Training Booklet

of 55
5 views
PDF
All materials on our website are shared by users. If you have any questions about copyright issues, please report us to resolve them. We are always happy to assist you.
Document Description
INFORMATION SECURITY AWARENESS TRAINING EMPLOYEE TRAINING BOOKLET Published by: Information Security Office Risk Management Division Department of Corrections and Rehabilitation State of California Information Security Awareness Training Information Security Office Revision: February 8, 2006 OTPD Approved: January 20, 2006 Reference Information ENTERPRISE INFORMATION SERVICES (EIS) CALL UNIT (HELPDESK): (916) 324-7789 CDCR INFORMATION SECURITY OFFICER: Allen Pugnier (A) (916) 358-2459 alle
Document Share
Document Tags
Document Transcript
  Published by:Information Security OfficeRisk Management DivisionDepartment of Corrections and RehabilitationState of California  II NNFFOORRMMAATTIIOONN  SS EECCUURRIITTYY  AA WWAARREENNEESSSS  TT RRAAIINNIINNGG   E MPLOYEE T RAINING B OOKLET    Information Security Awareness Training Revision: February 8, 2006Information Security Office OTPD Approved: January 20, 2006 E NTERPRISE I NFORMATION S ERVICES (EIS)   C ALL U NIT (H ELP D ESK ) :   (916) 324-7789 CDCR   I NFORMATION S ECURITY O FFICER :   Allen Pugnier (A)(916) 358-2459allen.pugnier@cdcr.ca.gov O N THE I NTRANET : S ECURITY A WARENESS T RAINING  C LICK ON THE I NFORMATION S ECURITY L INK FROM THE CDCR   I NTRANET M AIN P AGEAND N AVIGATE TO THE S ECURITY A WARENESS T RAINING A REA .http://intranet/PED/Information-Security/featured/Training/trng_main.asp F OR M ORE ON THE I NFORMATION S ECURITY I NTRANET SITE : http://intranet/PED/Information-Security/resources/links/links_main.asp NOTE: Some of the material in this handbook is copyrighted by the San Francisco Chapter of the Information Security Association, Inc. (ISSA), and is used with their permission. Reference Information  Information Security Awareness Training Revision: February 8, 2006Information Security Office OTPD: January 20, 2006 Page i   Table of Contents O VERVIEW ..........................................................................................................................1 L EARNING O BJECTIVE 1:   I NFORMATION S ECURITY AND P RIVACY   A. What is information security?.............................................................................2B. What is information privacy?..............................................................................3C. The Importance of Information Security and Information Privacy.......................3 L EARNING O BJECTIVE 2:   L AWS AND P OLICIES G OVERNING I NFORMATION S ECURITY   A. State Laws..........................................................................................................5 Unauthorized Computer Access................................................................... 5 Information Practices Act (IPA).................................................................... 6 Public Records Act (PRA)............................................................................ 6B. Federal Laws......................................................................................................7 Federal Copyright Act...................................................................................... 7 Electronics Communication Privacy Act.......................................................... 7  Computer Fraud and Abuse Act...................................................................... 7 Health Insurance Portability and Accountability Act........................................ 8C. State Policies......................................................................................................8 State Administration Manual........................................................................... 8 Department Operations Manual...................................................................... 8 L EARNING O BJECTIVE 3:   A PPROPRIATE U SE OF CDCR   I NFORMATION A SSETS   A. Electronic Mail..................................................................................................10 Appropriate Use............................................................................................... 11 Inappropriate Use............................................................................................. 11 Email Box......................................................................................................... 12B. Passwords........................................................................................................13C. Internet Usage..................................................................................................14D. Anti-Virus..........................................................................................................14E. Telephone Usage.............................................................................................15F. Remote Access................................................................................................15G. Hardware..........................................................................................................15H. Software...........................................................................................................17  Information Security Awareness Training Revision: February 8, 2006Information Security Office OTPD: January 20, 2006 Page ii   Table of Contents L EARNING O BJECTIVE 4:   C LASSIFY AND P ROTECT I NFORMATION A SSETS   A. Confidential Information...................................................................................18B. Public Information.............................................................................................20C. Sensitive Information........................................................................................20D. Personal Information........................................................................................21E. The Work Area.................................................................................................22 Workstation and Terminal Access........................................................... 23F. Visitors...........................................................................................................23G. Telephone Communications..........................................................................24H. Social Engineering........................................................................................24I. Email.............................................................................................................25J. Disposing “Hard Copy” Information...............................................................26K. Voice Mail Protection.....................................................................................26L. Protecting Telephone Cards..........................................................................27M. Destroying Electronic Data Files...................................................................27 Local Data Files....................................................................................... 27 Removable Media.................................................................................... 28 Network Disk/Server Files  .......................................................................28N. Safeguarding Equipment While Away from the Office..................................28 Modem Usage  .........................................................................................29O. File Backups..................................................................................................30 Good Backup Practices........................................................................... 31P. Password Selection.......................................................................................31 Passwords to Avoid................................................................................. 32 Password Do’s......................................................................................... 32 Password Don’ts  ......................................................................................33Q. Malicious Software........................................................................................33Symptoms of Malware.............................................................................34Preventing Malware Infections................................................................34R. Faxing Documents........................................................................................35
We Need Your Support
Thank you for visiting our website and your interest in our free products and services. We are nonprofit website to share and download documents. To the running of this website, we need your help to support us.

Thanks to everyone for your continued support.

No, Thanks
SAVE OUR EARTH

We need your sign to support Project to invent "SMART AND CONTROLLABLE REFLECTIVE BALLOONS" to cover the Sun and Save Our Earth.

More details...

Sign Now!

We are very appreciated for your Prompt Action!

x