Information Security Awareness Training by Wilfrid Laurier University

EHS Safety Training Solutions um Atlantic Training, LLC.
15. Nov 2013
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
1 von 28

Más contenido relacionado

Was ist angesagt?

Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner

Destacado

Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaAtlantic Training, LLC.
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa

Similar a Information Security Awareness Training by Wilfrid Laurier University

Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
Cyber SecurityCyber Security
Cyber SecurityNcell
Building a culture of securityBuilding a culture of security
Building a culture of securityCourion Corporation
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta

Más de Atlantic Training, LLC.

Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUAtlantic Training, LLC.
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHAAtlantic Training, LLC.
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SGAtlantic Training, LLC.
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SWAtlantic Training, LLC.
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTCAtlantic Training, LLC.

Último

SaaStr Workshop Wednesday: Align and execute enterprise B2B team selling moti...SaaStr Workshop Wednesday: Align and execute enterprise B2B team selling moti...
SaaStr Workshop Wednesday: Align and execute enterprise B2B team selling moti...saastr
Lasonczyk_Kyle_SCBS_PB1_2023-September.pptxLasonczyk_Kyle_SCBS_PB1_2023-September.pptx
Lasonczyk_Kyle_SCBS_PB1_2023-September.pptxKyleLasonczyk
Gravyty Presentation for Bloomerang Year End Stewardship 9-26-23.pdfGravyty Presentation for Bloomerang Year End Stewardship 9-26-23.pdf
Gravyty Presentation for Bloomerang Year End Stewardship 9-26-23.pdfBloomerang
Dang_Phuong_EBBS_PB1_2023.09.pptxDang_Phuong_EBBS_PB1_2023.09.pptx
Dang_Phuong_EBBS_PB1_2023.09.pptxNguyenDang389669
TSX-V_WIL_2021-DATA.KRESTON.VN.pdfTSX-V_WIL_2021-DATA.KRESTON.VN.pdf
TSX-V_WIL_2021-DATA.KRESTON.VN.pdfThuPhng26102
Mariia Abdullina and Yana Bort: Як обʼєднати багатокомпонентний ентерпрайз на...Mariia Abdullina and Yana Bort: Як обʼєднати багатокомпонентний ентерпрайз на...
Mariia Abdullina and Yana Bort: Як обʼєднати багатокомпонентний ентерпрайз на...Lviv Startup Club

Information Security Awareness Training by Wilfrid Laurier University

Hinweis der Redaktion

  1. Information revolution since 1980’s. 21st century is information century. All business are using information to process, develop and compete. More and more vulnerabilities and found in technology, as seen on news, websites. Billions dollars were paid for id theft in USA in 2005. Industry espionage, stealing credit card number, Denial of Service attack. Impact to business, financial impact, staff morale effect, reputation and public image damage. Add examples University of Minnesota lost 2 computers, with more than 13,000 students records and over 600 social security numbers in the hard drive, university is providing a mandatory data security training for all staff. University of California, Berkeley lost a laptop from its graduate school admission office, exposing 98,000 people’s personal information Strength the house before storm comes
  2. Unlicensed software leads to litigation, money loss, possible malicious code New viruses emerge everyday, old version of definition file can not protect your computer against them, virus can be propagated though floppy, usb, cd ect. If the CD is made to autorun, the installation shall be interrupted, the whole CD shall be scanned before the installation starts.
  3. At least, keep your pc silent when attackers call you by ping.
  4. Here are the Firewall options
  5. Once new vulnerabilities are released, they are playground for script kids, who grab attack tools and try them for curiosity
  6. Why password? It is not a useless but must go step, it is a lock to your information treasure box. If your password is too weak, than your treasure is likely be stolen. It provides authentication, authorization and accountability. Authentication: Who you are, how you can prove that Authorization: You access privileges according to whom you claimed you are, i.e. your profile Accountability: For auditing, the activities under your account are your responsibilities Good password: (@t&d09S, D1(ti0n@ry, Q6f^01d The quick brown fox jumps over the lazy dog Bad password: access, password, admin, qwerty, asdfgh, 123456, ottffs
  7. Identify the difference between a home computer and business computer, personal purpose and business purpose ITS will not take any responsibility if personal data (ex. Credit card number ) lost because of non-business purpose usage. Screen saver, crtl-alt-del combination Your data will be lost completely if your computer is stolen, which is more important/expensive then the computer itself, your windows password does not work anymore, it can be bypassed easily, For software/ hardware instruction requirement, contact help desk instead of exploring with risks Some wrong actions could lead massive results, Configure back up in office suite, and manually back up to usb drive, floppy disk. Client/server system users (such as Banner users) do not have to worry the data in Banner servers, because they are backed up by ITS.
  8. If your computer slows down, contact ITS, it is not security applications’ fault With physical access to a computer, key loggers, trojan software, (Back Orifice, VNC etc.) can be installed, data can be copied, modified, deleted… ITS does not need your password to perform any work, in any case it is needed, you will be asked to type it rather than tell it Personal computer device is not supposed to be used at your work. And ITS does not support it. Wireless connection is not safe, the data can be easily sniffed and cracked even with WEP/WPA protection, it can only be used for browsing, but not for any kind of login, and transferring confidential data Please contact ITS if any software is required, ITS can provide anti-executable, which will prevent unnecessary software being installed without authorization, $10 per year; Students Union and PPNP have implemented this, and the users are fairly happy with it ITS won’t send emails with attachments, Banks won’t do that too. Call help desk to verify the email account when necessary, suggest to convert to GroupWise for its feature of handling spam While Xmas is coming, more and more online frauds are coming with Santa
  9. Google the keyword or lookup in http://www.trendmicro.com/vinfo/hoaxes/default.asp, to verify this. Usually, an email with “Urgent” in Subject, is positive.
  10. Social Engineering is the acquisition of sensitive information or inappropriate access privileges by an outsider, based upon the building of an inappropriate trust relationship with insiders. The goal of social engineering is to trick someone into providing valuable information or access to that information
  11. If you cannot personally identify a caller who asks for personal information about you or anyone else (including badge number or employee number), for information about your computer system, or for any other sensitive information, do not provide the information. Insist on verifying the caller’s identity by calling them back at their proper telephone number as listed in your organization’s telephone directory. This procedure creates minimal inconvenience to legitimate activity when compared with the scope of potential losses. Remember that passwords are sensitive. A password for your personal account should be known ONLY to you. Systems administrators or maintenance technicians who need to do something to your account will not require your password. They have their own password with system privileges that will allow them to work on your account without the need for you to reveal your password. If a system administrator or maintenance technician asks you for your password, be suspicious. Systems maintenance technicians from outside vendors who come on site should be accompanied by the local site administrator (who should be known to you). If the site administrator is not familiar to you, or if the technician comes alone, it is wise to give a call to your known site administrator to check if the technician should be there. Unfortunately, many people are reluctant to do this because it makes them look paranoid, and it is embarrassing to show that they do not trust a visitor.