Free Essay

Security Recommendations

In:

Submitted By hotrodsz
Words 884
Pages 4
1) General Rules a) If it sounds too good to be true, it is. b) Need to know. Only give information to those people who need to know it and whose identity and security rights are known. c) People visiting our company in person should be watched carefully.

2) Around the Office d) Do not leave your computer logged in while you are not present. e) Do not allow a visitor to access your computer. f) Do not allow a visitor to plug a flash drive or CD into your computer g) Do not leave your computer logged in while you are not present. h) Shred all computer printouts as they are discarded. i) Shred all letters, memos and other paper. j) If in doubt SHRED IT! k) Computer Rooms should be locked at all times. l) Report suspicious behavior to security at once

3) On Your Computer m) Password Recommendations i) Passwords must be changed every 30 days ii) Passwords must be a least 8 characters. Characters should include at least 1 Capital Letter, 1 Small Letter, 1 number and 1 special character like; @#?|<>)(*&^%$ iii) Forgotten passwords can only be reset by visiting the help desk or IT support department in person and provide company identification card.

n) Recognizing Phishing and Online Scams iv) If it sounds too good to be true, it is. v) If the message does not appear to be authentic, it probably is not. vi) Does the content of the message appear in a search engine results? vii) Seeing silly typos, formatting, or grammatical errors a professional would not make.

o) How to Avoid Being a Victim of Phishing viii) Do not use work email for personal correspondence. ix) Do not reveal personal or financial information in an email. x) Do not respond to email solicitations for this information. This includes following links sent in email. xi) Do not send sensitive information over the Internet before checking a Web site's security. If the URL starts with HTTPS: the “S” stands for secure. xii) Pay attention to the URL of a web site. Malicious Web sites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net). xiii) If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Information about known phishing attacks is available online from groups such as the Anti-Phishing Working Group.

p) What to do if You Think You are a Victim of Phishing xiv) Report it to your supervisor. They in turn will report it to the appropriate people within the organization, including network administrators xv) If you believe your financial accounts may be compromised, contact your financial institution immediately and close the account(s). xvi) Watch for any unauthorized charges to your account. xvii) Consider reporting the attack to the police, and file a report with the Federal Trade Commission or the FBI's Internet Crime Complaint Center.

q) How to tell if a site on the internet is bad. xviii) Most browsers have internet web page rating services or advisors. (1) IE has Trusted Sites. This should be turned on. (2) Firefox add on Web-of-Trust (WoT) this rates websites; (a) green=good (b) yellow=questionable (c) red=bad (3) McAfee’s SiteAdvisor has a listing of sites reputation.

4) At Home

r) Protecting and Managing Your Digital Identity on Social Media xix) Review and use privacy settings xx) Don’t share information that can help people steal your identity or locate you xxi) Limit who can see photos or video tagged with your name xxii) Restrict the delivery of information to your circle of your friends

s) Identifying Hoaxes and Urban Legends xxiii) it suggests tragic consequences for not performing some action xxiv) it promises money or gift certificates for performing some action xxv) it offers instructions or attachments claiming to protect you from a virus that is undetected by anti-virus software xxvi) it claims it's not a hoax xxvii) there are multiple spelling or grammatical errors, or the logic is contradictory xxviii) there is a statement urging you to forward the message xxix) it has already been forwarded multiple times (evident from the trail of email headers in the body of the message) t) Places to check to see if the Email is a Hoax xxx) Urban Legends and Folklore - http://urbanlegends.about.com/ xxxi) Urban Legends Reference Pages - http://www.snopes.com/ xxxii) TruthOrFiction.com - http://www.truthorfiction.com/ xxxiii) Symantec Security Response Hoaxes - http://www.symantec.com/avcenter/hoax.html xxxiv) McAfee Security Virus Hoaxes - http://home.mcafee.com/VirusInfo/VirusHoaxes.aspx u) Credit Card Safety xxxv) Never use your Credit or Debit Cards on the Internet. xxxvi) Your Credit Card is actually safer to use while shopping because of the exposer of your PIN number associated with a Debit Card. xxxvii) Current Credit Card laws allow better protection for the consumer then Debit Card laws. xxxviii) Always review your Credit and Debit card purchases using your monthly bank statement. Watch for unauthorized purchases of any amount. Many scams may just take a small amount each month.

Similar Documents

Premium Essay

Security Assessment and Recommendations

...SE571 Course Project:  Security Assessment and Recommendations SE571 Course Project:  Security Assessment and Recommendations Charlie Furze Professor: Eddie Wachter SE571 Principles of Information Security and Privacy Keller Graduate School of Management July 24, 2015 Table of Contents Executive Summary 1 Company Overview 1 Security Vulnerabilities 3 A Hardware Example Title 3 A Software Example Title 4 Recommended Solutions 5 A Hardware Example Solution 6 A Software Example Solution 8 Impact on Business Processes 9 Budget 10 Summary 11 References 12 Executive Summary The executive summary can’t really be completed until the course project is completed. This is because the section should summarize BRIEFLY the entire paper. There should be one or two sentences about the purpose of the report, a one to two-sentence description of the company and then a quick summary of the two vulnerabilities and the two solutions that you have identified. Company Overview Here you should identify which of the two company scenarios you are using and briefly summarize the organizations products or services, and business processes. Two Security Vulnerabilities Software Vulnerability Remember, you need to choose only two vulnerabilities from the three categories: hardware, software and policy. It is recommended that you make them limited in scope and very specific. Also, before starting on this section, be sure you have a very clear...

Words: 1180 - Pages: 5

Premium Essay

Security Assessment and Recommendations

...SE571 Principles of Information Security and Privacy James Smikonis Week 3 Project March 18, 2012 Professor George Danilovics Security Assessment and Recommendations A report needs to be assessed for Aircraft Solutions. This report consists of a security assessment that exhibits all founding flaws in their system, as well as giving AS a report regarding their current infrastructure. Aircraft Solutions is a component fabrication and equipment company that delivers different architectural designs. One of their specialties is establishing communications and solutions to defense, commercial, aerospace industries. The employees at AS are fully qualified for the tasks they entail hence making their workforce more efficient and supplying outstanding service. The purpose of this assessment is to investigate the weaknesses that are presented in the operations of Aircraft Solutions (AS). While conducting this assessment, we will expose vulnerabilities; give an analysis of any relative threats, risks that will be addressed and a comprehensive analysis of the relative threats and consequences pertaining to this mission. Assessment and Investigation After carefully examining the three sections pertaining to Aircraft Solutions, we found that policy and hardware related issues require special attention. We found that Aircraft Solutions does not utilize any firewall between the commercial division and the Internet Gateway. In fact, we exhibited that the Department Defense routes...

Words: 907 - Pages: 4

Free Essay

Security Assessment and Recommendations for Aircraft Solutions

...Security Assessment and Recommendations for Aircraft Solutions Principles of Information Security and Privacy Keller Submitted: December 11, 2013 Executive Summary The purpose of this report is to investigate the vulnerabilities of Aircraft Solutions (AS) in the areas of hardware and policy. Furthermore, it provides recommended solutions to the security weaknesses mentioned in Phase 1. Aircraft Solutions is a well known leader in the design and production of component products and services for companies ranging from commercial industry to the aerospace industry. In addition, Aircraft Solutions maintains a large capacity plant filled with an extensive variety of equipment, which is mostly automated alongside skilled specialists in a range of fields to ensure they meet their customers’ needs. The weaknesses that are being addressed are hardware and policy. Company Overview Aircraft Solutions is a leader in the planning and production of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The headquarters of Aircraft Solutions is located in San Diego, California. The goal of Aircraft Solutions is to use machined products and related services to supply customer success, and to achieve cost, quality, and schedule requisites. They have a Defense Division (DD) of Aircraft Solutions located in Orange County, California and a Commercial Division (CD) located in San Diego County, California. Aircraft...

Words: 1560 - Pages: 7

Premium Essay

Security Recommendations to Prevent Social Engineering Attacks

...Security Recommendations To Prevent Social Engineering Attacks A social engineering attack is a non technical attack that attacks the mindset of the victim. An intruder prefers this attack, because the human mindset has more weaknesses than many systems do. There are several implementations that can be used to deter social engineering attacks. The following are list of security recommendations to thwart social engineering attacks that must be used by all company employees: · Do not click on any links in an e-mail instead scan the link with a virus scanner and type the link in the browser instead of clicking on the link. · Do not open any e-mail attachments without first during a virus scan on the e-mail or e-mail attachments can be blocked. · Do not talk about company business in front of anyone that is not a part of the company this includes family or friends. · Do not hold the door open to let anyone in the building instead have them go to the front desk to present their credentials. · Make sure that all paper company documents are burned in an incinerator. · Install mantraps where access cards must be used to enter in secure or employee only areas. · To obtain lost or forgotten passwords the user must come to the help desk with the proper identification and answer 2 security questions and the temporary password must be changed as soon as the account is accessed. · Internal e-mail addresses should only be given to employees with proper identification that can...

Words: 362 - Pages: 2

Premium Essay

Weaknesses Assignment Phase Ii- Security Assessment and Recommendations

...Running head: Security Assessment and Recommendations Week 6: Weaknesses Assignment Phase II- Security Assessment and Recommendations SE571 Principles of Information Security and Privacy Introduction Aircraft Solutions (AS) is a renowned equipment and component fabrication company with the capability to provide full range designs and implantation solutions to different sectors such as defense, aerospace, commercial and electronics industries. This paper discusses the possible recommendations based on the security assessment conducted in Phase 1, and proposes possible changes in order to ensure the safety of AS networks. The Company owns an enormous production plan which promises to deliver high quality solutions for targeted at various industries. It is equipped with a team of excellent and highly qualified professionals who cater to various needs of different industries. This paper intends to find possible solutions to bridge the gaps as found in the investigation in Phase 1. The weaknesses that are being addressed are the firewall configuration, virtualization of their hardware assets and defining and revisiting their security policy regarding firewall configuration and updated software at least twice a year. Brief overview of the Vulnerabilities in AS After a thorough investigation of the IT architecture and systems of the Aircraft Solutions, two main concerns were identified as the priority items that needed attention. The first was hardware related concern and was...

Words: 1692 - Pages: 7

Free Essay

Security Assessment Recommendations

...Course Project: Security Assessment Recommendations Vincent Hill DeVry University Keller Graduate School Principles of Information Security and Privacy SE571 Professor Krell April 15, 2012 Course Project: Security Assessment Recommendations INTRODUCTION An organization that specializes in making web site and providing web business solutions is known as Quality web design is. The company’s goal is to help its customers increase consumer generated revenue to Quality Web Design customer web sites. The other business solutions accompanied are accounting, payroll marketing, also parts of the business process and for which it assets are employed. Quality Web Design should be made aware of various security issues, even those that are not common. Identified are two of the potential security weaknesses that require improvement, and the possible remedies for each threat. The company Quality Web Design provides business solutions to the customers... The circuit used by the company may prove various flaws to security and the hardware and software used have various limitations as Microsoft share point which have limitations in supporting virtualization, up gradation whereas the web server provided by IBM provides various functionalities over the Microsoft web server. The company has a very good hardware, software, network system, the assets used by the company provide the support to the business process but there are many limitations of the hardware, software, assets and...

Words: 1453 - Pages: 6

Free Essay

Recommendations for Wireless Network Security Policy

...RECOMMENDATIONS FOR WIRELESS NETWORK SECURITY POLICY Introduction One of the newer technologies being increasingly used in today's business is that of wireless networks. While this technology has the advantages of providing greater user mobility and temporary access, it does have the disadvantage of an intrinsic lack of security. SECURITY THREATS There are a number of types of attack that wireless LANs are vulnerable to, based on different aspects of their operation and configuration. These include. i. Broadcast medium Wireless is a broadcast medium, where there is no way to control where the information is sent and who therefore has access to it. If an access point is set up and used in its default Configuration, then the user of such a system is vulnerable to attack, because anyone running sniffer software can see and capture everything that a user does across that network... ii. WEP Vulnerabilities. There were two problems with the original WEP encryption system. Firstly, the shared key system requires the use of the WEP key to verify a user attempting to connect to the wireless network. The second was the actual implementation of the encryption system itself. iii. Denial of Service This type of attack can be perpetrated by a jamming attack which can be either intentional attack which is one in which the attacker broadcasts a very high-power signal at the same frequency that the wireless network is operating on, causing interference to the network...

Words: 906 - Pages: 4

Premium Essay

Cloud Computing and Risk Accessment

...Computing Benefits, risks and recommendations for information security Rev.B – December 2012 2 Cloud Computing Benefits, risks and recommendations for information security Document History Date December 2009 Version 1.0 Modification Initial Release, Rev.A Author Daniele Catteddu, Giles Hogben Thomas Haeberlen Lionel Dupré December 2012 2.0 Rev.B About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU legislation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact details This report has been edited by: Lionel Dupré, Thomas Haeberlen For contacting ENISA or for general enquiries about this report, please use the following details: Email: resilience@enisa.europa.eu Internet: http://www.enisa.europa.eu Cloud Computing 3 Benefits, risks and recommendations for information security Legal notice Notice must...

Words: 12166 - Pages: 49

Premium Essay

Risk Assesment Plan

...If exploited, these vulnerabilities could result in: • Unauthorized disclosure of data • Unauthorized modification to the system, its data, or both • Denial of service, access to data, or both to authorized users This Risk Assessment Report evaluates the confidentiality (protection from unauthorized disclosure of system and data information), integrity (protection from improper modification of information), and availability (loss of system access) of the system. Recommended security safeguards will allow management to make decisions about security-related initiatives. PROJECT RISKS This risk assessment methodology and approach was conducted using the guidelines in NIST SP 800-30, Risk Management Guide for Information Technology Systems. The assessment is broad in scope and evaluates security vulnerabilities affecting confidentiality, integrity, and availability. The assessment recommends appropriate security safeguards, permitting management to make knowledge-based decisions about security-related initiatives. The methodology addresses the following types of controls: • Management Controls: Management of the...

Words: 1565 - Pages: 7

Free Essay

Executive Summarycase8

...significant competition from competitors such as Yahoo, Microsoft, WebMD, Kayak, Monster.com, Amazon.com, and others. Google was subject to increased regulatory scrutiny that had a negative impact on the company. Google faced internet security issues and security breaches. Google was facing some important issues and concerns that could affect not only its future growth but its very survival. In order to ensure their survival the corporation needs to implement better planning procedures, establish plans for diversification, and train the undereducated employees, to increase work quality. Relevant Factual Information about the Problem or Decision the Organization Faced Google currently faces several challenges that range from things such as legal action, international risk, internet security issues, revenue and growth sustainability, and recovering from losses. As Google continues to grow and continued purchasing other companies such as its acquisitions of YouTube, DoubleClick, and Postinie. It may not lead to more revenue and acquisitions may become difficult in the future. As the company continues to grow management will be challenged to find new and innovative ways to maintain a strong corporate future. Recommendations The first recommendation would be for Google to continuously improve...

Words: 408 - Pages: 2

Premium Essay

Risk Management

... | | Table of Contents 1 INTRODUCTION 1 2 IT SYSTEM CHARACTERIZATION 2 3 RISK IDENTIFICATION 6 4 CONTROL ANALYSIS 8 5 RISK LIKELIHOOD DETERMINATION 11 6 IMPACT ANALYSIS 13 7 RISK DETERMINATION 15 8 RECOMMENDATIONS 17 9 RESULTS DOCUMENTATION 18 LIST OF EXHIBITS Exhibit 1: Risk Assessment Matrix 18 List of Figures Figure 1 – IT System Boundary Diagram 4 Figure 2 – Information Flow Diagram 5 List of Tables Table A: Risk Classifications 1 Table B: IT System Inventory and Definition 2 Table C: Threats Identified 4 Table D: Vulnerabilities, Threats, and Risks 5 Table E: Security Controls 6 Table F: Risks-Controls-Factors Correlation 8 Table G: Risk Likelihood Definitions 9 Table H: Risk Likelihood Ratings 9 Table I: Risk Impact Rating Definitions 13 Table J: Risk Impact Analysis 13 Table K: Overall Risk Rating Matrix 15 Table L: Overall Risk Ratings Table 15 Table M: Recommendations 17 1 INTRODUCTION Risk assessment participants:...

Words: 1518 - Pages: 7

Premium Essay

Eshell Store

...Current Situation The store was developed for the sole purpose of communicating with customers electronically, as it related to the fuel and lubricants department of Shell Canada. With the main intention and focus for agricultural customers to utilize technology to attain their products with more “ease”. From a business perspective eStore’s goal was to reduce cost and provide a similar services that provided by customer agents. Unfortunately, after a year of implementation of the eStore, the company was faced with high customer response in applying to use eStore but low overall customer utilization. In addition to this the company faces technical issues , where considerations must be made for both utilization & technical issues to determine what must be done to improve the current status of the online store. Evaluation of eStore Basis for Development The development was based on customer habits and e-commerce is viewed as a method utilized when minimal but effective interaction is required. Thus based on the prominent customer group of Shell Canada, the idea of the eStore was developed. These groups being: • Transactors: highly price sensitive with no consultation which accounted for 95% of the customer base • Progressives : price insensitive with required price consultation These transactors significantly influenced the development of the eStore, as it required minimal consultation. Accomplishments of the eStore ...

Words: 1749 - Pages: 7

Free Essay

Aprilrowens

...analyze materials for data dictionaries. • Change Metadata, Worksheets, for Data Element name changes, Source name changes and updated definitions. • Correct metadata for various tables. • Approve new/modified data element names prior to physical implementation. • Update Data Element Metadata Collection • Verify definitions in Business Objects PROD (Production) to match any corrections made in dictionaries. • Maintain Metadata for operational and data warehouse • Verify correct changes were made to all worksheets and metadata. Assistant Facility Security Officer/Finanical Management Analyst; March 2009 to February 2014 • Implementing of security regulations, policies and procedures in coordination with NIPSPOM. • Conduct annual Security briefings for company personnel • Support and process Personal Security Questionaries (i.e. EQIP/SF-86/SF-85P) • Maintain oversight and management of employee Security Clearances. • Perform review of...

Words: 945 - Pages: 4

Free Essay

Project 505

...Company Findings and Analysis III. Summary and Conclusions – Findings Communicated to the President and Recommendations IV. Work Cited – References to support Recommendations Introduction: The purpose of this document is to discuss the internal controls and why the principle activities are important for a business to operate effectively. Our goal is to make the necessary recommendations and evaluate the system for future planning. We hope to uncover any issues that will prevent the company’s productivity. We’ll submit our recommendations to correct and improve the current system in place. In conclusion we’ll present our analysis to the President along with the recommendations needed to implement a better system of internal control. Issues: There’s an issue with too much responsibility placed on one employee. The accountant serving as the controller and treasurer creates a problem with documentation as you don’t have anyone to verify cash and revenue is accounted for correctly. It’s too easy for one employee to manipulate the books in his favor without a clear segregation of duties. The accountant is leaving checks in his office during the week exposing sensitive information and increasing the risk of theft in the office without securing the checks prior to leaving for the weekend. Access to petty cash is not regulated effectively due to lack of security and poor documentation. There’s a lack of human resource presence in order to complete a competent interview process...

Words: 615 - Pages: 3

Premium Essay

Sebi

...In 1988 the Securities and Exchange Board of India (SEBI) was established by the Government of India through an executive resolution, and was subsequently upgraded as a fully autonomous body (a statutory Board) in the year 1992 with the passing of the Securities and Exchange Board of India Act (SEBI Act) on 30th January 1992. In place of Government Control, a statutory and autonomous regulatory board with defined responsibilities, to cover both development & regulation of the market, and independent powers have been set up. Paradoxically this is a positive outcome of the Securities Scam of 1990-91. The basic objectives of the Board were identified as: * to protect the interests of investors in securities; * to promote the development of Securities Market; * to regulate the securities market and * for matters connected therewith or incidental thereto. Since its inception SEBI has been working targetting the securities and is attending to the fulfillment of its objectives with commendable zeal and dexterity. The improvements in the securities markets like capitalization requirements, margining, establishment of clearing corporations etc. reduced the risk of credit and also reduced the market. SEBI has introduced the comprehensive regulatory measures, prescribed registration norms, the eligibility criteria, the code of obligations and the code of conduct for different intermediaries like, bankers to issue, merchant bankers, brokers and sub-brokers,...

Words: 2239 - Pages: 9