You are here. | |||||||||||||||||||||||||
COMPUTER SECURITY DAY | |||||||||||||||||||||||||
November 30, 2007 is COMPUTER SECURITY DAY! | |||||||||||||||||||||||||
HOW?. WHO?. WHEN?. WHAT?. WHY?. WHERE?. SITE MAP. ACSD HOME. Links to other sites |
|||||||||||||||||||||||||
How can I get ideas for my organization to participate in Computer Security Day ? Answer: Visit http://clubs.yahoo.com/clubs/computersecurityday |
|||||||||||||||||||||||||
How does one participate in COMPUTER SECURITY DAY? | |||||||||||||||||||||||||
* * * * * 50 Ways to Participate in Computer Security Day * * * * *. (en francais, click ici) 1. Display computer security posters. 2. Present computer security briefings. 3. Change your password. Cambie su contrasena. Modifier votre mot de passe. 4. Check for computer viruses. 5. Show computer security videos, films or slides. 6. Protect against static electricity. 7. Modify the logon message on your computer system to notify users that Computer Security Day is November 30. 8. Vacuum your computer and the immediate area. 9. Consider cleaning the heads on your older model disk drives or other magnetic media drives. 10. Back-up your data. (after being certain that it is virus-free.) 11. Delete unneeded files. 12. Initiate a computer security poster design contest for next year. 13. Demonstrate computer security software. 14. Publicize existing computer security policy. 15. Issue new and improved computer security policy. 16. Declare an amnesty day for computer security violators who wish to reform. 17. Announce COMPUTER SECURITY DAY in your internal newsletter. 18. Examine the audit files on your computers. 19. Verify that the "Welcome" message that is normally used on your computer is appropriate for your organization. 20. Write-protect all diskettes that are not to be written to. 21. Take the write-protect rings out of the tapes in your library. 22. Verify your inventory of computer applications. 23. Verify your inventory of computer utilities and packaged software. 24. Verify your inventory of computer hardware. 25. Verifier votre inventaire de reseau (LAN, WAN, etc...) 26. Install and inspect power surge protection as appropriate. 27. Install fire/smoke detection and suppression equipment in computer areas. 28. Eliminate dust from computer areas, including chalk dust. 29. Provide dust and water covers for personal and larger computers. 30. Post "No Drinking" and "No Smoking" signs in computer areas. 31. Develop a recovery plan for all computer systems that require one. 32. Verify that passwords are not "Posted" and all other keys are secured. 33. Verify that backup power and air conditioning fit your needs. 34. Have a mini training session to provide all computer users with a basic understanding of computer security. 35. Verify that all source code is protected from unauthorized changes. 36. Verify that each computer has trouble log and that it is being used. 37. Verify that appropriate off site storage exists and is being used. 38. Remove all unnecessary items such as extra supplies, coat racks, and printouts from the computer room. 39. Select a computer system on which to perform a risk analysis. 40. Begin planning for next year's COMPUTER SECURITY DAY. 41. Change the FORMAT command in DOS to avoid accidental FORMATing. 42. Protect the computer on your store-and-forward phone message system. 43. Hold a discussion of ethics with computer users. 44. Volunteer to speak about computer security at a local computer club. 45. Collect Computer Security Day memorabilia to trade with others. 46. Register and pay for all commercial software that is used on your computer. 47. Register and pay for all shareware that you use regularly. 48. Install all security-related updates to your computer's operating system. 49. Help a computer novice backup their files. 50. Protect all cabin computers from floating droplets of liquid. 51. Plan to attend a computer security meeting or seminar. 52. Consider the privacy aspect of the data on your computer and protect it. 53. Update your anti-virus and firewall programs. 54. Use fingerprint biometrics to replace passwords for greater security. 55. Send us (The ASCD) an item to add to this list. 56. Obtain an approved degausser.. 57. Obtain approved data overwriting software. ASSOCIATION for COMPUTER SECURITY DAY (ACSD); P.O. Box 39110; Washington, DC 20016 U.S.A. email: Computer_Security_Day@ACM.ORG |
|||||||||||||||||||||||||
How did the ACM student chapter at Sheperd College observe Computer Security Day in 1999? click on "ACM student chapter" for answer. | |||||||||||||||||||||||||
This page hosted by | |||||||||||||||||||||||||
E-mail us at Computer_Security_Day@ACM.ORG Please come back soon and visit us. |
|||||||||||||||||||||||||