securing and protecting citizens' data
DESCRIPTION
Securing and Protecting Citizens' Data. J. Rick Mihalevich Dean of Information Technology Linn State Technical College [email protected] 573.897.5129 June 18, 2009. Securing and Protecting Citizen Data Goals. Provide awareness of the need - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/1.jpg)
J. Rick MihalevichDean of Information Technology
Linn State Technical [email protected]
573.897.5129June 18, 2009
![Page 2: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/2.jpg)
Provide awareness of the need Provide awareness of the major laws that
impact public entities Provide information on best practices,
technology, and trends Provide resources for further information
![Page 3: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/3.jpg)
Open Accessible Transparent Accountable
![Page 4: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/4.jpg)
LSTC currently utilizes XXXXXX to provide data XXXXXX processes which impacts approximately XXXXXX blocked attacks daily.
XXXXXXX manages a XXXX XXXX router at the gateway
LSTC utilizes XXXXXX Firewall The DMZ is attached to a XXXXXXX appliance. All packets are inspected by XXXXXX and XXXX
security software is used to protect against XXXXXX attacks.
![Page 5: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/5.jpg)
2006 26.5 million veterans was compromised when a laptop was stolen
2007 Inspector General for Tax Administration found 490 laptops containing sensitive taxpayer data had been lost or stolen
2006 Employee information at the department of agriculture was compromised by unauthorized access
Examples of Compromised Data
![Page 6: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/6.jpg)
FERPA: Family educational rights and privacy act
HIPAA: Health insurance portability and accountability act
GLB: Gramm-Leach-Bliley Act The Privacy Act E-government Act FISMA: The Federal Information Security
Management act
![Page 7: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/7.jpg)
Conclusion #1: LSTC Infrastructure◦ Security by Obscurity
Conclusion #2: Examples of Compromised Data◦ Employees may pose the greatest risk
Conclusion #3: Public Laws◦ Balance between openness and security
Public Trust Restricting access, in the name of security is no vise
![Page 8: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/8.jpg)
![Page 9: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/9.jpg)
Pass Phrase Thumb drive encryption Encryption of laptops Virtual Private Networks (VPN’s) Touchpad security Effective patch management
![Page 10: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/10.jpg)
Security officer Security by Obscurity Not using SSN Training and awareness Change passwords frequently (Strong) Don’t click on e-mail links
![Page 11: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/11.jpg)
![Page 12: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/12.jpg)
www.cybersecurity.mo.gov www.msisac.org Department of Homeland Security National Governors Association Center for
Best Practices National Association of Chief Information
Officers Governmental Accountability Office
![Page 13: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/13.jpg)
![Page 14: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/14.jpg)
![Page 15: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/15.jpg)
![Page 16: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/16.jpg)
![Page 17: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/17.jpg)
![Page 18: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/18.jpg)
Principles of openness, accuracy, transparency and accountability
How would you like your personal information handled fairly and lawfully process it process it only for limited, specifically stated purposes use the information in a way that is adequate, relevant and
not excessive use the information accurately keep the information on file no longer than absolutely
necessary process the information in accordance with your legal rights keep the information secure never transfer the information outside
![Page 19: Securing and Protecting Citizens' Data](https://reader035.vdocuments.mx/reader035/viewer/2022062309/56814c50550346895db962de/html5/thumbnails/19.jpg)
ethnic background political opinions religious beliefs health sexual life criminal history