SlideShare a Scribd company logo
Chapter 12
ISO 27001: Awareness
1
Information
System Security
Jupriyadi, S.Kom. M.T.
jupriyadi@teknokrat.ac.id
Bandarlampung, Agustus 2021
Agenda
 What is information?
 What is information security?
 What is risk?
 Introduction to the ISO standards
 Managing information security
 Your security responsibilities
Information
Information is an asset which,
like other important business assets,
has value to an organization and
consequently needs to be suitably
protected
Information Types
Information exists in many forms:
 Printed or written on paper
 Stored electronically
 Transmitted by post or electronic means
 Visual e.g. videos, diagrams
 Published on the Web
 Verbal/aural e.g. conversations, phone calls
 Intangible e.g. knowledge, experience, expertise, ideas
‘Whatever form the information takes, or means by which it is
shared or stored, it should always be appropriately protected’
Information Lifecycle
 Created
 Owned (it is an asset)
 Stored
 Processed
 Transmitted/communicated
 Used (for proper or improper purposes)
 Modified or corrupted
 Shared or disclosed (whether appropriately or not)
 Destroyed or lost
 Stolen
 Controlled, secured and protected throughout its existence
Information can be …
Key Term
 Information security is what keeps valuable information ‘free of danger’
(protected, safe from harm)
 It is not something you buy, it is something you do
o It’s a process not a product
 It is achieved using a combination of suitable strategies and approaches:
o Determining the risks to information and treating them accordingly
(proactive risk management)
o Protecting CIA (Confidentiality, Integrity and Availability)
o Avoiding, preventing, detecting and recovering from incidents
o Securing people, processes and technology … not just IT!
What is information security?
Security Elements
PEOPLE
Staff and
Management
PROCESSES
Business Activities
TECHNOLOGY
IT, Phones, USB sticks
People
People who use or have an interest in our information security
include:
 Shareholders / owners
 Management & staff
 Customers / clients, suppliers & business partners
 Service providers, consultants & advisors
 Authorities, regulators & judges
Our biggest threats arise from people (social engineers, unethical
competitors, hackers, fraudsters, careless workers, bugs, flaws …), yet our
biggest asset is our people (e.g. security-aware employees who spot
trouble early)
Processes
Processes are work practices or workflows, the steps or activities
needed to accomplish business objectives.
• Processes are described in procedures.
• Virtually all business processes involve and/or depend on
information making information a critical business asset.
Information security policies and procedures define how we secure
information appropriately and repeatedly.
Technology
Information technologies
 Cabling, data/voice networks and equipment
 Telecommunications services (PABX, VoIP, ISDN, videoconferencing)
 Phones, cellphones, PDAs
 Computer servers, desktops and associated data storage devices (disks,
tapes)
 Operating system and application software
 Paperwork, files
 Pens, ink
Security technologies
 Locks, barriers, card-access systems, CCTV
Value
• Protects information against various threats
• Ensures business continuity
• Minimizes financial losses and other impacts
• Optimizes return on investments
• Creates opportunities to do business safely
• Maintains privacy and compliance
Information security is valuable because it …
We all depend on information security
C I A
Information security is defined as the preservation of:
Confidentiality
Making information accessible
only to those authorized to use
it
Integrity
Safeguarding the accuracy and
completeness of information
and processing methods
Availability Ensuring that information is
available when required
Impacts
• IT downtime, business interruption
• Financial losses and costs
• Devaluation of intellectual property
• Breaking laws and regulations, leading to prosecutions, fines
and penalties
• Reputation and brand damage leading to loss of customer,
market, business partner or owners’ confidence and lost
business
• Fear, uncertainty and doubt
Security Incidents Cause….
Key Term
Risk is the possibility that a threat exploits a vulnerability in an
information asset,
leading to an adverse impact on the organization
What is Risk?
Threat: something that might cause harm
Vulnerability: a weakness that might be exploited
Impact: financial damage etc.
Threat Agent
The ‘actor’ that represents, carries out or catalyzes the threat
• Human
• Machine
• Nature
Threat Types
Threat type Example
Human error
Typo, wrong attachment/email address,
lost laptop or phone
Intellectual property Piracy, industrial espionage
Deliberate act
Unauthorized access/trespass, data theft, extortion,
blackmail, sabotage, vandalism,
terrorist/activist/criminal activity
Fraud Identity theft, expenses fraud
System/network attack Viruses, worms, Trojans, hacks
Service issue Power cuts, network outages
Force of nature
Fire, flood, storm, earthquake, lightning, tsunami,
volcanic eruption
Hardware issue
Computer power supply failure,
lack of capacity
Software issue Bugs or design flaws, data corruption
Obsolescence Windows XP Operating System?
So how do we secure
our information
assets?
ISO 27001
1990’s
• Information Security Management Code of Practice produced by a UK government-
sponsored working group
• Based on the security policy used by Shell
• Became British Standard BS7799
2000’s
• Adopted by ISO/IEC
• Became ISO/IEC 17799 (later renumbered ISO/IEC 27002)
• ISO/IEC 27001 published & certification scheme started
Now
• Expanding into a suite of information security standards (known as “ISO27k”)
• Updated and reissued every few years
• Current standard is known as ISO 27001:2018
History of ISO27001
• Concerns the management of information security,
not just IT/technical security
• Formally specifies a management system
• Uses Plan, Do, Check, Act (PDCA) to achieve, maintain and
improve alignment of security with risks
• Covers all types of organizations (e.g. commercial companies,
government agencies, not-for-profit organizations) and all
sizes
• Thousands of organizations worldwide have been certified
compliant
ISO 27001
Plan Do Check Act (PDCA)
Control Clauses
Control Clauses
• Information security policy - management direction
• Organization of information security - management
framework for implementation
• Asset management – assessment, classification and
protection of valuable information assets
• HR security – security for joiners, movers and leavers
• Physical & environmental security - prevents unauthorised
access, theft, compromise, damage to information and
computing facilities, power cuts
Control Clauses
• Communications & operations management - ensures the correct and
secure operation of IT
• Access control – restrict unauthorized access to information assets
• Information systems acquisition, development & maintenance – build
security into systems
• Information security incident management – deal sensibly with security
incidents that arise
• Business continuity management – maintain essential business processes
and restore any that fail
• Compliance - avoid breaching laws, regulations, policies and other security
obligations
Implementation Process Cycle
• Demonstrable commitment to security by the organization
• Legal and regulatory compliance
• Better risk management
• Commercial credibility, confidence, and assurance
• Reduced costs
• Clear employee direction and improved awareness
Benefits
Key Documents
• High level corporate security policy
• Supporting policies e.g. physical & environmental, email, HR,
incident management, compliance etc.
• Standards e.g. Windows Security Standard
• SOPs
• Records e.g. security logs, security review reports, corrective
actions
User Responsibilities
• Read and follow security policies and procedures
• Display identity cards while on the premises
• Challenge or report anyone without an ID card
• Visit the intranet Security Zone or call IT Help/Service
Desk for advice on most information security matters
• Allow unauthorized visitors onto the premises
• Bring weapons, hazardous/combustible materials,
recording devices etc., especially in secure areas
• Use personal IT devices for work purposes, unless
explicitly authorized by management
Do
Do Not
User Responsibilities
Password Guidelines
 Use strong passwords as suggested in the
password management policy.
 Change your password frequently. At least once
every 3 months.
 Each successive password must be unique.
Don’t use the same password again.
 Use short or easily-guessed passwords
 Write down passwords or store them in plain text
 Share passwords over phone or email
User Responsibilities
Internet Usage
Warning: Internet usage is routinely logged and monitored.
Be careful which websites you visit and what you disclose.
 Avoid websites that would be classed as obscene, racist, offensive or
illegal – anything that would be embarrassing
 Do not access online auction or shopping sites, except where
authorized by your manager
 Don’t hack!
 Do not download or upload commercial software or other
copyrighted material without the correct license and permission
from your manager
Use the corporate Internet facilities only for legitimate and
authorized business purposes
User Responsibilities
E-mail Usage
Do not use your corporate email address for personal email
Do not circulate chain letters, hoaxes, inappropriate jokes,
videos etc.
Do not send emails outside the organization unless you are
authorized to do so
Be very wary of email attachments and links, especially in
unsolicited emails (most are virus-infected)
Use corporate email for business purposes only
Follow the email storage guidelines
If you receive spam email, simply delete it. If it is offensive or
you receive a lot, call the IT Help.
User Responsibilities
Security Incidents
Report information security incidents, concerns
and
near-misses to IT
Email …
Telephone …
Anonymous drop-boxes …
Take their advice on what to do
Do not discuss security incidents with anyone outside
the organisation
Do not attempt to interfere with, obstruct or prevent
anyone else from reporting incidents
User Responsibilities
 Ensure your PC is getting antivirus updates and patches
 Lock your keyboard (Windows L) before leaving your PC unattended, and
shutdown your PC at the end of the day
 Store laptops and valuable information (paperwork as well as CDs, USB
sticks etc.) securely under lock and key
 Keep your wits about you while traveling:
 Keep your voice down on the cellphone
 Be discreet about your IT equipment
 Take regular information back ups
 Fulfill your security obligations:
 Comply with security and privacy laws, copyright and licenses,
 Comply with corporate policies and procedures
 Stay up to date on information security:
Chapter 12 iso 27001 awareness
34

More Related Content

PPTX
Cybersecurity Priorities and Roadmap: Recommendations to DHS
PDF
Cybersecurity Roadmap Development for Executives
PDF
Mergers and Acquisition Security - Areas of Interest
PDF
IT Risk Management
PPTX
MIS: Information Security Management
PDF
Identifying Code Risks in Software M&A
PPTX
Logging, monitoring and auditing
PPTX
Security management concepts and principles
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Roadmap Development for Executives
Mergers and Acquisition Security - Areas of Interest
IT Risk Management
MIS: Information Security Management
Identifying Code Risks in Software M&A
Logging, monitoring and auditing
Security management concepts and principles

What's hot (20)

PPTX
Cissp- Security and Risk Management
PPTX
Understanding the security_organization
PPTX
Build an Information Security Strategy
PPTX
Cybertopic_1security
PPTX
Risk Management Approach to Cyber Security
PDF
Business case for information security program
PDF
Simplifying the data privacy governance quagmire building automated privacy ...
PPTX
Security Organization/ Infrastructure
PDF
Cybersecurity solution-guide
PDF
M&A security - E-crime Congress 2017
PPT
Information security management
PPT
Information Security
PDF
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPT
Ca world 2007 SOC integration
PDF
Strategy considerations for building a security operations center
PPTX
Information risk management
PPT
2008: Web Application Security Tutorial
PDF
A Case Study of the Capital One Data Breach
Cissp- Security and Risk Management
Understanding the security_organization
Build an Information Security Strategy
Cybertopic_1security
Risk Management Approach to Cyber Security
Business case for information security program
Simplifying the data privacy governance quagmire building automated privacy ...
Security Organization/ Infrastructure
Cybersecurity solution-guide
M&A security - E-crime Congress 2017
Information security management
Information Security
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Ca world 2007 SOC integration
Strategy considerations for building a security operations center
Information risk management
2008: Web Application Security Tutorial
A Case Study of the Capital One Data Breach
Ad

Similar to Chapter 12 iso 27001 awareness (20)

PDF
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
PPTX
ISO27k Awareness presentation.pptx
PPTX
ISO27k Awareness presentation v2.pptx
PPTX
Awareness Training on Information Security
PPTX
Information security
PPTX
17 info sec_ma_imt_27_2_2012
PPT
Intro to Information Security.ppt
PDF
1678784047-mid_sem-2.pdf
PDF
ISO / IEC 27001:2005 – An Intorduction
PPTX
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
PPTX
Information security: importance of having defined policy & process
PPTX
INFORMATION SECURITY
PPTX
Information Security and Privacy-Unit-1.pptx
PPTX
Security Foundation and Incident Mgmt and BCMS.pptx
PPTX
ke-1 - Copy cat massunu rahing.pptxdfdff
PPTX
ke-1.pptx454545454545550515545456486498498498
PPTX
ke-1.pptx
PDF
Information Security
PPTX
Presentation1 110616195133-phpapp01(information security)
PPT
chapter 1. Introduction to Information Security
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO27k Awareness presentation.pptx
ISO27k Awareness presentation v2.pptx
Awareness Training on Information Security
Information security
17 info sec_ma_imt_27_2_2012
Intro to Information Security.ppt
1678784047-mid_sem-2.pdf
ISO / IEC 27001:2005 – An Intorduction
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Information security: importance of having defined policy & process
INFORMATION SECURITY
Information Security and Privacy-Unit-1.pptx
Security Foundation and Incident Mgmt and BCMS.pptx
ke-1 - Copy cat massunu rahing.pptxdfdff
ke-1.pptx454545454545550515545456486498498498
ke-1.pptx
Information Security
Presentation1 110616195133-phpapp01(information security)
chapter 1. Introduction to Information Security
Ad

More from newbie2019 (20)

PDF
Digital forensic principles and procedure
PDF
Fundamental digital forensik
PDF
Pendahuluan it forensik
PDF
Chapter 15 incident handling
PDF
Chapter 14 sql injection
PDF
Chapter 13 web security
PDF
NIST Framework for Information System
PDF
Nist.sp.800 37r2
PDF
Chapter 10 security standart
PDF
Chapter 8 cryptography lanjutan
PDF
Pertemuan 7 cryptography
PDF
Chapter 6 information hiding (steganography)
PDF
Vulnerability threat and attack
PDF
Chapter 4 vulnerability threat and attack
PDF
PDF
Chapter 3 security principals
PDF
Chapter 2 konsep dasar keamanan
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
PDF
Chapter 1 introduction
PDF
CCNA RSE Routing concept
Digital forensic principles and procedure
Fundamental digital forensik
Pendahuluan it forensik
Chapter 15 incident handling
Chapter 14 sql injection
Chapter 13 web security
NIST Framework for Information System
Nist.sp.800 37r2
Chapter 10 security standart
Chapter 8 cryptography lanjutan
Pertemuan 7 cryptography
Chapter 6 information hiding (steganography)
Vulnerability threat and attack
Chapter 4 vulnerability threat and attack
Chapter 3 security principals
Chapter 2 konsep dasar keamanan
Fundamentals of information systems security ( pdf drive ) chapter 1
Chapter 1 introduction
CCNA RSE Routing concept

Recently uploaded (20)

PDF
Business Ethics Teaching Materials for college
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
Pre independence Education in Inndia.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
Business Ethics Teaching Materials for college
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Complications of Minimal Access Surgery at WLH
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
PPH.pptx obstetrics and gynecology in nursing
Pharma ospi slides which help in ospi learning
Renaissance Architecture: A Journey from Faith to Humanism
Final Presentation General Medicine 03-08-2024.pptx
RMMM.pdf make it easy to upload and study
Pre independence Education in Inndia.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
STATICS OF THE RIGID BODIES Hibbelers.pdf
TR - Agricultural Crops Production NC III.pdf

Chapter 12 iso 27001 awareness

  • 1. Chapter 12 ISO 27001: Awareness 1 Information System Security Jupriyadi, S.Kom. M.T. jupriyadi@teknokrat.ac.id Bandarlampung, Agustus 2021
  • 2. Agenda  What is information?  What is information security?  What is risk?  Introduction to the ISO standards  Managing information security  Your security responsibilities
  • 3. Information Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected
  • 4. Information Types Information exists in many forms:  Printed or written on paper  Stored electronically  Transmitted by post or electronic means  Visual e.g. videos, diagrams  Published on the Web  Verbal/aural e.g. conversations, phone calls  Intangible e.g. knowledge, experience, expertise, ideas ‘Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected’
  • 5. Information Lifecycle  Created  Owned (it is an asset)  Stored  Processed  Transmitted/communicated  Used (for proper or improper purposes)  Modified or corrupted  Shared or disclosed (whether appropriately or not)  Destroyed or lost  Stolen  Controlled, secured and protected throughout its existence Information can be …
  • 6. Key Term  Information security is what keeps valuable information ‘free of danger’ (protected, safe from harm)  It is not something you buy, it is something you do o It’s a process not a product  It is achieved using a combination of suitable strategies and approaches: o Determining the risks to information and treating them accordingly (proactive risk management) o Protecting CIA (Confidentiality, Integrity and Availability) o Avoiding, preventing, detecting and recovering from incidents o Securing people, processes and technology … not just IT! What is information security?
  • 7. Security Elements PEOPLE Staff and Management PROCESSES Business Activities TECHNOLOGY IT, Phones, USB sticks
  • 8. People People who use or have an interest in our information security include:  Shareholders / owners  Management & staff  Customers / clients, suppliers & business partners  Service providers, consultants & advisors  Authorities, regulators & judges Our biggest threats arise from people (social engineers, unethical competitors, hackers, fraudsters, careless workers, bugs, flaws …), yet our biggest asset is our people (e.g. security-aware employees who spot trouble early)
  • 9. Processes Processes are work practices or workflows, the steps or activities needed to accomplish business objectives. • Processes are described in procedures. • Virtually all business processes involve and/or depend on information making information a critical business asset. Information security policies and procedures define how we secure information appropriately and repeatedly.
  • 10. Technology Information technologies  Cabling, data/voice networks and equipment  Telecommunications services (PABX, VoIP, ISDN, videoconferencing)  Phones, cellphones, PDAs  Computer servers, desktops and associated data storage devices (disks, tapes)  Operating system and application software  Paperwork, files  Pens, ink Security technologies  Locks, barriers, card-access systems, CCTV
  • 11. Value • Protects information against various threats • Ensures business continuity • Minimizes financial losses and other impacts • Optimizes return on investments • Creates opportunities to do business safely • Maintains privacy and compliance Information security is valuable because it … We all depend on information security
  • 12. C I A Information security is defined as the preservation of: Confidentiality Making information accessible only to those authorized to use it Integrity Safeguarding the accuracy and completeness of information and processing methods Availability Ensuring that information is available when required
  • 13. Impacts • IT downtime, business interruption • Financial losses and costs • Devaluation of intellectual property • Breaking laws and regulations, leading to prosecutions, fines and penalties • Reputation and brand damage leading to loss of customer, market, business partner or owners’ confidence and lost business • Fear, uncertainty and doubt Security Incidents Cause….
  • 14. Key Term Risk is the possibility that a threat exploits a vulnerability in an information asset, leading to an adverse impact on the organization What is Risk? Threat: something that might cause harm Vulnerability: a weakness that might be exploited Impact: financial damage etc.
  • 15. Threat Agent The ‘actor’ that represents, carries out or catalyzes the threat • Human • Machine • Nature
  • 16. Threat Types Threat type Example Human error Typo, wrong attachment/email address, lost laptop or phone Intellectual property Piracy, industrial espionage Deliberate act Unauthorized access/trespass, data theft, extortion, blackmail, sabotage, vandalism, terrorist/activist/criminal activity Fraud Identity theft, expenses fraud System/network attack Viruses, worms, Trojans, hacks Service issue Power cuts, network outages Force of nature Fire, flood, storm, earthquake, lightning, tsunami, volcanic eruption Hardware issue Computer power supply failure, lack of capacity Software issue Bugs or design flaws, data corruption Obsolescence Windows XP Operating System?
  • 17. So how do we secure our information assets?
  • 18. ISO 27001 1990’s • Information Security Management Code of Practice produced by a UK government- sponsored working group • Based on the security policy used by Shell • Became British Standard BS7799 2000’s • Adopted by ISO/IEC • Became ISO/IEC 17799 (later renumbered ISO/IEC 27002) • ISO/IEC 27001 published & certification scheme started Now • Expanding into a suite of information security standards (known as “ISO27k”) • Updated and reissued every few years • Current standard is known as ISO 27001:2018 History of ISO27001
  • 19. • Concerns the management of information security, not just IT/technical security • Formally specifies a management system • Uses Plan, Do, Check, Act (PDCA) to achieve, maintain and improve alignment of security with risks • Covers all types of organizations (e.g. commercial companies, government agencies, not-for-profit organizations) and all sizes • Thousands of organizations worldwide have been certified compliant ISO 27001
  • 20. Plan Do Check Act (PDCA)
  • 22. Control Clauses • Information security policy - management direction • Organization of information security - management framework for implementation • Asset management – assessment, classification and protection of valuable information assets • HR security – security for joiners, movers and leavers • Physical & environmental security - prevents unauthorised access, theft, compromise, damage to information and computing facilities, power cuts
  • 23. Control Clauses • Communications & operations management - ensures the correct and secure operation of IT • Access control – restrict unauthorized access to information assets • Information systems acquisition, development & maintenance – build security into systems • Information security incident management – deal sensibly with security incidents that arise • Business continuity management – maintain essential business processes and restore any that fail • Compliance - avoid breaching laws, regulations, policies and other security obligations
  • 25. • Demonstrable commitment to security by the organization • Legal and regulatory compliance • Better risk management • Commercial credibility, confidence, and assurance • Reduced costs • Clear employee direction and improved awareness Benefits
  • 26. Key Documents • High level corporate security policy • Supporting policies e.g. physical & environmental, email, HR, incident management, compliance etc. • Standards e.g. Windows Security Standard • SOPs • Records e.g. security logs, security review reports, corrective actions
  • 27. User Responsibilities • Read and follow security policies and procedures • Display identity cards while on the premises • Challenge or report anyone without an ID card • Visit the intranet Security Zone or call IT Help/Service Desk for advice on most information security matters • Allow unauthorized visitors onto the premises • Bring weapons, hazardous/combustible materials, recording devices etc., especially in secure areas • Use personal IT devices for work purposes, unless explicitly authorized by management Do Do Not
  • 28. User Responsibilities Password Guidelines  Use strong passwords as suggested in the password management policy.  Change your password frequently. At least once every 3 months.  Each successive password must be unique. Don’t use the same password again.  Use short or easily-guessed passwords  Write down passwords or store them in plain text  Share passwords over phone or email
  • 29. User Responsibilities Internet Usage Warning: Internet usage is routinely logged and monitored. Be careful which websites you visit and what you disclose.  Avoid websites that would be classed as obscene, racist, offensive or illegal – anything that would be embarrassing  Do not access online auction or shopping sites, except where authorized by your manager  Don’t hack!  Do not download or upload commercial software or other copyrighted material without the correct license and permission from your manager Use the corporate Internet facilities only for legitimate and authorized business purposes
  • 30. User Responsibilities E-mail Usage Do not use your corporate email address for personal email Do not circulate chain letters, hoaxes, inappropriate jokes, videos etc. Do not send emails outside the organization unless you are authorized to do so Be very wary of email attachments and links, especially in unsolicited emails (most are virus-infected) Use corporate email for business purposes only Follow the email storage guidelines If you receive spam email, simply delete it. If it is offensive or you receive a lot, call the IT Help.
  • 31. User Responsibilities Security Incidents Report information security incidents, concerns and near-misses to IT Email … Telephone … Anonymous drop-boxes … Take their advice on what to do Do not discuss security incidents with anyone outside the organisation Do not attempt to interfere with, obstruct or prevent anyone else from reporting incidents
  • 32. User Responsibilities  Ensure your PC is getting antivirus updates and patches  Lock your keyboard (Windows L) before leaving your PC unattended, and shutdown your PC at the end of the day  Store laptops and valuable information (paperwork as well as CDs, USB sticks etc.) securely under lock and key  Keep your wits about you while traveling:  Keep your voice down on the cellphone  Be discreet about your IT equipment  Take regular information back ups  Fulfill your security obligations:  Comply with security and privacy laws, copyright and licenses,  Comply with corporate policies and procedures  Stay up to date on information security:
  • 34. 34