Information Security Training & Awareness
Information Security Training & Awareness
Information Security Training & Awareness
SECURITY TRAINING
AWARENESS
DECK
AGENDA
• WHAT IS INFORMATION SECURITY • SAFE PRACTICES
• MULTIFACTOR AUTHENTICATION
WHY INFORMATION SECURITY
With this digital integration comes a heightened
risk of cyber threats.
Cybersecurity is no longer just an IT issue; it's a
personal concern.
IMPORTANT?
WHAT IS INFORMATION SECURITY?
Information Security, often referred to as
InfoSec, is the practice of protecting information
by mitigating information risks.
INTEGRITY
Safeguarding the accuracy and trustworthiness of data by
preventing unauthorized and improper modification.
AVALAIBILITY AVALAIBILITY
Making sure that authorized users have timely and reliable
access to information and systems when needed.
STATISTICS SAY..
The average data breach costs in
2022 is $4.45 million, a 2.2% rise from
2022 amount of $4.35 million.
SOURCE: UPGRAD
SOURCE: UPGRAD
Ransomware is a type of Trojans are malicious Viruses are malicious code Adware is software that
malware that encrypts programs that are disguised that spread by copying automatically displays or
files or systems until a as legitimate software to themselves to infect files, downloads advertising
ransom is paid to decrypt trick users into installing programs or boot sectors material such as banners
them and restore access. and executing an attack to alter system function. or pop-ups when a user is
payload on their systems. online.
COMMON MALWARES
SPYWARE WORM BOTS ROOTKITS
Targeted email scam Spear phishing directed Phishing attempt carried Phishing through text
towards specific individuals specifically at senior out using voice calls, often messages attempting to
containing malicious links or executives to access spoofing legitimate steal passwords or
attachments. sensitive data. entities. personal information.
PHISHING ATTACKS
ANGLER PHISHING PHARMING FILTER EVASION CLONE PHISHING
Creating fake social media Misdirecting users to fake Carefully crafted emails Spoofing communication
profiles to build connections fraudulent websites by with malicious content from a legitimate contact to
and trick targets into modifying infrastructure like designed to bypass email request sensitive data by
sharing sensitive data. DNS records. security filters. impersonating senders.
PASSWORD ATTACKS
BRUTE FORCE DICTIONARY RAINBOW TABLE HYBRID
Trying every possible Trying commonly used Using precomputed hash Combining brute force and
password combination passwords and words from tables of encrypted dictionary attacks by
possible until the correct a precompiled dictionary file passwords for quickly attempting dictionary
password is discovered. as guesses. matching hash digests to words with special
plaintext passwords characters or numbers
added.
WHAT YOU
NEED TO DO
STRONG PASSWORD GUIDELINES
Length - Use at least 12 Complexity - Include Obscurity - Avoid common Randomness - Generate or
characters or longer upper and lower case words, names or dates use passwords that are
letters, numbers and fully random
symbols
LOCATION INHERENCE
(Somewhere you
(Something you are)
are)
Location of
users’s Fingerprints,/ Retina scan/
access request Facial recognition
SAFE WEB USAGE PRACTICES
Log out completely after Avoid using public
Verify web URLs and
finishing sessions to computers or WiFi
digital certificates to
prevent access from networks for accessing
avoid spoofed websites
same browser sensitive accounts
Use a VPN and encrypted Keep all operating Be cautious of HTTP links
connections for better systems, browsers and and only download from
data security plugins updated regularly trusted sources
Use anti-phishing
Don't stay permanently Clear browsing history,
browser extensions to
signed into accounts on caches, cookies regularly
detect fraudulent
browsers
websites
SAFE EMAIL USAGE PRACTICES
Beware of
Never open links Look out for red compelling
or attachments flag phrases, bad content like
from unknown or grammar, offers that seem
suspicious spelling errors too good to be
sources true
PUBLIC
It is the process of
RESTRICTED
PUBLIC INTERNAL
Data that may be freely disclosed Internal data that is not meant for
to the public public disclosure
INCIDENT MEANING
Leaders must visibly Conduct training on Align policies to Well defined, easy to
support and abide by security policies and identified threats, implement policies
security policies to set acceptable usage regulatory climate and have higher adoption
the tone for the guidelines for all users business objectives. across workforce.
organization. to comprehend
responsibilities.
EMPLOYEE
BEST
PRACTICES
Lock workstations when Attend all required security
leaving desks to prevent awareness education and
unauthorized access policy acknowledgement