Send the link below via email or IMCopy
Present to your audienceStart remote presentation
- Invited audience members will follow you as you navigate and present
- People invited to a presentation do not need a Prezi account
- This link expires 10 minutes after you close the presentation
- A maximum of 30 users can follow your presentation
- Learn more about this feature in our knowledge base article
Do you really want to delete this prezi?
Neither you, nor the coeditors you shared it with will be able to recover it again.
Make your likes visible on Facebook?
Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.
User Data Protection and Network Security Overview
Transcript of User Data Protection and Network Security Overview
...Important An InfoSec/IA Presentation User Data Protection
& Network Security Browser cache history
Pictures and images
System log files
Office documents, spreadsheets, and PDFs Data Protection and You You Create Data Every Time
You Use A Computer Business Operations and Intelligence
Fiscal Controls and Responsibilities
Computer Network Defense details
Required by Law (Personnel details/PII) Gaming performance metrics
Warrior Transition Units details
Financials - budgets and cost projections
Authentication secrets (passwords)
Purchase requests and contracts
Personnel information (HR, PII, and HIPAA)
System log files and records But is all of it important? Threats Two Classifications of Threats to Information and Data Hacktivists
Insiders Unintentional Hardware failure
Insiders What you can do to protect, prevent, and preserve important ARMP information Hackers, Malware, and Bots (oh my!) User shares (your U:\ drive)
Department shares (ITS, Common, etc.)
- provided specifically for this purpose
- synchronized and backed up regularly
- critical lost files can be restored Copy important files... Every Day! Family pictures
Personal music and documents
Non-approved software Personal files
are not necessarily AR 25-2, 4-5(a) Prohibited activities. ... [T]he following activities are specifically prohibited by any authorized user on a Government provided IS or connection:
(1) Use of ISs for unlawful or unauthorized activities such as file sharing of media, data, or other content that is protected by Federal or state law, including copyright or other intellectual property statutes.
(3) Modification of the IS or software, use of it in any manner other than its intended purpose, or adding user–configurable or unauthorized software such as, but not limited to, commercial instant messaging, commercial Internet chat, collaborative environments, or peer-to-peer client applications. These applications create exploitable vulnerabilities and circumvent normal means of securing and monitoring network activity ... Actually, personal use of computer systems are prohibited, limited, or restricted by ARMY Regulation 25-2 and ARMP Policy... Malicious For example... (and there are many, many more) Systems that are infected with malware are not allowed back on the network.
Copying data from infected systems can spread the malware.
In serious cases, NETCOM or CID may seize the system and all data on it
...permanently. Why and how? 1- Backup important data daily 2- Scan files for viruses 3- Minimize personal data