Академический Документы
Профессиональный Документы
Культура Документы
CYBER SECURITY
AND PRIVACY
ORIENTATION
2012
Developed by K2Share,
LLC.
What You Will Learn in this
Program
• Potential risks and vulnerabilities
• Definitions
• Your role in cyber security and
protecting privacy
• Best practices in security and privacy
2
Cyber Security and Privacy Starts
and Ends with Us!
Security Tips
3
Information Stewardship
connect with
4
Cyber Security Defined
6
The CIA and N
7
Sensitive Data
8
Tips to Help Protect PII
• Minimize PII
• Secure PII
• Safeguard the Transfer
of PII
• Dispose of PII Properly
9
Prevent Spillage
10
If You Suspect a PII Breach
11
Threats and Vulnerabilities
12
Securing the Department
14
Secure Passwords
Do Don’t
• Use a combination • Use personal
of: lower and upper information
case letters, • Dictionary words
numbers, and, (including foreign
special characters languages)
• Change it every 90 • Write it down
days • Share it with anyone
• Create a complex,
strong password,
and protect its
secrecy
15
Protect Your Facility
16
Situational Awareness
18
Social Engineering
Do Don’t
• Document the • Participate in
situation—verify the
surveys
caller identity, obtain
as much information • Share personal
as possible, if Caller information
ID is available, write
• Give out
down the caller's
telephone number, computer
take detailed notes systems or
of the conversation network
• Contact your ISSO information
19
Mobile Computing
20
Report Suspicious Computer
Problems
If your system acts
unusual!
Report immediately
to your ISSO or
EDCIRC!
22
Congratulations!
You have completed New
Employee Introduction to Security
and Privacy
New Employee Introduction to Security and
COMPLETION
New Employee Introduction to Security and
U.S. DEPARTMENT OF EDUCATION
New Employee Introduction to
Security and Privacy
Privacy
Privacy
this is to certify that
has successfully completed
New Employee Introduction to Security and
Privacy
completion date
24