
Security, Ethics and Confidentiality
Presentation
•
Professional Development, Instructional Technology
•
Professional Development
•
Practice Problem
•
Easy
Crystal Spaulding
Used 5+ times
FREE Resource
28 Slides • 3 Questions
1
Security, Ethics and Confidentiality
2
Security Awareness 2020
Introduction
3
This course is designed to fulfill the mandate of Public Act 100-040.
Cybersecurity is a term used widely today and has become a national priority. This is because a large part of everyone's daily life can be impacted by a breach or outage of critical systems such as banking, utility services, and communications. Most information is somehow connected to a computer system.
4
Cybersecurity
The general population relies heavily on these systems. However, mistakes occur, and most data breaches are the direct result of end user error. No matter what our skill level, we are all considered "end users". Completing this awareness course helps us to be better prepared to secure the state's information and the data entrusted to us as employees, while providing some basic tactics that can be used to protect one's personal information as well.
Course
5
Course Goals
Understand your role in protecting your organization's information, data, and IT systems;
Protect the information, data and IT systems of your organization;
Make better security-minded decisions to protect your private information and data at home.
6
Terminology
Cybersecurity and Information Security
7
What is the difference between Cybersecurity and Information Security?
Information security is concerned with all information, regardless of format, method of storage, or mode of transmission (e.g., electronic, paper or oral).
"Cybersecurity" is information security with a digital or computer component.
For the purpose of this course, the central focus is protection of the information, the technology that carries the information, and the information systems in your care.
8
9
10
Virtual Desktop Infrastructure
VDI term that refers to using a virtualized desktop that is hosted on a Virtual machine that lives on a server
In other words, there is no physical desktop computer in front of you,
but rather a terminal or remote desktop connection to a virtual machine that is hosted, secured and fully customizable per user basis.
11
CSC Agents access all claims and calls via VDI
Everything on VDI is monitored and reported
DO NOT open any personal websites on VDI
DO NOT open or access emails on VDI
No Outlook, Gmail, Yahoo, or social media sites on VDI
Always, always logout of VDI at the end of your shift
12
Behind the Scenes
What goes on behind the scenes to protect the information and systems you have access to at work is similar to the protections mentioned in the previous slide.
13
Using technical tools and software, your IT and IT Security staff secure your work environment by:
Setting up firewalls,
Scanning network traffic for threats and blocking or mitigating the threat,
Setting up incident detection and incident prevention systems,
14
IT Security staff secure your work environment
Blocking access to known malicious websites
Maintaining anti-virus protection.
Even with the above protections and tools working behind the scenes, users are still the weakest link in information security.
15
16
Did you know?
Did you know that each month the firewalls surrounding the State of Illinois' networks deny over 1.5 BILLION attempts at unauthorized access?
17
So, what is a firewall?
18
Using our house analogy, a firewall could be described as a fence or security system protecting your house. A person who does not have permission to enter cannot get past the walls or gates.
Firewall
19
20
21
22
23
24
Multiple Choice
Renata needs to leave her desk for lunch. What should she do before leaving her workstation?
Turn off her monitors
Log out of her email
Lock her workstation by pressing CTRL/ALT/Delete and then choosing "Lock"
All of the above
25
Poll
It is ok to post that I work for IDES on professional social media sites like LinkedIn.
True
False
26
Confidentiality
As a UI agent, you will come in contact with confidential and protected personal information. Understanding how to handle this sensitive information is critical to success. Confidential Information is information not known to the public. This refers to information in IBIS/ PUA system and information that we receive from claimants.
27
Points to remember
Remember to store all information within Virtual Desktop only.
DO NOT store or transfer data to any unapproved device or system.
28
Points to Remember:
DO NOT post any Personal, Private or Sensitive Information (PPSI) information on social media sites .
DO NOT post any data related to the engagement and/or information related to your association with the engagement on social media sites
29
Points to Remember:
DO NOT post any data related to the engagement and/or information related to your association with the engagement on social media sites
You are NOT permitted to use IBIS / PUA to file claims on behalf of family or friends.
You are NOT permitted to share confidential information about IDES on Social media.
You are NOT permitted to provide your contact details or your supervisor’s contact details to claimant.
30
Multiple Select
I can post work related information on social media
True
False
31
Get ready for a live class presentation
Check ZOOM chat and click on the link https://quizizz.com/join?gc=55503832
Security, Ethics and Confidentiality
Show answer
Auto Play
Slide 1 / 31
SLIDE
Similar Resources on Wayground
23 questions
TPDC 2020
Presentation
•
Professional Development
24 questions
Instructional Analysis
Presentation
•
Professional Development
25 questions
Life 5 Part 1 - Quiz A Review
Presentation
•
Professional Development
25 questions
CREATING INTERACTIVE LESSONS USING QUIZIZZ APPLICATION
Presentation
•
Professional Development
23 questions
Tutoring HUB training
Presentation
•
Professional Development
23 questions
pembuatan survey online
Presentation
•
Professional Development
24 questions
Fund Flow Statement
Presentation
•
Professional Development
24 questions
Understanding Teaching Styles
Presentation
•
Professional Development
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade