Security Presentation - PowerPoint PPT Presentation

1 / 11
About This Presentation
Title:

Security Presentation

Description:

Security Presentation – PowerPoint PPT presentation

Number of Views:124
Avg rating:3.0/5.0
Slides: 12
Provided by: rossst
Category:

less

Transcript and Presenter's Notes

Title: Security Presentation


1
Security Presentation
  • Among BSUs most valuable assets is the
    information stored in computer files on our
    desktop computers and on the local area network.
  • Threat Categories
  • Natural Disasters Fire, flood, tornado, etc.
  • Nonhuman Product failures, bugs, etc.
  • Human
  • Malicious
  • Insiders Disgruntled Employees
  • Outsiders Hackers, Crackers, etc.
  • Nonmalicious
  • Untrained or uninformed Employees

2
What Makes Us Vulnerable?
  • Easily Guessed Passwords
  • Too short, too simple, common words
  • Not Keeping Secrets
  • Writing passwords down, sending confidential data
    in e-mails
  • Trusting Things We Get From Others
  • Opening e-mail attachments that have a virus or
    other malicious code
  • Unattended Workstations Left Unlocked
  • CTRL ALT DEL to lock your workstation

3
Passwords
  • A password is a string of characters entered to
    verify that you are authorized to access computer
    resources and consisting of
  • Letters A to Z and a to z (upper and lower case)
  • Numbers 0 to 9
  • Special Characters - ! _at_ ( )
    etc.
  • There is a direct relationship between the ease
    with which a password can be remembered and the
    ease with which it can be guessed. If a password
    is easy to remember, it is probably easy for
    someone else to guess.

4
Choose A Strong Password
  • Do Choose A Password That
  • Is at least 8 characters long
  • Contains Uppercase and lowercase letters
  • Contains at least one number or special character
  • Is not a dictionary word in any language, slang
    or jargon
  • Cannot be easily guessed and is easy to remember
  • Dont Choose A Password That
  • Has fewer than 8 characters
  • Could be found in a dictionary
  • Uses public information about you or your family
    or friends (Social Security Number, Birthday,
    Credit Card, etc.)
  • You have used before
  • Is a variation of your user ID
  • Relates to something significant about you

Remember to change your password every 90 days.
5
Examples of
  • Weak Passwords
  • Daisy
  • 123456789
  • Dddddddd
  • septEmber
  • MickeyMouse
  • aaaabbbccd
  • volkswagen
  • noteboook
  • Strong Passwords
  • Wwenad2d
  • 2BoN2bTist?
  • IsfgaWdo6
  • 3bmstfw1491
  • Mdi1imh
  • 52eobbowtffcd
  • tmb1W2rpw
  • mkrG8b

But how do I remember that?!
6
Use Mnemonics!
  • Heres How
  • Think of a phrase that is easy for you to
    remember. It could be the first line of a poem
    or a song lyric.
  • Using the first letter of each word, convert the
    phrase into characters.
  • Example Water, water everywhere and not a drop
    to drink converts to Wwenad2d
  • Be creative, dont use an obvious one, or the
    exmple above.

7
Protect Your Password!
  • Dont tell anyone your password.
  • Dont write your password down.
  • Make sure your password cannot be guessed.
  • If you think there is even a slight chance
    someone knows your password, change it.
  • Dont let someone see what you are entering as
    your password.

Protect the security of the Departments
information as if your job depends on it,
becauseit does!
8
Information Technology Resource Use BSU Policy
6460-C
  • Personal Use Limited
  • The primary purpose of University IT Resources is
    to conduct official University business
  • No Expectation Of Privacy
  • Subject to Public records laws, and subsequently
    public records requests.

9
IT Resource Policy Continued
  • Prohibited Actions
  • Profit Making
  • Political/Religious Advocacy
  • Accessing Anyone Elses Information
  • Inappropriate Internet Pages
  • Intentional or Negligent Interference
  • Use Common Sense And Refer To The Policy For
    Further Information
  • Compliance
  • HRS Listed As A Contact Regarding Compliance
    Violations
  • We Should Know And Follow The Policy Were Held
    To Enforce
  • Violation Of The Policy Can Result In Penalties
    Ranging From Reprimand To Separation

10
Team Reminders!
  • Security Door File Room Codes
  • Supervisor Groupwise Access
  • Out Of The Office E-Mail Rules
  • Windows Updates
  • E-Mail Security
  • Confidentiality Notice
  • Winzip Password Secure Sensitive Information
  • If you havent already read understood the IT
    Resource policy, please do so today.

11
THANKS!!!
Write a Comment
User Comments (0)
About PowerShow.com