Top Banner
Incident Security & E- Mail Confidentiality • Integrity • Availability
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Incident Security & E-Mail Confidentiality Integrity Availability.

Incident Security & E-MailConfidentiality • Integrity • Availability

Page 2: Incident Security & E-Mail Confidentiality Integrity Availability.

Objectives Logical Security

Anti-Virus Software Usernames and Passwords Secure Screen Savers

Physical Security Securing the work area

Other Security Individual Computer User’s

Statement Of Responsibility E-Mail Issues

Page 3: Incident Security & E-Mail Confidentiality Integrity Availability.

Logical Security

Page 4: Incident Security & E-Mail Confidentiality Integrity Availability.

Anti-Virus Software Every computer must run an anti-

virus software package with virus definition files being no more than 7 days old

Configured to download and update automatically unless otherwise configured by a CTSP

Incident personnel may not unload or disable anti-virus software

All portable media must be scanned before use

Page 5: Incident Security & E-Mail Confidentiality Integrity Availability.

Anti-Virus Software User responsibilities

Never open file attachments from unknown, suspicious, or untrustworthy source

Delete spam and junk e-mail Never download files from

untrustworthy sources Do not install software without first

contacting the incident CTSP Should a virus be detected,

disconnect computer from the network and immediately notify a CTSP

Page 6: Incident Security & E-Mail Confidentiality Integrity Availability.

Usernames and Passwords

Do not share passwords Password complexity enabled 12 characters with at least 1

uppercase, 1 lowercase, 1 number and 1 punctuation

One logon per ID

Page 7: Incident Security & E-Mail Confidentiality Integrity Availability.

Secure Screen Saver

All computers must have a locking password protected screen saver enabled

Timeout is 15 minutes Users will logout of shared

machines when stepping away for long periods of time

Page 8: Incident Security & E-Mail Confidentiality Integrity Availability.

System Settings

Login Banner Government owned equipment will

display a standard or Agency specific banner at login

Leased computers will display a standard banner:

Page 9: Incident Security & E-Mail Confidentiality Integrity Availability.

System Settings

“You are about to access a computer that is owned or leased by the United States government that is intended for authorized use and users only. You should have no expectation of privacy in your use of this network. Use of this network constitutes consent to monitoring, retrieval, and disclosure of any information stored within the network for any purpose including criminal prosecution.”

Page 10: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Backups: Incident Data

Incident CTSP’s are responsible for backing up data residing on all servers

Ultimately, your data is your responsibility to secure

Back it up - Lock it up. All media that contains backed up data must be secured.

Offsite Storage / Jump Drive or Email

Page 11: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Backups: I-Suite

Under no circumstances shall I-Suite backups remain in the possession of any individual for “historical purposes”

Database and data backups (not repository or documentation box copies) will be deleted and destroyed at the end of an incident

Page 12: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Security: Access Control

Users can expect access to be limited to the data that is relevant to their position

Additional security measures shall be provided for sensitive data

Do not distribute data (files and photos) to individuals. Information generated on a fire belongs to the hosting agency.

Have management approval for all users accessing the Incident network

Page 13: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Security: PII All Federal agencies require

employees to take awareness training in dealing with Personally Identifiable Information (PII)

This training emphasizes the importance of protecting PII data

Page 14: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Security: PII Incident Management Teams collect PII data from

resources at Check-in. What is considered PII?Full name Telephone numberStreet addressE-mail addressVehicle registration plate numberDriver's license numberFace, fingerprints, or handwritingCredit card numbers

Page 15: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Security: PII What is not considered PII?

First or last name, if commonCountry, state, or city of residenceAge, especially if non-specificGender or raceName of the school attendingName of employerGrades, salary, or job positionCriminal record

Non-PII data does not imply non-private information

Page 16: Incident Security & E-Mail Confidentiality Integrity Availability.

Data Security: Scrubbing

Deleted files are not erased Scrubbing is the process of

writing random characters over the entire hard drive

All leased computers when being returned must be scrubbed/wiped

Free space (as opposed to whole disk) scrubbers are acceptable

Page 17: Incident Security & E-Mail Confidentiality Integrity Availability.

Physical Security

Page 18: Incident Security & E-Mail Confidentiality Integrity Availability.

Securing the Work Area

Equipment containing sensitive data will be secured at all times

Pay special attention to high traffic areas

Common areas in leased facilities should not be considered secure

Provide specific security measures for equipment during non-business hours

Page 19: Incident Security & E-Mail Confidentiality Integrity Availability.

Other Security Procedures

Page 20: Incident Security & E-Mail Confidentiality Integrity Availability.

Individual Security Responsibilities

Individual Computer User’s Statement of Responsibility

Report the loss or theft of data and equipment immediately: Inform the C&G and Security Inform the administrative agency Inform the agency that owned or

rented if the loss was equipment Provide for continuity of operations Document all actions

Page 21: Incident Security & E-Mail Confidentiality Integrity Availability.

E-Mail Issues

Page 22: Incident Security & E-Mail Confidentiality Integrity Availability.

Questions?