DCE101: Cybersecurity and Data Protection at U-M

Welcome to Cybersecurity and Data Protection at U-M

In this course you will learn about:

Let's get started.

Protecting university data is a shared responsibility

The University of Michigan has a multi-faceted mission to "serve the people of Michigan and the world" and to develop "leaders and citizens who will challenge the present and enrich the future." This mission is powered by an ever-expanding information technology ecosystem, which is increasingly under attack.

You work with data as part of your job. This means you share in the responsibility of safeguarding the university's digital resources, as well as the privacy of others.

You could encounter sensitive university data when you:

Protecting university data is a daily shared responsibility. Fortunately, across U-M there are resources, tools, and processes to help you handle U-M data appropriately and securely - like this course!

Sensitive Data at U-M

U-M has four data classification levels that help determine the level of protection needed to access and work with sensitive data.

Knowledge Check

Question: What type of classified data includes protected health information, Social Security Numbers, and student loan applications?

Answer: The correct answer is High.

Each type of institutional data requires varying security measures. The university has policies, standards, and data protection programs that define the safeguards to be used, including the actions you should take.

You can protect the university in your daily work

As a member of the U-M Community, you have an explicit responsibility to protect the university's data and digital resources. The following guidance can help you fulfill this responsibility:

After your completion of this course is recorded in My LINC, you will be emailed links to important resources.

Knowledge Check

Question: What resource should you consult before storing or working with sensitive data on a system or service?

Answer: The correct answer is the Sensitive Data Guide.

Question: To whom do you send an email to report a security incident?

Answer: The correct answer is security@umich.edu.

Way to go! Now you are familiar with the classification levels for institutional data, along with important practices for safeguarding it.

Next, let's dive into how to stay safe online and protect your devices.

Stay safe online

You may not think that your U-M account is a target for threat actors, but it is! Your university login credentials provide access to important university services and assets, such as:

It's important to learn how to keep yourself, and the information you work with, safe online. This includes being aware of the tactics threat actors use, and knowing how to avoid getting tricked.

Beware of phishing and scams

Threat actors seek to profit from U-M digital resources, disrupt university operations, and cause reputational damage to the institution. They invent increasingly sophisticated ways to steal valuable assets like passwords, sensitive personal information, and even research data.

How do threat actors try to trick you?

Threat actors often use psychological persuasion or tricks to lure you into sharing sensitive information, downloading malicious software, allowing remote access to your device, or sending money. Scams are designed to manipulate your emotions and take advantage of how busy you are, so you will be caught off guard.

Common scam tactics

Examples of common scams tactics include:

Common scam examples

Scammers regularly send phishing emails to target faculty, staff, and students at universities, including the University of Michigan. You can look up recent Phishes and Scams on the Safe Computing website. Examples and tips to avoid them include:

Report phishing and scams

If you receive a suspicious email, text, or voice message, send the entire message, or a description of the message, to ReportPhish@umich.edu. When you report phishing, you help ITS Information Assurance update anti-phishing defenses, including threat intelligence, to protect others at the university.

Next, let's look at some best practices for protecting your devices and accounts.

Best practices to protect yourself and the U

Now that you have a better understanding of the manipulative tactics used by threat actors, be sure to follow these best practices when working with data at U-M:

Test Your Knowledge

Question: What should you avoid downloading if you use a personal device to do some of your work?

Answer: The correct answer is institutional data.

Question: Do not allow a third party, other than a known U-M IT support provider, to do what to your U-M device?

Answer: The correct answer is to have remote access.

Let's look at more ways you can protect your devices and accounts.

Protect your devices and accounts

Disclosure of sensitive information is often unintentional. Data breaches are caused by common mistakes, such as lost portable devices or stolen login credentials. Therefore, putting best practices in place and maintaining them is an important part of protecting devices and accounts.

What can I do?

Securing devices and accounts means more than just keeping them in a safe place. Best practices for protecting your devices and accounts include:

Stay up to date on best practices

See Secure Your Devices on the Safe Computing website for a complete list of best practices for keeping your devices and accounts secure.

Test Your Knowledge

Question: What should you use if you are accessing sensitive data while working off campus?

Answer: The correct answer is the U-M VPN.

Question: Which two of the following are best practices when protecting your devices and accounts at U-M?

Answer: The correct answers are to set software and browsers to automatically update and keep backups for individual workstations.

Report IT security incidents

All users of university IT resources must report all suspected or actual IT security incidents, regardless of severity, to security@umich.edu.

An IT security incident is attempted or actual:

Examples include:

You're almost done! Next is the course summary.

Course summary

You should know how to:

Now it's time to review a summary of your data protection responsibilities.

Understanding Your Data Protection Responsibilities

As a member of the U-M community, you work with important digital resources and have a shared responsibility for ensuring the security, integrity, and confidentiality of university data.

Here is a summary of your data protection responsibilities that are a key part of your job at U-M:

By completing this training course and the following assessment, I attest that "I understand my responsibilities for protecting university data."

Assessment

Next up is a ten-question assessment. You need to score 80% to pass. You may retake it as many times as you need. Note that course completions for the accessible assessment are recorded in My LINC on a weekly basis. If you receive an automated My LINC email within the week reminding you to complete the training, you may disregard the notice. After your completion is recorded in my LINC, you will receive an email containing links to the resources mentioned in this course (plus a few more!), so that you can bookmark them for future reference.

Take the course assessment now.

Please fill out a short course evaluation to tell us about your experience with this eLearning course.