We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHailey Dean
Modified over 3 years ago
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011
2 Copyright © 2011 IsecT Ltd. Introduction Do you use Facebook, MySpace, Flickr, Linked In, Blogger or Twitter? Do your colleagues, friends or family use them? Do you tend to trust the people you know? Are you human?
3 Copyright © 2011 IsecT Ltd. The risks
4 Copyright © 2011 IsecT Ltd. Low-end risk
5 Copyright © 2011 IsecT Ltd. High-end risk? Personal information on as many as 35 million users of a South Korean social network site may have been exposed as the result of what has been described as the country's biggest ever hack attack … Names, phone numbers, addresses, and other details may have been exposed through the Cyworld hack, which follows previous attacks against South Korean government sites and financial service firms. North Korea has been implicated in some of these hacks. … The RegisterThe Register 28 th July 2011
6 Copyright © 2011 IsecT Ltd. Leveraging information
7 Copyright © 2011 IsecT Ltd. Social engineering
8 Copyright © 2011 IsecT Ltd. Social engineering
9 Copyright © 2011 IsecT Ltd. Social engineering
10 Copyright © 2011 IsecT Ltd. D elay A uthenticate R esist T ransfer Dealing with social engineers General employees Front-line employees
11 Copyright © 2011 IsecT Ltd. Other controls
12 Copyright © 2011 IsecT Ltd. Conclusion You may believe you are immune to the kinds of attacks we have discussed … but are your colleagues, friends, bosses, family members, suppliers …? Please help us raise awareness: knowing that we might be attacked, what forms attacks may take, and how to respond (remember DART) are important controls
13 Copyright © 2011 IsecT Ltd. Further information Speak to colleagues Visit the intranet Security Zone Contact the Information Security Manager Read these books …
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar.
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.
Social Networking Presentation to Department Heads January 21, 2010.
WELCOME TO A NATIONAL DISABILITY INSTITUTE 30 SECOND TRAINING.
Web 2.0: Concepts and Applications 5 Connecting People.
Using LinkedIn. LinkedIn At A Glance LinkedIn is a social network aimed toward professionals More than 50 million users Usually seen as an online version.
Fatima Begum. Introduction What is a social network? “A website where one connects with those sharing personal or professional interests, place of origin,
The popularity of the social networks. The most popular social networks.
Minimum Data-set for all mental health referrals.
Using Facebook to Connect With Customers Part 1. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Facebook for Personal Use.
Security Liaisons Information Presentation. Introduction What’s the big deal with computer security? Don’t we have an IT security department to take.
Using Facebook to Connect With Customers. Outline Questions from Librarians Introduction to Facebook Uses for Facebook Hands-On Workshop Summary / Conclusions.
Data Privacy Request Janet Rash Intel Corporation Oregon Community Relations Manager October 3, 2008.
Week 2 Social Media and Online Identity. Feedback on week 1 How did you get on? What are your thoughts on Digital literacies Did you take the Digital.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Clarity in a World of Social Madness How Social Media Works for YOU, Your BUSINESS and.
Facebook: The Social Network That Took Over The World By Sarah Benqlilou.
Social Networking Pluses and Minuses By: Julie Nguyen and Carol Osorio.
Hobbies: Social networking YOU TUBE FACE BOOK MYSPACE.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Making Your Business Grow Back to Table of Contents.
Tyntec Research: Brazilian and Russian Social Media Users Are Concerned About Identity Theft – UK and US Counterparts Worry Most About Lack of Information.
Tim Reid Malvern Parish C.E Primary School Internet Safety.
Internet Safety Night Raising Good Digital Citizens.
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
© 2011 Amadeus North America, Inc. All rights reserved. Trademark of Amadeus North America, Inc. and/or affiliates. Amadeus is a registered trademark of.
East Midlands Councils Member Development Skills Portal Survey February 2012.
0 Using Linkedin for ACACSO Networking Lisa Gering November 13, 2009.
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
We are UK based property investment company. we provide Buy to Let Properties for Sale, property investment and full letting management for any properties.
Technology Social Media Unit 1. What is Social Media? Social media is the interaction among people in which they create, share or exchange information.
PERSONAL HISTORY AND ITS IMPACT ON A CAREER IN HEALTH PERSONAL HISTORY AND ITS IMPACT ON A CAREER IN HEALTH South Carolina AHEC Health Careers Academy.
TASK 2: WHO DO YOU SEE? WHO DO YOU SEE? SHORT PRESENTATION.
How to register for an NHS Athens Account Contact Matt Holland [
E-Safety E-safety relates to the education of using new technology responsibly and safely focusing on raising awareness of the core messages of safe content,
25 % of users don’t bother with privacy settings 1.11 billion users 665 million daily users 23 % of users check their account 5 times a day 1in10 people.
Sedex: Registration and Account Set Up Instructions.
Durban, South Africa, 8 July 2013 Automated Targeted Attacks Alexandru Catalin Cosoi, Chief Security Strategist, Bitdefender ITU.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
LGA: AFS Submission & GRAP Updates 06 September 2013.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Final Year Projects Some tips
EAdvocacy: Tools You Can Use to Recruit Volunteers, Raise Money and Take Action 2008 Leadership Summit & Lobby Day September 22, 2008.
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
Version 6.0 August 2012 How to register for an NHS Athens Account Contact Matt Holland [
Bullying in the Workplace. Introduction Bullying at work is when someone tries to intimidate another worker, often in front of colleagues.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
© 2017 SlidePlayer.com Inc. All rights reserved.