1 / 14

Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5

Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5. O u t l i n e. • Company Background • Policy • Six (6) Issues • Additional Security Issues • Q & A. Company Background. • Power Sources • Implantable Medical Devices Founded in 1950 by Wilson Greatbatch.

jonco
Download Presentation

Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Dominick Bennese, Jyl Mangooni, Steve Lorson GROUP 5

  2. O u t l i n e • Company Background • Policy • Six (6) Issues • Additional Security Issues • Q & A

  3. Company Background • Power Sources • Implantable Medical Devices • Founded in 1950 by Wilson Greatbatch

  4. Policy OR Practice? P O L I C Y 1) Purpose 2)Scope 3)Definitions 4)References 5)Responsibilites 6)Procedure 7)Compliance

  5. The Six (6) Issues • Remote Access • Information Security • Email • Privacy and Access • Password • Compliance

  6. Remote Access Security • Connection from outside • Anti-Virus, Firewalls • Request

  7. Information Security Policy • Data Classifications • Public Information • Protected Information • Confidential Information • “Need-to-Know”

  8. E-mail Policy • WGT owns all e-mails • Not a Storage tool • 90 Days • Secure Email through • PGP encryption • Token Key encryption • Password protected zip files

  9. Privacy and Access Policy • Passwords and “Employee’s Only” Sections • Protection from Hackers and Other Threats • Set Up Security Controls and Advise Custodians and Users of Controls

  10. Password Policy • Expire- 90 Days • 3 Strikes & You’re Out • Forgotten Password

  11. Compliance Policy • Understand Policy • Results in disabled access • Reserve right to change

  12. Additional Security Issues • Laptop, PDA, Internet Phone • Back Up Techniques • Network Hibernation • Exceptions to policy • Pin Number • Punishments

  13. Q U E S T I O N S ? Dominick Bennese Jyl Mangooni Steve Lorson

More Related