Académique Documents
Professionnel Documents
Culture Documents
2
Cyber Security and Privacy Starts
and Ends with Us!
Security Tips
3
Information Stewardship
4
Cyber Security Defined
5
Privacy Defined
6
The CIA and N
7
Sensitive Data
8
Tips to Help Protect PII
• Minimize PII
• Secure PII
• Safeguard the Transfer
of PII
• Dispose of PII Properly
9
Prevent Spillage
10
If You Suspect a PII Breach
11
Threats and Vulnerabilities
12
Securing the Department
14
Secure Passwords
Do Don’t
• Use a combination of: • Use personal
lower and upper case information
letters, numbers, and, • Dictionary words
special characters (including foreign
• Change it every 90 languages)
days • Write it down
• Create a complex, • Share it with anyone
strong password, and
protect its secrecy
15
Protect Your Facility
16
Situational Awareness
17
Social Engineering
18
Social Engineering
Do Don’t
• Document the • Participate in
situation—verify the
surveys
caller identity, obtain
as much information • Share personal
as possible, if Caller ID information
is available, write
down the caller's • Give out
telephone number, computer
take detailed notes of systems or
the conversation network
• Contact your ISSO information
19
Mobile Computing
20
Report Suspicious Computer
Problems
If your system acts
unusual!
Report immediately to
your ISSO or EDCIRC!
22
Congratulations!
You have completed New Employee
Introduction to Security and Privacy
Privacy
this is to certify that
completion date
24