Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Data Security

No description
by

kahfei bak

on 23 May 2010

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Data Security

[Information Security & Privacy] Safety
Physical safety of
documents
people
infrastructure IT Security
Measure for protection of
Data
applications
system
networks
processes Privacy
Personal right and personal data Data Security RB/GF105 is an Obligation
not an option Principles and Goals Security Organization Responsibilities and Security Security Measures but why bother? Bosch assets
know-how
employees
patents
processes
machines 43.9% of data leak
is unintentional http://www.securelist.com/en/analysis/204792108/Global_Research_on_Data_Leaks_in_2009 integrated into
our process Balance between usability and Security ISP Regulation ISP Documentation Emergency planning
who is who
Departmental IS regulation Appointment Letter of DSP
Declaration of Obligation ISP Concept Common Sense, please Data Classification 0 1 2 3 Public internal confidential strictly confidential flyer, advertisement corporate annoucement leaking of data lead to damage
to reputation on individual business area. damage to bosch group Software and Application Viruses Non-standard hardware Password/screensaver Encryption Clean Desk Only certified software
Open-source or freeware
Software catelogues for PEACY installation
Confirm with your department DSP and ISY Trojan
Worm
Virus
Spyware
Mail
Website
Pendrive Smart Phone
USB Pendrive
External hardisk
CD/DVD

mix-case, mix-type
at least 8 characters
symbol/special characters
non-dictionary words
avoid keyboard pattern (qwertyu)
avoid personal info (birthday, employee number, etc)
do not use the same password for different applications http://www.auscert.org.au/render.html?it=2260 SecudeMail
Encrypt - the right person received the content
Sign - ensure the content is not tampered
Wipe Handling document according
to confidentiality ctrl + alt + del is your friend
set screensaver with password protection
change default idle time to the most 5 minutes
Contact details Document CD
Pendrive
Keys document
payslips??
handphone
Full transcript