SlideShare ist ein Scribd-Unternehmen logo
1 von 8
OUTSIDE OF THE OFFICE   Threats from
                        the outside
BE AWARE

 We have covered many ways that you might be targeted while
  using your computer. However, there are other ways hackers
  may target T VA when you are out of the of fice. One example,
  given in the last session, was baiting. More methods than
  baiting threaten employees:
   Tailgating
   Shoulder Surfing
   Theft
TAILGATING AND SHOULDER SURFING

 Tailgating: when someone unknown enters through security by
  following someone else with a badge through the doors.
 Shoulder Surfing: When others look over your shoulder to see
  private information
AWARENESS CONTINUED

 You must be aware of your surroundings not only when you are
  traveling, but when you are at your of fice as well.
 Travel
     Be aware of shoulder surfing
     Use secure networks
     Keep private information secure
     Strong password
 Of fice
   Strong password
   Be aware of tailgating
   Keep identification on person
TRAVEL

 When traveling unsecure networks can leak information to
  prying eyes
   Always use your VPN (provided by TVA) when accessing the internet
    away from the office
   The VPN (virtual private network) encrypts your identification so
    prying eyes cannot decipher what your activities are
   If you are very worried about others looking at your screen you can
    always purchase a mirror for your laptop so you can see what people
    are doing behind you
AT THE OFFICE

 When leaving your of fice ALWAYS lock your computer (CTRL +
  ALT + DELETE)
 Never leave private information out in the open
 Do not keep lists of usernames and passwords
 Always keep your ID badge on you
 Keep your laptop locked into the dock if it is not being used
 Never leave your T VA credit card unattended
 Never leave your VPN tokens unattended
PASSWORD

 Password strength is vital for you security
   Must be at LEAST eight characters
   Do NOT use the same password at TVA for other programs (personal
    e-mail, ebay, amazon, ect…)
   Password must contain at least one lower case letter, upper case
    letter, number, and symbol (@#$%&!?)
   Try to use words that are not easily guessable
   Enter passwords quickly so shoulder surfing individuals cannot figure
    them out
   Never share your password with anyone
   Change your password regularly
LEAVING WORK

 When leaving work keep your laptop in a secure knapsack
 Do NOT leave your laptop in out in your car
 The trunk is also not safe. Thieves will first look in the trunk
  for valuables
 If you must leave your laptop in the car keep it in a locked
  container. This will assist in preventing theft

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (11)

Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Phishing
PhishingPhishing
Phishing
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Sniffer
SnifferSniffer
Sniffer
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Ähnlich wie Day 3

Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World CupLookout
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Data theft
Data theftData theft
Data theftLaura
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingTim McAlpine
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Securityselcukca84
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter Cyber Security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is DangerousGihan Dias
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdfData Hops
 
Zcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security TipsZcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security TipsJohn Tshinseki
 

Ähnlich wie Day 3 (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Data theft
Data theftData theft
Data theft
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money Thing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 
Zcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security TipsZcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security Tips
 

Kürzlich hochgeladen

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Day 3

  • 1. OUTSIDE OF THE OFFICE Threats from the outside
  • 2. BE AWARE  We have covered many ways that you might be targeted while using your computer. However, there are other ways hackers may target T VA when you are out of the of fice. One example, given in the last session, was baiting. More methods than baiting threaten employees:  Tailgating  Shoulder Surfing  Theft
  • 3. TAILGATING AND SHOULDER SURFING  Tailgating: when someone unknown enters through security by following someone else with a badge through the doors.  Shoulder Surfing: When others look over your shoulder to see private information
  • 4. AWARENESS CONTINUED  You must be aware of your surroundings not only when you are traveling, but when you are at your of fice as well.  Travel  Be aware of shoulder surfing  Use secure networks  Keep private information secure  Strong password  Of fice  Strong password  Be aware of tailgating  Keep identification on person
  • 5. TRAVEL  When traveling unsecure networks can leak information to prying eyes  Always use your VPN (provided by TVA) when accessing the internet away from the office  The VPN (virtual private network) encrypts your identification so prying eyes cannot decipher what your activities are  If you are very worried about others looking at your screen you can always purchase a mirror for your laptop so you can see what people are doing behind you
  • 6. AT THE OFFICE  When leaving your of fice ALWAYS lock your computer (CTRL + ALT + DELETE)  Never leave private information out in the open  Do not keep lists of usernames and passwords  Always keep your ID badge on you  Keep your laptop locked into the dock if it is not being used  Never leave your T VA credit card unattended  Never leave your VPN tokens unattended
  • 7. PASSWORD  Password strength is vital for you security  Must be at LEAST eight characters  Do NOT use the same password at TVA for other programs (personal e-mail, ebay, amazon, ect…)  Password must contain at least one lower case letter, upper case letter, number, and symbol (@#$%&!?)  Try to use words that are not easily guessable  Enter passwords quickly so shoulder surfing individuals cannot figure them out  Never share your password with anyone  Change your password regularly
  • 8. LEAVING WORK  When leaving work keep your laptop in a secure knapsack  Do NOT leave your laptop in out in your car  The trunk is also not safe. Thieves will first look in the trunk for valuables  If you must leave your laptop in the car keep it in a locked container. This will assist in preventing theft