Here - LSU Health New Orleans

Transcription

Here - LSU Health New Orleans
Information Security Training for
LSUHSC Employees and Students
Protecting
Yourself and
Your University
in the
Digital World
Revised August 17, 2016
1
Introduction
• Welcome to the LSUHSC’s Basic End User Information Security
training module. It is intended for all employees and students
who have access to LSU’s computing resources and must be
renewed on an annual basis.
• Information Security at LSU is everyone’s responsibility! During
your workday, you probably engage in various computer related
activities (e.g. communicating with others via email, or going to
various websites to perform research or access campus
resources).
• If you don’t follow appropriate security measures during these
seemly harmless activities, you can inadvertently leave your
personal data, as well as sensitive University data, open to attack
from unauthorized users. These attacks can result in the
breakdown of your computer, portable device or LSU’s network.
2
What is an END USER?
• An End User is any employee, student or affiliate
who uses the LSU Computer infra-structure in the
course of work or studies.
3
What You Need to Know
• Goals
• End User Responsibilities
• Password Management
Procedures
• Tampered Accounts
• Social Engineering
• LSU Security Policies
• Confidentiality/ Safeguards
• Safe Use of Portable Devices
4
Goals for Training
• Educate End Users about Information Security.
• Provide information on the role each End User plays
in protecting our network and data.
5
End Users Have Responsibilities
• As a user of LSUHSC computing resources you
have the responsibility to:
• Comply with LSU Security Policies (CM-42 & PM-36).
• Use computer resources responsibly.
• Create strong passwords.
• Use the computer for authorized purposes only (e.g. jobrelated or school related).
• Participate in the protection of electronic resources and data.
• Take reasonable precautions to avoid introducing computer
viruses into the network.
• Stay up-to-date with your compliance training.
6
What is Information Security?
• Information Security is the protection of computing
resources and the data that they store or access.
7
Why Do I Need to Learn about
Information Security?
Isn’t this just an IT Problem?
8
Why is Information Security
Important?
• Information Security allows the University to carry
out its mission by:
– Enabling people to carry out their jobs, education,
and research.
– Supporting critical business processes.
– Protecting personal and sensitive information.
• Security violations have consequences.
9
Consequences
• Risk to integrity of confidential information (e.g. data corruption,
destruction, unavailability of patient information in an
emergency).
• Risk to security of personal information (e.g. identity theft).
• Loss of confidentiality, integrity & availability of data (and time).
• Embarrassment, bad publicity, media coverage, news reports.
• Loss of patients’ trust, employee and public trust.
• Costly reporting requirements.
• Internal disciplinary action(s), termination of employment or
student enrollment.
• Penalties, prosecution and potential for sanctions/lawsuits.
10
Passwords
• Your use of a strong password is critical to secure
Protected and Restricted information.
• Your password is like the lock on your house (you
want it to be as strong as possible).
11
If Someone Knows Your Username and
Password They Can….
•
•
•
•
Read your emails
Respond to your emails as if they were you
Have the same access to all the information you have
Have you blamed for offenses they commit using your
login ID
• Execute financial transactions in your name
• Access information on your patients
• Steal your identity
12
Strong Passwords
• No password is unbreakable.
• Given enough time and
computing power a hacker can
crack any password.
13
Passwords Under Attack
• Because passwords are the most common method
used to allow users access to computer networks,
cracking passwords quickly has become a top priority
not only for the independent hacker, but also for
governments, organized crime and other
organizations seeking unauthorized access to online
information.
14
Passwords Under Attack (cont.)
• Recent developments have aided these groups in their
quest to illicitly obtain passwords.
– New software that turns computer video cards into password
cracking supercomputers.
– Internet search engine software has been turned to cracking
passwords.
– Breaches of large networks such as Sony, Gawker, and
RockYou have made millions of passwords public, allowing
hackers to identify patterns in how the average network user
creates a password.
– Social Engineering scams to trick individuals into revealing
their passwords.
15
The Best Defense
• Choose passwords that take considerable time to
break (given commonly available computing power).
• Change your password frequently (do not give a
would-be hacker enough time to complete the
cracking of your password.)
• Never, ever share your password (if someone you
don’t know asks for your password, s/he is up to no
good.)
16
Remembering Passwords
• If at all possible, never write down your password.
• As passwords become more complex, it may become
necessary to write down a password to remember it.
• If you must write down your password(s) in order to
remember them, take the following precautions:
17
Take Precautions to Remember your
Passwords
•
Don’t keep your User ID and its Password together.
Store them separately in a secure location.
•
Don’t store your password on or near the computer
you use (e.g. Instead of taping the password to the
bottom of your keyboard [really bad idea], keep it in
your glasses case).
• Instead of writing down the password, write down a
hint that will remind you of the password.
• Many smartphones have an app for storing passwords
securely (but you need another password to access it).
18
Should:
The Characteristics of a Strong
Password
• Be long, the longer the better
• Be difficult to guess
• Not be found in the dictionary
• Not be based on some readily available
personal information (e.g. child’s
name, home address, birth date, etc.)
• Contain characteristics from four
different categories (upper case and
lower case letters, numbers and
special characters)
19
The Characteristics of a Strong Password
(cont.)
• Password = “mydogrover”. 10 lower case letters. Ten
positions w/26 possible values for each position or
2610 or 141,167,095,653,376 possible combinations.
• Password = “MyD0gR0ver”. 10 upper and lower case
letters and numbers. Ten positons w/62 possible
values for each position or 6210 or
839,299,365,868,340,224 or about 6000 times as
many possible combinations.
20
The Characteristics of a Strong Password
(cont.)
• Password= “henrysdogrover” 14 lower case letters.
Fourteen positions w/26 possible values for each
position or 2614 or 64,509,974,703,297,150,976
possible combinations or 456,000 times as many
possible combinations as “mydogrover”.
21
The Characteristics of a Strong Password
(cont.)
• In the first case the number of available characters
was increased from 26 to 62, a difference of 36. The
increase resulted in 6000 times as many possible
combinations.
• In the second case, the length of the password was
increased from 10 characters to 14, a difference of 4.
The increase resulted in 456,000 times as many
possible combinations.
22
How To Create a Strong Password
The “strength” of a password is based upon the number of
combinations possible:
• Password= “Eek!_the_beAt1e$!” - 17 characters. U/L case Alphanumeric w/
numbers & special characters or 6617
(8,555,529,718,761,317,069,203,003,539.456) possible combinations.
– It would take approximately 6 months of continuous processing to crack this password
using methods described above.
• Password= “Alex_hates_avacados!” 20 characters. U/L case Alphabetic and
special characters. 5420 (4.4450351179593105816204799588172 times 10 to
the 34th power) possible combinations.
– It would take over twelve years of continuous processing to crack this password using the
methods described above.
Which password is stronger?
Which password is easier to remember?
23
How To Create a Strong Password (cont.)
• Tips on using phrases or sentences as passwords:
– Avoid well known phrases like book or movie titles or quotes
of your favorite characters or historical figures. Hackers collect
lists of such phrases to try first before switching to brute force
techniques.
– Instead build sentences about your everyday life, e.g.,
“GeorgehasaCamaro!” or “Tom_likes_Mustangs_better”.
24
How To Create a Strong Password (cont.)
– Avoid using pronouns (e. g., I, me, mine, you,
yours, he, she, it, etc.) in your sentences.
Pronouns make your password vulnerable to a
syntax attack.
• Instead of a password like “I_hate_broccoli” use
“Carol_hates_broccoli”. Using proper names also
makes the password longer.
– You can still include numbers and special
characters if you wish. For example,
“Bill_is_LSUs_#1_fan!” would take centuries to
crack using modern methods.
25
How To Make YOUR Password Stronger
• Make it longer – 15 character passwords are much
more secure than 10 character passwords.
• Use a larger pool of characters – Passwords
containing upper and lower case letters, numbers
and special characters like ‘$’, ‘!’, and ‘_’ are more
secure than passwords using lower case letters alone
for the same length.
26
LSUHSC Password Policy
• The password must contain characters from three of
the four following categories:
–
–
–
–
English upper case letters (A-Z)
English lower case letters (a-z)
Base 10 digits (0-9)
Non-alphanumeric characters: ONLY @, #, $, _
• The first character must be a lower case or an upper
case character (a-z, A-Z).
• The password must be no less than 10 characters
(but can be longer).
27
LSUHSC Password Policy (cont.)
• The password must be different from the previous
14 passwords used.
• The password must be changed at least every 70
days, and will remain valid for 70 days.
• The password cannot be changed more than once in
24 hours.
• The password cannot contain the UserID as a
substring.
• The password cannot contain a string of characters
from the user’s name.
28
Social Engineering
The process of deceiving people into giving away access
or confidential information. It is the act of manipulating
people into performing actions or divulging confidential
information, rather than defeating technical defenses
like breaching firewalls or cracking passwords. The
term typically applies to trickery or deception for the
purpose of information gathering, fraud, or computer
system access; in most cases the attacker never comes
face-to-face with the victim.
29
Why Do People Fall for Social Engineering
Techniques?
People are fooled every day by these scams
because they haven't been adequately warned
about social engineers. Without the proper
education, most people won't recognize a social
engineer's tricks because they are often very
sophisticated.
Awareness is the number one defensive measure.
Employees and students should be aware that
social engineering exists and also be aware of the
tactics most commonly used.
30
Social Engineering (cont.)
• Examples of “People Hacking” include:
– Telephone conversations from someone
pretending to be a Help Desk supporter or
computer vendor
– Shoulder surfing
– Phishing Scams
– Combination Attacks
– Hoaxes
– Dumpster diving
– Physical access to your computer
31
Telephone Conversations
• A hacker might attempt to gain your password by
impersonating a Help Desk supporter or a computer
vendor such as Microsoft during a phone conversation.
• Passwords should NEVER be given out during a telephone
conversation.
• Computer vendors will NOT call users directly.
‐ If someone calls claiming to be a vendor, tell them to
contact Computer Services and explain the problem.
‐ Do not, under any circumstances, follow any instructions
given to you by this person, no matter what dire
consequences they may describe.
‐ Hang up as quickly as possible and report the call to the
Help Desk at 568-4357.
32
Telephone Conversations (cont.)
• The Help Desk will ask for a secondary form of
authentication when unlocking your account or
resetting your password such as:
₋ Last four digits of your Social Security number
₋ Date of birth
₋ Place of birth
33
You Get a Call at Your
Desk
• The caller gives his name and
states he works for MicroSoft
Corp. He is calling you because he
is getting numerous alerts from
your computer indicating your
computer is infected with multiple
viruses.
• Your computer is working fine as
far as you can tell.
• He wants you to carry out a series
of steps to correct the problem.
What Should You Do?
a. Hang up on the caller and
continue working. No big deal.
b. Hang up and call the Help Desk
(4357) to report a phishing call.
c. Follow the caller’s instructions.
Virus infections are very serious
and the caller said he was from
MicroSoft so he must know
what he is doing.
34
You Should
Hang up and call the Help Desk to report a
phishing call.
– An employee of a computer vendor (e.g.
MicroSoft, Cisco, HP, etc.) will never call an
individual user.
– Never perform steps on your computer at
someone’s direction unless you have called that
individual (e.g. the Help Desk) and asked for help.
35
Shoulder Surfing
• A hacker could attempt to learn your
password or breach confidential
information by:
–
–
•
watching while you type your password
reading your computer’s screen
Prevention:
–
–
Type your password quickly or when no
one else is watching.
Position your screen so it can’t be easily
viewed by someone behind you.
36
Phishing Scams
• Phishing is a technique to trick you in to taking
action you would not ordinarily take (e.g.
transferring funds or revealing your password).
The hacker sends an email that pretends to be
from a legitimate provider of services such as the
IT department, a bank, a brokerage house, an ISP
or an email service provider, etc.
• In the message of the email, the hacker creates a sense of urgency
or fear to motivate the reader to take the action (usually clicking
on a link or an attachment) he desires.
• If you suspect that an email may be a fishing scam, contact the
purported sender, without using any links or other information
from the email, and confirm the email is legitimate. For example, if
the email says its from the IT department, call the Helpdesk at 568HELP.
37
Phishing Scams (cont.)
• DO NOT click on any of the links or take any other action
directed by the email until you confirm it is legitimate.
• A phishing message will direct you to take an action such
as:
⁻ Clicking on a link or an attachment
⁻ Reveal your username and password
⁻ Transfer funds
• It will contain one or both of the following elements:
⁻ Reason (“Due to the recent email upgrade. . .”)
⁻ Consequence ( “. . . or your account will be
suspended.”)
38
Phishing Scams (cont.)
• Milder messages may omit or imply the
consequence: “Due to a lack of activity on your
account (reason), you must click on the link below
and login with your username and password
(action).”
• The loss of access to the account is implied.
• More aggressive messages may omit the reason:
“Funds must be transferred by clicking on the link
below before COB today (action) or your payroll
account will be overdrawn! (consequence)”
39
Could it Be a Phishing Email?
• Does it ask you to take an actions such as clicking on a
link or an attachment or transferring funds?
• Does it give a reason that makes the action seem
logical?
• Does it ask for your username and password?
• Does it create a sense of fear or urgency by stating or
implying dire consequences for failing to act (e.g.
access suspended, account overdrawn, legal action
taken, etc.)?
• Does the message start with “EXTERNAL EMAIL.
EVALUATE”?
40
Could it Be a Phishing Email?
If the answer is “YES” to three (3) or more of
the questions in the previous slide, it may be
a phishing email and you should
independently confirm that it is legitimate.
41
What Do I Do?
• If you suspect an email might be a phishing
email:
– DO NOT take any action directed by the email.
– Attempt to contact the entity listed as the sender to
confirm that the request is legitimate.
– When contacting the sender, DO NOT use any
information contained in the suspect email.
– Instead obtain contact information from your own
contact list or from the entity’s website.
– If the sender denies sending the email, Send the
suspicious email as an attachment to [email protected].
42
Phishing Scams (cont.)
• Don’t click on these links in unsolicited emails or text
messages:
– Celebrity pictures or scandals (“HOT PICS of [name of celebrity].”)
– Breaking news (“LATEST INFO on flood insurance, Affordable Care Act,
etc.)
– Offers for “free” or “discounted” software.
– Unbelievable bargains (Cruises, iPads, etc.)
– Attachments claiming to be invoices or lawsuits.
– Charity scams (“Aid the victims of the Haitian earthquake.”)
– Offers of “exclusive access” if you simply login with your email
credentials.
– Online surveys.
– Emails claiming to be from the IRS or FBI.
43
Actual Phishing Email
From: LSU Health Sciences Center [mailto:[email protected]]
Sent: Monday, October 18, 2010 11:14 AM
Subject: Notice
REASON
Please note that some of the staff and faculty mailboxes will not be
available between 6:00 and 9:00 pm Tuesday, October 19th, 2010. for
system maintenance.
ACTION
The Maintenance will include the upgrading of the current user info, you
are hereby requested to send your current (User Name) (Password) for
upgrade to [email protected]
Thank you
Information Technology
Asks for your User Name and
Password
Implies you won’t be “upgraded without supplying username
and password
44
Legitimate Email from LSUHSC
•
From: Bettina Owens - Asst Vice Chancellor for Information Technology
Sent: Wednesday, March 04, 2015 10:13 AM
To: LSUHSC N.O. Faculty, Staff and Students
Subject: Password Policy Changes
•
On April 1, 2015, the length of time between required password changes for your
LSUHSC account will extend from 35 days to 70 days. Additionally, the minimum length
of the password will increase from 8 characters to 10 characters.
Your current password will expire as scheduled, whether that is 1 day or 34 days after
April 1st . The next time you change your password after April 1st you will have 70 days
before you have to change it again. When your current password expires you will be
required to select a 10-character password. View our password policy for full policy
details.
**********************************************************************
This message has been authorized by LSU Health Sciences Center administration for
mass distribution as a service to our faculty, staff, and students.
45
Is this a Phishing Scam? Yes or No
From: Mary Nucci [mailto:[email protected]]
Sent: Wednesday, July 06, 2016 10:06 AM
Subject: To All Faculty\Staff\Outlook Web Access Users
*EXTERNAL EMAIL: EVALUATE*
To All Faculty\Staff\Outlook Web Access Users
Take note of this important update that our new web mail has been improved with a
new messaging system from Outlook Web Access which also include faster usage on email,
shared calendar, web-documents and the new 2016 anti-spam version.
Please use the link below to complete your upgrade for our new Outlook Web Access
improved Webmail.
CLICK on FACULTY AND STAFF UPGRADE.
Regards
IT Service Desk Support.
46
YES!!
From: Mary Nucci [mailto:[email protected]]
Sent: Wednesday, July 06, 2016 10:06 AM
Subject: To All Faculty\Staff\Outlook Web Access Users
*EXTERNAL EMAIL: EVALUATE* Email is from outside the LSUHSC campus
To All Faculty\Staff\Outlook Web Access Users
URGENT
Take note of this important update that our new web mail has been improved with a
new messaging system from Outlook Web Access which also include faster usage on email,
shared calendar, web-documents and the new 2016 anti-spam version. REASON
CONSEQUENCE
Please use the link below to complete your upgrade for our new Outlook Web Access
improved Webmail. ACTION
CLICK on FACULTY AND STAFF UPGRADE.
Regards
IT Service Desk Support.
47
Is this a Phishing Scam? Yes or No
From: donotreply [mailto:[email protected]]
Sent: Thursday, May 12, 2016 2:33 PM
To: [email protected]
Subject: Help Desk Ticket - # HD99573091 Account Validation
*EXTERNAL EMAIL: EVALUATE*
Hello user
We have placed a temporal hold on two incoming mails to your account due to insufficient
validation.
To continue receiving messages, please follow address and validate your service.
This helps us stop automated programs from sending junk email.
We apologize for any inconvenience and appreciate your understanding.
Thanks,
The account team.
This email has been sent from a virus-free computer protected by Avast.
www.avast.com
48
Yes!
From: donotreply [mailto:[email protected]]
Sent: Thursday, May 12, 2016 2:33 PM
To: [email protected]
Subject: Help Desk Ticket - # HD99573091 Account Validation
URGENT
*EXTERNAL EMAIL: EVALUATE* FROM OUTSIDE THE CAMPUS
Hello user
We have placed a temporal hold on two incoming mails to your account due to insufficient validation.
To continue receiving messages, please follow address and validate your service. ACTION
CONSEQUENCE
This helps us stop automated programs from sending junk email. REASON
We apologize for any inconvenience and appreciate your understanding.
Thanks,
The account team.
This email has been sent from a virus-free computer protected by Avast.
www.avast.com
49
Thing to Remember
• LSUHSC-NO will NEVER ask for your user name or password in
an email.
• If it is an email sent to all employees and/or students, it will
contain the sender’s name and job title and the following text
will be appended to the end of the message: “This message has
been authorized by LSU Health Sciences Center administration for
mass distribution as a service to our faculty, staff and students.”
• Emails from outside the LSUHSC network will contain the
message “*EXTERNAL EMAIL: EVALUATE*” NEVER provide your
username or password in response to an email from outside the
LSUHSC network.
• If you suspect the email is a phishing scam, independently
confirm the email by contacting the sender without using any
information in the email. Obtain information from your own
contact list or from the sender’s website.
50
Combination Attacks
• Recently, hackers have been combining different
social engineering attacks. One example is called
Franco-phoning.
– Franco-phoning combines a phishing email with a
telephone call to convince the victim to turn over
sensitive data or install malware.
– First, the hacker carefully researches the target
organization to obtain names of executives, their
assistants, customers, phone numbers, and email
addresses.
51
Combination Attacks (cont.)
– Using that information, the hacker calls a targeted
individual within the organization, usually an
accountant or an administrative assistant with
authority to make large financial transactions.
– The hacker poses as a customer, bank representative
or another employee using a real name based on his
research.
– The hacker provides a plausible story, again using his
research, and requests the assistance of the victim.
52
Combination Attacks (cont.)
– The hacker then sends an email with an attachment
that is supposed to be an invoice or wire transfer that
needs immediate processing.
– When the victim clicks on the attachment, malware is
installed on the victim’s computer that allows the
hacker to assume the victim’s logon ID and executes
transfers of large sums of money.
– Unlike other phishing attacks, franco-phoning emails
have perfect grammar and spelling.
53
Combination Attacks (cont.)
– Because of the research the hacker does, special
formats and messages are usually correct.
– The best defense is to independently verify
everything before taking action on any request that
seems out of the ordinary.
– If the caller claims to be from IT, call IT on a separate
line and verify what the caller says.
– If the caller claims to be from your bank, call your
regular banker to verify what you are being told.
54
Hoaxes
• One type of suspicious email is the hoax. It warns of a virus or
other type of malware that will cause serious harm to your
computer such as wiping the hard drive. It is especially perfidious
because it usually comes from a well-meaning friend or relative
who has been duped by the hoax.
• Hoax emails generally have the following characteristics:
– They are sent by a friend or colleague.
– They warn of a “new” virus, malware or hazard.
– They claim that this new hazard damages your computer in some
catastrophic way, usually erasing the hard drive.
– The email claims that anti-virus programs are unable to detect it or have
been caught off guard by its appearance.
– It urges your to send this “warning” to everyone in your address list.
55
Problems Caused by Hoaxes
• The main problem caused by Hoaxes is that they overload
email systems with unnecessary traffic.
• In addition, those that follow the instructions in the Hoax
email wind up disabling their computers and must have them
repaired or reconfigured before they are usable again.
• As with other threats, Hoaxes have developed variations.
Some variants to watch out for are:
– The virus named in the hoax is the name of an actual virus.
However, the real virus acts differently than what the hoax
describes.
– The hoax will instruct recipients to delete an obscure system file
causing their computers to malfunction on the next boot-up.
56
How Can You Tell if it is a Hoax?
• How do you determine whether a message is
genuine or a hoax?
– Does the message have three or more of the
characteristics of a hoax?
– Remember that any links in the message are there to
convince you of its authenticity so don’t rely to them.
– Enter specific or unique terms from the message into an
Internet search engine and see if any references to hoaxes
come up.
– Call the Help Desk.
• It is a violation of CM-42 to re-transmit virus
hoaxes.
57
How Can You Tell
• You can check the following websites:
– http://home.mcafee.com/virusinfo/virus-hoaxes
– http://www.snopes.com/computer/virus/virus.asp
– http://antivirus.about.com/od/emailhoaxes/l/blenh
oax.htm
58
Dumpster Diving
• A hacker might learn information by:
- scouring trash for passwords written on scraps of paper
- reading documented computing procedures
- finding discarded hard drives, discs, or CDs
• Destroy all information in accordance with policy once it is no
longer needed.
• Contact your local computer supporter or the Help Desk for
assistance with properly erasing or destroying computer
media.
59
Physical Access to your Computer
• A hacker could access, remove, destroy,
or otherwise damage your computer.
• Prevention: Always use good physical
security measures to prevent theft or
damage to your computer.
– Lock your office when you leave for
lunch or breaks.
– Keep your laptop in the trunk of your
car, not on the seat.
60
Information Security Polices
• LSUHSC-NO has two information security policies. Employees
and Students should familiarize themselves with both of them.
– CM-42 - Information Technology (IT) Infrastructure
(http://www.lsuhsc.edu/administration/cm/cm-42.pdf)
– PM-36 Louisiana State University System Information Security
Plan (http://www.lsuhsc.edu/administration/pm/pm-36.pdf)
61
CM-42 Connected
• Applies to any person using, or
any device that Connects to the
LSUHSC IT Infrastructure.
• A device is considered Connected
to the LSUHSC IT Infrastructure if
it is plugged into a wired network
jack on campus, connects to the
LSUHSC wireless network on
campus, remotely connects to the
LSUHSC network via the Internet,
telephone connection, or other
remote mechanism.
• Examples of remotely
connecting include, but are
not limited to:
- using the remote.lsuhsc.edu
VPN “Network Connect”
option
- logging on to Citrix (DesktopNew or PSDesktop) on campus
- using a mobile device that is
on a cellular network and uses
ActiveSync to access email
(sometimes called “push”
email)
62
CM-42 Not Connected
• Methods of accessing the LSUHSC network that do
NOT meet the definition of Connected include, but
are not limited to:
– using the remote.lsuhsc.edu VPN with the “Web
Connect” option
– using Outlook Web Access (OWA) off campus
– logging on to Citrix (Desktop or PSDesktop) off
campus
63
CM-42 Acceptable Use
• End Users are accountable for any violations
associated with their user IDs.
• The IT infrastructure must only be used in the
furtherance of the user’s work as an employee or
student.
• All computer equipment purchased with LSUHSC
funds and the electronic data created by it are
LSUHSC property.
• End users are not allowed to store personal files
on LSUHSC equipment.
64
CM-42 Acceptable Use (cont.)
• End users must exhibit responsible behavior by
complying with:
-
All Federal and State laws
LSU rules and policies
Terms and computing contracts
Software licensing rules
• Proper authorization must be obtained from the
supervisor (if an employee) or dean (if a student):
-
to use LSU computing resources
before accessing or sharing data
65
CM-42 Illegal Use of the I.T.
Infrastructure
End Users shall NOT:
• Engage in any activity that jeopardizes the
availability, performance, integrity, or
security of the I.T. infrastructure.
• Use computing resources in a wasteful
manner.
• Use I.T. resources for personal gain or
commercial purposes not directly related
to their jobs.
• Use I.T. resources to store personal files.
66
CM-42 Illegal Use (cont.)
• Install, copy, or use any software in violation of
licensing agreements, copyrights, or contracts.
• Obtain or attempt to access the files or electronic
mail of others unless authorized by the owner.
• Harass, intimidate, or threaten others through
electronic messages.
• Construct a false communication that appears to be
from someone else.
• Use non-LSUHSC E-mail to conduct official LSUHSC
business unless authorized by the Chancellor.
67
CM-42 Illegal Use (cont.)
• Send or forward unsolicited E-mail to lists of
people unrelated to official business.
• Send, forward, or reply to E-mail chain
letters.
• “Reply to all” to mass E-mail mailings.
• Create or transmit any offensive, obscene, or
indecent images, data, or other material.
• Retransmit virus hoaxes.
68
Examples of Illegal Use
• Using “Napster” clones (Kazaa, Morpheus,
BitTorrent, etc.)
• Playing streaming audio or video that is not
work or school related.
• Operating a website on the LSUHSC network
for personal use or business use not related
to your job.
• Accessing of websites not related to your job
or your studies.
69
CM-42 Data
• Data is defined as any information residing on the University’s
IT Infrastructure or held on any other IT Infrastructure on
behalf of the University. These data includes files, documents,
messages in any format, including e-mail messages and posts
made on any Social Media site maintained by/for the
University.
• All University data created and/or maintained by a User are
also subject to this Policy, even if the data are created and/or
stored on the User’s own personal computer, smartphone, or
other personal device.
70
CM-42 Data (cont.)
• Courts have ruled that for purposes of e-discovery or
public records requests, whether the information
resides on the agency’s own devices or those of its
employees. LSUHSC bears the responsibility for
producing the information under penalty of law.
• Therefore, faculty, staff and students must
understand that there is no expectation of privacy
regarding LSUHSC Data, even if it resides on one’s
personally owned device.
71
PM-36
• PM-36 is the LSU System Information Security Plan.
• It classifies sensitive information into two categories:
– Protected Information
– Restricted Information
72
PM-36 Protected Information
• Protected Information includes, but is not limited to:
–
–
–
–
–
–
Employment records
Medical records (including research data)
Student records
Personal financial information (SSN’s, credit card numbers, etc.)
Trade secret information
Classified government information
73
PM-36 Restricted Information
• Restricted information is limited to a few individuals. It
includes but is not limited to:
–
–
–
–
Any information related to potential or actual litigation
Ongoing investigations
Psychotherapy notes
Disciplinary actions
74
PM-36 Contingency Plans
• All Protected and Restricted information must have a
contingency plan that covers the possible loss of the
information due to fire, equipment failure, data corruption,
weather, power failure, accidental erasure, etc.
- All data stored on LSUHSC servers are covered by the LSUHSC
Contingency Plan.
- Contingency plans for Protected and Restricted information
stored on workstations, laptops, external hard drives, flash
drives, etc. are the responsibility of the end user.
75
PM-36 Public Records
• Any email or other electronic file, produced in connection with
your employment or education at LSUHSC-NO that does not meet
the definition of protected or restricted information is considered
to be a public record under State law and must be made available
to any citizen within 72 hours of the request.
• For that reason, any email or other electronic file created or received
in connection with your work at LSUHSC-NO must be kept on LSUHSCNO servers so as to be available in the event of a public records
request.
• Any email or other electronic file created or received in connection
with your work at LSUHSC-NO that resides on your personal device
may need to be produced in order to satisfy a public records request.
76
Data Breaches
• A data breach occurs when sensitive information is accessed by
unauthorized persons.
• Federal and State laws require that persons whose personal,
financial, or health information is compromised by a data breach
must be notified that their information has been disclosed.
• Information that is encrypted is exempt from these notification
requirements.
• Data breaches can expose LSUHSC and its employees to civil and
criminal penalties.
• Civil monetary penalties for data breaches range from $100 to
$50,000 per record.
• Criminal penalties include imprisonment for up to ten years.
77
Examples of Data Breaches
• Lost or stolen laptops storing unencrypted PHI or student
data.
• Lost or stolen smart phones with email access.
• Lost or stolen USB “thumb” drives or portable hard drives
with unencrypted PHI or student data.
• Papers, handwritten notes, photographs, images, or other
documents with PHI not disposed of properly.
• CD, DVD, floppies, backup tapes with PHI that have not been
destroyed at end-of-life per University policy.
78
Breaches and Consequences
• On February 24, 2011, Massachusetts General Hospital
agreed in a settlement to pay $1,000,000.00 to the U.S.
government for violations involving the breach of 192 patient
records.
• On January 7, 2011 Tulane University announced that a
university owned laptop was stolen December 29, 2010 that
had a file containing private information of each person
employed at the university in the past year, according to
school officials.
– The computer had W-2 information, names, Social Security
numbers, addresses and salaries for every employee, including
student and part-time employees and anyone who received a
2010 W-2.
79
Breaches and Consequences (cont.)
- School officials said the laptop, used to process 2010 tax
records during the university's winter break, was not
encrypted and was in a briefcase in the locked automobile
of an employee who was out of town. It was stolen Dec. 29,
and school officials were notified the following day.
- The university sent letters to the more than 10,000 affected
individuals and offered them a full year of credit
monitoring.
80
Breaches and Consequences (cont.)
• In 2010, New York Presbyterian Hospital and
Columbia University Medical Center agreed to pay
$4.8 million in monetary payments to DHHS after a
faculty member exposed records of 6800 patients to
the Internet while operating a file server without
appropriate technical safeguards.
http://www.hhs.gov/news/press/2014pres/05/2014
0507b.html
81
Prevention is The BEST Approach
• Data breaches can be prevented by ensuring that the
appropriate safeguards are in place and followed. For
example:
– Adding extra security measures (e.g. password protection, encryption,
backups) to portable devices (laptop, smartphone, flash drive,
external hard drive).
– Taking precautions when protected information (health or financial
information) is stored on a local computer (e.g. locking computer,
encryption, backups).
– Taking precautions when protected information (health or financial
information) is sent to another location (e.g. encrypting data or
encrypting the transmission or use LSU Health FileS).
– Taking precautions when accessing protected information (employee,
student, health, financial, etc.) from a remote location.
82
When a Breach is Suspected
• When a breach occurs or is thought to have
occurred:
– Contact the Office of Compliance Programs
immediately:
• Phone – (504) 568-5135
• Anonymous Hotline – (504) 568-4347
• Email – [email protected]
83
Portable Devices
• Add extra security measures to prevent device
theft by:
− storing important data separately
− installing and maintaining anti-virus software
− activating the password protect feature on your device
(This is required if you connect to the LSUHSC network)
− encrypting sensitive files
− backing up your data
84
Portable Devices (cont.)
• Employees who use University owned portable
devices should:
− have a signed receipt on file with the department for
LSUHSC tagged equipment (especially laptops).
− be aware of requirements for reporting any theft of the
equipment.
− have any University owned tablets or smartphones
enrolled in the MDM system.
85
Data Hoarding
• With storage capacities allowing you to keep billions of
pages of information on something the size of a postage
stamp, there is a tendency to simply allow information to
accumulate like the stuff in the spare room of your home.
• This accumulation occurs whether the device is a
smartphone, laptop, or USB or portable hard drive.
86
Data Hoarding
• What happens when that device is lost or stolen?
If all that was on the device was your e-books or contact list
or a copy of your dissertation, then your biggest problem is
how to reconstruct the data.
• But what if those billions of pages of storage
contain patient information?
Now you are required to notify each of your patients that you
allowed their medical information to be breached. If 500 or
more patients are affected, you must also notify the news
media.
87
Don’t Be a Data Hoarder
• Review the data on your portable devices
periodically and remove anything that you don’t
need on a day-to-day basis.
• If there is a need to retain certain information even
though you are not using it frequently, back it up to
your O: drive.
• To secure information you retain on your portable
devices, use the precautions on the following slides:
88
Confidentiality/Safeguards
Extra precautions must be taken when protected
information (health or financial information) is stored
on a local computer:
• Data must be encrypted in case your laptop is lost or stolen
(contact your supporter for more information).
• Lock your computer if you leave your machine unattended.
• Written backup and disaster plans must be in place. LSUHSC
backs up all files on servers (O:, T:, U: and V: drives) daily.
89
Confidentiality/Safeguards (cont.)
Extra precautions must be taken when protected
information (health or financial information) is sent to
another location.
• Do not use any email system other than LSUHSC.EDU to send or
receive protected information. Email sites such as Yahoo or
Hotmail do not have the security features that the LSUHSC email
system has to protect sensitive information.
• Emails from one @LSUHSC.EDU email address to another are
protected by a variety of security measures and are considered
safe for protected and restricted information.
90
Confidentiality/Safeguards (cont.)
•
Do not automatically forward LSUHSC.EDU email to a non-LSU
email system. Email coming to your LSUHSC email box may
contain sensitive information. If it is automatically transferred
to a non-LSU email system that does not have the security
features to protect sensitive information, a data breach can
result.
•
Do not store files with protected or restricted information on
cloud services such as iCloud or Google Drive. They do not have
the security precautions that are in place on the LSUHSC
network. Using such sites increases the likelihood of a breach.
91
Confidentiality/Safeguards (cont.)
⁻ Many cloud service providers have facilities in different
countries. If the protected or restricted information on your
personal device is stored on a cloud server in another country,
it is no longer subject to the protections of U.S. law.
⁻ Be aware of any default settings on personally owned devices
that may automatically copy protected or restricted
information to a cloud drive.
92
Confidentiality/Safeguards (cont.)
• Do not use Web based file-sharing sites such as
YouSendit.Com, Sharefile.com or Doodle.com to transfer
protected or restricted information. These sites are not secure
and have been the source of data breaches. Instead use LSU
Health FileS.
• Do not use Internet file-sharing apps like BitTorrent to transfer
protected information. These applications are not secure and
have been the source of data breaches. Instead use LSU Health
FileS.
• The employee’s or student’s department will be held
responsible for any data breaches that occur and will bear the
expenses incurred in mitigating a breach.
93
Data Security When Traveling
• Extra precautions must be taken when accessing protected
information (employee, student, health, financial, etc.) from a
remote location.
- Make sure your connection is secure by using a VPN (Virtual Private
Network) or SSL (little lock icon at the bottom of your browser
screen).
- When accessing email or other files via the World Wide Web from
a computer at a hotel business center or conference:
• Don’t allow anyone to read your screen over your shoulder.
• Make sure any copies of such files are deleted from the Internet cache
on the computer before you leave. The following link has directions
for deleting the Internet cache: http://kb.iu.edu/data/ahic.html
- When working from home, ensure the computer you are using has
up-to-date anti-virus software and operating system patches.
94
Citrix
• An easy way to ensure that you do not leave any
sensitive data on a public computer is to use Citrix.
• It provides access to published Windows desktop
environments. These environments have preconfigured applications which may be run without
the need to install, configure or update applications
on your local workstations.
• Citrix can be accessed from the Internet and stores
information on your “O:” drive.
• Logon to LSU’s Remote Access Portal at link below
and select the Citrix Web Interface option.
https://remote.lsuhsc.edu/danana/auth/url_default/
welcome.cgi
95
Compromised Accounts
• Indications that your account has been
compromised include:
- a locked account
‐ a password that is no longer accepted
‐ missing data
‐ computer settings that have unexpectedly
changed
‐ transactions you did not authorize
• You should contact your computer supporter or
the Help Desk if you suspect that someone has
tampered with your account.
96
What Do I Do if I Think my Password Has
Been Compromised?
• Notify the Help Desk or your computer support
personnel.
• Change your password immediately (If you need
assistance changing your password, ask your
computer supporter or the Help Desk or go to
www.lsuhsc.edu/changepassword).
Remember:
You are responsible for all activities occurring
under your LSU login ID.
97
Incident Reporting
• Notify your local computer supporter or the
Help Desk if:
- You suspect your password has been
compromised.
- You suspect your files have been tampered
with.
- Your computer behaves abnormally.
- You suspect someone has obtained or is trying
to obtain unauthorized access.
- A device or media with protected or restricted
information has been lost or stolen.
- You have been called by someone claiming to
be a vendor.
98
Why Should I Take These Precautions if I
Only Use my PC for Reading Email?
• The REASON:
Hackers use a technique called “Escalating
Privilege” which enables them to turn ANY
user account into an administrator account
that gives them unrestricted access to our
network. All they need is an account to get past
the firewall.
99
Violations
• LSUHSC monitors network traffic.
• Violations of CM-42 or PM-36 will be reported to
the appropriate dean or vice-chancellor.
• Violating CM-42 or PM-36 will result in
disciplinary action up to and including loss of
network access, termination of employment,
expulsion and civil or criminal liability.
100
Any Questions?
We Are Here to Help!
Office of Compliance Programs
433 Bolivar St.
Suite 807
New Orleans, LA. 70112
568-5135
[email protected]
101