SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009
     Presentation Outline Security Guidelines Email Workstation Wireless External Mobile Device Security Protection of Confidential and Private Data Online Financial Transactions Those *!@&$ NDSU network services Dual Support with the ND Association of Counties
   NDSU E-mail What is secure Encrypted User name and password  Email messages and attachments Subject to privacy laws HIPAA GLBA FERPA ND Public Open Records Century Code Using personal e-mail address and equipment for NDSU Business Can be subject to ND Public Open Records Century Code
Workstation Users must have unique login and password Operating system and office software current with latest patches  Anti-virus software and firewall installed, enabled and active Confidential/private data is not accessible or viewable by public Log off computer when done or away from desk Set a password protected screensaver
Workstation Area Confidential/sensitive information not available for public view Protected hard copy documentation stored in locked file cabinet Manipulated hard copy documentation Tidy desk area
Wireless Access Wireless access in the office  Open vs. Secured Access available only to those who need it Wireless access outside of the office Public access Not recommended  Working with confidential private data Use for personal banking Purchasing merchandise online Use NDSU Webmail client to send and receive email – do not send attachments, message body should not contain sensitive information
Laptop Security ,[object Object]
Back up all data, and make use of encryption features when you do so.
Hard drive and external storage is encrypted.
Laptop must be labeled and identified,[object Object]
Phlushing the Phish! What is NDSU doing? What can you do? Recent Spear Phishing Attacks
             Confidential/Private Data Defined and classified in NDUS 1901.2 Examples:  Pesticide Program Master Gardeners 4-H Research What is allowable for use and storage
           Employees & Volunteers Must sign confidentiality agreements Background checks required* Receive formal, documented training  *Above point required if handling electronic financial transactions
           Social Security Numbers Do not use as an identifier on  Files Spread sheets Data bases Correspondence  Any files/documents containing SSN data must be secured and available only to those who have a need to know
       Credit Card Information Do not store Full credit card number (only last four digits) CVV2 number Exp. Date Receipts Only allow last four digits on receipt No CVV2 number No exp. Date Do not accept credit card transactions over email If received over voice mail, delete immediately Must have separation of duties for acceptance of credit cards
More Safeguards Non-disclosure (suppression) Farmers/Ranchers Parents Children Requests for lists of members Health questionnaires (4-H) Date of Birth combined with name Information posted to Web sites
Use & Disposal of Protected Data Encrypt or password protect on electronic devices Back up regularly Allow only those who have a need to know access to data Use only where necessary Dispose of properly
             Personnel  & Volunteer Files Stored in locked cabinet not in public area If request is made to view personnel file Dean and General Counsel to approve request Log request, date, time Viewer must sign log form Only allow what is considered public information to be viewed Purge according to data retention policies Shred with cross cut shredder, burn, using document destruction service
     Suspected Data Breach For computer related security issues contact your supervisor Document reasons you suspect breach of data Do not move, touch, alter equipment or anything related to the breach  Do not attempt to do your own investigation
     NDSU network services E-mail accounts Alias Shared E-mail box space Changing electronic ID Non-employee accounts Affiliate vs. Guest accounts
Alias E-mail Account ,[object Object]
Does not require password
Owner responsible for removing and adding usersSender Alias Recipient Recipient Recipient

Weitere ähnliche Inhalte

Was ist angesagt?

Data Security - English
Data Security - EnglishData Security - English
Data Security - EnglishData Security
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacySolix Technologies, Inc
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...Jack Pringle
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Data protection act
Data protection act Data protection act
Data protection act Iqbal Bocus
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataShirisha Jella
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records ManagersJesse Wilkins
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonNicholas Davis
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...Nicholas Davis
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2jodimw
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information PrivacyPerry Slack
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoMegan Bell
 

Was ist angesagt? (17)

Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Eight principles of consumer data privacy
Eight principles of consumer data privacyEight principles of consumer data privacy
Eight principles of consumer data privacy
 
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
We Have Met the Enemy, and He is Us: The Role of the "Human Factor" in Protec...
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR ZyLAB ACEDS Webinar- GDPR
ZyLAB ACEDS Webinar- GDPR
 
MIS ppt 1
MIS ppt 1MIS ppt 1
MIS ppt 1
 
Data protection act
Data protection act Data protection act
Data protection act
 
Chapter1
Chapter1Chapter1
Chapter1
 
Legal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students dataLegal and ethical aspects in analysing students data
Legal and ethical aspects in analysing students data
 
20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers20110428 ARMA Amarillo IT for Records Managers
20110428 ARMA Amarillo IT for Records Managers
 
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw MadisonUsing Digital Certificates To Secure Sensitive Communications At Uw Madison
Using Digital Certificates To Secure Sensitive Communications At Uw Madison
 
Threats
ThreatsThreats
Threats
 
Healthcare Information Security Secure Sensitive Communications Within The ...
Healthcare Information Security   Secure Sensitive Communications Within The ...Healthcare Information Security   Secure Sensitive Communications Within The ...
Healthcare Information Security Secure Sensitive Communications Within The ...
 
Wk1 discussion 2
Wk1 discussion 2Wk1 discussion 2
Wk1 discussion 2
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
IoT
IoTIoT
IoT
 
Security Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens InfoSecurity Awareness 9 10 09 V4 Sens Info
Security Awareness 9 10 09 V4 Sens Info
 

Andere mochten auch

I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)Bruce Sundeen
 
Presentación sobre Medina Azahara
Presentación sobre Medina AzaharaPresentación sobre Medina Azahara
Presentación sobre Medina AzaharaIES Villarrubia
 
Photography Presentation
Photography PresentationPhotography Presentation
Photography Presentationburrendav
 
Legislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesLegislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesBruce Sundeen
 
Responsive web design - tips & tricks
Responsive web design - tips & tricksResponsive web design - tips & tricks
Responsive web design - tips & tricksRavi Bhadauria
 
Typography and Colors for GUI Designers
Typography and Colors for GUI DesignersTypography and Colors for GUI Designers
Typography and Colors for GUI DesignersRavi Bhadauria
 

Andere mochten auch (7)

Photography Tips
Photography TipsPhotography Tips
Photography Tips
 
I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)I Love How North Dakota is Growing (as long as nothing changes)
I Love How North Dakota is Growing (as long as nothing changes)
 
Presentación sobre Medina Azahara
Presentación sobre Medina AzaharaPresentación sobre Medina Azahara
Presentación sobre Medina Azahara
 
Photography Presentation
Photography PresentationPhotography Presentation
Photography Presentation
 
Legislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New RealitiesLegislative Advocacy: New Players New Rules, New Realities
Legislative Advocacy: New Players New Rules, New Realities
 
Responsive web design - tips & tricks
Responsive web design - tips & tricksResponsive web design - tips & tricks
Responsive web design - tips & tricks
 
Typography and Colors for GUI Designers
Typography and Colors for GUI DesignersTypography and Colors for GUI Designers
Typography and Colors for GUI Designers
 

Ähnlich wie Managing It Security

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLEJonathan Ezor
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security cschumley
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerZitaAdlTrk
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practicecschlein
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentationbrentcarey
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseIpro Tech
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security environment
Security environmentSecurity environment
Security environmentJay Choudhary
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureEuropean Collaboration Summit
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identitywegdam
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the HourVijay Dalmia
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Securitysatyakam_biswas
 

Ähnlich wie Managing It Security (20)

5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE5 19 09 Brandeis Lawyer Technology CLE
5 19 09 Brandeis Lawyer Technology CLE
 
Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security Don't Get Stung - Student Data Security
Don't Get Stung - Student Data Security
 
Ppt Employee Pres
Ppt Employee PresPpt Employee Pres
Ppt Employee Pres
 
Data breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in DangerData breaches - Is Your Law Firm in Danger
Data breaches - Is Your Law Firm in Danger
 
Carol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practiceCarol Schlein Presentation Leveraging Technology in your new law practice
Carol Schlein Presentation Leveraging Technology in your new law practice
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Training for managers and supervisors presentation
Training for managers and supervisors presentationTraining for managers and supervisors presentation
Training for managers and supervisors presentation
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Recycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident ResponseRecycling eDiscovery Best Practices for Data Breach Incident Response
Recycling eDiscovery Best Practices for Data Breach Incident Response
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security environment
Security environmentSecurity environment
Security environment
 
Unit 3
Unit 3Unit 3
Unit 3
 
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference ArchitectureECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
ECS19 - Nicki Borell - Microsoft Cybersecurity Reference Architecture
 
Cybersmart
CybersmartCybersmart
Cybersmart
 
User & Mobile Centric Identity
User & Mobile Centric IdentityUser & Mobile Centric Identity
User & Mobile Centric Identity
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
IT Policy - Need of the Hour
IT Policy - Need of the HourIT Policy - Need of the Hour
IT Policy - Need of the Hour
 
Best Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information SecurityBest Practices In Corporate Privacy & Information Security
Best Practices In Corporate Privacy & Information Security
 

Mehr von Bruce Sundeen

Making the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesMaking the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesBruce Sundeen
 
Research Update 2009
Research Update 2009Research Update 2009
Research Update 2009Bruce Sundeen
 
Taking Goodto Great10 12
Taking Goodto Great10 12Taking Goodto Great10 12
Taking Goodto Great10 12Bruce Sundeen
 
Legislative Advocacy National Fcs
Legislative Advocacy National FcsLegislative Advocacy National Fcs
Legislative Advocacy National FcsBruce Sundeen
 

Mehr von Bruce Sundeen (6)

Risk Communication
Risk CommunicationRisk Communication
Risk Communication
 
Making the Best of Economic Uncertainties
Making the Best of Economic UncertaintiesMaking the Best of Economic Uncertainties
Making the Best of Economic Uncertainties
 
Research Update 2009
Research Update 2009Research Update 2009
Research Update 2009
 
Taking Goodto Great10 12
Taking Goodto Great10 12Taking Goodto Great10 12
Taking Goodto Great10 12
 
Extension
ExtensionExtension
Extension
 
Legislative Advocacy National Fcs
Legislative Advocacy National FcsLegislative Advocacy National Fcs
Legislative Advocacy National Fcs
 

Kürzlich hochgeladen

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 

Kürzlich hochgeladen (20)

Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 

Managing It Security

  • 1. Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009
  • 2. Presentation Outline Security Guidelines Email Workstation Wireless External Mobile Device Security Protection of Confidential and Private Data Online Financial Transactions Those *!@&$ NDSU network services Dual Support with the ND Association of Counties
  • 3. NDSU E-mail What is secure Encrypted User name and password Email messages and attachments Subject to privacy laws HIPAA GLBA FERPA ND Public Open Records Century Code Using personal e-mail address and equipment for NDSU Business Can be subject to ND Public Open Records Century Code
  • 4. Workstation Users must have unique login and password Operating system and office software current with latest patches Anti-virus software and firewall installed, enabled and active Confidential/private data is not accessible or viewable by public Log off computer when done or away from desk Set a password protected screensaver
  • 5. Workstation Area Confidential/sensitive information not available for public view Protected hard copy documentation stored in locked file cabinet Manipulated hard copy documentation Tidy desk area
  • 6. Wireless Access Wireless access in the office Open vs. Secured Access available only to those who need it Wireless access outside of the office Public access Not recommended Working with confidential private data Use for personal banking Purchasing merchandise online Use NDSU Webmail client to send and receive email – do not send attachments, message body should not contain sensitive information
  • 7.
  • 8. Back up all data, and make use of encryption features when you do so.
  • 9. Hard drive and external storage is encrypted.
  • 10.
  • 11. Phlushing the Phish! What is NDSU doing? What can you do? Recent Spear Phishing Attacks
  • 12. Confidential/Private Data Defined and classified in NDUS 1901.2 Examples: Pesticide Program Master Gardeners 4-H Research What is allowable for use and storage
  • 13. Employees & Volunteers Must sign confidentiality agreements Background checks required* Receive formal, documented training *Above point required if handling electronic financial transactions
  • 14. Social Security Numbers Do not use as an identifier on Files Spread sheets Data bases Correspondence Any files/documents containing SSN data must be secured and available only to those who have a need to know
  • 15. Credit Card Information Do not store Full credit card number (only last four digits) CVV2 number Exp. Date Receipts Only allow last four digits on receipt No CVV2 number No exp. Date Do not accept credit card transactions over email If received over voice mail, delete immediately Must have separation of duties for acceptance of credit cards
  • 16. More Safeguards Non-disclosure (suppression) Farmers/Ranchers Parents Children Requests for lists of members Health questionnaires (4-H) Date of Birth combined with name Information posted to Web sites
  • 17. Use & Disposal of Protected Data Encrypt or password protect on electronic devices Back up regularly Allow only those who have a need to know access to data Use only where necessary Dispose of properly
  • 18. Personnel & Volunteer Files Stored in locked cabinet not in public area If request is made to view personnel file Dean and General Counsel to approve request Log request, date, time Viewer must sign log form Only allow what is considered public information to be viewed Purge according to data retention policies Shred with cross cut shredder, burn, using document destruction service
  • 19. Suspected Data Breach For computer related security issues contact your supervisor Document reasons you suspect breach of data Do not move, touch, alter equipment or anything related to the breach Do not attempt to do your own investigation
  • 20. NDSU network services E-mail accounts Alias Shared E-mail box space Changing electronic ID Non-employee accounts Affiliate vs. Guest accounts
  • 21.
  • 22. Does not require password
  • 23. Owner responsible for removing and adding usersSender Alias Recipient Recipient Recipient
  • 24.
  • 26. Owner required to change password when users leave or are added to groupSender Shared Recipient Recipient Recipient
  • 27. Electronic ID Official Format = FirstName.LastName Full-time employees and Students can change EID at http://enroll.nodak.edu Non-employees/students must request change Change subject to previous ownership of “name space.” Name change due to marriage/divorce – must go through HR with proper documentation Employees have 500 MB e-mail box. Request to increase must be sent through Helpdesk.
  • 28. Affiliate vs. Guest Accounts Services available: desktop_auth, Blackboard, Library, Wireless Must be “sponsored” by department Affiliate accounts for periods longer than one week Guest accounts for periods less than one week E-mail requires completion of Non-employee ID form
  • 29. Managing IT Security for Extension and Outreach Offices Theresa Semmens NDSU Chief IT Security Officer October, 2009