Topic outline

  • General

    INTRODUCTION

    What is Information Security?  Why is it important?

    According to Wikipedia, information security is defined as "protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction".  Information security no longer belongs only to the Information Technology (IT)  It's everyone's responsibility and should be incorporated into each individual's daily routine. Simply put, a security aware organization is one in which every employee understands that the potential risks of someone to stealing, damaging, or misusing electronic data stored on computers throughout the organization.

    Adpated from Texas A&M University System Security Awareness Training

  • Topic 1

    USERNAMES AND PASSWORDS

    Usernames and passwords are probably the most common method of verifying an end-user’s identity. Just like the lock on your house, you want your password to be as strong as possible. A strong password means that it is difficult for someone else to guess. If someone knows your password, they can login to university systems to which you have access, login to your computer and view your files, read your e-mail, and respond to your e-mail as if they were you.  Any offenses committed with your login may be blamed on you.

  • Topic 2

    SAFELY USING THE WEB AND E-MAIL

    Many of us get caught up in the daily “routine” and are sometimes guilty of not paying attention to details. We may recognize the sender’s name on an e-mail message and assume that the message is legitimate. In some cases, the message really came from the sender, but the information may not be correct. In other cases, the sender’s name may have been forged by someone trying to trick us into revealing our passwords or banking information.

  • Topic 3

    PROTECTING YOUR COMPUTER

    As in most cases, the best defense is a good offense.  This theory especially applies to protecting your computer against malware such as viruses, worms, trojans, and spyware.  Other considerations include patching and updating your computer's operating system, physically securing your system, and backing it up on a regular basis.

  • Topic 4

    POLICIES IN THE WORKPLACE

    Most workplaces have information security policies that address such concerns as appropriate use of technology, confidentiality of information, and other local issues. These rules are in addition to federal and state laws that govern all institutions. This lesson outlines general policy issues that are common to many organizations.

  • Topic 5

    SECURITY AT HOME AND WHEN TRAVELING

    Security must be considered not only in the workplace but also when at home and traveling. In fact, it can be even more important since you may not have trusted IT professionals available to help and you may find yourself using public-access systems such as those at hotels and coffee shops. Outside of the workplace, be extra cautious when connecting to the Internet. Be certain that your computer is properly configured in a secure manner.