04-IT Security Handbook
04-IT Security Handbook
Summary
Be aware
Implement that 80% of
measures to information
prevent leaks leaks is
when caused by
handling user error—
critical so always
information. be careful.
✔
Be careful and prevent data from being stolen, lost, or misplaced.
Implement measures to prevent leaks when handling critical information*.
Monitor critical information* when handling to prevent data from being stolen
or lost. 1
2. Do not use PCs for private purposes!
I am browsing my
What are you
friend’s website.
doing with the
PC?
I understand. I’m
Private use of a sorry. I will never
company PC is do it again.
prohibited. IT Network
Department logs the
history of PC
operations.
Summary
✔
Do not use PCs for private purposes!
Be aware that operation of the PC is logged.
2
3. Removing critical information is dangerous!
If it is Use the
Do not unavoidabl allowed
take out e, obtain device
critical approval only
informa- from your when
tion!* section transpor-
head! ting.
✔
Do not remove critical information* from company premises.
If it is unavoidable, obtain approval from your section head!
Use the allowed device only and take special care with portable data.
3
4. Be careful when storing critical information*
Summary
Store a Be aware
Store CDs laptop PC that
and USB carefully, informa-
memory for tion has
sticks* in example, value
a locked securing worth
cabinet. it with a stealing.
chain.
✔
Store CDs and USB memory sticks* containing critical information* in a locked cabinet.
Store a laptop PC carefully, for example, securing it with a chain.
Be aware that information has value worth stealing and selling, so handle it with care.
4
5. When a security-related accident occurs
Critical
information
Infec
ted b len
yav ked or sto
a
irus*
r ma tion le
Info
Summary
When a security-
related accident
Follow the
occurs, instructions
immediately from the
report it to the security
security administrator*.
administrator*!
✔
When a security-related accident occurs, immediately report it to the security administrator*!
5
6. A virus* is destructive!
It may be infected by a
computer virus*. Immediately
pull out the network* cable
(LAN cable) and turn off the PC.
Then, report it to the security
administrator!
Summary
Report the
Do not infection to
open Install
the
suspicious anti-
security
e-mail! virus*
administra-
software!
tor*.
✔
Do not open suspicious e-mail.
Anti-virus* software is installed on the PC you use.
Report the infection to the security administrator*.
6
7. Use PCs appropriately!
I want to I want to
install* this connect my
easy-to-use personal PC to
software. the company
network
because I am
familiar with it.
Summary
Do not Do not
install connect any
software on PC other
the than
company company-
PC without owned ones
permission. to the
company
network*.
✔
Do not install software on the company PC without permission.
Do not connect any PC other than company-owned ones to the company network*.
7
8. Check test
(3). Choose all the responses below that you should not do.
1. Browsing my friend’s website from the company PC
2. Opening suspicious e-mail
3. Installing* software without permission
4. Connecting your PC to the company network
1) Critical information
Technical, production or personal information that should be
protected. It is defined by each department/factory.
2) Computer virus/virus
A malicious program that may spread to other computers and
may disrupt the display on the screen, display meaningless
words, or destroy files stored in a disk.
3) USB memory stick
A portable data storage device that is inserted into the USB
port on a PC. Due to its compactness, it is often lost and
information leaks become a problem.
4) Zip
A special file compression algorithm with a unique password
for protecting files.
5) Hard disk
The typical storage units used to store data on a PC. An
external hard disk drive is available nowadays.
6) Security administrator
A person appointed in each region to be responsible for IT
security.
7) Network
A mechanism to connect multiple PCs, send/receive e-mail,
and share data. The Internet can be said to be a worldwide
network.
8) Install
Copying software specifically designed for PCs onto a PC.
9
Inquiry about IT security: