120 likes | 536 Views
ABC’s of DHS IT Security & Privacy. On the next slides are some of the DHS IT Security & Privacy terms and definitions you need to remember. . A. Permissions: to access DHS Information Systems , or granted by owners of PHI.
E N D
On the next slides are some of the DHS IT Security & Privacy terms and definitions you need to remember. 2014 DHS IT Security & Privacy Training
A Permissions: to access DHSInformation Systems, orgranted by owners of PHI Unauthorized acquisition, access, use, or disclosure of PHI which compromises the security or privacy of such information B C Hiding data from people who aren’t supposed to see it 2014 DHS IT Security & Privacy Training
D Proves identity with a key pair; a public key and a private key Unauthorized entity from outside DHS which can harm DHS Information Systems E F External storage device; must be obtained from OST 2014 DHS IT Security & Privacy Training
G Visitors who do not have a DHS user ID and password H Federal law designed to protect sensitive protected health information (PHI) I User performing actions which violate DHS policies 2014 DHS IT Security & Privacy Training
J The place you must employ DHS IT Security and Privacy best practices One means of preventing unauthorized physical access to DHS facilities; given only to authorized employees K L DHS employees & contractors must pass IT training every year 2014 DHS IT Security & Privacy Training
M Disclose a minimum amount of protected information to do the job User should have access to onlydata he/she needs to perform a particular task N O DHS data is "owned" by DHS rather than individuals, but accountability for working with that data is assigned to individuals within DHS 2014 DHS IT Security & Privacy Training
Individually identifiable Protected Health Information (PHI) / Personally Identifiable Information (PII) – MUST be protected P Q DHS email spam filter R DHS employees’ duty to protect information privacy and security 2014 DHS IT Security & Privacy Training
Suspected or actual unauthorized attempt to alter, acquire, access, or destroy DHS information S Working on DHS information from a location that is not a DHS facility, such as an employee's home T U Intruders to the DHS Information Systems 2014 DHS IT Security & Privacy Training
V Security weaknesses through which threats impact DHS Information Systems W With fraud and abuse, the three primary impacts of a security incident X DHS users should have NO expectation of privacy on the DHS computers 2014 DHS IT Security & Privacy Training
The user whose actions and inactions are critical to maintaining an effective security environment Y Z A computer that has been taken over by a remote system; often used for sending spam or carrying out network attacks 2014 DHS IT Security & Privacy Training