SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Information Security Training
User Awareness and Practices
Ismail Oduoye CISA,CISSP
September 2019
Learning Objectives
01
02
03
IT Security Fundamental
Provide background knowledge
on Information Security
Introduction
Need for IT Security Awareness
Training
UC IT Risk Road Map
What we have achieved
04
05
06
Cyber-attack
Discussion of various cyber-
attack methods
Social Engineering
Discussion of the various types
of Social Engineering Attack.
IT Security Tips
General tips for prevention of
Cyber-attack.
Introduction
1 2
5
3
4
What Are User Personal
Responsibilities?
 Report security violations
 Develop “end-of-day” security procedures
 To be discussed extensively under IT Security Tips
What Is IT Security
Awareness?
Who Is Responsible for
IT Security?
Who Must
Have
Security
Awareness
Training?
Everyone who uses a computer needs to
know how to keep his or her computer
and data secure to ensure a safe working
environment.
 Without training, employees could be
making serious mistakes, especially in
the realm of security.
 Security training allows organizations to
influence behavior, mitigate risk, and
ensure compliance.
 Develop a security-focused culture
 Protect Asset
All employees who use
information technology or have
access to areas where information
resources reside.
It means understanding various information
technology threats that exist in one's computing
environment and taking reasonable steps to
guard against them.
Importance of Information
Security Awareness
IT Security Fundamental
Definition of Terms
Core Objectives of
Information
Security(CIA)
What is Information Security
 Vulnerability
 Threat
 Threat Agent
 IT Risk
 IT Risk Management
 Information security is the
practice of protecting
information by mitigating
information risks. It is part
of information risk
management.
 It is not something you
buy, it is something you
do. It’s a process not a
product.
 Confidentiality
 Integrity
 Availability
IT Risk Road Map
Implementation of Controls
 4th Generation Firewall
 Macfee Antivrus
 Macfee DLP
 Macfee DAM
 FIM-CIM Track
 2FA on email platform
 Cut edge Backup
infrastructure
 Improved change control
management
.
Continous Monitoring and
Review
 Daily review and monitoring
 IT project/application security
assessment .
 Investigation of IT incidents
 Internal VAPT
 External VAPT
Manage Security
 Establishment of SOC.
 Reporting.
 Performance measurement.
 Incident prediction.
 IT risk advisory
IT Risk Management
 Identification of assets and vulnerabilities across
the network
 Information System and Security Policy
framework
 Improved IT Governance
Cyber Criminals
Cracker:
Computer-savvy
programmer creates
attack software
Script Kiddies:
Unsophisticated
computer users who
know how to
execute programs
Leading Cyber Threats
 Viruses
 Worms
 Ransomware
 Trojan Horses / Logic Bombs
 Social Engineering
 Rootkits
 Botnets / Zombies
What is an Internet Minute?
Social Engineering Attack
In the context of information security, Social Engineering refers to psychological
manipulation of people into performing actions or divulging confidential information.
Non-technical method of
intrusion that relies on:
• Human interaction
• Trickery
• Manipulation
Exploiting the weakest
link in the chain
Phone Call:
This is John, the System
Administrator. What is
your password?
Social Engineering
Types of Social Engineering Attack
Social Engineering is a game of cat and mouse
Physical
 Impersonation
Pretending to be someone you are not.
 Dumpster Diving
Digging through trash to obtain information.
 Tailgating and Shoulder Surfing
Waiting for an action to take place and then
capitalizes on the result. E.g. Security door
Digital/Logical
 Spam
 Phishing
 SMiShing
 Spear Phishing
 Whaling(CEO Fraud)
 Hoaxes
 Vishing
 Typo squatting/Domain phishing
 Watering Hole
 Baiting
 Social Media Mining
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Social Engineering
Tips to Prevent Social Engineering and other Cyber-attack
1. Be mindful of site you visit
and surf on the internet,
especially while on UC’s
network.
2. Think twice before you
input your password on any
website without https.
3.Consider the source.
4. Check the sender’s email
address before taking any
action.
5.Avoid download of
installable/executable files, movies,
pons etc.
6.Do not click any suspicious link.
8.Do not click any
suspicious link.
9.Password security is
key.
10.Do not share your
password.
12.Be cautious of free Wi-Fi
13.Do not use official email for
personal activities online.
11.The Executives and
other staff should be wary
of spear phishing and the
whaling attacks.
14.Do not assume, confirmation is
necessary.
15.Trust but verify
Tips to Prevent Social Engineering and other Cyber-attack
17.Secure all devices and
social media profiles i.e.
use of security PIN for
Phone and 2 steps
verifications on WhatsApp
and Telegram.
18.Improve on your personal privacy,
reduce personal and official information
you posted on social media.
19.Pay attention to the weekly
Information security awareness email
from IT Risk and Control. Education is
key.
16.Be wary of personable
callers
21.IT Security is the business
of all staff.
20. Do not be the weak
link
Questions
Thank you

Weitere ähnliche Inhalte

Was ist angesagt?

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Enterprise Management Associates
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 

Was ist angesagt? (20)

Security awareness
Security awarenessSecurity awareness
Security awareness
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...Security Awareness Training: Are We Getting Any Better at Organizational and ...
Security Awareness Training: Are We Getting Any Better at Organizational and ...
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 

Ähnlich wie Information Security Awareness Session -2020

Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemIJERA Editor
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxSkippedltd
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxlevimax2
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxAkshayKhade21
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & HackingZayedMufti
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challengescyberprosocial
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information securityJayanth Vinay
 

Ähnlich wie Information Security Awareness Session -2020 (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
E-Commerce Privacy and Security System
E-Commerce Privacy and Security SystemE-Commerce Privacy and Security System
E-Commerce Privacy and Security System
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
CYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptxCYBERSECURITY TRACK.pptx
CYBERSECURITY TRACK.pptx
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Understanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For EveryoneUnderstanding Endpoint Security: A Guide For Everyone
Understanding Endpoint Security: A Guide For Everyone
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Cyber-Security & Hacking
Cyber-Security & HackingCyber-Security & Hacking
Cyber-Security & Hacking
 
Effective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern ChallengesEffective Cyber Security Technology Solutions for Modern Challenges
Effective Cyber Security Technology Solutions for Modern Challenges
 
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
 

Kürzlich hochgeladen

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Kürzlich hochgeladen (20)

Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Information Security Awareness Session -2020

  • 1. Information Security Training User Awareness and Practices Ismail Oduoye CISA,CISSP September 2019
  • 2. Learning Objectives 01 02 03 IT Security Fundamental Provide background knowledge on Information Security Introduction Need for IT Security Awareness Training UC IT Risk Road Map What we have achieved 04 05 06 Cyber-attack Discussion of various cyber- attack methods Social Engineering Discussion of the various types of Social Engineering Attack. IT Security Tips General tips for prevention of Cyber-attack.
  • 3. Introduction 1 2 5 3 4 What Are User Personal Responsibilities?  Report security violations  Develop “end-of-day” security procedures  To be discussed extensively under IT Security Tips What Is IT Security Awareness? Who Is Responsible for IT Security? Who Must Have Security Awareness Training? Everyone who uses a computer needs to know how to keep his or her computer and data secure to ensure a safe working environment.  Without training, employees could be making serious mistakes, especially in the realm of security.  Security training allows organizations to influence behavior, mitigate risk, and ensure compliance.  Develop a security-focused culture  Protect Asset All employees who use information technology or have access to areas where information resources reside. It means understanding various information technology threats that exist in one's computing environment and taking reasonable steps to guard against them. Importance of Information Security Awareness
  • 4. IT Security Fundamental Definition of Terms Core Objectives of Information Security(CIA) What is Information Security  Vulnerability  Threat  Threat Agent  IT Risk  IT Risk Management  Information security is the practice of protecting information by mitigating information risks. It is part of information risk management.  It is not something you buy, it is something you do. It’s a process not a product.  Confidentiality  Integrity  Availability
  • 5. IT Risk Road Map Implementation of Controls  4th Generation Firewall  Macfee Antivrus  Macfee DLP  Macfee DAM  FIM-CIM Track  2FA on email platform  Cut edge Backup infrastructure  Improved change control management . Continous Monitoring and Review  Daily review and monitoring  IT project/application security assessment .  Investigation of IT incidents  Internal VAPT  External VAPT Manage Security  Establishment of SOC.  Reporting.  Performance measurement.  Incident prediction.  IT risk advisory IT Risk Management  Identification of assets and vulnerabilities across the network  Information System and Security Policy framework  Improved IT Governance
  • 6. Cyber Criminals Cracker: Computer-savvy programmer creates attack software Script Kiddies: Unsophisticated computer users who know how to execute programs
  • 7. Leading Cyber Threats  Viruses  Worms  Ransomware  Trojan Horses / Logic Bombs  Social Engineering  Rootkits  Botnets / Zombies
  • 8. What is an Internet Minute?
  • 9. Social Engineering Attack In the context of information security, Social Engineering refers to psychological manipulation of people into performing actions or divulging confidential information. Non-technical method of intrusion that relies on: • Human interaction • Trickery • Manipulation Exploiting the weakest link in the chain Phone Call: This is John, the System Administrator. What is your password?
  • 11. Types of Social Engineering Attack Social Engineering is a game of cat and mouse Physical  Impersonation Pretending to be someone you are not.  Dumpster Diving Digging through trash to obtain information.  Tailgating and Shoulder Surfing Waiting for an action to take place and then capitalizes on the result. E.g. Security door Digital/Logical  Spam  Phishing  SMiShing  Spear Phishing  Whaling(CEO Fraud)  Hoaxes  Vishing  Typo squatting/Domain phishing  Watering Hole  Baiting  Social Media Mining
  • 18. Tips to Prevent Social Engineering and other Cyber-attack 1. Be mindful of site you visit and surf on the internet, especially while on UC’s network. 2. Think twice before you input your password on any website without https. 3.Consider the source. 4. Check the sender’s email address before taking any action. 5.Avoid download of installable/executable files, movies, pons etc. 6.Do not click any suspicious link. 8.Do not click any suspicious link. 9.Password security is key. 10.Do not share your password. 12.Be cautious of free Wi-Fi 13.Do not use official email for personal activities online. 11.The Executives and other staff should be wary of spear phishing and the whaling attacks. 14.Do not assume, confirmation is necessary. 15.Trust but verify
  • 19. Tips to Prevent Social Engineering and other Cyber-attack 17.Secure all devices and social media profiles i.e. use of security PIN for Phone and 2 steps verifications on WhatsApp and Telegram. 18.Improve on your personal privacy, reduce personal and official information you posted on social media. 19.Pay attention to the weekly Information security awareness email from IT Risk and Control. Education is key. 16.Be wary of personable callers 21.IT Security is the business of all staff. 20. Do not be the weak link

Hinweis der Redaktion

  1. © Copyright PresentationGO.com – The free PowerPoint template library
  2. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  3. © Copyright PresentationGo.com – The free PowerPoint template library
  4. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  5. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  6. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  7. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  8. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  9. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  10. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library
  11. © Copyright PresentationGO.com – The free PowerPoint template library
  12. © Copyright PresentationGO.com – The free PowerPoint template library
  13. © Copyright PresentationGO.com – The free PowerPoint and Google Slides template library