Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
-
Upload
brandon-porter -
Category
Documents
-
view
213 -
download
0
Transcript of Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.
![Page 1: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/1.jpg)
Information SecurityGeneral Awareness Training
Module 1 – Introduction
For The UF HSC Workforce
![Page 2: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/2.jpg)
Module 1 - Introduction 2
General Awareness: Information Security
Prevent Risks
Protect Information
Threats
![Page 3: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/3.jpg)
Module 1 - Introduction 3
Principles of Information Security
![Page 4: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/4.jpg)
Module 1 - Introduction 4
What Are We Trying to Prevent?• Violation of privacy
• Identity theft
• Loss of competitive advantage
• Loss of computer and network resources
• Copyright violations and other illegal uses
![Page 5: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/5.jpg)
Module 1 - Introduction 5
What Must Be Protected?
Servers and Networks
Offices and Buildings
Information
Desktop andPortable Computers
![Page 6: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/6.jpg)
Module 1 - Introduction 6
Protected From What Threats?
Computer Accident orHardware Failure
Computer Hackers
WeatherMalware -Virus, Worm, Spyware
Laptop, PDA ThievesPhishing Scams
![Page 7: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/7.jpg)
Module 1 - Introduction 7
What Is Important?
![Page 8: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/8.jpg)
Module 1 - Introduction 8
Individually identifiable health
information; health information
combined with name, or med
record #, or address, or key
dates, or family members, or any
other information that would link a
person to their health condition.
What Kind of Information ?
Protected Health Information (PHI)
![Page 9: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/9.jpg)
Module 1 - Introduction 9
Individually identifiable student
information; name or UF ID or SSN or
photo, in combination with grades,
demographics, admissions,
schedules, class rosters, financial, or
any information needed and used by
our faculty and staff about our
students, with the exception of a
limited amount of directory
information.
Student Records
What Kind of Information ?
![Page 10: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/10.jpg)
Module 1 - Introduction 10
What Kind of Information ?Names combined with SSNs, or
drivers license numbers or Florida
Ids, or any Financial account
numbers and access codes, or
any other information that could
be used to commit fraud using
someone else’s identity.Personal Identification Information (of anyone including faculty, staff, vendors
and clients)
![Page 11: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/11.jpg)
Module 1 - Introduction 11
Student Records
Protected By Laws
HIPAA
FERPA
Florida Statutes, Chapter 817.5688 (aka House Bill 481)
Protected Health Information (PHI)
Personal Identification Information (of anyone including faculty, staff, vendors and clients)
![Page 12: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/12.jpg)
Module 1 - Introduction 12
Personal Identification Information (of anyone including faculty, staff, vendors and clients)
Student Records
MUST Be Safeguarded WhereverIt is Used or Stored
HIPAA
FERPA
Florida Statutes, Chapter 817.5688 (aka House Bill 481)
Protected Health Information (PHI)
![Page 13: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/13.jpg)
Module 1 - Introduction 13
Research
Academic
Business
Other Important to UF HSC Needs To Be Safeguarded Too
![Page 14: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/14.jpg)
Module 1 - Introduction 14
Summary
Servers and Networks
Thumb Drives
Computer HackersAnd Thieves
Natural Disasters Different Types of Information
Confidentiality, Integrity,Availability
info
![Page 15: Information Security General Awareness Training Module 1 – Introduction For The UF HSC Workforce.](https://reader035.fdocuments.in/reader035/viewer/2022081603/5697bf891a28abf838c89b4a/html5/thumbnails/15.jpg)
Module 1 - Introduction 15
Your Responsibilities
Protect Information and our Computing Environment
Learn and Practice SafeguardsReview General Awareness
Training Regularly