Security Training Session - The University of North Carolina at

UNC Pembroke
Security Education
Melanie Jacobs
Division of Information
This course is to provide users with
guidelines on safe computing practices,
evolving practices and standards
Roles and responsibilities of
users of technology and data
It is everyone’s responsibility to safeguard data and use technology
in the appropriate manner.
Everyone is responsible and must know their responsibilities and do
their part to protect the security of confidential information.
Regulations and Statutes
North Carolina Identity Theft Act
Red Flag Rules
PCI (payment card industry data security
North Carolina Identity Theft
Privacy Laws and Standards protecting PII
• North Carolina Identity Theft Act – restricts the collection and use
of Social Security numbers and other personally identifying
Identifying information covers a wide range of data, including SSNs, bank
account numbers, driver’s license numbers, biometric data (fingerprints),
passwords, and parent’s legal surname prior to marriage (often used as a form of
Individuals must be notified of security breaches when there’s a reasonable
likelihood that their “identifying information” was compromised.
• The Privacy Act – a U.S. federal law requiring protection of
individual privacy government agencies.
Red Flag Rule
Are you complying with the Red Flags Rule?
The Red Flags Rule requires many businesses and
organizations to implement a written Identity Theft
Prevention Program designed to detect the warning
signs or "red flags“ of identity theft in their day-to-day
Identification of Red Flags
"Red Flag" means a pattern, practice, alert or specific
activity that indicates the possible existence of Identity
Identification of Red Flags
In order to identify relevant Red Flags, the University considers the
types of Covered Accounts it offers or maintains, the methods it
provides to open its Covered Accounts, the methods it provides to
access its Covered Accounts, and its previous experiences with
Identity Theft.
Red Flags may be detected while implementing existing account
opening and servicing procedures such as: individual identification,
caller authentication, third party authorization, and address changes.
Identification of Red Flags
The University identifies the following Red
Flags categories:
Notifications and Warnings from Consumer Reporting Agencies
Suspicious Documents
Suspicious Personal Identifying Information
Suspicious Covered Account Activity
Alerts from Others
PCI – Payment Card Industry Data
Security Standard
PCI compliance required by state contract
UNCP Network is not compliant
Never store credit or debit card data
Never save data on computer or shared drive
Never collect data online
Never send data in email
Contact DoIT to use uPay
Classification and protection of
UNCP policy on data classification
Electronic Data
University Electronic Data – Data in any electronic form collected,
processed, stored or distributed by the university or its employees.
Applies to data stored in information systems, and includes
administrative and academic data as well as documents such as
Web sites and email, regardless of the electronic media on which
the data is stored.
The university shall develop specific safeguards for all protected and
sensitive data. The university shall make information about data in
these classifications, and the relevant safeguards available, to all
faculty, staff, students, temporary employees, vendors, contactors,
etc., as necessary.
The university may develop additional policies to further manage or
secure subsets of University Data. In the case of conflicts between
this and such additional policies, the most restrictive policy shall
•This policy applies to all data, whether collected, processed or
stored in electronic or other forms (hereinafter “University Data”). It
applies to all documents, media, records, reports, files, messages,
•This policy does not to apply to creative works, including software,
art, music, etc., that are addressed by UNCP’s Copyright Policy
(UNCP Faculty Handbook,
unless said creative work includes or contains University Data. In
the latter case, this policy shall apply to the University Data included
or contained within the creative work, but not the remaining portions
of the creative work.
•This policy does apply to data collected, used, processed or stored
by UNCP under a grant or contractual agreement unless said grant
or agreement assigns ownership of the data to an entity other than
•This policy does not apply to data owned by a separate entity that
the university has purchased or leased the right to use.
The Chancellor and his or her designees shall be responsible for the
implementation of this policy.
The vice chancellors and other members of the Executive Staff are
responsible for the procedures and processes within their respective
division or area to comply with this policy’s security directives
concerning University Data.
Each member of the campus community, including faculty, staff,
students, temporary workers, contactors, etc., has the responsibility
to report to his or her supervisor or to DoIT any attempt to gain
unauthorized access to protected or sensitive data.
Classification of Data
Protected Data – University Data to which access is limited by
federal or state law or regulation, or by university policy.
Sensitive Data – University Data which is not addressed by federal
or state law or regulation, or by other university policy, but which
should nevertheless have limited access due to its nature.
Public Data – University Data that is not classified as protected data
or sensitive data. Public data is available under state public records
laws. See, e.g., N.C.G.S. Sec. 132-1, et seq.
Data Management Roles and
Chief Data Steward
The Associate Vice Chancellor for Information Resources and Chief
Information Officer shall serve as the Chief Data Steward (hereinafter “CDS”)
of UNCP. The CDS is ultimately responsible for the management of and
access to University Electronic Data, including definition and standards for
encoding of said data. The CDS is responsible for establishing guidelines for
the appointment and responsibilities of Data Stewards and Data Managers.
The CDS shall oversee the management of and access to University Electronic Data
and shall develop procedures necessary to complete this task.
The CDS shall approve standards for coding and entry of data in shared environments
and shall resolve any conflicts about these standards.
The CDS may audit the access authorized and actually granted to Data Users as well
as the accuracy and integrity of University Electronic Data as necessary.
Data Stewards
University employees who have delegated authority from the CDS for
the management of a particular set of University Electronic Data.
A Data Steward shall maintain knowledge of the University
Electronic Data assigned to his or her purview, and the manner in
which it is used, including any federal or state legislation governing
the use of this data.
A Data Steward shall be responsible for the accuracy and integrity of
the University Electronic Data assigned to him or her, and shall
develop procedures to ensure that data is entered correctly.
Data Stewards shall collectively develop standards for the coding
and entry of data in shared environments.
A Data Steward shall review the access granted to University
Electronic Data under his or her purview and make adjustments as
needed. Such a review must occur at least annually.
Data Managers
University employees who have delegated authority from a Data
Steward for the management of the University Electronic Data or a
portion of the data under the purview of the Data Steward. Data
managers shall not delegate these duties or responsibilities.
•Data Managers shall fulfill any of the duties and responsibilities
delegated by a Data Steward. This delegation shall not release the
Data Steward from these responsibilities.
Data Users
•Individuals who need and use University Electronic Data as part of
their assigned duties or in fulfillment of assigned roles or functions
within the university community.
•Data users shall observe all applicable federal legislations and
university policy when accessing Electronic Data.
•Data users shall review and follow any documents to information
management and security, including procedures and best practices, as
it is made.
Office of Institutional Effectiveness
Office of Institutional
The Office of Institutional Effectiveness at
UNCP serves as the central office for
maintenance of data regarding students,
faculty, and staff as well as institutional
programs, services, facilities, and operations.
Most of this data is maintained in the Banner
database and is input by a variety of
people/offices across campus. IE is
responsible for reporting on this data to the
system office.
Data requests
Anyone can request data from IE by completing a
request form at:
IE staff will evaluate the request and follow-up with
questions if necessary. Some general
considerations are:
Who? (Who is the requester?)
What? (What type of data is being requested? E.g.,
student, faculty, staff, facilities, etc.)
Why? (For what purpose will the data be used?)
Where? (Where will the data be stored, presented,
published, etc.?)
When? (In most circumstances, data requests will be
filled within 10 working days.)
In deciding what data can be released & to whom,
IE is guided by
The Association of Institutional Research
(AIR) Code of Ethics (
University, state, & federal policies & laws,
Family Educational Rights and Privacy Act
Open record laws
Consultations with others, e.g.,
University Counsel
Institutional Review Board (IRB)
In general, data can most often be released if
it is in aggregate form; that is, in summary
categories describing groups rather than
For individual student data, in keeping with
FERPA, directory information (e.g., name,
address, phone number, e-mail address,
major, dates of attendance, degree received)
is generally releasable to any requester. (See for
other directory information items. Students may “opt out”
of having their directory information available by
completing a form in the registrar’s office.)
Non-directory information may be
released to faculty and staff IF they have
a legitimate educational interest (i.e.,
they need the information to carry out
their official duties or implement policies
at UNCP).
Non-directory information will NOT be sent
via e-mail (unless encrypted), portable
storage devices, or in print format. In some
instances, it may be saved to a shared
folder on a UNCP server with restricted
UNCP is a public agency, and therefore subject to
federal and state open record laws. This means
that many of UNCP’s records and documents are to
be made available for inspection by any interested
member of the public. Examples include
Meeting minutes
Financial reports
Student & employee directory information
Employee salary
Course information such as course schedules and grade
There are some specific exceptions to the open
record laws, including
Individual student records as defined in FERPA
Documents containing personally identifying information such as
social security numbers.
Publicly available data:
Before requesting
data, check IE’s
website for publicly
information about
UNCP’s faculty,
staff, and students.
College Portrait
Common Data Set
Data Resources
Strategic Planning
When in doubt about whether data can be released by virtue
of open record laws, IE consults with University Counsel.
Some data which is not addressed by federal or state law or
regulation, or by other university policy, is nonetheless
considered “sensitive” due to its potential use in identify theft.
IE follows the guidelines of our IT department when
determining if this data can be released.
Individuals requesting non-aggregated student or employee
data for the purposes of research are referred to the university
Federal Family Rights
and Privacy Act
of 1974
Never—use a social security number to identify a person…because:
Social Security Number + Date of Birth =CREDIT CARD APPROVAL!
A Banner Student Number is the best student identifier; however,
there are nine identifiers that are classified as Directory Information
at UNC Pembroke and that are releasable to parties other than the
They are:
•Student’s Name
•Telephone listing
•Email address
•Major field of study
•Recognized school activities, i.e. sports, societies
•Previous institution(s) attended
•Degrees and awards received
•Dates of attendance / enrollment status
Federal Family Educational Rights and Privacy Act of 1974
In short, once students becomes 18 or a student of a post-secondary
institution, they have the right to inspect their records and make
amendments, if plausible.
Additionally, with this ownership, comes the right to say to whom these
records can be released ….e.g. Parents.
Cannot be discussed without:
completing a
FERPA Consent Form
Available at the Office of the Registrar
or Call:
Or stop by:
The Registrar’s Office, first floor, Lumbee Hall
Safe Computing Practices
Safeguards to follow for maintaining a
secure data environment
Security is a process, not a product. Therefore, the
objective behind implementing good computing
practices is that good computing habits will develop
Why are password important?
Most computer systems rely on passwords for
authentication. If someone knows your user ID and can
obtain or guess your password…they’re in.
Consequences: A compromised password can result in
fraud; theft or destruction of valuable information; public
disclosure of private information and/or serious legal
How an attacker can get your
Password cracking software
Using “sniffer” software to read passwords from plain
text email or other network traffic
Social engineering (tricking you into divulging your
Passwords stored on your computer in a plain text
(unencrypted) file
Simple guessing of a password based on personal
Finding a written down password on your desk, in a
drawer or in the trash
Strong Password
Contains at least 8-12 characters
Contains characters from at least 3 of the following 4
Upper case letters
Lower case letters
Non-alphanumeric characters
Does not contain words in a dictionary and is not a name
Does not contain any part of the account name
Is not based on personal information
Known only to the user
Strong Passwords continued…
Do not use names, people, or places that are identifiable
to you
Never share your password with others
Don’t write it down, post it near your computer or include
it in a data file.
Don’t store passwords in an unencrypted file or send in
an unencrypted email
Don’t store passwords in web applications or software
Use a unique password for each
sensitive account
Hackers know that many people use the same password for different
services. If they manage to crack a password for one user account,
it will often give them access to other services for the same user.
Unique, strong passwords can be difficult to come up with and
remember. But you don’t need a strong password for all of your
accounts. The strength of your password should be based on the
sensitivity of the data that you are trying to protect.
Create strong passwords for your most sensitive accounts, such as your
corporate network account and personal financial accounts.
For non-critical accounts you can use a password that is easier to remember.
Change your passwords
If someone steals your password you probably will not know it until it
has been used, and perhaps not even then. Changing your password
regularly limits the damage, since the attacker will no longer be able to
use the compromised password.
How often you change your password depends on the sensitivity of the
information you are trying to protect. You should change passwords:
At least every 90 days for a normal network account
•Every 30 days for highly-sensitive accounts
Don’t reuse passwords, or significant portions of passwords
•Don’t change a password by incrementing a digit at the end or by
using easily guessed pattern.
•Pick an entirely new password each time you change it.
Privileged Accounts
For accounts with special privileges (system administrators,
managers, or anyone with high levels of access to applications
systems) protection of passwords is especially important.
Passwords for privileged accounts should be changed more
frequently than 30 days, or as specified by company policy), and
extra care should be given to the creation of strong passwords.
Temporary Passwords
Temporary passwords are assigned for one-time use to a new user, or
users who have forgotten their password or have been locked out of
the system.
Communicate the password securely. That means give the
password directly to the users-not passed along through a third
party, sent via clear text email or written on a post-it note stuck to
the user’s monitor.
Change the password immediately. Since the temporary password is
known to the system administrator who gave it to you, it must be
changed immediately after you log on.
Password re-set security
BraveWeb provides a reset function for the users who have forgotten
their password. The system asks you to answer a question that you
filled in when you created your account. The questions and answers
are usually based on personal information.
Your answer to the reset question should not be easily guessable. If it
is, someone could reset your password and gain access to your
Passwords are your
Passwords are your responsibility and the
only tool that you have to gain information.
Give it away or don’t protect it and you are
responsible for what they do with it.
Web Browsing
The problems with web browsing are………..
Network security systems are good at stopping inbound attacks.
But when you browse the Web, you make an outbound connection to
an external web server and ask it to send files to your computer.
Technical security systems can help keep web browsing safe – but a
lot depends on your security awareness and the actions you
Web browsing do’s and don’ts
Read all dialogue boxes – If a dialogue box pops up asking you to
say yes/No or OK/Cancel to a question, read the message and think
about what you would be agreeing to before you click.
Think before you click on a link – The actual destination of a link
may not be what it seems. Hold your mouse over the link before you
click. The actual destination (URL) should appear in the lower left
window of the browser. Does the destination make sense in the
context of where you are trying to go? If not, don’t click it.
Go only to trusted sites – Use common sense. Particularly when
using your business computer, don’t invite trouble by going to web
sites that are out of the mainstream. (websites directly related to
your work)
Block Pop-ups
Pop-up windows on web pages are not just annoying-they are
commonly used to download malicious software or direct you to a
malicious web site.
Set your browser to block pop-ups. (You can allow pop-ups for a
specific site if needed.)
• Internet Explorer: Go to Tools > Internet Options > Content.
Check the box labeled Turn on Pop-up Blocker.
• Firefox: Go to Tools > Options > Content. Check the box labeled
Block pop-up windows.
Viruses are commonly spread by harmful email attachments. Other
types of viruses can infect your computer if you simply open or
preview an email.
Email Attachments
• Unsafe File types. Never open any email attachment with any of the
following file types: .bat, .com, .exe, .vbs
• Unknown file types. Never open any email attachment with a file
type extension that you do not recognize or are not expecting.
• Microsoft Office Documents. Can contain viruses as well as
malicious code. Never open an attached .doc, .xls or other Office
document without first scanning it for viruses. (which is setup to occur
automatically by our Virus software)
Email (continued)
Think before you click.
• If you receive an email that is obviously spam, don’t give in to
curiosity – DELETE IT!
• If you receive an email containing an attachment that you weren’t
expecting, be suspicious. Call the sender and find out if it is in fact a
legitimate email. Or call the helpdesk for guidance if you are not
• Don’t trust links in email. The link may not go where it appears to
go. Hold the cursor over the link for a few seconds without clicking.
Your email program should display the actual destination of the link.
Email (continued)
Active scripts
Scripts are small programs that are used to create interactive content in
a web page or in html email.
Email programs let you choose whether or not to allow scripts to run. If
you allow scripts, they can run as soon as you open or preview an
It is dangerous to allow scripts to run in email, because hackers put
them in spam email to download malicious programs or for other
illegitimate purposes.
Email / Internet Scams
Aside from normal spam, be wary of messages or sites that are “too
good to be true”
Things to look for:
Messages asking for a username/password or credit card
Message claiming your computer is infected with a virus
Paypal, eBay, online auctions
Advance Fee – Most notably from Nigerian Central Bank
New variant preying on the patriotism of Post-9/11
Look at
Email / Internet cont…
Treat all e-mail and Instant Messaging attachments as suspicious
Do not open email from an unknown source
If you get an unexpected attachment from a familiar sender, call the
sender to verify the authenticity of the message
Never forward chain letters
Any protected or sensitive data should not be sent via email
because email is not encrypted and the data can be easily read
Email may be subject to North Carolina Public. The governor has
mandated a 10 year retention policy (currently this policy is under
review by UNC General Administration)
Third Party Webmail
Third party webmail is an email system other than the official UNCP
email. Examples are Yahoo, Gmail, and Hotmail. Third party email
systems are neither secure nor sanctioned by the University.
Avoid using third party email for University business.
Instant Messaging
• Instant Messaging services do not encrypt messages, so they are
not secure.
• Avoid sending protected and sensitive data via Instant Messaging
DoIT is working on secure Instant Messaging services as part of the
communication server.
Peer-to-Peer File Sharing
Peer-to-peer file sharing systems include
• BitTorrent
• Limewire
• KaZaa
• iMesh
• Gnutella
P2P file sharing converts the users desktops into a server which is a
violation of UNCP’s Appropriate Use Policy. P2P software is often
used to share copyrighted material and is a means of spreading
Avoid using Peer-to-peer software
What DoIT is doing for you…..
Password-protected screen savers
Windows patches
Windows firewall
McAfee Anti-virus
Clean access for residential and wireless systems
Perimeter firewall and internal virtual LANs
Rogue wireless access point detection
FTP over SSL from off campus via FileZilla and NetDrive
Safeguards for you
Reception computers should not be left unattended
Log off your workstation if you step away
Place monitors in such a way that only you can see the screen
Log out of websites that require authentication as well as close the
Lock your office if possible when you leave the room
Lock down hardware
Secure your office when you are away
Label & protect your storage media
Store disks, cassettes, and optical storage media securely
Safeguard hard copies
Do not store your password on your computer or anywhere except in
your memory
Do not share your password with anyone including DoIT staff.
Do not allow anyone else to use your network account nor should
you use someone else’s account
Do not allow someone that you do not know to use your workstation.
Confirm that any visitors in your work area are there for business
Safeguards - backups
There are many different ways to backup
CD and DVD burners
Zip Drives
Tape Drives
External Hard Drives
Make backing up your data a habit
Safeguards – Software Updates
Remember to run all security updates and patches
These are meant to protect your computer against attack
Never disable security updates
Most common is Microsoft Products
 Microsoft Windows updates
Microsoft Office (Outlook, Word, Excel, PowerPoint,
Remote Access
•Never store protected or sensitive university data off campus. If you
must take protected or sensitive data off campus encrypt it.
•Password protect mobile storage devices such as flash drives
**The Governor has mandated that all University-owned mobile devices be
•Never allow a third party to access University resources or provide
equipment for personal use.
•Keep your computer updates up-to-date and anti-virus updated
Remote Access ….(continued)
•Disable file sharing on any device you use for remote access.
•Disable Bluetooth if you are not using it.
•Verify wireless networking for remote access is secure.
•Only use the VPN when accessing the University enterprise. If you are
not using it then log out.
Malicious Software
What is malicious software?
Malicious software (also called malware, hostile code) is a catch-all
term for any software designed to:
Cause damage to,
Steal information from, or
Otherwise misuse…..
……a single workstation, a server or a network.
There are many types of malware, and malware programs “in the wild” are often a
combination of two or more types.
Some of the major types are…….
•A fragment of computer code that attached itself to other code,
•Application software.
•Code used to boot the computer, or
•Macro instructions placed in documents.
•Usually requires some user action to initiate it, such as opening a file
•May run simply by opening an infected web page or html email
•May download a “payload” (another malware file)
•File infecting virus
•Macro Virus
•Script Virus
Virus Protection
You should always have virus protection and
updated virus definitions
Never disable virus protection
Viruses can be transmitted through files
downloaded from the Internet, removable media,
insecure shared computers
• Similar to a virus, but spreads without any user action.
• Typically scans the Internet looking for other computers that have
vulnerabilities it can attack. Copies itself to vulnerable computers.
• May download a payload (other malware)
• Uses the newly-infected computer to attack other computers
Trojan Horse
Malware that is hidden within another seemingly innocent program or
file. The Trojan is installed without your knowledge when you install the
host file.
Trojans are often hidden in “free-ware” programs, such as:
•Music or video files
•Cell phone ringers
•File-sharing programs
•Or programs pretending to be anti-spyware tools.
Once installed, the Trojan may:
•Manipulate files on your computer – create, delete, rename, or
transfer files to or from your computer.
•Open a “back door” – a connection from your computer to the
outside, giving an attacker ongoing access.
Spyware is class of malware that collects personal information from
your computer and transmits it to someone. Types of spyware
• Adware – an application program that displays advertising banners
while the program is running. These programs often collect
information about you and pass it on to third parties. They also can
slow down your computer’s performance.
• System monitor – a program that copies information from your
computer and sends to an attacker. These include
Programs that copy screen images, and
“keyloggers” that capture your keystrokes.
System monitors can be used to gather information like user IDs,
passwords, credit card numbers and social security numbers.
Why is this important?
Malicious software is a serious problem for businesses. Some of the
effects that malicious software can have are:
• Slow system performance by using up capacity, possibly shutting
down a network
• Capture and transmit confidential information, such as credit card
numbers, user names and passwords, or sensitive information about
your business
• Change data
• Erase files
• Change software configurations
• Give the attacker a connection to your computer for further attacks
How malicious code spreads
Email links – Phishing emails can contain links to maintain web
sites that download malware to your computer.
Email attachments – Viruses can be executed by opening an
• CDs or flash drives – Malware can be spread from infected storage
• Software vulnerabilities – a locally developled web application
might be vulnerable to malware attacks. Commercial software that
does not have security patches may also be vulnerable.
How malicious code spreads
Pop-up windows – A phony system message or pop-up ad may
trick you into clicking a link that downloads malicious software.
Instant Messaging (IM) – Links and files can be sent through
Instant Messaging. These can install viruses or trojans.
Software and files – Important-looking software or files can contain
Email containing malicious scripts – Viruses can affect your
computer simply by viewing or previewing an email, if your email
settings permit the execution of scripts in HTML emails.
Web pages with malicious scripts – If you have active scripting
enabled on your browser, a web page can download malicious
software simply by connecting to the URL.
Guidelines for preventing
Patches – Keep security patches up-to-date (ex: Microsoft updates)/
Most viruses work by exploiting known software flaws and can be
prevented by applying the latest patches.
Use an anti-virus program – And keep it up-to-date. Keep the virus
definition updated daily, and perform a complete system scan
Use anti-spyware program – These programs also need to be
updated and scanned regularly to detect the latest spyware threats.
Back up your files – Back up your files regularly and store them on
the University network to ensure they are safe.
The only method for reliably clearing an infected machine is to
wipe the hard drive. You must assume that all of your data on
the hard drive will be lost if your computer is infected with a
virus. This is why its important to make backing up your data a
Guidelines for preventing
Downloads – Scan software from public sources (such as shareware) before you download and execute it.
Pop-ups – Enable pop-up blocking in Firefox or Internet Explorer.
Think before you click. A window that might look like an important system
message could be a fake that will download malicious software if you click on it.
Read all messages and understand what you are agreeing to before you click ok.
Do not trust the buttons in pop-up ads. The entire window could be a mailicious
To close the pop-up, RIGHT-click on it to display a command menu, then select
Guidelines for preventing
Email – Don’t trust email from known sources. Worms spread by
emailing themselves to everyone in the address book of an infected
computer, so they are very likely to come from someone you know.
Executable files – Never open an executable file received in email.
Don’t download email that is obviously spam. Even if your network is
protected by spam filtering software that catches most spam, some
will get through.
Email attachments – Don’t open an email attachment unless you
were expecting it and you are sure you know what it is.
Range of Disciplinary Sanctions
Persons in violation of this policy are subject to a full range of
sanctions, including, but not limited to, disciplinary action or dismissal
from The University of North Carolina at Pembroke. Any sanctions
against employees will be imposed through procedures consistent with
any applicable state regulations. Some violations may constitute
criminal or civil offenses, as defined by local, state and federal laws,
and the University may prosecute any such violations to the full extent
of the law.
What is Authentication?
Authentication is a means to control access to
information resources by verifying the identity of a user
logging into an account, or onto a computer or network.
Knowledge of the password is assumed to guarantee
that the user is authentic. The problem is that passwords
can often be guessed, stolen, accidentally revealed, or
forgotten. The information in this section can help you
mitigate the risks associated with password
Unauthorized Access
Can be accomplished by any connection to a computer
or network using most services (Telnet, HTTP, FTP,
Email, Web, etc.)
Must somehow compromise authentication (password,
PIN, token, smart card) to gain access.
Once access is gained malicious activity can occur
Protects data in transit or stored on disk
The act of ciphering and enciphering data through the
use of shared software keys, data cannot be accessed
without the appropriate software keys’
Common use of encryption includes the following
Virtual Private Networking (VPN) – Used to secure data
transfer across the Internet
Secure Sockets Layer – Used to secure client to server webbased transactions
S-MIME – Used to secure e-mail transactions
Wireless Equivalency Privacy (WEP) protocol – Used to
secure wireless transactions
Will alleviate the following attacks:
Data sniffing and spoofing
Wireless attacks
Computing accounts are created for each individual
allowing access through authentication.
Since computing accounts uniquely identify each user,
you are responsible for any activity generated by your
Disable any file sharing capabilities that you may have
enabled with a file sharing program (e.g., Limewire or
BitTorrent) to help prevent unintended access to your
computing files & to ensure your computer isn’t offering
copyrighted material.
Comply with UNCP rules and System policies, and all
relevant laws (local, state, and federal), license
agreements (e.g., copyright), & contracts.
Use computing resources only for their intended
purposes or incidental personal use.
Act responsibly and ethically, and respect the rights of
other users in online forums.
Protect confidential information under your account, or to
that which your account has access.
Inappropriate Use
Computing accounts and other computing resources are
to be used according to the university-related activities
for which they are assigned. However, it is possible to
misuse your account and/or other computing resources.
Examples of Inappropriate Use
Allowing someone to use your account or using someone
else's account.
Using your account or computing resources for unauthorized
commercial purposes or personal gain.
Assuming the identity of someone else without his/her
Using your account or computing resources for illegal
Failure to fulfill these
responsibilities can lead to:
The restriction or denial of access to computing
resources or computing privileges
Other disciplinary action by the University
Law enforcement involvement
Confidentiality is the guarantee that information is
disclosed only to those who are authorized to know it.
In some instances, federal funds can be withheld from
the entire university if breaches of confidential
information are identified as a problem. Therefore, it is
imperative that you know what information to protect and
how to protect it.
Various types of information, such as student records
and patient health information, are defined as
confidential. As an employee of UNCP, you may have
access to confidential information, and you are obligated
to protect the privacy of that information.
All university employees are responsible for becoming
familiar with Federal and State laws, policies, and rules
regarding confidential information in order to ensure that
confidential information is appropriately protected and
not disclosed to unauthorized persons.
Policies are found at
Social Engineering
What is social engineering?
• Social engineering is manipulating behavior
through psychology.
• A set of psychological tactics used by hackers to
gain access to restricted information.
• In more simple terms: conning someone into
giving out confidential information.
Searching for an easy way in..
Vulnerabilities are weaknesses in security that
an attacker uses to gain access to a computer
system or to confidential information.
 People – actions or inactions of users
 Processes – lack of defined policies, or failure
to follow them
 Technology – insufficient or improperly
configured technical systems.
People are the weakest link in security
Strategies of social engineering
The objective is to gain your trust.
Here are some examples the attacker might
• Friendliness/persuasion
• Impersonation
• Confusion/intimidation
Facebook and Tweeter are some examples of where
social engineering can take place.
Minimize the risks to your
wireless network
Restrict access - Only allow authorized users to access
your network. Each piece of hardware connected to a
network has a MAC (media access control) address. You
can restrict or allow access to your network by filtering
MAC addresses.
Wireless continued……….
Install a firewall - While it is a good security
practice to install a firewall on your network, you
should also install a firewall directly on your
wireless devices (a host-based firewall).
Attackers who can directly tap into your wireless
network may be able to circumvent your network
firewall—a host-based firewall will add a layer of
protection to the data on your computer
Mobile Computing
Mobile computing devices have become very common
92% of business travelers use a laptop on the road
63% carry mobile phones used for business
21% carry PDA’s
Approximately 30% of mobile devices carry “mission
critical” or highly confidential business information
Among those who use a PDA for business, 25%
have lost one.
Mobile Computing Security Risk
Easily lost or stolen because of their size.
Wireless capabilities pose a risk of unauthorized
connection to your device, or snooping of information
broadcast over a wireless network.
Users often download risk content, such as games or
ring tones that can contain viruses and spyware.
Computers outside the campus network are not
protected by the network firewall and other security
Consequences of a security breach involving a
mobile device……..
Disclosure of confidential information, through.....
……..someone accessing files on your laptop, PDA or
…… intruder intercepting messages sent over the
Internet or a wireless network
• Loss of important information…..
………….a lost, stolen, or damaged mobile device that you
did not save backup copies of the information.
• Malware infection…..
…………….which can be transmitted to the campus
Business travel security tips
Store data on a network server
• Sensitive information should always be stored on a
network server, not on the computer’s hard drive where it
can be easily stolen or damaged.
This is especially true of mobile computing devices.
Business travel security tips
Backup your data before you leave
If you have data on a mobile device that isn’t stored
anywhere else, make sure you save a backup copy to
the network, a flash drive, or a disk before you leave.
Check your laptop for sensitive data
Always check your device to make sure you know
what data it contains.
Security Incidents
A security incident is an event, either accidental or
deliberate, which results in unauthorized access, loss,
disclosure, modification, disruption, or destruction of
computing information resources. If you think that a
security incident may have occurred, report it
immediately to the DoIT staff (Help Desk).
Refer to our website for additional security information
State Required Changes
Strong passwords with 90 day expiration
Password protected screen saver
Accounts inactive for 30 days must be disabled
Separate accounts for administrative privileges with a 30 day
Laptop and mobile device encryption
The state has an Internet security policy and the
entire UNC system is held to this policy
Related flashcards

Computer security

25 cards

Computer security

73 cards

Fictional hackers

61 cards

Create Flashcards