3/31/16 notes CALS 085/002
3/31/16 notes CALS 085/002 CALS 002
Popular in Foundation:Information Tech
verified elite notetaker
Popular in Calculus and Pre Calculus
This 3 page Class Notes was uploaded by HD on Thursday March 31, 2016. The Class Notes belongs to CALS 002 at University of Vermont taught by Thomas P. DeSisto in Spring 2016. Since its upload, it has received 23 views. For similar materials see Foundation:Information Tech in Calculus and Pre Calculus at University of Vermont.
Reviews for 3/31/16 notes CALS 085/002
Report this Material
What is Karma?
Karma is the currency of StudySoup.
Date Created: 03/31/16
3/31/16 Data Security ICT Topic Step #1 = Risk Assessment o Assets something you value o Threats something that could damage or destroy your asset o Types Qualitative Informed opinions regarding assets and threats Quantitative Assigning money values to assets Using formula to calculate change and cost of expected loss Example: Your hardware and data Flash drives Phones Laptops Etc. All things left behind in places Example: University research Data security for UVM research o Threats Physical hazards Water Electrical surge Etc. Hardware failure Software failure User error Loss or destruction (physical and digital) Outside attacks Removal or destruction (physical and digital) Step #2 = Take Action (Based on Risk Assessment) o Keep protective measures up-to-date Surge protectors Wires Software Etc. o Organize and back-up systems and data Flashdrives Webfiles o Use locks and keys Actual locks Encryptions Cybercriminals and How to Protect Yourself o *video* James Lyne, Director of Technology Strategy at Sophos 80% of websites are affected—a lot of them are small businesses 6 Steps According to James Update system and application software Have strong passwords Be suspicious Keep backups Make sure you run basic security controls Make sure you look up best practice for devices other than just your PC Stronger Passwords (What to Do) o Use strong passwords At least 8 characters, mix of characters Upper/lower case Numbers Symbols Phrases or long sentences if possible Don’t use the same password twice Use two-step authentication whenever it’s available o Password Managers Examples 1Password KeePass Keeper LastPass Keychain for Mac o Two-Step Authentication Something the user: Knows o Password o Personal ID # o Pin # o Answer to a question Has o Authenticator device o Card o Cell phone Is o Biometrics o Fingerprint reader on the iphone from the 5s to 6s o How secure is your password? activity