My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2021-04-26-minutes-it-study-session
>
Meetings
>
2021
>
05. May
>
2021-05-04 10:00 AM - Commissioners' Agenda
>
2021-04-26-minutes-it-study-session
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
4/29/2021 12:56:13 PM
Creation date
4/29/2021 12:54:27 PM
Metadata
Fields
Template:
Meeting
Date
5/4/2021
Meeting title
Commissioners' Agenda
Location
Commissioners' Auditorium
Address
205 West 5th Room 109 - Ellensburg
Meeting type
Regular
Meeting document type
Supporting documentation
Supplemental fields
Alpha Order
a
Item
Approve Minutes
Order
1
Placement
Consent Agenda
Row ID
75943
Type
Minutes
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
74
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
10.4.3 Intrusion Detection <br />IT shall: <br />1.Implement network-based and/or host-based intrusion detection or prevention tools. <br />2.Maintain current intrusion detection or prevention signatures. <br />3.Monitor inbound and outbound communications for unusual or unauthorized <br />activities. <br />4.Send individual intrusion detection loqs to a central loqqinq facility where correlation <br />and analysis will be accomplished as a system wide intrusion detection effort. <br />5.Review intrusion detection or prevention loqs weekly or implement automated event <br />notification. <br />6.Employ automated tools to support near-real-time analysis of events in support of <br />detectinq system-level attacks. <br />(CJIS 5.9 §5.10.1.3) <br />10.4.4 Employee Accountability <br />All eeuntyCounty employees will practice safe computing by scanning removable media,not <br />knowingly introducing a virus,and not clicking on links or visiting non-trusted web pages.For <br />more safe computing practices,see KGIT User Wiki -Safe Computing Best Practices. <br />If a virus or malware infection is suspected,employees must notify IT and their DHIEO <br />immediately.IT may remove,disconnect from the network,or turn off any computer <br />suspected of being infected. <br />The employee may be responsible for payment of any expense incurred due to their <br />negligent or malicious use of eeuntyCounty technology at the actual rate of expense. <br />Outstanding debt may be recuperated through payroll deduction without the prior consent of <br />the employee. <br />10.5 Responsibilities <br />10.5.1 Employees <br />1.Not knowingly introduce a virus into Kittitas County computers or network. <br />2.Discontinue computer use and immediately contact IT if they suspect their <br />workstation has been infected by a virus or virus protection software is disabled or <br />suspected to be not up to date. <br />3.Not click on unknown links or visit non-trusted Web pages. <br />4.Be familiar with Technology Policy 6 -Personal Equipment. <br />10.5.2 IT <br />1.Install and maintain appropriate anti-virus software on all computers. <br />2.Respond appropriately to infections and intrusions.This may include a quarantine of <br />affected systems,destroying detected viruses,and repairing or destroying infected <br />files. <br />3.Install all security related software patches in a timely manner.This may include <br />integration testing. <br />45
The URL can be used to link to this page
Your browser does not support the video tag.