Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Information Security Awareness

No description
by

Steve MacFarlane

on 13 August 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Information Security Awareness

A To L Files
K To Z Files
Information Security Awareness
The Security intranet site has several guides and tools to assist employees.
Myth
: PINs are not subject to ATIP.

Fact
: PINs can by subject to an ATIP request and not providing them can be met with large fines
The security classification follows
the information

Originator determines the level of security
Sensitive information received by X must be assessed and assigned the proper designation

*Always ensure that the designation matches the highest sensitivity contained therein.
PROTECTED INFORMATION
PROTECTED A - limited personal injury
ex. Exact salary,


PROTECTED B - Serious personal injury
ex. SIN with other personal info, medical information.


PROTECTED C - Extremely grave personal injury
ex. Informant information, witness protection
Departmental Responsibilities

Guides on the Intranet
PIN to Email
* Must identify and categorize information, by which unauthorized disclosure could reasonably be expected to cause injury to:

1. PROTECTED
Private and other non-national interests

2. CLASSIFIED
The national interest
Ownership
NEED TO KNOW PRINCIPLE
CLASSIFIED INFORMATION
CONFIDENTIAL - When disclosure might reasonably be expected to cause injury to the national interest.


SECRET - When compromise might reasonably cause serious injury to the national interest.


TOP SECRET - When compromise might reasonably cause exceptionally grave injury to the national interest.
Access to sensitive information and assets must be limited to those whose duties require such access.

Simply having the appropriate clearance does not entitle you to access the information!
Presentation to X
September 18, 2013

Unclassified
Declassification and Downgrading
Information must be classified or protected only for the time it
requires protection.

Declassification
is the removal of the classification entirely

Downgrading
is the reduction of the classification.

Examples: Budget before release, Cabinet document
HOW TO..
SECRET
Sept 18,2013
SM
Changes are made in ink, dated and
initialed
PROCESS..
1. Consult with originator/owner of info.
if they cannot be found, consult manager of
organization that originated or owned asset.

2. Communicate in writing that the change is
approved.
TOOLS
Secure fax/phone
MyKey (PKI)
Secure Cabinets
Mobile shelving
Secure discussion areas
Employees and Managers Security Guides
Transmittal of Sensitive information
Transport of Sensitive information
Handling sensitive information
Departmental Online Awareness (DOLA)
PIN TO PIN
*PIN-to-PIN transmission security
*PIN Address vulnerability
*Bypass of Virus/Malware Scanning and
Spam filtering
*BBs with PIN to PIN usage should
not be recycled
*Useful tool for emergency situations
MyKey (PKI)
Is acceptable up to Protected B
USB Key
Security vs. Convenience
**Remember to lock up USBs containing sensitive information**
*only forward PINs that are work related*
Shredders
*ensure you use
the appropriate
type
PIN to PIN
Myth:
PIN to PIN is more secure than email
Fact:
PINs can easily be sent to the wrong person.
PINs are saved to the actual device
Secret vs. A secret
Over classification can be
costly to store and handcuff
you when the time comes
to share it.
Full transcript