Search Header Logo
Security, Ethics and Confidentiality

Security, Ethics and Confidentiality

Assessment

Presentation

Professional Development, Instructional Technology

Professional Development

Practice Problem

Easy

Created by

Crystal Spaulding

Used 5+ times

FREE Resource

28 Slides • 3 Questions

1

Security, Ethics and Confidentiality

Slide image

2

Security Awareness 2020


Introduction 

3

This course is designed to fulfill the mandate of Public Act 100-040.

Cybersecurity is a term used widely today and has become a national priority. This is because a large part of everyone's daily life can be impacted by a breach or outage of critical systems such as banking, utility services, and communications. Most information is somehow connected to a computer system.

4

Cybersecurity

The general population relies heavily on these systems. However, mistakes occur, and most data breaches are the direct result of end user error. No matter what our skill level, we are all considered "end users". Completing this awareness course helps us to be better prepared to secure the state's information and the data entrusted to us as employees, while providing some basic tactics that can be used to protect one's personal information as well. 

Course 

5

Course Goals 

  •  Understand your role in protecting your organization's information, data, and IT systems; 

  • Protect the information, data and IT systems of your organization;

  •  Make better security-minded decisions to protect your private information and data at home.

6

Terminology 

Cybersecurity and Information Security

7

What is the difference between Cybersecurity and Information Security? 

  •  Information security is concerned with all information, regardless of format, method of storage, or mode of transmission (e.g., electronic, paper or oral).

  • "Cybersecurity" is information security with a digital or computer component.

  • For the purpose of this course, the central focus is protection of the information, the technology that carries the information, and the information systems in your care.

8

Slide image

9

Slide image


10

Virtual Desktop Infrastructure

  • VDI term that refers to using a virtualized desktop that is hosted on a Virtual machine that lives on a server

  • In other words, there is no physical desktop computer in front of you,

  • but rather a terminal or remote desktop connection to a virtual machine that is hosted, secured and fully customizable per user basis.

Slide image

11

CSC Agents access all claims and calls via VDI

  • Everything on VDI is monitored and reported

  • DO NOT open any personal websites on VDI

  • DO NOT open or access emails on VDI

  • No Outlook, Gmail, Yahoo, or social media sites on VDI

  • Always, always logout of VDI at the end of your shift

12

Behind the Scenes 

What goes on behind the scenes to protect the information and systems you have access to at work is similar to the protections mentioned in the previous slide. 

13

Using technical tools and software, your IT and IT Security staff secure your work environment by: 

  • Setting up firewalls,

  • Scanning network traffic for threats and blocking or mitigating the threat, 

  • Setting up incident detection and incident prevention systems,

14

IT Security staff secure your work environment 

  •  Blocking access to known malicious websites

  • Maintaining anti-virus protection.

  •  Even with the above protections and tools working behind the scenes, users are still the weakest link in information security.

15

Slide image

16

Did you know? 

Did you know that each month the firewalls surrounding the State of Illinois' networks deny over 1.5 BILLION attempts at unauthorized access?

17

So, what is a firewall? 

18

Using our house analogy, a firewall could be described as a fence or security system protecting your house. A person who does not have permission to enter cannot get past the walls or gates.

Firewall

19

Slide image


20

Slide image

21

Slide image

22

Slide image

23

Slide image

24

Multiple Choice

Renata needs to leave her desk for lunch. What should she do before leaving her workstation?

1

Turn off her monitors

2

Log out of her email

3

Lock her workstation by pressing CTRL/ALT/Delete and then choosing "Lock"

4

All of the above

25

Poll

It is ok to post that I work for IDES on professional social media sites like LinkedIn.

True

False

26

 Confidentiality 

As a UI agent, you will come in contact with confidential and protected personal information. Understanding how to handle this sensitive information is critical to success. Confidential Information is information not known to the public. This refers to information in IBIS/ PUA system and information that we receive from claimants.

27

Points to remember

  • Remember to store all information within Virtual Desktop only.  

  • DO NOT store or transfer data to any unapproved device or system.

28

Points to Remember:

  • DO NOT post any Personal, Private or Sensitive Information (PPSI) information on social media sites .

  • DO NOT post any data related to the engagement and/or information related to your association with the engagement on social media sites

29

Points to Remember:

  • DO NOT post any data related to the engagement and/or information related to your association with the engagement on social media sites

  • You are NOT permitted to use IBIS / PUA to file claims on behalf of family or friends.

  • You are NOT permitted to share confidential information about IDES on Social media.

  • You are NOT permitted to provide your contact details or your supervisor’s contact details to claimant.

30

Multiple Select

I can post work related information on social media

1

True

2

False

31

Get ready for a live class presentation

Check ZOOM chat and click on the link https://quizizz.com/join?gc=55503832

Security, Ethics and Confidentiality

Slide image

Show answer

Auto Play

Slide 1 / 31

SLIDE