Viewable by the world
Group Access to Cyber Security Website
Can VIEW the space: all-lbnl-users ,  anonymous , 
Can EDIT the space:
Can ADMINISTER the space:

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Computer Protection Program mission is to enable Berkeley Lab’s scientific mission by providing a secure yet open environment for Laboratory information and information systems. Our services include vulnerability scanning and remediation, intrusion detection, incident response, cyber security reviews, consultation and training.

 

Warning

Linux Local Privilege Escalation (zero-day vulnerability), more details are here

Section
Column
width

...

50%

...

Image Added FAQs

  1. Contact Us

...

My computer:

  1. ?
  2. Can't get online? Check

...

  1. onestop.lbl.gov

...

Suspicious Email:

Targeted phishing?

  1. sent to you in the context of your affiliation with Berkeley Lab, UCB, UC, or DOE
  2. forward the email to [email protected] as an attachment (how to)

Standard phishing or spam? 

  1. Gmail interface: select message & press "Spam" button

  2. Email application (e.g. Thunderbird): move message to Gmail/Spam label

  3. Other: forward the email to [email protected] as at attachment (how to)

Generally suspicious, want a human to give an opinion?

  1. forward the email to [email protected] as an attachment (how to)

 

Latest News

  1. Linux Local Privilege Escalation (zero-day vulnerability)

  2. Sophos problem affecting the Lab
  3. Flashback malware affecting the Lab
  4. Vulnerable Browser Plugins
  5. Securing Home Computers
  6. Network Usage Policy
  7. Recent Targeted Phishing Attacks
  8. Computer Security Annual Refresher Training Available
  9. PII Search Tool
  10. Mac OS X Security Recommendations

more

Column
width5%
 

...

width40%

Services

  1. One Time Passwords (OTP)
  2. LBNL Central Syslog Server (Intranet)
  3. Preventing Off-site Blocks

more

Training

  1. SPAM? Report SPAM
  2. Email targeted to your UC/LBNL/DOE role?
    Forward to [email protected]


Image Added Training

The Cyber Security group sets cyber security training requirements, which are tracked through the JHA system.

Column
width50%

Image Added Resources

Need help protecting your computer or server? Need a password manager? View our list of Cyber Security Resources.

Lost/stolen computer, phone or tablet? Report here



Image Added Requirements

The Security for Information Technology policy requires employees and affiliates to comply with our Cyber Security Requirements.


Pop away

  1. SEC 0201 Computer Security
  2. SEC 0220 Privacy, HIPPA, & PII
  3. PII Certification : Security 0221 (SEC0221)

more

Security Requirements

  1. Minimum Security Requirements
  2. Regulations & Procedures Manual (RPM)
  3. External and Outsourced Information Systems
  4. Passwords

more

Contact Us

For security issues, contact CPP at [email protected] (Emergency or after hours? Page (510) 486-7770)

For common issues, e.g. blocked computers, contact the Help Desk.

more

...