SlideShare a Scribd company logo
Developed by K2Share, LLC.
TOPIC ON CYBER
SECURITY
BY AKSHAY
BRANCH:AD
What You Will Learn in this Program
• Potential risks and vulnerabilities
• Definitions
• Your role in cyber security and protecting
privacy
• Best practices in security and privacy
2
You are part of the Department’s
stewardship of this information
Information Stewardship
• You are a steward of
personal information
for millions of
Americans
• Vulnerabilities at home
and at work jeopardize
not only the
Department’s
stakeholders, but
everyone you connect
with
3
Cyber Security Defined
• Cyber Security’s goal: Protect our information
and information systems
• Cyber Security is: “Protection of information
systems against unauthorized access to or
modification of information, whether in storage,
processing or transit, and against the denial of
service to authorized users, including those
measures necessary to detect, document, and
counter such threats.”
4
Privacy Defined
• Information privacy, or data privacy: the
relationship between collection and
dissemination of data, technology, the
public expectation of privacy, and the
legal and political issues surrounding
them.
• Information privacy is the right to control
what information about a person is
released.
5
The CIA and N
• Confidentiality: Safeguards information from being accessed by
individuals without the proper clearance, access level, and need to know.
• Integrity: Results from the protection of unauthorized modification or
destruction of information.
• Availability: Information services are accessible when they are needed.
Authentication means a security measure that establishes the validity of a
transmission, message, or originator, or a means of verifying an individual's
authorization to receive specific categories of information.
• Non-repudiation: Assurance the sender of data is provided with proof of
delivery and the recipient is provided with proof of the sender's identity, so
neither can later deny having processed the data.
6
Sensitive Data
• Information is considered sensitive if the loss of
Confidentiality, Integrity, or Availability could be expected
to have a serious, severe, or catastrophic adverse
effect on organizational operations, organizational
assets, or individuals.
• Types of sensitive information include:
– Personnel
– Financial
– Payroll
– Medical
– Privacy Act information.
7
Tips to Help Protect PII
• Minimize PII
• Secure PII
• Safeguard the Transfer of
PII
• Dispose of PII Properly
8
Prevent Spillage
• When storing sensitive information, including PII, prevent
spillage by following these security tips:
– Encrypt data before storing
– Store data only on a network that has been certified and
accredited to store this type of information
– Remember, some systems are strictly non-sensitive—never
transmit, store, or process sensitive data on a non-sensitive
system
– Label paperwork containing PII appropriately and ensure it is
not left lying around
– Use the secure bins provided to dispose of paperwork
containing PII
9
If You Suspect a PII Breach
• Notify your immediate supervisor and ISSO at
once.
• Or, you can also enter the PII breach yourself
using the Department’s online breach/incident
reporting system, called OVMS (Operational
Vulnerability Management System, available at
https://ovms.ed.gov).
• Federal agencies must report a breach within 1
hour of discovery (actual or potential breach) so
time is of the essence.
10
Threats and Vulnerabilities
• What are we protecting our and our
stakeholders information from?
– Threats--any circumstances or events that can
potentially harm an information system by destroying
it, disclosing the information stored on the system,
adversely modifying data, or making the system
unavailable
– Vulnerabilities--weakness in an information system
or its components that could be exploited.
11
Securing the Department
• Don’t store PII on unencrypted storage devices
• Remove your Personal Identity Verification (PIV), or
smart card, when leaving your desktop PC
• Never transmit secure information over an unsecured fax
machine
• Check for security badges and make sure guests
needing escorts have them
• Don’t write down passwords
• Use only authorized thumb drives
• Properly label removable media such as CDs or DVDs
• Be careful how you dispose of anything that might
contain sensitive information
12
Department Password Policy
• The Department has guidelines pertaining to password
use.
– Passwords must be:
– Obscured during login and during transmission.
– Changed after the initial login.
– Forced by the system to be changed every 90 days.
– Strong - shall include three of the four characteristics:
• Numerals
• Alphabetic characters
• Upper and lower case letters
• Special characters
• Passwords shall be at least eight (8) characters in length.
13
Secure Passwords
Do
• Use a combination of:
lower and upper case
letters, numbers, and,
special characters
• Change it every 90
days
• Create a complex,
strong password, and
protect its secrecy
Don’t
• Use personal
information
• Dictionary words
(including foreign
languages)
• Write it down
• Share it with anyone
14
Protect Your Facility
• Protect your facility by following these general security
tips:
– Always use your own badge to enter a secure area
– Never grant access for someone else using your badge
– Challenge people who do not display badges or passes.
– Report any suspicious activity that you see to your ISSO or
building security using the Information Security Incident
Response and Reporting Procedures.
15
Situational Awareness
• To practice good situational
awareness, take the following
precautions, including but not limited
to:
– Avoid discussing topics related to
Government business outside Government
premises, whether you are talking face to
face or on the phone
– Remove your security badge after leaving
your work station
– Don’t talk about work outside the office
– Avoid activities that may compromise
situational awareness
– Be discreet when retrieving messages from
smart phones or other media
16
Social Engineering
17
Hello, I'm calling from Technology for
America – we're a non-profit organization,
working to help ensure that the U.S. stays
at the forefront of computer technology.
Today we're conducting a telephone survey
about the usage of computer systems. Can
I ask you a few questions about your
computer system?
Social engineering is a collection of techniques intended to trick
people into divulging private information. Includes calls emails,
web sites, text messages, interviews, etc.
Social Engineering
18
Do
• Document the
situation—verify the
caller identity, obtain as
much information as
possible, if Caller ID is
available, write down
the caller's telephone
number, take detailed
notes of the
conversation
• Contact your ISSO
Don’t
• Participate in
surveys
• Share personal
information
• Give out computer
systems or
network
information
Mobile Computing
• Always maintain physical control
of mobile devices!
19
• Properly label with
classification and contact
information
• Disable wireless
functionality when it is not in
use
Report Suspicious Computer
Problems
If your system acts
unusual!
20
Report immediately to
your ISSO or
EDCIRC!
Trojan Horse Spyware Worm
Use of Social Media
• Be aware of what you post online!
• Monitor privacy settings
• Refrain from discussing any work-related
matters on such sites.
21

More Related Content

Similar to cybersecurity

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
MansoorAhmed57263
 
Information security
Information securityInformation security
Information security
Vijayananda Mohire
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
talkaton
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
learnt
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
Manish Singh
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
gppcpa
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
Ernest Staats
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
klodianelezi1
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
EricK Gasana
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
ANAND MURALI
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
Financial Poise
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 
Module2_General_Security
Module2_General_SecurityModule2_General_Security
Module2_General_Security
Dulcey Whyte
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
Geoffrey Vaughan
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
vasidharta
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
IBM Security
 

Similar to cybersecurity (20)

itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
Information security
Information securityInformation security
Information security
 
Session4807.ppt
Session4807.pptSession4807.ppt
Session4807.ppt
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Recommending information security measures
Recommending information security measuresRecommending information security measures
Recommending information security measures
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Privacies are Coming
Privacies are ComingPrivacies are Coming
Privacies are Coming
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Module2_General_Security
Module2_General_SecurityModule2_General_Security
Module2_General_Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!Compete To Win: Don’t Just Be Compliant – Be Secure!
Compete To Win: Don’t Just Be Compliant – Be Secure!
 

Recently uploaded

一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
bmucuha
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
ihavuls
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
Timothy Spann
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
ElizabethGarrettChri
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
Timothy Spann
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
xclpvhuk
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
a9qfiubqu
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
aqzctr7x
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
bopyb
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
z6osjkqvd
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
Sm321
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
taqyea
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
mkkikqvo
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
hyfjgavov
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
Lars Albertsson
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
wyddcwye1
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
Márton Kodok
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
soxrziqu
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
Bill641377
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
AndrzejJarynowski
 

Recently uploaded (20)

一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
DSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelinesDSSML24_tspann_CodelessGenerativeAIPipelines
DSSML24_tspann_CodelessGenerativeAIPipelines
 
Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024Open Source Contributions to Postgres: The Basics POSETTE 2024
Open Source Contributions to Postgres: The Basics POSETTE 2024
 
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
06-12-2024-BudapestDataForum-BuildingReal-timePipelineswithFLaNK AIM
 
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
一比一原版(Unimelb毕业证书)墨尔本大学毕业证如何办理
 
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
原版一比一弗林德斯大学毕业证(Flinders毕业证书)如何办理
 
一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理一比一原版(UO毕业证)渥太华大学毕业证如何办理
一比一原版(UO毕业证)渥太华大学毕业证如何办理
 
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
一比一原版(GWU,GW文凭证书)乔治·华盛顿大学毕业证如何办理
 
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
一比一原版英属哥伦比亚大学毕业证(UBC毕业证书)学历如何办理
 
Challenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more importantChallenges of Nation Building-1.pptx with more important
Challenges of Nation Building-1.pptx with more important
 
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
一比一原版(harvard毕业证书)哈佛大学毕业证如何办理
 
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
原版一比一多伦多大学毕业证(UofT毕业证书)如何办理
 
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
一比一原版兰加拉学院毕业证(Langara毕业证书)学历如何办理
 
End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024End-to-end pipeline agility - Berlin Buzzwords 2024
End-to-end pipeline agility - Berlin Buzzwords 2024
 
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
原版一比一利兹贝克特大学毕业证(LeedsBeckett毕业证书)如何办理
 
Build applications with generative AI on Google Cloud
Build applications with generative AI on Google CloudBuild applications with generative AI on Google Cloud
Build applications with generative AI on Google Cloud
 
University of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma TranscriptUniversity of New South Wales degree offer diploma Transcript
University of New South Wales degree offer diploma Transcript
 
Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...Population Growth in Bataan: The effects of population growth around rural pl...
Population Growth in Bataan: The effects of population growth around rural pl...
 
Intelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicineIntelligence supported media monitoring in veterinary medicine
Intelligence supported media monitoring in veterinary medicine
 

cybersecurity

  • 1. Developed by K2Share, LLC. TOPIC ON CYBER SECURITY BY AKSHAY BRANCH:AD
  • 2. What You Will Learn in this Program • Potential risks and vulnerabilities • Definitions • Your role in cyber security and protecting privacy • Best practices in security and privacy 2
  • 3. You are part of the Department’s stewardship of this information Information Stewardship • You are a steward of personal information for millions of Americans • Vulnerabilities at home and at work jeopardize not only the Department’s stakeholders, but everyone you connect with 3
  • 4. Cyber Security Defined • Cyber Security’s goal: Protect our information and information systems • Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.” 4
  • 5. Privacy Defined • Information privacy, or data privacy: the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. • Information privacy is the right to control what information about a person is released. 5
  • 6. The CIA and N • Confidentiality: Safeguards information from being accessed by individuals without the proper clearance, access level, and need to know. • Integrity: Results from the protection of unauthorized modification or destruction of information. • Availability: Information services are accessible when they are needed. Authentication means a security measure that establishes the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. • Non-repudiation: Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data. 6
  • 7. Sensitive Data • Information is considered sensitive if the loss of Confidentiality, Integrity, or Availability could be expected to have a serious, severe, or catastrophic adverse effect on organizational operations, organizational assets, or individuals. • Types of sensitive information include: – Personnel – Financial – Payroll – Medical – Privacy Act information. 7
  • 8. Tips to Help Protect PII • Minimize PII • Secure PII • Safeguard the Transfer of PII • Dispose of PII Properly 8
  • 9. Prevent Spillage • When storing sensitive information, including PII, prevent spillage by following these security tips: – Encrypt data before storing – Store data only on a network that has been certified and accredited to store this type of information – Remember, some systems are strictly non-sensitive—never transmit, store, or process sensitive data on a non-sensitive system – Label paperwork containing PII appropriately and ensure it is not left lying around – Use the secure bins provided to dispose of paperwork containing PII 9
  • 10. If You Suspect a PII Breach • Notify your immediate supervisor and ISSO at once. • Or, you can also enter the PII breach yourself using the Department’s online breach/incident reporting system, called OVMS (Operational Vulnerability Management System, available at https://ovms.ed.gov). • Federal agencies must report a breach within 1 hour of discovery (actual or potential breach) so time is of the essence. 10
  • 11. Threats and Vulnerabilities • What are we protecting our and our stakeholders information from? – Threats--any circumstances or events that can potentially harm an information system by destroying it, disclosing the information stored on the system, adversely modifying data, or making the system unavailable – Vulnerabilities--weakness in an information system or its components that could be exploited. 11
  • 12. Securing the Department • Don’t store PII on unencrypted storage devices • Remove your Personal Identity Verification (PIV), or smart card, when leaving your desktop PC • Never transmit secure information over an unsecured fax machine • Check for security badges and make sure guests needing escorts have them • Don’t write down passwords • Use only authorized thumb drives • Properly label removable media such as CDs or DVDs • Be careful how you dispose of anything that might contain sensitive information 12
  • 13. Department Password Policy • The Department has guidelines pertaining to password use. – Passwords must be: – Obscured during login and during transmission. – Changed after the initial login. – Forced by the system to be changed every 90 days. – Strong - shall include three of the four characteristics: • Numerals • Alphabetic characters • Upper and lower case letters • Special characters • Passwords shall be at least eight (8) characters in length. 13
  • 14. Secure Passwords Do • Use a combination of: lower and upper case letters, numbers, and, special characters • Change it every 90 days • Create a complex, strong password, and protect its secrecy Don’t • Use personal information • Dictionary words (including foreign languages) • Write it down • Share it with anyone 14
  • 15. Protect Your Facility • Protect your facility by following these general security tips: – Always use your own badge to enter a secure area – Never grant access for someone else using your badge – Challenge people who do not display badges or passes. – Report any suspicious activity that you see to your ISSO or building security using the Information Security Incident Response and Reporting Procedures. 15
  • 16. Situational Awareness • To practice good situational awareness, take the following precautions, including but not limited to: – Avoid discussing topics related to Government business outside Government premises, whether you are talking face to face or on the phone – Remove your security badge after leaving your work station – Don’t talk about work outside the office – Avoid activities that may compromise situational awareness – Be discreet when retrieving messages from smart phones or other media 16
  • 17. Social Engineering 17 Hello, I'm calling from Technology for America – we're a non-profit organization, working to help ensure that the U.S. stays at the forefront of computer technology. Today we're conducting a telephone survey about the usage of computer systems. Can I ask you a few questions about your computer system? Social engineering is a collection of techniques intended to trick people into divulging private information. Includes calls emails, web sites, text messages, interviews, etc.
  • 18. Social Engineering 18 Do • Document the situation—verify the caller identity, obtain as much information as possible, if Caller ID is available, write down the caller's telephone number, take detailed notes of the conversation • Contact your ISSO Don’t • Participate in surveys • Share personal information • Give out computer systems or network information
  • 19. Mobile Computing • Always maintain physical control of mobile devices! 19 • Properly label with classification and contact information • Disable wireless functionality when it is not in use
  • 20. Report Suspicious Computer Problems If your system acts unusual! 20 Report immediately to your ISSO or EDCIRC! Trojan Horse Spyware Worm
  • 21. Use of Social Media • Be aware of what you post online! • Monitor privacy settings • Refrain from discussing any work-related matters on such sites. 21