Laserfiche WebLink
10.4.3 Intrusion Detection <br />IT shall: <br />1.Implement network-based and/or host-based intrusion detection or prevention tools. <br />2.Maintain current intrusion detection or prevention signatures. <br />3.Monitor inbound and outbound communications for unusual or unauthorized <br />activities. <br />4.Send individual intrusion detection loqs to a central loqqinq facility where correlation <br />and analysis will be accomplished as a system wide intrusion detection effort. <br />5.Review intrusion detection or prevention loqs weekly or implement automated event <br />notification. <br />6.Employ automated tools to support near-real-time analysis of events in support of <br />detectinq system-level attacks. <br />(CJIS 5.9 §5.10.1.3) <br />10.4.4 Employee Accountability <br />All eeuntyCounty employees will practice safe computing by scanning removable media,not <br />knowingly introducing a virus,and not clicking on links or visiting non-trusted web pages.For <br />more safe computing practices,see KGIT User Wiki -Safe Computing Best Practices. <br />If a virus or malware infection is suspected,employees must notify IT and their DHIEO <br />immediately.IT may remove,disconnect from the network,or turn off any computer <br />suspected of being infected. <br />The employee may be responsible for payment of any expense incurred due to their <br />negligent or malicious use of eeuntyCounty technology at the actual rate of expense. <br />Outstanding debt may be recuperated through payroll deduction without the prior consent of <br />the employee. <br />10.5 Responsibilities <br />10.5.1 Employees <br />1.Not knowingly introduce a virus into Kittitas County computers or network. <br />2.Discontinue computer use and immediately contact IT if they suspect their <br />workstation has been infected by a virus or virus protection software is disabled or <br />suspected to be not up to date. <br />3.Not click on unknown links or visit non-trusted Web pages. <br />4.Be familiar with Technology Policy 6 -Personal Equipment. <br />10.5.2 IT <br />1.Install and maintain appropriate anti-virus software on all computers. <br />2.Respond appropriately to infections and intrusions.This may include a quarantine of <br />affected systems,destroying detected viruses,and repairing or destroying infected <br />files. <br />3.Install all security related software patches in a timely manner.This may include <br />integration testing. <br />45