New Employee Cyber Security and Privacy Orientation 2012



Download 4,59 Mb.
bet1/5
Sana10.07.2022
Hajmi4,59 Mb.
#773051
  1   2   3   4   5
Bog'liq
it-security

New Employee Cyber Security and Privacy Orientation 2012


Developed by K2Share, LLC.

What You Will Learn in this Program

  • Potential risks and vulnerabilities
  • Definitions
  • Your role in cyber security and protecting privacy
  • Best practices in security and privacy

Cyber Security and Privacy Starts and Ends with Us!


Security Tips
Commit to a disciplined practice of information security and continue to refresh yourself so you don’t become a point of vulnerability in our security defenses.

Information Stewardship


You are part of the Department’s stewardship of this information
  • You are a steward of personal information for millions of Americans
  • Vulnerabilities at home and at work jeopardize not only the Department’s stakeholders, but everyone you connect with

Cyber Security Defined

  • Cyber Security’s goal: Protect our information and information systems
  •  Cyber Security is: “Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats.”

Privacy Defined

  • Information privacy, or data privacy: the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. 
  • Information privacy is the right to control what information about a person is released.

The CIA and N

  • Confidentiality: Safeguards information from being accessed by individuals without the proper clearance, access level, and need to know.
  • Integrity: Results from the protection of unauthorized modification or destruction of information.
  • Availability: Information services are accessible when they are needed. Authentication means a security measure that establishes the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information.
  • Non-repudiation: Assurance the sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data.

Download 4,59 Mb.

Do'stlaringiz bilan baham:
  1   2   3   4   5




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish