A Users Guide to IT Security Awareness


PURPOSE
Youve seen it on TV and heard it on the news. While there are many processes and applications in the background regarding security at 蹤獲扦, it is vital that you are aware of those things that can assist 蹤獲扦 in keeping data, information, and privacy intact.

 

INTRODUCTION


INFORMATION SECURITY EXPLAINED
Information security involves the preservation of:

  • Confidentiality - Ensuring information is disclosed to, and reviewed exclusively by intended recipients and/or authorized individuals
  • Integrity - Ensuring the accuracy and completeness of information and processing methods
  • Availability - Ensuring that information and associated assets are accessible, whenever necessary, by authorized individuals

LAWS AND ACTS TO FOLLOW
In many cases, the responsibility of data security is the LAW.  蹤獲扦 must consider many Federal and State laws which are intended to make certain that certain data does not fall into the wrong hands.

  • Health Insurance Portability and Accountability Act (HIPAA)
  • USA Patriot Act
  • Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM)
  • Higher Education Opportunity Act of 2008
  • Family Educational Rights and Privacy Act of 1974 (FERPA or the Buckley Amendment)
  • Digital Millennium Copyright Act (DMCA)

CONSEQUENCES OF A BREACH OF SECURITY
Should there be a breach of security, 蹤獲扦 could be subject to many costly consequences. Because we are a state educational institution of Kansas, these consequences can be very costly. The possible consequences of insufficient security are:

  • Loss of productivity
  • Identity theft
  • Equipment theft
  • Service interruption (e.g., email and Enterprise Resource Planning applications)
  • Embarrassing media coverage
  • Compromised confidence
  • Legal penalties

VITAL INFORMATION
Your effectiveness in securing 蹤獲扦s information begins with an understanding of what is vitally important. Here are some examples of data that needs to be protected:

  • Credit Card Information
  • Social Security Numbers
  • Addresses
  • Private Documents
  • Payroll Information
  • Intellectual Property
  • Academic Transcripts

蹤獲扦 TECHNOLOGY POLICIES
There is a chapter devoted to the policies regarding technology at our institution. It is the users responsibility to read and regularly review the 蹤獲扦 - Policies and Procedures Manual for Technology, Chapter 19.

DIGITAL MILLENNIUM COPYRIGHT ACT (DMCA)
A brief side note about DCMA. Whether at work, or at home, if you are downloading music, games, or movies and you are NOT paying for them, chances are you are in violation of the DMCA. If 蹤獲扦 authorities receive notification from DMCA that a specific University computer is distributing illegal media, 蹤獲扦 is required to shut down that system until the offending software is removed. Departmental supervisors are notified of the offense.

 

THINK ABOUT WHAT YOU ARE DOING


THINK色..then CLICK

This is certainly something to ask yourself before proceeding on a pop-up, warning box, or error message.

  • Could the actions I am about to perform, in any way, harm either myself or Wichita State University?
  • Is the information I am currently handling of vital importance to either myself or 蹤獲扦?
  • Is the information I am about to review legitimate / authentic?
  • Have I contacted appropriate 蹤獲扦 personnel with questions regarding my uncertainty of how to handle this sensitive situation?

Next, here are a list of dangers associated with personal security awareness.

 

DANGERS


VIRUSES
A virus is malicious code that is sometimes attached in email messages that is capable of inflicting a great deal of damage, and causing extensive frustration.

  • Stealing files containing personal information
  • Sending emails from your account
  • Rendering your computer unusable
  • Removing files from your computer

What you can do -

Do not open attachments to emails if:

  • Received from unknown individuals
  • In any way appear suspicious

SPYWARE
Spyware is any technology that aids in gathering information about you or 蹤獲扦 without your knowledge
and consent.

  • Specific programming that is placed into an unsuspecting computer to secretly gather information about the user, and relayed to advertisers or other interested parties
  • Cookies are used to store information about you on your own computer
  • Spyware exposure can be caused by a software virus or as a result of installing a new program

What you can do -

  • Do not click on options in deceptive / suspicious pop-up windows
  • Do not install any software without receiving prior approval from ITS or your supervisor
  • If you experience slowness / poor computer performance or excessive occurrences of pop-up windows, contact Information Technology Services (ITS)

UNAUTHORIZED SYSTEMS ACCESS
Unauthorized systems access occurs when individuals maliciously obtain unauthorized access to computers, applications, confidential information, and other valuable assets. Not all guilty parties are unknown色.some can be your co-workers. Unauthorized systems access can result in theft and damage of vital information

What you can do -

  • Use strong passwords for all accounts
  • Commit passwords to memory
  • If not possible to memorize, store all passwords in a secure location
  • Never tell anyone your password
  • Never use default passwords
  • Protect your computer with a password-protected screen saver
  • Report suspicious individuals / activities to ITS
  • Report compromised systems to your supervisor

SHOULDER SURFING
Shoulder surfing is the act of covertly observing employees actions with the objective of obtaining confidential information.

What you can do -

  • Be aware of everyone around you and what they are doing
  • Be alert when traveling (airplanes, trains, buses, etc)
  • Be alert at restaurants; all public gathering areas
  • Be alert in Internet cafes
  • Be alert in Computer labs
  • Do not perform work involving confidential 蹤獲扦 information if you are unable to safeguard yourself from shoulder surfing

UNAUTHORIZED FACILITY ACCESS
Some individuals maliciously obtain unauthorized access to offices with the objective to steal equipment, confidential information, and other valuable 蹤獲扦 assets.

What you can do -

  • Do not allow access to University facilities by unidentified individuals;( i.e., referred to as tailgating)
  • Shred all 蹤獲扦 confidential documents
  • Do not leave anything of value exposed in your office / work space (e.g., Lock all 蹤獲扦 confidential documents in desk drawers / file cabinets)

CURIOUS PERSONNEL
Some employees, who are not necessarily malicious, might perform activities that test the limits of their network and facilities access.

What you can do -

  • Retrieve your 蹤獲扦 confidential faxes and printed documents immediately
  • Shred all 蹤獲扦 confidential documents
  • Lock all 蹤獲扦 confidential documents in desk drawers / file cabinets
  • Follow the guidance previously provided to prevent unauthorized systems access
  • Report suspicious activity / behavior to your supervisor

SOCIAL ENGINEERING
Social engineering is basically taking advantage of peoples helping nature/conscience for malicious purposes.

What you can do -

  • Never lose sight of the fact that successful social engineering attacks are engineered for peoples natural inquisitiveness
  • If a received phone call is suspicious, request to return their call
  • Do not provide personal / confidential 蹤獲扦 information to a caller until you are able to verify the callers identity, and their association with their employers company
  • Never provide a caller with anyones password, including your own
  • Report any unrecognized person in a 蹤獲扦 facility to University Police

PHISHING
Phishing is an online scam whereby emails are sent by hackers who seek to steal your identity, rob your bank account, or take over your computer.

What you can do -

  • Use the stop-look-question technique:
    • Stop: Do not react to phishing ploys consisting of upsetting, threatening, or exciting information
    • Look: Look closely at the claims in the email, and carefully review all links and Web addresses
    • Question: Do not reply to emails requesting confirmation of account information; call or email the company in question to verify if the email is legitimate
  • Never email personal information
  • Report misuse of a Procurement Card transaction
  • Report suspicious computer activity to ITS

INSTANT MESSAGING SERVICES (IM)
Privacy threats caused by using free IM services in the workplace include personal information leakage, loss of confidential information, and eavesdropping.

What you can do -

  • Depending upon with whom you are communicating, and how IM was implemented, every message you send even to a coworker sitting in the next cubicle can/may traverse outside of 蹤獲扦s local network
  • All messages you send may be highly susceptible to being captured and reviewed by malicious people
  • Never send confidential messages or any files to individuals
  • Realize that there is no means of knowing that the person you are communicating with is really who they say they are

COMPUTERS AND HANDHELD DEVICES


OFFICE COMPUTER USE
Here are some specific conditions and procedures that should be followed when using office computers:

  • Log out of all programs when you leave your work area
  • Lock your computer when you leave your work area
  • Screen Savers should have passwords
  • Make certain your system software and anti virus applications are always up to date
  • Install licensed programs only
  • If you leave your system on at night, make certain that your office space is physically secure

HOME COMPUTER USE
Here are some specific conditions and procedures that should be followed when using home computers for business purposes:

  • Make certain your home computer has all the latest updates for the operating system, applications, and anti-virus program
  • Use the VPN (Virtual Private Network) if you remote into your office desktop. 蹤獲扦 employees who remote into their office desktops at home are required by policy to use the VPN
  • Encrypt files or attach passwords to files that contain 蹤獲扦 data
  • Make certain that your home wireless connection is secured preferably with WPA and above
  • To be safe, it is a good idea to shutdown your system while you are away, or when you are not going to use the system
  • As a rule of thumb, imagine if your house was robbed and they stole your computer. Is your sensitive data protected? Do you have a backup somewhere else? Could you recover from a complete loss?

PORTABLE DEVICE USE
Here are some specific conditions and procedures should be followed when using University-Owned laptops, smartphones, netbooks, and tablets:

  • Always keep in mind that these devices are highly-regarded targets for theft
  • 蹤獲扦 data should be encrypted, and/or password-protected
  • The device should be password-protected
  • The device should remain physically inaccessible to others
  • Do not access sensitive data on open wireless networks
  • Make certain you have written down, and filed the serial number for your device
  • If possible, have a physical security lock available to use should you have to briefly walk away from the device

SMALL HANDHELD DEVICES, FLASH DRIVES, AND EXTERNAL DRIVE USE

Here are some specific conditions and procedures that should be followed when using these devices:

  • Smartphones are usually tied to a 蹤獲扦 email account, and should therefore be password protected
  • These devices are frequently lost
  • These devices are easily stolen
  • These devices can and should be password protected and/or encrypted if there is any 蹤獲扦 or personal data on them.

SUMMARY


REMEMBER THESE SUGGESTIONS

  • Be security-conscious regarding anything of vital importance to 蹤獲扦, and yourself
  • When your personal safety, 蹤獲扦s safety, or any confidential information is involved, always ask yourself, what measures should I perform to keep myself and 蹤獲扦 safe, and to ensure that 蹤獲扦s confidential information is protected against harm, theft, or inappropriate disclosure?
  • Apply similar considerations mentioned in this document to systems at home
  • Threats do not stop at the work place; they extend to your home, and other surroundings
  • Do not allow this security awareness information to lead to paranoia
  • Make informed decisions to protect yourself, 蹤獲扦, and others

WHO TO CONTACT
It is important for you to contact appropriate 蹤獲扦 personnel the moment you suspect anything might be wrong. Contact Information Technolgy Services (ITS) at 316-978-4357 (蹤獲扦-HELP), or email helpdesk@wichita.edu.