Department of Child Support Services Information Security Office
Department of Child Support Services Information Security Office
Policy / Information Security Awareness Risk Management Program and Systems Security
Business Continuity
Compliance
Safeguard Reviews
2
INFORMATION SECURITY
SEC-
-Y
Training Objectives
Enhance awareness and understanding of:
Security Practices
4
Preserve
Financial
Makes
Losses
Business Sense
6
Facilities
Equipment
Responsibility
User
Information Classification
Public Information
Information
10
Confidential Information
Protected from disclosure by law
Information maintained by state/ local agencies that require precautions to protect it from unauthorized access, modification, or deletion.
Examples of Confidential Information:
Child Support participant information System navigation manuals (procedure or access codes, etc), Legal Opinions, and some operational manuals
11
Confidential Information
Personal Information:
An individuals name in combination with one or more of the following elements:
Social security numbers Drivers license numbers Account number; credit card or debit card number, in combination with a required access code
12
Confidential Information
Sensitive Information:
Requires special precautions in handling and disclosure.
Agency
Organizational
13
7213(a), 7213A
42 United States Code section 454 California Welfare and Institutions Code sections 11478.1 California Family Law Code section 17212
Punishable
15
Fine: Jail :
Revenue Service
CA
CA
CA
17
18
Access Management Separation of Duties Acceptable Use Data Protection Physical Security Passwords
Social Engineering Remote Access Portable / Mobile Computing and Storage Devices Conflict Recusal Incident Reporting
19
Access Management
Golden Rule
Acceptable Use
Need
to Know
Authorized
20
Separation of Duties
Acceptable Use
Use resources for authorized purposes Use of Child Support resources may be monitored
Data Protection
Hard Copy
Lock
it up
Printer/fax Shred
23
Data Protection
Encrypt Electronic Data
In Transit
Secure web services Data transfer VPN E-mail
In Storage
Portable
Laptops Hard
Devices
Disk / CDs
USB
DVD
24
Physical Security
25
Physical Security
Work Area Security Practices
Protect printer and fax machine Clean Desk Lock Computer Secure information on the monitor
26
27
Passwords Standard
28
Passwords
You are personally responsible and accountable for all activity occurring under your User ID and password.
30
Social Engineering
Dont give out Information unless you determine:
31
Phishing Stats
6.1 billion phishing emails per month 28,888 phishing reports (Jun 07) 55,643 phishing websites reported (Apr 07)
Anti-phishing.org
32
Remote Access
Management approval
DCSS approved solution
33
owned
Encryption
Physical Report Logical
activated
protection
lost/stolen protection
34
Conflict Recusal
Employees must not access information from any Child Support case in which one participant is a(n): Employee Relative of the Child Support employee Person with whom the Child Support employee cohabits Close Friend or Business Associate
35
INCIDENT MANAGEMENT
Incident Reporting
36
What To Report?
The confidentiality, integrity and/or availability of Child Support information A person or property located at any Child Support facility Suspected virus or computer problem Lost or stolen information/ information asset Unauthorized access Inappropriate activities Unauthorized/suspicious people or activity in facility
37
Examples:
Where To Report
CONTACT
Call the DCSS Security Desk at 888-DCSS-Help; 888-327-7435 Email the DCSS Security Desk at [email protected] Mail completed incident report
DCSS Information Security Office P.O. BX 419064, MS10 Rancho Cordova, CA 95741-9064
38
Final Thoughts
If not you, who? If not now, when?
40
Remember!