We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHailey Dean
Modified over 2 years ago
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011
2 Copyright © 2011 IsecT Ltd. Introduction Do you use Facebook, MySpace, Flickr, Linked In, Blogger or Twitter? Do your colleagues, friends or family use them? Do you tend to trust the people you know? Are you human?
3 Copyright © 2011 IsecT Ltd. The risks
4 Copyright © 2011 IsecT Ltd. Low-end risk
5 Copyright © 2011 IsecT Ltd. High-end risk? Personal information on as many as 35 million users of a South Korean social network site may have been exposed as the result of what has been described as the country's biggest ever hack attack … Names, phone numbers, addresses, and other details may have been exposed through the Cyworld hack, which follows previous attacks against South Korean government sites and financial service firms. North Korea has been implicated in some of these hacks. … The RegisterThe Register 28 th July 2011
6 Copyright © 2011 IsecT Ltd. Leveraging information
7 Copyright © 2011 IsecT Ltd. Social engineering
8 Copyright © 2011 IsecT Ltd. Social engineering
9 Copyright © 2011 IsecT Ltd. Social engineering
10 Copyright © 2011 IsecT Ltd. D elay A uthenticate R esist T ransfer Dealing with social engineers General employees Front-line employees
11 Copyright © 2011 IsecT Ltd. Other controls
12 Copyright © 2011 IsecT Ltd. Conclusion You may believe you are immune to the kinds of attacks we have discussed … but are your colleagues, friends, bosses, family members, suppliers …? Please help us raise awareness: knowing that we might be attacked, what forms attacks may take, and how to respond (remember DART) are important controls
13 Copyright © 2011 IsecT Ltd. Further information Speak to colleagues Visit the intranet Security Zone Contact the Information Security Manager Read these books …
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar.
Information Security Awareness Copyright © 2011 IsecT Ltd. September 2011 Management seminar Building our security culture.
As some of you may know its not that safe to go online. So we the student council are here to teach you how to be safe online. This is all you need to.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Social Media Awareness Training For Financial Institutions January 30, 2014.
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
EPSIplus An overview Name of presenter Association Name European Associations Meeting, Copenhagen, funded by eContentPlus Place Association Logo.
A centre of expertise in digital information managementwww.ukoln.ac.uk Introduction To Facebook: Opportunities and Challenges For The Institution Brian.
WHAT EFFECT HAS ICT HAD ON THE SOCIETY WE LIVE IN? By Samuel Cox 26 th September 2011.
1 The Rights of the Child Qualitative Eurobarometer study Paul Stamper Deputy Managing Director TNS opinion October 2010.
Getting Started with Social media YouTube, We Tube Jayme Swain Director, Engage.
. The sender and recipient(s) of an message do not have to be online at the same time. When one person sends a message, it is stored on an.
Final Year Projects Some tips
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
PARENTS QUESTIONNAIRE IN REFERENCE TO THEIR CHILDRENS SAFETY ON THE INTERNET.
ANNUAL SECURITY AWARENESS TRAINING – 2011 UMW Information Technology Security Program Annual Security Awareness Training for UMW Faculty and Staff.
©Ian Sommerville 2000 Software Engineering, 6th edition. Chapter 26Slide 1 Chapter 26 Legacy Systems.
Chapter 6 Politically Connected Your Vote Doesnt Count If you applied rationality to voting, you probably wouldnt vote. The costs of voting researching.
Research PowerPoint How to organize your mysterious PowerPoint.
Year 2 Curriculum Evening Wednesday 25 th September 2013.
East Midlands Councils Member Development Skills Portal Survey February 2012.
Minimum Data-set for all mental health referrals.
This presentation was modified. The original version can be found at and is made possible by the Corporation for National and Community.
A PRESENTATION FOR THE PARENTS OF MIDDLETON PRIMARY SCHOOL.
Training for YOUR marathon! Chris Leigh. The 4 Ps of marathon training PLANNING PROGRESSION PERSONAL PATIENCE.
Are YOU Part of the Phenomenon?. What you can do with facebook: What you can do with facebook: You can see where old You can see where old faces wound.
©2011 1www.id-book.com An evaluation framework Chapter 13.
Non-Employee Work Consulting/ Contract Labor Tom Phillips - Effective Agreements DFW Sales/Bus. Dev. Networking Group July 21, 2009.
End of Over-the-Counter Sales of Paper U.S. Savings Bonds.
Copyright 2008, Elizabeth A. Evans. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-
© 2016 SlidePlayer.com Inc. All rights reserved.