[BLUE TEAM PACKET] 2019 PALMETTO CYBER DEFENSE COMPETITION (PCDC) PALMETTO CYBER DEFENSE COLLEGE. Version 1.0

Size: px
Start display at page:

Download "[BLUE TEAM PACKET] 2019 PALMETTO CYBER DEFENSE COMPETITION (PCDC) PALMETTO CYBER DEFENSE COLLEGE. Version 1.0"

Transcription

1 [BLUE TEAM PACKET] 2019 PALMETTO CYBER DEFENSE COMPETITION (PCDC)

2 April 2019 Team, On behalf of everyone at the Palmetto Cyber Defense College (PCDC), I officially welcome you to the PCDC family! Our team of esteemed professors and faculty have updated the curriculum to keep us on track to becoming the new leader in cyber defense education. Over 50 students are currently enrolled in the spring semester. That is double the enrollment from the fall semester. Our goal is to reach at least 100 students enrolled in the fall semester by the end of the day! If we can meet this goal, PCDC will be eligible to apply for Center of Superiority status! Welcome to the Palmetto Cyber Defense College! Regards, Matthew Turner Dr. Matthew Turner President, Palmetto Cyber Defense College

3 April 2019 Team, Welcome to the Palmetto Cyber Defense College (PCDC)! We are excited that you have accepted our job offer and agreed upon your start date. While your new position reports to the Senior System Administration, Mr. Thomas Lewis, I d like to welcome you to the Information System Security department on behalf of all of the staff. As mentioned during the interviews, the previous team was recently terminated due to gross mismanagement of their assigned information system assets, as well as the data assets contained within. It is important to bring these assets up to date These assets are key to our successful operation, and any assets that remain in a compromised state will need to be remediated as soon as possible. Each of us will play a role to ensure your successful integration into the department. At the time specified by our physical security staff, you may enter the department s office area. This department serves the information technology (IT) needs for the entire college. Key IT services are Moodle, OrangeHR, and Zimbra . Our helpdesk services faculty, staff, and current and prospective students, as well as alumni. Dr. Turner, the College President, has set a college-wide goal to reach 100 enrolled students for the fall semester. Although enrollment does not typically fall within our department s scope, supporting enrollment will be made a priority for today. Attached please find some information about our network, school, and organization. If you have any questions, please contact Mr. Lewis. We look forward to having you come on board! Regards, Paula Diaz Ms. Paula Diaz Chief Information Systems Officer (CISO), Palmetto Cyber Defense College

4 TABLE OF CONTENTS 1.0 ACCOUNT INFORMATION Initial Password List Password Changes VoIP Authentication Access NETWORK OVERVIEW Alternative Laptop/VM Startup Instructions Backups and Recovery Active Defense Incident Reporting Other Requests TEAM ASSESSMENT Scoring Injects... 3 LIST OF APPENDICES Appendix A Network Diagram... A-1 Appendix B Password Tracker... B-1 Appendix C Organization Chart... C-1 Appendix D List of Professors... D-1 Appendix E List of Courses... E-1 Appendix F Enrollment Instructions... F-1

5 1.0 ACCOUNT INFORMATION 1.1 Initial Password List At the start of the day, your team will be supplied an envelope with your initial username and password information for all assigned assets. 1.2 Password Changes Changes of domain user accounts need to be reported to the Gold Team. Please coordinate with a call to lessen service check downtime. Failure to promptly report changes to domain user accounts can negatively impact service checks from the competition scoring engine. 1.3 VoIP Authentication Authenticated communications via voice-over-ip (VoIP) is vital to security of injects and avoiding spoofing attacks. Initial communications from the Blue Team to the Gold Team should be authenticated with the password included in Initial Password List. Best security practice suggests that Blue Team establish a new password for all subsequent communications. Similarly, other college employees will also be regularly contacting you and will authenticate themselves; expect them to also periodically change their passwords with you. The attached form in Appendix B is included to assist with tracking password changes Access You will access your via Zimbra through the following address: mail.bluexx.pcdc.local 2.0 NETWORK OVERVIEW Your assigned network consists of virtual machines that are accessed via the Chrome web browser installed on the provided laptops. Usernames and passwords for all assets will be provided in the Initial Password List. The network diagram is in Appendix A. Network Diagram. The Chrome web browser on the provided laptops should automatically go to the VMware vsphere server. Should the address not appear automatically, use the following address: Alternative Laptop/VM Startup Instructions 1. Turn on laptop 2. Click on Blue Team icon 3. You will see a privacy error screen; click on advanced 4. Click on proceed to 5. You will see the VMware vsphere screen; click on vsphere Web Client (flash) 1

6 6. Login to your Blue Team VM with credentials 2.2 Backups and Recovery Teams do not have access to create snapshots of VMs, nor to recover a VM from a snapshot. Snapshot and recovery requests can be submitted to Mr. Thomas Lewis, Senior System Administration, at Thomas.Lewis.IT@gold.pcdc.local using the following format: SUBJECT: Backup/Recovery Request BODY: Team #: Request: Justification: Please note that recovery from a snapshot comes with a substantial cost to the department. 2.3 Active Defense While this term is still being defined in industry (some say it includes offensive capabilities and others say it does not). We are referring to Defending Forward countering of preventing a perceived cyber-attack by taking the fight to your adversary with the goal of taking away their ability to perform offensive cyber operations against you. This is not permitted under any circumstances. Teams should keep their actions within their own assigned assets, unless explicitly permitted by Ms. Paula Diaz, Chief Information Systems Officer (CISO). 2.4 Incident Reporting Accurate incident reports that can be verified will net your team a modest amount of points in the end-of-day team assessment. Incident reports must contain a description of what occurred (including source and destination IP addresses, timelines of activity, passwords cracked, access obtained, damage done, etc), a discussion of what was affected, and a remediation plan. Overly inaccurate Incident Reports, especially abuse of Incident Reports, will net no points and may result in a loss of points. Hand written reports must be legible, coherent, and professional. Should you recognize that an incident has occurred, you may contact Ms. Carolyn Hayes, the Incident Response, at Carolyn.Hayes.it@gold.pcdc.local using the following format: SUBJECT: Incident Reporting BODY: Team #: Time(s) of Incident:

7 2.5 Other Requests Asset(s) Affected: Source (IP Address) of Attack: Description of Attack/Incident: Remediation/Plan to Resolve: There will be an online Help Desk Ticketing server provided for teams to request assistance from the Gold Team. Information will be provided on the day of the competition. The ticketing server can be reached at: TEAM ASSESSMENT Employee performance is assessed at the end of each day. A score is given to the team of employees in the same department. 3.1 Scoring Scoring for the Information System Security department is based on keeping required services up, controlling/preventing un-authorized access, and completing business tasks, a.k.a. injects, from colleagues, supervisors, and other departments throughout the day. Teams accumulate points by successfully completing these injects and maintaining services. Teams lose points by violating service level agreements, usage of recovery services, and successful penetrations by hackers, a.k.a. the red team. Any team action that interrupts the scoring system is exclusively the responsibility of that team and will result in a lower score. Any team member that modifies a competition system or system component, with or without intent, in order to mislead the scoring engine into assessing a system or service as operational, when in fact it is not, may be suspended or fired. Validation of this act will come with a significant points penalty as it gives the Blue Team an unfair points advantage for a service that is not actually up. 3.2 Injects If a business tasks, a.k.a. inject, requires multiple files for fulfillment, please compress the files into a single file in.zip format. This ensures that each inject has only one upload. Please name inject s/files in the following format: <teamnumber>_<injectnumber>_<injecttitle> Injects and services are weighted evenly; it is disadvantageous to ignore injects. There will be NO partial credit for late injects, so endeavor to fulfill injects on-time. Inject responses that are turned in on-time will be allowed at least partial credit.

8 APPENDIX A NETWORK DIAGRAM A-1

9 APPENDIX B PASSWORD TRACKER Username Password Account Description B-1

10 APPENDIX C ORGANIZATION CHART President Secretary to the President General Counsel Ombudsperson Senior Vice President, Finance and Business Chief Information Systems Officer (CISO) Vice President, Human Resources & Recruitment Vice President, Student Affairs Vice President, Education Office Manager Office Manager Office Manager Office Manager Office Manager Payroll Senior Security Officer HR Head of Financial Aid Dean, School of Information Technology Payroll Security Officer HR Financial Aid Dean, School of Defense Business Finance Incident Response Recruitment & Hiring Financial Aid Dean, School of Offense, Business Finance Senior System Administrator Recruitment & Hiring Head of Admissions Dean, School of Incident Response OS & Software Admissions Infrastructure Admissions Hardware Marketing Web Administrator Head of Enrollment Senior Helpdesk Registrar Helpdesk Registrar Helpdesk C-1

11 APPENDIX D LIST OF PROFESSORS Employee ID Name Prefix First Name Last Name Mr. Peter Washington peter.washington@gold.pcdc.local Mr. Douglas Flores douglas.flores@ gold.pcdc.local Ms. Andrea Garcia andrea.garcia@ gold.pcdc.local Mrs. Theresa Murphy theresa.murphy@gold.pcdc.local Mr. Harold Nelson harold.nelson@gold.pcdc.local Ms. Janet Henderson janet.henderson@gold.pcdc.local Mrs. Kelly Adams kelly.adams@gold.pcdc.local Mr. Gregory Edwards gregory.edwards@gold.pcdc.local Mrs. Debra Wood debra.wood@gold.pcdc.local Mr. Cayden Stewart cayden.stewart@gold.pcdc.local Mr. Benjamin Russell benjamin.russell@gold.pcdc.local Ms. Margaret Allen margaret.allen@gold.pcdc.local Mr. Carl Collins carl.collins@gold.pcdc.local Ms. Donna Brown donna.brown@gold.pcdc.local Mr. Roy Griffin roy.griffin@gold.pcdc.local Mrs. Dorothy Edwards dorothy.edwards@gold.pcdc.local Mr. Jose Hill jose.hill@gold.pcdc.local Mrs. Ann Coleman ann.coleman@gold.pcdc.local Mr. Phillip White phillip.white@gold.pcdc.local Ms. Diana Peterson diana.peterson@gold.pcdc.local Mr. Eugene Perez eugene.perez@gold.pcdc.local Mr. Daniel Cooper daniel.cooper@gold.pcdc.local Mrs. Keisha Brown keisha.brown@gold.pcdc.local Ms. Tammy Young tammy.young@gold.pcdc.local Dr. Steven Phillips steven.phillips@gold.pcdc.local Dr. Sharon Lopez sharon.lopez@gold.pcdc.local Dr. Ryan Alexander ryan.alexander@gold.pcdc.local Dr. Beatrice Lee beatrice.lee@gold.pcdc.local Dr. Joe Robinson joe.robinson@gold.pcdc.local Dr. Ernest Washington ernest.washington@gold.pcdc.local Dr. Melissa King melissa.king@gold.pcdc.local Dr. Fatima Davis fatima.davis@gold.pcdc.local Dr. Paul Cooper paul.cooper@gold.pcdc.local Dr. Brittney Russell brittney.russell@gold.pcdc.local D-1

12 APPENDIX E LIST OF COURSES Course ID Course Name Course Availability CSWF-1101 Networking Fundamentals 1 Fall Semester CSWF-1102 Introduction to Cryptography Fall Semester CSWF-1103 Programming 101 Fall Semester CSWF-1104 Databases and SQL Fall Semester CSWF-1201 Networking Fundamentals 2 Spring Semester CSWF-1202 Advanced Cryptography Spring Semester CSWF-1203 Advanced Programming Spring Semester CSWF-1204 Data Science Spring Semester CSWF-2101 Web Development and Coding Fall Semester CSWF-2102 Internet of Things (IoT) Fall Semester CSWF-2103 Mobile Communications Fall Semester CSWF-2104 Introduction to Robotics Fall Semester CSWF-2201 Artificial Intelligence Spring Semester CSWF-2202 Cloud Concepts and Security Spring Semester CSWF-2203 Introduction to SCADA Systems Spring Semester CSWF-2204 Health Informatics Spring Semester CSWF-3101 Security and Risk Management Fall Semester CSWF-3102 Asset Security Fall Semester CSWF-3103 Security Architecture and Engineering Fall Semester CSWF-3104 Communication and Network Security Fall Semester CSWF-3201 Identity and Access Management Spring Semester CSWF-3202 Security Assessment and Testing Spring Semester CSWF-3203 Security Operations Spring Semester CSWF-3204 Software Development Security Spring Semester CSWF-4101 Analyze Fall Semester CSWF-4102 Collect and Operate Fall Semester CSWF-4103 Investigate Fall Semester CSWF-4104 Operate and Maintain Fall Semester CSWF-4105 Oversee and Govern Fall Semester CSWF-4106 Protect and Defend Fall Semester CSWF-4107 Securely Provision Fall Semester CSWF-4201 Cybersecurity Capstone Project Spring Semester E-1

13 APPENDIX F ENROLLMENT INSTRUCTIONS Enrollment: Throughout the day you will need to enroll students into the Palmetto Cyber Defense College. Students will enroll through your web application, the admissions office, or via phone. The web application can be found at It is hosted on a Tomcat server on your Ubuntu box. Students are not officially enrolled into the college until they have been added to your Moodle instance. The Moodle instance can be accessed remotely via You can enroll students individually or many at a time from a.csv file. 1. MOODLE a. Homepage is book marked Moodle on Google Chrome. URL : i. Login information 1. Admin 2. P@$$w0rd b. How to Bulk Upload Users : Admin Dashboard > Site administration > Users > Accounts > Upload users > select.csv file of students > Upload Users > Username template must be %f%l > upload users. i. The csv file must have the following header row for the upload to work correctly. firstname,lastname, ,age,gender,satscore

14 c. How to Add Singe User : Admin Dashboard > Site administration > Users > Accounts > Add a new user > Fill out required fields. 2. Tomcat d. How to find User Account information : Admin Dashboard > Users > Select user. i. You can upload Users form this page as well. 3. a. Home Page URL of site hosted on Tomcat i.

15 b. FTP server VSFTPD is installed i. Login Information 1. Username : ftpuser 2. Password : ftpuser ii. Windows 7, OrangeHRM server has Filezilla FTP client installed on it. 4. Only in the event of total system failure can you can enroll students manually via telephone. Phone numbers will be distributed day of the competition. 5. Additional Trusted accounts will be distributed on day of competition. a. Users must use their unique PCDC account to authenticate themselves to IT staff. New passwords will be sent to users via their .

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

NATIONAL CYBER DEFENSE COMPETITION. Competition Rules

NATIONAL CYBER DEFENSE COMPETITION. Competition Rules NATIONAL CYBER DEFENSE COMPETITION Competition Rules IOWA STATE UNIVERSITY, INFORMATION ASSURANCE CENTER SPRING 2013 Definitions CDC Cyber Defense Competition ISEAGE Internet Scale Event Attack Generation

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES ACCESS MANAGEMENT Policy UT Health San Antonio shall adopt access management processes to ensure that access to Information Resources is restricted to authorized users with minimal access rights necessary

More information

2015 Security Dawgs Cyber Defense Competition

2015 Security Dawgs Cyber Defense Competition Page 1 2015 Security Dawgs Cyber Defense Competition Team Packet April 18th, 2015 Page 2 Contents Security Dawgs CDC Mission and Objectives 3 Overview 3 Competition Goals 3 Competition Team Definitions

More information

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES

INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES INFORMATION TECHNOLOGY DATA MANAGEMENT PROCEDURES AND GOVERNANCE STRUCTURE BALL STATE UNIVERSITY OFFICE OF INFORMATION SECURITY SERVICES 1. INTRODUCTION If you are responsible for maintaining or using

More information

Wixie Implementation. Tech4Learning, Inc

Wixie Implementation. Tech4Learning, Inc Wixie Implementation Tech4Learning, Inc Guide Wixie Implementation Guide 2 This guide is designed to help you get Wixie up and running in preparation for teachers and students using it in classrooms or

More information

The College of William & Mary. Digital Measures ActivityInsight. W&M Administrator User s Guide

The College of William & Mary. Digital Measures ActivityInsight. W&M Administrator User s Guide The College of William & Mary Digital Measures ActivityInsight W&M Administrator User s Guide The information contained in this guide is meant to supplement the DMS online Resource Center. DM implementation

More information

POLICIES AND PROCEDURES

POLICIES AND PROCEDURES Integrated Information Technology Services POLICIES AND PROCEDURES Utica College Email POLICY: Email is Utica College s sole accepted mechanism for official electronic communication in the normal conduct

More information

Computer Networking Technologies and Information Assurance & Cybersecurity

Computer Networking Technologies and Information Assurance & Cybersecurity Computer Networking Technologies and Information Assurance & Cybersecurity Admissions Information Application Materials Students wanting to apply for a degree seeking program at the College of Eastern

More information

Common Syllabus revised

Common Syllabus revised Department of Information Sciences and Technology Volgenau School of Engineering IT 369 Data and Application Security Common revised 08.23.2018 This syllabus contains information common to all sections

More information

Secure Systems Administration and Engineering

Secure Systems Administration and Engineering Secure Systems Administration and Engineering Program Information The job outlook for careers in Cybersecurity and Information Technology continues to be very strong. Many experts predict a continued shortage

More information

Texas A&M University: Learning Management System General & Application Controls Review

Texas A&M University: Learning Management System General & Application Controls Review Overall Conclusion Overall, the controls established over the primary learning management system at Texas A&M University, Blackboard Learn (ecampus), are effective in providing reasonable assurance that

More information

UNIT ONE. Introduction to CyberPatriot and Cybersecurity. AIR FORCE ASSOCIATION S CYBERPATRIOT

UNIT ONE. Introduction to CyberPatriot and Cybersecurity.  AIR FORCE ASSOCIATION S CYBERPATRIOT AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT ONE Introduction to CyberPatriot and Cybersecurity www.uscyberpatriot.org Learning Objectives Participants will gain an

More information

Cyber Security Guide. For Politicians and Political Parties

Cyber Security Guide. For Politicians and Political Parties Cyber Security Guide For Politicians and Political Parties Indian Election Integrity Initiative Design by ccm.design Cover Image by Paul Dufour Helping to Safeguard the Integrity of the Electoral Process

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

umapps Using umapps 6/13/2018 Brought to you by: umtech & The Center for Teaching & Learning

umapps Using umapps 6/13/2018 Brought to you by: umtech & The Center for Teaching & Learning umapps Using umapps Center for Teaching and Learning (CTL) 100 Administration Bldg., Memphis, TN 38152 Phone: 901.678.8888 Email: itstrainers@memphis.edu Center for Teaching and Learning Website 6/13/2018

More information

The College of Saint Rose

The College of Saint Rose The College of Saint Rose Online Resources for CITE Students Student ID and PIN Number What is my Saint Rose Student ID used for? Your Student ID is your unique identification number that links all of

More information

PeopleAdmin 7 User s Guide. Applicant Tracking System - Faculty Positions -

PeopleAdmin 7 User s Guide. Applicant Tracking System - Faculty Positions - PeopleAdmin 7 User s Guide Applicant Tracking System - Faculty Positions - - Table of Contents Introduction... Getting Started... User Roles Logging Into Your Account Home Page Posting a Position... Creating

More information

Course Scheduling System User s Guide

Course Scheduling System User s Guide 29 March 2003 Document: Course Scheduling System Randy Jackson, Project Leader CSCI 680 Team Course Scheduling System Contents CONTENTS...I REVISION SHEET...II REVIEW HISTORY...II 1. INTRODUCTION... 1

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

Vice President for Information Technology Status and Activity Report for April 2019

Vice President for Information Technology Status and Activity Report for April 2019 Vice President for Information Technology Status and Activity Report for April 2019 Prepared by Timothy M. Chester, Vice President for Information Technology (VPIT) 1. Items Requiring Action Verify and

More information

Degree Conferral Application Instructions For Students

Degree Conferral Application Instructions For Students Degree Conferral Application Instructions For Students Students should meet with their advisor to verify their eligibility for degree conferral either in the Fall semester or early in the Spring semester

More information

An Overview of Mobile Security

An Overview of Mobile Security An Overview of Mobile Security Dr. Fan Wu Professor, Department of Computer Science, College of Business and Information Science (CBIS) Director, Center of Information Assurance Education (CIAE) Interim

More information

IT150 - IT Systems Security +

IT150 - IT Systems Security + IT150 - IT Systems Security + Document Type: Proposal Type: Requester(s): College: Origination Approved: District Master Course Outline Revision Robert A Bunge North 04/11/2017-11:28 AM BASIC INFORMATION

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY October 25, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Cyber Hygiene Guide. Politicians and Political Parties

Cyber Hygiene Guide. Politicians and Political Parties Cyber Hygiene Guide Politicians and Political Parties Canadian Election Integrity Initiative Design by ccm.design Cover Image by Songquan Deng Helping to Safeguard the Integrity of the Electoral Process

More information

Red Flags Program. Purpose

Red Flags Program. Purpose Red Flags Program Purpose The purpose of this Red Flags Rules Program is to document the protocol adopted by the University of Memphis in compliance with the Red Flags Rules. Many offices at the University

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017

UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 UNIVERSITY OF MASSACHUSETTS AMHERST INFORMATION SECURITY POLICY September 20, 2017 I. Introduction Institutional information, research data, and information technology (IT) resources are critical assets

More information

Data Breach Preparedness & Response

Data Breach Preparedness & Response Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication

More information

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

POLICY 8200 NETWORK SECURITY

POLICY 8200 NETWORK SECURITY POLICY 8200 NETWORK SECURITY Policy Category: Information Technology Area of Administrative Responsibility: Information Technology Services Board of Trustees Approval Date: April 17, 2018 Effective Date:

More information

The CISO is the owner of the vulnerability management process. This person designs the process and ensures is implemented as designed.

The CISO is the owner of the vulnerability management process. This person designs the process and ensures is implemented as designed. University of Alabama at Birmingham VULNERABILITY MANAGEMENT RULE May 19, 2017 Related Policies, Procedures, and Resources Data Protection and Security Policy Data Classification Rule 1.0 Introduction

More information

NORTHEAST STATE COMMUNITY COLLEGE WEB STANDARDS, POLICIES, AND GUIDELINES

NORTHEAST STATE COMMUNITY COLLEGE WEB STANDARDS, POLICIES, AND GUIDELINES NORTHEAST STATE COMMUNITY COLLEGE WEB STANDARDS, POLICIES, AND GUIDELINES A. Roles of Web-enabled Technology Support of Northeast State s Vision, Mission, and Guiding Beliefs Northeast State Community

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure:

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure: This document is scheduled to be published in the Federal Register on 07/12/2017 and available online at https://federalregister.gov/d/2017-14553, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Revision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents

Revision History Revision (Rev) Date of Rev Owner Summary of Changes Section I. (alpha); Incident Closure Canceling Incidents University of Central Florida Information Technology (UCF IT) Title: Effective: 12/15/2016 UCF IT Incident Management Policy & Procedure Revised: 07/13/2018 Approved By: Michael Sink, Associate VP & COO,

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Institution Guide and Application Checklist

Institution Guide and Application Checklist Department of Defense (DoD) Voluntary Education Partnership Memorandum of Understanding (MOU) November 5, 05 Institution Guide and Application Checklist General Information Welcome The Under Secretary

More information

Post-Secondary Institution Data-Security Overview and Requirements

Post-Secondary Institution Data-Security Overview and Requirements Post-Secondary Institution Data-Security Overview and Tiina K.O. Rodrigue, EdDc, CISSP, CISM, PMP, CSM, CEA, ITIL, ISC2 Compliance Mapper, A+ Senior Advisor Cybersecurity - 2017 Agenda Who needs to worry

More information

Canvas Tutorial. How to use Canvas for self-scheduled online exams

Canvas Tutorial. How to use Canvas for self-scheduled online exams Canvas Tutorial How to use Canvas for self-scheduled online exams The Download Process Canvas login page: http://canvas.northwestern.edu/ Login to Canvas using your NetID and password 2 Find Law School

More information

The fast track to top skills and top jobs in cyber. Guaranteed.

The fast track to top skills and top jobs in cyber. Guaranteed. The fast track to top skills and top jobs in cyber. Guaranteed. NO COST TO SELECTED PARTICIPANTS WELCOME The SANS Institute is presenting the SANS CyberTalent Immersion Academy for Women to encourage women

More information

CYBER RISK MANAGEMENT

CYBER RISK MANAGEMENT CYBER RISK MANAGEMENT AND BEST PRACTICES Heather Fields, JD, CHC, CCEP (414) 298-8166 hfields@reinhartlaw.com 1000 North Water Street, Suite 1700, Milwaukee, WI 53202 www.reinhartlaw.com 0 Agenda Role

More information

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions

NISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce

More information

Virtual Desktop Infrastructure Setup for Windows 7

Virtual Desktop Infrastructure Setup for Windows 7 Virtual Desktop Infrastructure Setup for Windows 7 Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer or

More information

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

The SANS Institute Top 20 Critical Security Controls. Compliance Guide The SANS Institute Top 20 Critical Security Controls Compliance Guide February 2014 The Need for a Risk-Based Approach A common factor across many recent security breaches is that the targeted enterprise

More information

NERC Staff Organization Chart

NERC Staff Organization Chart NERC Staff Organization Chart President and CEO Administrative Associate Director to the Office of the CEO Associate Director, Member Relations and MRC Secretary Senior Vice President and Chief Reliability

More information

SMARTEVALS (FCE) DEAN/DEPT HEAD RESULTS GUIDE

SMARTEVALS (FCE) DEAN/DEPT HEAD RESULTS GUIDE FCE Results Semester FCE results are calculated and released a few days after the final grade deadline ensuring that all participating campuses have submitted final grades. Results are sent via email to

More information

International Application Service AGENT PORTAL USERS GUIDE

International Application Service AGENT PORTAL USERS GUIDE International Application Service AGENT PORTAL USERS GUIDE Table of Contents Gaining Access to the Agent Portal... 4 Register your Account... 4 Log in to the Agent Portal... 6 Change my password... 7 Reset

More information

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO A New Cyber Defense Management Regulation Ophir Zilbiger, CRISC, CISSP SECOZ CEO Personal Background IT and Internet professional (since 1992) PwC (1999-2003) Global SME for Network Director Information

More information

PTLGateway Data Breach Policy

PTLGateway Data Breach Policy 1 PTLGateway Data Breach Policy Last Updated Date: 02 March 2018 Data Breach Policy This page informs you of our policy which is to establish the goals and the vision for the breach response process. This

More information

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03 AUDIT REPORT Network Assessment Audit Audit Opinion: Needs Improvement Date: December 15, 2014 Report Number: 2014-IT-03 Table of Contents: Page Executive Summary Background 1 Audit Objectives and Scope

More information

OA Cyber Security Plan FY 2018 (Abridged)

OA Cyber Security Plan FY 2018 (Abridged) OA Cyber Security Plan FY 2018 (Abridged) 1 Table of Contents Vision... 3 Goals, Strategies, and Tactics... 5 Goal #1: Create a Culture that Fosters the Adoption of Cyber Security Best Practices... 5 1.1

More information

Virtual Desktop Infrastructure Setup for Windows 10

Virtual Desktop Infrastructure Setup for Windows 10 Virtual Desktop Infrastructure Setup for Windows 10 Virtual Desktop Infrastructure (VDI) allows you to connect to a virtual computer and use software that you don t have installed on your own computer

More information

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre

More information

THE CARE AND FEEDING OF IOWA STATE NET-IDS Published by Information Technology Services Handout GGS 317 February 2008

THE CARE AND FEEDING OF IOWA STATE NET-IDS Published by Information Technology Services Handout GGS 317 February 2008 THE CARE AND FEEDING OF IOWA STATE NET-IDS Published by Information Technology Services Handout GGS 317 February 2008 1 What is a Net-ID? A Network ID (or Net-ID) is the username that allows access to

More information

Student Self Service User's Guide

Student Self Service User's Guide Student Self Service User's Guide Table of Contents Helpful Hints... P 1 Accessing Self Service... P 2 Student Center... P 3 MAP (My Academic Plan)... P 4 Degree Map... P 6 Eligibility to Register... P

More information

How to Register as an Employer on Handshake:

How to Register as an Employer on Handshake: TSU Career & Professional Development Center Handshake Employer Instructions: Registration & Posting a Position The Career & Professional Development Center uses a new dynamic recruitment platform known

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Requirements Specification

Requirements Specification Redesign of the Software Engineering Site (R.O.S.E.S.) Requested by: Dr. Timoth Lederman Professor Department of Computer Science Siena College Delivered By: Prepared By: Kurt Greiner Daniel Rotondo Ryan

More information

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER 1 INCIDENT RESPONDER'S FIELD GUIDE TABLE OF CONTENTS 03 Introduction

More information

Back To School Packet Directions California Managed Schools

Back To School Packet Directions California Managed Schools Back-to-School Packet Directions for Families What is the Back to School Packet? It is an online form completed annually at the start of each school year. The state of California requires the school to

More information

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning

Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning 2017 California Higher Education Collaborative Conference Making YOUR Organization More Efficient and Effective Through Business Continuity / Continuity of Operations Planning Introductions Rick Blackburn,

More information

Security of Information Technology Resources IT-12

Security of Information Technology Resources IT-12 Security of Information Technology Resources About This Policy Effective Dates: 11-28-2007 Last Updated: 10-23-2017 Responsible University Administrator: Office of the Vice President for Information Technology

More information

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every

More information

New Hire Technology Checklist & Tips

New Hire Technology Checklist & Tips New Hire Technology Checklist & Tips As a new employee of the Framingham Public School District you have been given access to systems and technology services needed to perform the duties and responsibilities

More information

Quick-Guide WaveNet Update: Staff View

Quick-Guide WaveNet Update: Staff View Purpose: 1. Introduce the WaveNet portal features for the Staff view. 2. Illustrate and describe the Staff Home page, Staff Services, Staff Resources, Computer & other key IT links. # Illustration: Description:

More information

6. To view a listing of Frequently Asked Questions, information on. 7. When completing the online application, you have the option to

6. To view a listing of Frequently Asked Questions, information on. 7. When completing the online application, you have the option to Application Instructions External (Non-Employee) Applicants Note: Current FSU Employees MUST USE OMNI Self Service > Recruiting Activities > Careers, to apply for FSU jobs. Refer to the Job Aid for Internal

More information

Incident Training Guide

Incident Training Guide Incident Training Guide Using the Main Application V1.4 (Non WHS Unit User) WHS Version Control Document Title: Incident Training Guide using the Main Application Document Issue: Version 1.4 Date Issued:

More information

Course Lecturer Application Process

Course Lecturer Application Process Course Lecturer Application Process All course postings for McGill University s School of Continuing Studies will be posted at the following website: https://cce.mcgill.ca/postings. Please note that applying

More information

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018 DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL June 14, 2018 A. Overriding Objective 1.1 This Directive establishes the rules and instructions for Bank Personnel with respect to Information

More information

Version 1.26 Installation Guide for SaaS Uila Deployment

Version 1.26 Installation Guide for SaaS Uila Deployment Version 1.26 Installation Guide for SaaS Uila Deployment Table of Contents Introduction... 2 Scope and Purpose... 2 Architecture Overview... 2 Virtual Architecture... 2 Getting Started... 3 System Requirements...

More information

RiskSense Attack Surface Validation for IoT Systems

RiskSense Attack Surface Validation for IoT Systems RiskSense Attack Surface Validation for IoT Systems 2018 RiskSense, Inc. Surfacing Double Exposure Risks Changing Times and Assessment Focus Our view of security assessments has changed. There is diminishing

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

Student Guide INTRODUCTION TO ONLINE RESOURCES

Student Guide INTRODUCTION TO ONLINE RESOURCES Student Guide INTRODUCTION TO ONLINE RESOURCES Date: 08. June. 2017 By: Technical Support Team STUDENT GUIDE southwales.unicaf.org 1)Introduction...4 2)Student Panel (SIS)...4 2.1)Student Panel (SIS) Login...4

More information

Data Security and Privacy at Handshake

Data Security and Privacy at Handshake Data Security and Privacy at Handshake Introduction 3 A Culture of Security 3 Employee Background Checks 3 Dedicated Security and Privacy Teams 3 Ongoing Team Training 4 Compliance 4 FERPA 4 GDPR 4 Security

More information

Glossary of Technology Terms

Glossary of Technology Terms Glossary of Technology Terms 1 Acceptable Use Agreement (AUA) An acceptable use agreement (AUA) is a document that outlines a set of rules to be followed by users or customers of a set of computing resources,

More information

Networking Technology

Networking Technology Associate in Applied Science Networking Fundamentals Diploma Cisco Networking Certificate Network Security Certificate Networking Technology IT Support Certificate Advanced IT Support Certificate Information

More information

NERC Staff Organization Chart Budget 2018

NERC Staff Organization Chart Budget 2018 NERC Staff Organization Chart Budget 2018 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

NERC Staff Organization Chart Budget 2019

NERC Staff Organization Chart Budget 2019 NERC Staff Organization Chart Budget 2019 President and CEO Associate Director to the Office of the CEO Senior Vice President and Chief Reliability Senior Vice President, General Counsel and Corporate

More information

Student Guide. By UNICAF University

Student Guide. By UNICAF University vnhgfj Student Guide By UNICAF University 1 2 Table of Contents 1) Introduction... 5 2) Student Panel (SIS)... 5 2.1) Student Panel (SIS) Login... 5 2.1.1) Definitions... 5 2.1.2) Registration Email...

More information

1. Federation Participant Information DRAFT

1. Federation Participant Information DRAFT INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES [NOTE: This document should be considered a as MIT is still in the process of spinning up its participation in InCommon.] Participation in InCommon

More information

NYDFS Cybersecurity Regulations

NYDFS Cybersecurity Regulations SPEAKERS NYDFS Cybersecurity Regulations Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 lsotto@hunton.com www.huntonprivacyblog.com March 9, 2017 The Privacy Team at Hunton & Williams Over 30 privacy

More information

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk

A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk SESSION ID: GRC-T10 A Comedy of Errors: Assessing and Managing the Human Element of Cyber Risk R Jason Straight Sr. VP, Chief Privacy Officer UnitedLex Corp. Has anyone seen this man? 2 3 4 We re getting

More information

The Widening Talent Gap: The greatest security challenge of our time

The Widening Talent Gap: The greatest security challenge of our time INFORMATION SECURITY The Widening Talent Gap: The greatest security challenge of our time Presented by: Experis Information Security Practice Thursday, April 14, 2016 General Information Share the webinar

More information

WHITE PAPER- Managed Services Security Practices

WHITE PAPER- Managed Services Security Practices WHITE PAPER- Managed Services Security Practices The information security practices outlined below provide standards expected of each staff member, consultant, or customer staff member granted access to

More information

Comodo IT and Security Manager Software Version 6.6

Comodo IT and Security Manager Software Version 6.6 Comodo IT and Security Manager Software Version 6.6 End User Guide Guide Version 6.6.053117 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding

More information

Discovery Education. Single Sign On. LDAP with Active Directory. (Lightweight Directory Access Protocol)

Discovery Education. Single Sign On. LDAP with Active Directory. (Lightweight Directory Access Protocol) Discovery Education Single Sign On LDAP with Active Directory (Lightweight Directory Access Protocol) Overview Discovery Education offers the ability to integrate with a district s Active Directory (AD)

More information

Gulf College Oman Tel.: / Fax: Web Site:

Gulf College Oman Tel.: / Fax: Web Site: Gulf College Oman Tel.: 24468666/ Fax: 24468666 Email: gulfclge@omantel.net.om Web Site: www.gulfcollege.edu.om INTRODUCTION IET Centre staff are responsible for supervising and following up college labs.

More information

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 rat Comodo EDR Software Version 1.7 Administrator Guide Guide Version 1.1.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1 Introduction to Comodo EDR...3 1.1 Purchase

More information

Academic Program Review Cyber Security College of Southern Nevada 2017

Academic Program Review Cyber Security College of Southern Nevada 2017 Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

STRATEGIC PLAN

STRATEGIC PLAN STRATEGIC PLAN 2013-2018 In an era of growing demand for IT services, it is imperative that strong guiding principles are followed that will allow for the fulfillment of the Division of Information Technology

More information

Foundation Programme. Applicant

Foundation Programme. Applicant Foundation Programme Applicant User Guide Oriel is an online system designed to manage specialty recruitment and forms part of the Intrepid HR software suite used to administer training, education and

More information

Guide to SciVal Experts

Guide to SciVal Experts Guide to SciVal Experts Contents What is SciVal Experts and How Can I Benefit From It?....... 3 How is My Profile Created?... 4 The SciVal Experts Interface.... 5-6 Organization Home Page Unit Individual

More information