Welcome To Cybersecurity Annual User Awareness Refresher Training
Welcome To Cybersecurity Annual User Awareness Refresher Training
Cybersecurity is the practice of protecting computer systems and networks including the data the from:
• 1Lost
• 2Disclosed
• 3Modified
4
Battelle’s CyberSecurity Protection Program within our Information Management department is
chartered with protecting Battelle's:
• Information5
• Systems6
• Computers7
• Networks8
9
Technology alone cannot provided adequate protection.
10
Information Technology systems and data compromises are at an all time high, due to:
• 11
Increasing use of computers and the Internet
• 12
More prevalent “Zero Day10” exploits
• 13
Advanced sophistication and resources of hackers (e.g. organized crime, nation states)
14
Battelle is specifically targeted because we are a major government contractor.
18
Be Smart, Safe, and Secure, because this is our Battelle.
In this section, you will learn about Battelle’s principles and techniques of information
protection. You will also learn about removable media storage guidelines, sensitive
information categories and reporting requirements.
All staff members should apply the Principle of Least Privilege when granting access to sensitive information.
All staff members should apply the Principle of Least Privilege when granting access to sensitive information.
Battelle staff members and contractors may have camera enabled devices in their possession in general access areas at all Battelle locations.
Use of a camera enabled device must be consistent with Battelle Policy 1.4 and staff and contractors are responsible to ensure:
1
• The proper usage of the device and approved areas for use are understood
2
• 3
The area around the camera field of view is visually checked to ensure no Business Sensitive, Strictly Private, proprietary, or
otherwise client related material is in the background of the shot
• The pictures are not posted on any external social networking sites
4
Battelle staff members and contractors may have camera enabled devices in their possession in general access areas at all Battelle locations.
Use of a camera enabled device must be consistent with Battelle Policy 1.4 and staff and contractors are responsible to ensure:
1
• The proper usage of the device and approved areas for use are understood
2
• 3
The area around the camera field of view is visually checked to ensure no Business Sensitive, Strictly Private, proprietary, or
otherwise client related material is in the background of the shot
• The pictures are not posted on any external social networking sites
4
Thumb Drives
CD’s/DVD’s
Diskettes External Hard Drives Backup Tapes MP3 Players
Be extremely careful when using removable media to transport sensitive information outside of Battelle.
Do so only if you must have it for work at home or while on travell.9
Take only the minimum information needed.10
When disposing of the device, return it to Battelle for proper disposal or sanitizing. Caution! Simply deleting the information does not
remove it. Rather, the device must be sanitized by overwriting a number of times. Contact the IM Service Desk for assistance in
sanitizing devices.11
Maintain positive control of the device at all times.12
If any device containing Battelle or client sensitive information is lost or stolen, it must be reported immediately to the IM Service Desk.
13
NEVER remove Government Classified or Government Sensitive information from Battelle on a laptop or a removable storage device.
Government Classified
Top Secret, Secret, Confidential, and other categories of government classified information
require specialized security measures and are not approved for storage in IM systems, e-mail
servers, file servers, SharePoint sites, or PC hard drives.
Contact Battelle Government Security or your local Facility Security Officer with questions
concerning safeguards for classified information or to report the loss, compromise, or suspected
compromise of classified information. The proper reporting telephone numbers can be found on
the CyberSecurity Contact List.
Metadata Removal3
Encrypting Sensitive Information4
Secure File Transfer5
Compliance Data6
Click on each Technique for more information.
*Metadata is the term describing embedded hidden data within Microsoft Office products
Iron Key is
the preferred
thumb drive
Battelle staff
should use.
Thumb Drives
Hard Drives CD/DVD Western Digital
Passports
Metadata Removal
Metadata is embedded hidden data, for example, review comments, un-resolved tracked changes
(added and deleted text), author’s names, and more. It is Battelle’s best practice not to share or
transmit Microsoft Office Word, Excel, or PowerPoint files to non Battelle entities or individuals
without first removing all potentially embarrassing or damaging Metadata unless the external users
need to see the metadata (e.g., Tracked Changes and Comments for collaboration reasons).
Failure to remove certain types of metadata could be embarrassing, or worse yet, damaging to
Battelle.
Refer to the CyberSecurity web page for more information on tools to remove meta-data.
Exercise caution when sending sensitive information outside of Battelle via the Internet. It is
especially dangerous to include sensitive information in e-mail messages, because e-mail may be
stored in unencrypted form on multiple e-mail servers outside of Battelle.
Information Management has implemented an encrypted Secure File Transfer application (FX) to
securely transmit large data files over the Internet.
Commercial encryption software is available for hard drives, folders, or individual files. Contact IM
for recommendations.
If dealiCompliance Datang with credit card (PCI) or Personally Identifiable Information (PII), please see Information
Management to ensure standards are followed.
Note: Both types of data need to be protected and requires Information Management to be notified to ensure
compliance and appropriate controls are in place to protect the information.
The following methods are used to safeguard your PC at Battelle. Click each method for more information.
6
Passwords
Virus Protection
Baseline Software
Backup of Computing devices
Sanitization
Screen Saver
Principle
Password Sharing— Personal network passwords and SecurID Personal Identification Numbers
(PINs) are for use by the assigned staff member only. Sharing personal passwords or PINs with
anyone, including family, friends, contractors, or other Battelle staff, is prohibited.
Password Storage and Handling— Passwords and PINs should be memorized. If a written
password is necessary, it must be carried on the staff member's person or kept in locked storage.
Passwords and PINs must not be kept with or attached to the device (PC, laptop, token, etc.).
Change Passwords Frequently— Network passwords must be changed at least every six months.
Virus Protection
Virus protection is critical for network defense. Current virus pattern files are required on all
computing devices connected to the Battelle network, including both business and home computing
devices. Battelle provides Trend Micro OfficeScan virus protection software for all Battelle users.
Staff members who access the Battelle network from home for work are licensed to use OfficeScan.
Baseline Software
All staff members are required to maintain baseline software on all Battelle PCs connected to the
Battelle network, and are further required to install patches distributed by IM within the specified
timeframe. Computing devices that cannot meet these requirements because of project or
engineering constraints must be reviewed and approved by IM. The IT Asset Manager (ITAM) must
approve any non-baseline software. IM maintains a list of software already approved by the ITAM
as well as software that has been prohibited by the ITAM.
For more information, see the Desktop Baseline Software web site in the CyberSecurity Contacts
List.
Screen Saver
Password protected auto-locking or screen savers are required on all computing devices that
contain Battelle information, including BlackBerry devices and PDAs, and must be set to activate
after 10 minutes of inactivity. This is automatically set for PCs on the Battelle network.
When you step away from your PC, you must manually lock your PC by pressing either the Window
and L key together, or the control-alt-delete keys and clicking Lock Computer.
• Intellectual property
1
• Product information
2
• Proposal Information
3
2 4
1
1
The following are guidelines that will help you identify suspicious e-mail and attachments
• 2
Be extremely cautious of e-mail from a sender you do not recognize; however, sender addresses are easily faked, so knowledge of the sender
is no guarantee that the e-mail is safe.
• Exercise caution if an e-mail contains an attachment you were not anticipating. Many attachments which look safe, for example, Microsoft Word
files, are often infected. If you feel you need the attachment for Battelle business, contact the sender via phone if possible to confirm that the
attachment is legitimate. Replying to the e-mail may cause more spam to be generated to their account.
• Microsoft and other software vendors never distribute software updates via e-mail. If you receive an e-mail claiming to have software updates, it
is almost certainly infected. DO NOT OPEN IT. Report it immediately to the IM Service Desk.
• Electronic greeting cards or postcards frequently contain dangerous software and should be deleted immediately.
• Do not click on hotlinks in e-mail messages. Hotlinks in e-mail text are often spoofed, leading to attacks.
• E-mail is neither secure nor confidential. Exercise caution when sending sensitive information outside of Battelle via e-mail. Use Battelle's FX
(Secure File Transfer) utility to transmit sensitive information. See the IM website for instructions.
• E-mail that is threatening in nature must be reported to Security Operations or Battelle IM Service Desk.
2
1
Road Apple
A road apple is a real-world variation of a Trojan Horse that uses physical media and relies on the curiosity of the victim.
The attacker leaves a malware infected floppy disc, CD ROM or thumb drive in a location sure to be found (bathroom,
elevator, sidewalk), gives it a legitimate looking and curiosity piquing label - and simply waits.
In some cases, hackers have mailed official looking CDs or thumb drives to users. These are often imprinted with the
logo of clients or business partners. When the user inserts the CD or thumb drive into the PC, infected files are secretly
installed. These files can infect other PCs and servers on the network, and can lead to serious compromises of
information.
For information regarding travel outside of the country, please see the Travel website.
Review the chart below for more information regarding roles and responsibilities. Select each role to see the responsibility assigned.
Managers Ensuring Cybersecurity policies and procedures are implemented and enforced.
Information Owners Protecting the integrity, confidentiality, and accessibility of the information
commensurate with the damage that could occur if the information is
compromised. (examples, Project Leaders, SharePoint Admins, Web Masters,
etc.)
Information Management Configuration control, management oversight, and security of firewalls and
networks, and providing guidance to staff on cybersecurity issues.
Fact
2
If you’re not sure about cybersecurity polices and procedure or are in need of assistance, 3click on the link below to save the pdf
document to your desktop.
Fact