SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Information Security
Shanthamallachar D B
Introduction
• InfoSec
Information security processes and policies typically involve
physical and digital security measures to protect data from
unauthorized access, use, replication or destruction.
• InfoSec Core Objectives(C-I-A Tried).
Confidential
Integrity
Availability
Main Objectives:
• LEADING THREATS
• SAFE & SECURE PRACTICES
• BEST PRACTICES
• Virus
• Worm
• Trojan Horse / Logic Bomb
• Social Engineering
• ADVANCED PERSISTENT THREAT (APT)
• Rootkits
• Botnets / Zombies
 A virus attaches itself to a program, file, or disk
 When the program is executed, the virus
activates and replicates itself
 The virus may be benign or malignant but
executes its payload at some point (often upon
contact)
 Viruses result in crashing of computers and loss
of data.
 In order to recover/prevent virus/attacks:
 Avoid potentially unreliable websites/emails
 System Restore
 Re-install operating system
 Anti-virus (i.e. Avira, AVG, Norton)
Program
A
Extra Code
Program
B
infects
• Independent program which replicates itself and sends copies from computer to
computer across network connections. Upon arrival the worm may be activated to
replicate.
To Joe
To Ann
To Bob
Email List:
Joe@gmail.com
Ann@yahoo.com
Bob@uwp.edu
• Logic Bomb: Malware logic executes upon certain conditions.
Program is often used for legitimate reasons.
▫ Software which malfunctions if maintenance fee is not paid
▫ Employee triggers a database erase when he is fired.
• Trojan Horse: Masquerades as beneficial program while
quietly destroying data or damaging your system.
▫ Download a game: Might be fun but has hidden part that emails your
password file without you knowing.
• Social engineering manipulates people into performing actions or divulging confidential information. Similar to a
confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or
access computer systems.
Phone Call:
This is John,
the System
Admin. What
is your
password?
Email:
ABC Bank has
noticed a
problem with
your account…
In Person:
What ethnicity
are you? Your
mother’s
maiden name?
and have
some
software
patches
I have come
to repair
your
machine…
• Definition: An advanced persistent threat (APT) is a broad
term used to describe an attack campaign in which an
intruder, or team of intruders, establishes an illicit, long-term
presence on a network in order to mine highly sensitive data.
• Targets: Typically include Large Enterprises or Governmental
Networks
• Reason:
▫ Intellectual property theft (e.g., trade secrets or patents)
▫ Compromised sensitive information (e.g., employee and
user private data)
▫ The sabotaging of critical organizational infrastructures
(e.g., database deletion)
▫ Total site takeovers
• Phishing: a
‘trustworthy entity’
asks via e-mail for
sensitive information
such as SSN, credit
card numbers, login
IDs or passwords.
 Symptoms:
 Antivirus software detects a problem
 Pop-ups suddenly appear (may sell security software)
 Disk space disappears
 Files or transactions appear that should not be there
 System slows down to a crawl
 Unusual messages, sounds, or displays on your monitor
 Stolen laptop (1 in 10 stolen in laptop lifetime)
 Your mouse moves by itself
 Your computer shuts down and powers off by itself
 Often not recognized
• Anti-virus software detects malware and can destroy it
before any damage is done
• Install and maintain anti-virus and anti-spyware
software
• Be sure to keep anti-virus software updated
• Many free and pay options exist
• A firewall acts as a wall between your computer/private network
and the internet. Hackers may use the internet to find, use, and
install applications on your computer. A firewall prevents hacker
connections from entering your computer.
• Filters packets that enter or leave your computer
• Never use ‘admin’ or ‘root’ or ‘administrator’ as a login for the admin
• A good password is:
▫ private: it is used and known by one person only
▫ secret: it does not appear in clear text in any file or program or on a piece of paper pinned to the terminal
▫ easily remembered: so there is no need to write it down
▫ at least 8 characters, complex: a mixture of at least 3 of the following: upper case letters, lower case letters,
digits and punctuation
▫ not guessable by any program in a reasonable time, for instance less than one week.
▫ changed regularly: a good change policy is every 3 months
• Beware that someone may see you typing it. If you accidentally type your password instead of
your login name, it may appear in system log files
• Do not open email attachments unless you are expecting the email with
the attachment and you trust the sender.
• Do not click on links in emails unless you are absolutely sure of their
validity.
• Only visit and/or download software from web pages you trust.
• Definition
A clean desk policy (CDP) is a corporate directive that specifies how employees should leave
their working space when they leave the office. Most Clean Desk Policies require employees to clear
their desks of all papers at the end of the day.
• Sensitive information must be protected at all times from
anyone who may pass by including other employees, cleaners,
and office visitors
• In effect, a clean desk policy is one of the simplest ways to
protect sensitive information and to reduce the risk of a data
breach and identity theft
• A clean desk policy also complies with information security
regulations
BACKUP IMPORTANT INFORMATION
19
 No security measure is 100% reliable.
 Even the best hardware fails.
 What information is important to you?
 Is your backup:
Recent?
Off-site & Secure?
Process Documented?
Encrypted?
Tested?
• Always logoff or lock you system if you leave (even for a minute)
• Keep systems patches and up to date
• Use strong passwords and protect them
• Encrypt sensitive files
• Watch what you share
• Disable insecure mechanisms if possible
• Never let someone have access to yours system under your credentials
• Be aware of individuals looking for information or access
• Don’t forget physical security
• Report any potential breach to your InfoSec Team

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Threats to information security
Threats to information securityThreats to information security
Threats to information securityarun alfie
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
Security concepts
Security conceptsSecurity concepts
Security conceptsartisriva
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
1 security goals
1   security goals1   security goals
1 security goalsdrewz lin
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Software Security
Software SecuritySoftware Security
Software SecurityAkNirojan
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 

Was ist angesagt? (20)

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Threats to information security
Threats to information securityThreats to information security
Threats to information security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3Viruses (Lecture) IT Slides # 3
Viruses (Lecture) IT Slides # 3
 
Security concepts
Security conceptsSecurity concepts
Security concepts
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Computer security
Computer securityComputer security
Computer security
 
1 security goals
1   security goals1   security goals
1 security goals
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Software Security
Software SecuritySoftware Security
Software Security
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 

Ähnlich wie Information Security Essentials

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 

Ähnlich wie Information Security Essentials (20)

It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
Internet
InternetInternet
Internet
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
презентация1
презентация1презентация1
презентация1
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 

Kürzlich hochgeladen

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Information Security Essentials

  • 2. Introduction • InfoSec Information security processes and policies typically involve physical and digital security measures to protect data from unauthorized access, use, replication or destruction. • InfoSec Core Objectives(C-I-A Tried). Confidential Integrity Availability
  • 3.
  • 4. Main Objectives: • LEADING THREATS • SAFE & SECURE PRACTICES • BEST PRACTICES
  • 5. • Virus • Worm • Trojan Horse / Logic Bomb • Social Engineering • ADVANCED PERSISTENT THREAT (APT) • Rootkits • Botnets / Zombies
  • 6.  A virus attaches itself to a program, file, or disk  When the program is executed, the virus activates and replicates itself  The virus may be benign or malignant but executes its payload at some point (often upon contact)  Viruses result in crashing of computers and loss of data.  In order to recover/prevent virus/attacks:  Avoid potentially unreliable websites/emails  System Restore  Re-install operating system  Anti-virus (i.e. Avira, AVG, Norton) Program A Extra Code Program B infects
  • 7. • Independent program which replicates itself and sends copies from computer to computer across network connections. Upon arrival the worm may be activated to replicate. To Joe To Ann To Bob Email List: Joe@gmail.com Ann@yahoo.com Bob@uwp.edu
  • 8. • Logic Bomb: Malware logic executes upon certain conditions. Program is often used for legitimate reasons. ▫ Software which malfunctions if maintenance fee is not paid ▫ Employee triggers a database erase when he is fired. • Trojan Horse: Masquerades as beneficial program while quietly destroying data or damaging your system. ▫ Download a game: Might be fun but has hidden part that emails your password file without you knowing.
  • 9. • Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems. Phone Call: This is John, the System Admin. What is your password? Email: ABC Bank has noticed a problem with your account… In Person: What ethnicity are you? Your mother’s maiden name? and have some software patches I have come to repair your machine…
  • 10. • Definition: An advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data. • Targets: Typically include Large Enterprises or Governmental Networks • Reason: ▫ Intellectual property theft (e.g., trade secrets or patents) ▫ Compromised sensitive information (e.g., employee and user private data) ▫ The sabotaging of critical organizational infrastructures (e.g., database deletion) ▫ Total site takeovers
  • 11. • Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as SSN, credit card numbers, login IDs or passwords.
  • 12.  Symptoms:  Antivirus software detects a problem  Pop-ups suddenly appear (may sell security software)  Disk space disappears  Files or transactions appear that should not be there  System slows down to a crawl  Unusual messages, sounds, or displays on your monitor  Stolen laptop (1 in 10 stolen in laptop lifetime)  Your mouse moves by itself  Your computer shuts down and powers off by itself  Often not recognized
  • 13.
  • 14. • Anti-virus software detects malware and can destroy it before any damage is done • Install and maintain anti-virus and anti-spyware software • Be sure to keep anti-virus software updated • Many free and pay options exist
  • 15. • A firewall acts as a wall between your computer/private network and the internet. Hackers may use the internet to find, use, and install applications on your computer. A firewall prevents hacker connections from entering your computer. • Filters packets that enter or leave your computer
  • 16. • Never use ‘admin’ or ‘root’ or ‘administrator’ as a login for the admin • A good password is: ▫ private: it is used and known by one person only ▫ secret: it does not appear in clear text in any file or program or on a piece of paper pinned to the terminal ▫ easily remembered: so there is no need to write it down ▫ at least 8 characters, complex: a mixture of at least 3 of the following: upper case letters, lower case letters, digits and punctuation ▫ not guessable by any program in a reasonable time, for instance less than one week. ▫ changed regularly: a good change policy is every 3 months • Beware that someone may see you typing it. If you accidentally type your password instead of your login name, it may appear in system log files
  • 17. • Do not open email attachments unless you are expecting the email with the attachment and you trust the sender. • Do not click on links in emails unless you are absolutely sure of their validity. • Only visit and/or download software from web pages you trust.
  • 18. • Definition A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most Clean Desk Policies require employees to clear their desks of all papers at the end of the day. • Sensitive information must be protected at all times from anyone who may pass by including other employees, cleaners, and office visitors • In effect, a clean desk policy is one of the simplest ways to protect sensitive information and to reduce the risk of a data breach and identity theft • A clean desk policy also complies with information security regulations
  • 19. BACKUP IMPORTANT INFORMATION 19  No security measure is 100% reliable.  Even the best hardware fails.  What information is important to you?  Is your backup: Recent? Off-site & Secure? Process Documented? Encrypted? Tested?
  • 20. • Always logoff or lock you system if you leave (even for a minute) • Keep systems patches and up to date • Use strong passwords and protect them • Encrypt sensitive files • Watch what you share • Disable insecure mechanisms if possible • Never let someone have access to yours system under your credentials • Be aware of individuals looking for information or access • Don’t forget physical security • Report any potential breach to your InfoSec Team