180 likes | 296 Views
Information Security Essentials for Research. Randy Moore, CISSP Director, IT Information Security Services OU HIPAA Security Officer University of Oklahoma Health Sciences Center. Outcome Statement. At the conclusion of this presentation you should be able to:. Identify threats
E N D
Information Security Essentials for Research Randy Moore, CISSPDirector, IT Information Security Services OU HIPAA Security Officer University of Oklahoma Health Sciences Center
Outcome Statement At the conclusion of this presentation you should be able to: Identify threats State safe practices Know where to report an incident
Research data • Where is your research data? • Is it safe from common threats?
Common threat #1 • Virus and worm infections (malicious code)
Virus Detection Summary • Last 4 Hours: 36 • Last 24 Hours: 301 • Last 7 Days: 1,902 • Last 30 Days: 14, 466
Threat #2: Software vulnerabilities • 484 Vulnerabilities identified in 1 month
Threat #3: Data loss • Data loss or destruction • Hardware failure • Theft • Accidental deletion • Fire • Tornado • Flood
What if? Disaster strikes you? • Is your data backed up? • To tape? • Have you tested the restore process? • Do you lock your doors and keep your laptop secure? • Do you use tracking software on laptops?
Threat #4: Unauthorized access • Connecting to 700 million on the Internet • There are bad guys on the “Net” • They want access to your computer • 44,000 probes per day
Threat #5: Malicious software from the web • Malicious software downloads from the web • Spyware • Trojan Horse • Key Loggers • 1 in 10 web sites attempt to download software without permission OUHSC Threat Level
Safe Practices for the Internet • Set higher security settings in your browser • Do not install add-ons to your browser(Google tool bar, Comet Curser, Gator, HotBar, etc.) • Avoid Game Sites and sites that require you to fill out online forms • Install a spyware removal tool • Always remember that your computer is a business tool
Threat #6: Email • 89% of e-mail traffic contains viruses, phishing schemes, or is SPAM • 27,735,000 malicious e-mails blocked from delivery to OUHSC last month
Safe Practices for Email • Do not open unsolicited email or attachments • Do not reply to SPAM • Do not use your OUHSC email address in online forms and questionnaires unless it becomes necessary for University related business. • Place a confidentiality notice in your signature block
Safe practices summary • Antivirus updates (daily) • Security patches (monthly) • Data backups (daily) • Browser security settings (periodically) • Avoid unknown software from the Internet (always) • Firewall protection (annually) • Email caution (always) • Report suspicious activity (always)
Incident Response Incidents are reported to: • Tier 1 or Computer Support Personnel or Supervisor • IT Service Desk • IT Security • Office of Compliance (PHI incidents)
Safe Practices • Follow policies to help protect your data • See http://it.ouhsc.edu/policies/
Contact information • IT Information Security Services • IT-Security@ouhsc.edu • 271-2476 • IT Service Desk • Servicedesk@ouhsc.edu • 271-2203