the laboratory to elevated risks.
• If circumstances create a need for an exception from these constraints,
contact the IS office (4-8348; is@ameslab.gov).
Computer Software Licenses
• It is the responsibility of each computer user to follow the licensing
agreement of all software that is being used and to keep documentation
including:
– Sales receipts.
– Original diskettes.
– Purchase orders.
– Registration certificates.
– License codes.
• It is illegal to make or use unlicensed copies of software. Ignorance is no
excuse under the Copyright Protection Act. Violation of licensing
agreements is punishable by fines and/or imprisonment.
• It is Ames Laboratory’s policy to adhere to all copyright agreements of
software owned by or used by Ames Laboratory personnel.
Cyber Security Incidents
• A Cyber Security Incident is an adverse event that threatens the security
of information resources.
– Incidents must be reported immediately to a group administrator, ACSM, or the IS office with
your name and computer system’s IP address (similar to 147.155.xxx.xxx).
– An investigative team will examine the system, acquire an image, and provide further
assistance to facilitate data and system recovery.
• Examples of reportable Cyber Security Incidents include:
– Compromise/Intrusion: Intentional or unintentional instances of system compromise by
unauthorized users.
– Malicious Code: Instances of malicious code such as viruses, Trojan horses, or worms.
– Unauthorized Use: Use of a computer to obtain data without authorization, obtaining or
using illegal material, or hacking.
– Loss or Theft: The physical loss or theft of any computer system; the loss or theft of digital
media containing Sensitive but Unclassified Information (SUI).
– Information Compromise: Any unauthorized disclosure of information.
Cyber Attack
• How to Recognize a Cyber Attack
– Signs indicating a computer system is under attack may include:
• Unusually sluggish or non-responsive applications.
• Unexpected changes in system behavior.
• Persistent pop-up messages.
• Missing or corrupt data.
• How to Prevent a Cyber Attack
– Use plug-ins to block ads (Ad-Block Plus).
– Use GPG for sender verification with e-mail.
– Ensure anti-virus is turned on.
Social Engineering and Internet Safety
• Web.
– Avoid ‘high-risk’ sites: gambling, pornography, ‘ad-supported’, etc.
– Read prompts and pop-ups; understand what you click
– Never use your Ames Laboratory password with Internet servers.
• E-Mail.
– Phishing attacks and other forms of social engineering are also cyber attacks.
– Any publicly available information may be used to make a message appear legitimate,
including:
• Logos.
• personal e-mail addresses.
• official documents.
Social Engineering and Internet Safety
(continued)
• Social Media.
– Phishing and other social engineering attacks commonly occur via social media.
– Limit broadcasts of work place, job duties and other personal information.

More Related Content

What's hot

Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 

Viewers also liked

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Viewers also liked (20)

General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
Cyber Security Awareness October 2014
Cyber Security Awareness October 2014Cyber Security Awareness October 2014
Cyber Security Awareness October 2014
 

Similar to Cyber security awareness training by cyber security infotech(csi)

Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
bodo-con
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
bodo-con
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
Imran Khan
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
Venkat Alagarsamy
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
Nicholas Davis
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
Nicholas Davis
 

Similar to Cyber security awareness training by cyber security infotech(csi) (20)

security and system mainatance
security and system mainatancesecurity and system mainatance
security and system mainatance
 
Mis
MisMis
Mis
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Security (IM).ppt
Security (IM).pptSecurity (IM).ppt
Security (IM).ppt
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Development of security architecture
Development of security architectureDevelopment of security architecture
Development of security architecture
 
Enterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurityEnterprise mobileapplicationsecurity
Enterprise mobileapplicationsecurity
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
System Security Sem 2(Module 1).pptx
System Security Sem 2(Module     1).pptxSystem Security Sem 2(Module     1).pptx
System Security Sem 2(Module 1).pptx
 
Unit v
Unit vUnit v
Unit v
 
Network Security, Change Control, Outsourcing
Network Security, Change Control, OutsourcingNetwork Security, Change Control, Outsourcing
Network Security, Change Control, Outsourcing
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
Computer security
Computer securityComputer security
Computer security
 
Chapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptxChapter-2-Control-Audit-Security-ioenotes.pptx
Chapter-2-Control-Audit-Security-ioenotes.pptx
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 

More from Cyber Security Infotech

More from Cyber Security Infotech (6)

Trends that state the future of mobile application development
Trends that state the future of mobile application developmentTrends that state the future of mobile application development
Trends that state the future of mobile application development
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Introduction to induction heating by stead fast engineers
Introduction to induction heating by stead fast engineersIntroduction to induction heating by stead fast engineers
Introduction to induction heating by stead fast engineers
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 

Recently uploaded

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cyber security awareness training by cyber security infotech(csi)

  • 1. Cyber Security Awareness Training by Cyber security Infotech(CSI)
  • 2. Table of Contents • Cyber Security Highlights. – User Accounts. – Baseline Configurations. – Configuration Management. – Contingency Plans and Backups. – Mobile Devices and Portable Storage. – Login Banners. – Physical Security. – Sensitive and Personally Identifiable Information (PII). • Network and Internet Access. • Appropriate Use. • Computer Software Licenses. • Cyber Security Incidents. • Cyber Attack. • Social Engineering and Internet Safety.
  • 3. Roles and Responsibilities • Users. – Follow security procedures, report security problems, and complete required computer security training. • Privileged Users. – Administer their own systems, including patch and configuration management. • Group Administrators. – Manage computers and implement the cyber security program within their group. • Assistant Cyber Security Managers (ACSM). – Program point of contact. – Implement the cyber security program within their program. • Cyber Security Team. – Manage day-to-day operation of the cyber security program. • Directors / Associate Directors. – Responsible for the Laboratory’s cyber security program. – Establish the program’s overall goals, objectives and priorities.
  • 4. User Accounts • Central accounts through the IS office provide access to: – Workstations. – E-mail (including webmail). – Remote connectivity (VPN, SSH, modem/dialup). – Central services (Central File Services, administrative applications, web publishing, etc.). • Passwords are keys to computing resources, just as door keys are for facilities. • Different passwords should be used to access Internet resources (i.e. an ISU or hotmail account). To facilitate this, the use of a cryptographic password safe is recommended. • The DOE requires that passwords: – Be at least 8 characters long. – Not be based on the username or a dictionary word. – Be changed every 180 days, or when a compromise is suspected. – Contain mixed case, symbols, and digits. – Contain a nonnumeric character in the first and last position.
  • 5. Baseline Configurations • Baseline Configurations must be applied to all computers attached to the Ames Laboratory network. • Pre-baselined systems are available to all users from the storeroom. Administrative users must purchase these systems or provide justification outlining why the provided systems are not sufficient.
  • 6. Baseline Configurations (continued) • Baseline requirements include – Anti-virus software. – Anti-spyware software. – Current patches for operating systems and applications. • If a workstation is in use and the operating system is no longer supported by the vendor, it must be isolated from other Laboratory computers. Contact the IS office (4-8348; is@ameslab.gov) for assistance.
  • 7. Configuration Management • Users are responsible for ensuring that changes to the system do not diminish security and that changes to the system are reflected in system documentation. • Examples of risky system changes include: – Installing third party software. – Providing physical system access to others. – Installing or configuring hardware devices.
  • 8. Contingency Plans and Backups • Contingency Plans. – Users should document the procedures, equipment, and personnel necessary to recover computing capabilities and data in the event that computer system operations are disrupted. • Significant computing resources should have a written contingency plan including: – System backup details. – System recovery checklist/guide. – Key personnel. – System configuration data such as key applications and configuration settings. • Backups. – Backups are critical to contingency preparedness. Backups should: • Be stored securely. • Be periodically tested for usability. • Be documented (what is backed up, the backup schedule, and the data recovery procedures). – It is important to differentiate data which should be backed up from data considered temporary, or an acceptable loss.
  • 9. Mobile Device and Portable Storage • Users of mobile devices (e.g. laptops, PDAs) and portable media (e.g. USB keys) are responsible for the security of these devices when used in other environments. Users are encouraged to: – Make complete backups of data prior to travel, – Utilize central imaging and scanning facilities for laptops and removable media, – Keep laptops within sight at all times during travel, – Be aware of the physical and network environment when using the laptop or sending information over untrusted networks. • Pre-verified USB keys are available from the storeroom for purchase. Use of other USB keys is also permitted with approval on a case-by-case basis. A USB scanning station is available in the IS office. • Moderate data must be encrypted if stored on mobile devices or portable storage.
  • 10. Login Banners • The DOE requires login banners on: – All interactive access points (e.g. console login, SSH, and web site access). – All non-interactive access points that provide a human readable response. • Banners are displayed prior to system resource access, and users must acknowledge compliance before accessing those resources. • Systems which do not support pre-login banners must display a warning at or immediately after login. • If electronic banners and warnings are not supported at all, clearly visible printed banners may be used for console access.
  • 11. Physical Security • Ames Laboratory is an open campus with unlocked buildings during the day. Students and the general public may use buildings at any time. • It is important the computers and data are secured. For instance: – Lock office and laboratory doors if unattended. – Ensure that computer screens are password protected when users are not at the terminal. – Report suspicious activity or unrecognized people in laboratory spaces.
  • 12. Moderate Data and PII • Users are responsible for the identification and safe handling of Sensitive but Unclassified Information (SUI) and Personally Identifiable Information (PII). • These data types include: – Projects covered by Non-Disclosure Agreements (NDA’s). – Work for Others confidentiality agreements. – Law enforcement sensitive data. – Official Use Only. – Data including personal information such as Social Security Numbers, medical data, birth date, and other non-public information on individuals.
  • 13. Network and Internet Access • Network access is provided to users and visitors upon request. To request network access, use the IP request form available from the IS office. • All network users are required to read, sign, and return the Rules of • An individual site security plan may be required for Foreign Nationals.
  • 14. Appropriate Use • The DOE grants employees permission to use computing resources for limited personal use provided that such activity is not for personal financial gain, illegal, or detrimental to Ames Laboratory’s mission. • Specifically, users may not: – Access pornographic web sites and material. – Develop applications for personal gain. – Illegally download copyrighted material. – Access potentially offensive material. – Perform personal activities that cause congestion, delays or disruptions of service to others. – Install applications which are considered dangerous, including peer to peer (P2P) software, vulnerability scanning tools, and other software listed at:
  • 15. Appropriate Use (continued) • As indicated in the login banner, users of computer and network resources do not have a right to, or expectation of, privacy at any time, including when they are accessing the Internet applications such as social networking sites or personal e-mail. • In addition, while activities such as the use of social networking sites, online radio, or chat programs are not prohibited, users may be asked to limit such activity if they expose the laboratory to elevated risks. • If circumstances create a need for an exception from these constraints, contact the IS office (4-8348; is@ameslab.gov).
  • 16. Computer Software Licenses • It is the responsibility of each computer user to follow the licensing agreement of all software that is being used and to keep documentation including: – Sales receipts. – Original diskettes. – Purchase orders. – Registration certificates. – License codes. • It is illegal to make or use unlicensed copies of software. Ignorance is no excuse under the Copyright Protection Act. Violation of licensing agreements is punishable by fines and/or imprisonment. • It is Ames Laboratory’s policy to adhere to all copyright agreements of software owned by or used by Ames Laboratory personnel.
  • 17. Cyber Security Incidents • A Cyber Security Incident is an adverse event that threatens the security of information resources. – Incidents must be reported immediately to a group administrator, ACSM, or the IS office with your name and computer system’s IP address (similar to 147.155.xxx.xxx). – An investigative team will examine the system, acquire an image, and provide further assistance to facilitate data and system recovery. • Examples of reportable Cyber Security Incidents include: – Compromise/Intrusion: Intentional or unintentional instances of system compromise by unauthorized users. – Malicious Code: Instances of malicious code such as viruses, Trojan horses, or worms. – Unauthorized Use: Use of a computer to obtain data without authorization, obtaining or using illegal material, or hacking. – Loss or Theft: The physical loss or theft of any computer system; the loss or theft of digital media containing Sensitive but Unclassified Information (SUI). – Information Compromise: Any unauthorized disclosure of information.
  • 18. Cyber Attack • How to Recognize a Cyber Attack – Signs indicating a computer system is under attack may include: • Unusually sluggish or non-responsive applications. • Unexpected changes in system behavior. • Persistent pop-up messages. • Missing or corrupt data. • How to Prevent a Cyber Attack – Use plug-ins to block ads (Ad-Block Plus). – Use GPG for sender verification with e-mail. – Ensure anti-virus is turned on.
  • 19. Social Engineering and Internet Safety • Web. – Avoid ‘high-risk’ sites: gambling, pornography, ‘ad-supported’, etc. – Read prompts and pop-ups; understand what you click – Never use your Ames Laboratory password with Internet servers. • E-Mail. – Phishing attacks and other forms of social engineering are also cyber attacks. – Any publicly available information may be used to make a message appear legitimate, including: • Logos. • personal e-mail addresses. • official documents.
  • 20. Social Engineering and Internet Safety (continued) • Social Media. – Phishing and other social engineering attacks commonly occur via social media. – Limit broadcasts of work place, job duties and other personal information.