My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2021-04-26-minutes-it-study-session
>
Meetings
>
2021
>
05. May
>
2021-05-04 10:00 AM - Commissioners' Agenda
>
2021-04-26-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/29/2021 12:56:13 PM
Creation date
4/29/2021 12:54:27 PM
Metadata
Fields
Template:
Meeting
Date
5/4/2021
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
a
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
75943
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
74
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
Technology Policy 10 -Viruses and Malware <br />10.Viruses and Malware <br />10.1 Summary <br />Each e_County employee plays a critical role in keeping the eeuntyCounty's information <br />secure.Viruses and malware represent a major threat to that security.Stop.Think.Connect. <br />10.2 References <br />1.KGIT Security Presentation <br />2.KGIT User Wiki -Safe Computing Best Practices <br />10.3 Definitions <br />10.3.1 Computer viruses and malware <br />Programs designed with the malicious intent to infiltrate and/or damage records or a <br />computer system without the owner's informed consent. <br />10.4 Policy <br />10.4.1 Malicious Code Protection <br />IT shall implement malicious code protection that includes automatic updates for all systems <br />with Internet access.Systems not connected to the Internet shall be kept current with <br />malicious code protection updates (i.e.most recent update available).(CJIS 5.9 §5.10.4.2) <br />IT shall employ virus protection mechanisms to detect and eradicate malicious code (e.g. <br />viruses,worms,Tro an horses)at critical points throuqhout the network and on all <br />workstations,servers,and mobile computinq devices on the network.(CJIS 5.9 §5.10.4.2) <br />10.4.2 Spam and Spyware Protection <br />IT shall implement spam and spyware protection,and shall: <br />1.Employ spam protection mechanisms at critical information system entry points (e.q. <br />firewalls,electronic mail servers,remote-access servers). <br />2.Employ spyware protection at workstations,servers,and mobile computinq devices <br />on the network. <br />3.Use the spam and spyware protection mechanisms to detect and take appropriate <br />action on unsolicited messaqes and spywareladware,respectively,transported by <br />electronic mail,electronic mail attachments,Internet accesses,removable media <br />(e.q.diskettes or compact disks)or other removable media as defined in this Policy. <br />(CJIS 5.9 §5.10.4.3) <br />44
The URL can be used to link to this page
Your browser does not support the video tag.