Presentation is loading. Please wait.

Presentation is loading. Please wait.

PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach

Similar presentations


Presentation on theme: "PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach"— Presentation transcript:

1 PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach http://www.streetwise-security-zone.com Score 10 points for each correct answer…

2 Creative Commons Licensed by Scott Wright. 2 http://www.streetwise-security-zone.com Identity Theft Who had their Yahoo Email account hacked in 2008? 1. 1.Osama Bin Laden 2. 2.Stephen Harper 3. 3.Sarah Palin 4. 4.Brittany Spears

3 Creative Commons Licensed by Scott Wright. 3 http://www.streetwise-security-zone.com Identity Theft Who had their Yahoo Email account hacked in 2008? 1. 1.Osama Bin Laden 2. 2.Stephen Harper 3. 3.Sarah Palin 4. 4.Brittany Spears Most of the answers to Sarah Palin’s Yahoo password reset questions were available from Wikipedia. The hacker guessed where she met her husband… Wasilla High School, Alaska

4 Creative Commons Licensed by Scott Wright. 4 http://www.streetwise-security-zone.com Safe Web Browsing You can tell if a browser session is secure if… 1. 1.The URL is prefixed with “secure://” 2. 2.A pop-up dialog says “This is a secure session” 3. 3.“Verified by Visa” appears on the web page 4. 4.A “lock” icon appears beside the URL, or at the bottom of the browser window

5 Creative Commons Licensed by Scott Wright. 5 http://www.streetwise-security-zone.com Safe Web Browsing You can tell if a browser session is secure if… 1. 1.The URL is prefixed with “secure://” 2. 2.A pop-up dialog says “This is a secure session” 3. 3.“Verified by Visa” appears on the web page 4. 4.A “lock” icon appears beside the URL, or at the bottom of the browser window

6 Creative Commons Licensed by Scott Wright. 6 http://www.streetwise-security-zone.com Endpoint Security Antivirus programs are only effective when… 1. 1.Viruses are at least 2 weeks old 2. 2.Used together with Firewalls 3. 3.Virus definitions are updated regularly 4. 4.Computers are scanned in Safe Mode

7 Creative Commons Licensed by Scott Wright. 7 http://www.streetwise-security-zone.com Endpoint Security Antivirus programs are only effective when… 1. 1.Viruses are at least 2 weeks old 2. 2.Used together with Firewalls 3. 3.Virus definitions are updated regularly 4. 4.Computers are scanned in Safe Mode

8 Creative Commons Licensed by Scott Wright. 8 http://www.streetwise-security-zone.com Information Security Risks What is the most risky Internet application for enterprises? (according to Ponemon Research Study 2008) 1. 1.Limewire 2. 2.Gmail 3. 3.YouTube 4. 4.Hotmail

9 Creative Commons Licensed by Scott Wright. 9 http://www.streetwise-security-zone.com Information Security Risks What is the most risky Internet application for enterprises? (according to Ponemon Research Study 2008) 1. 1.Limewire 2. 2.Gmail 3. 3.YouTube 4. 4.Hotmail Top 10 risky applications… 1- Limewire 2- YouTube 3- Gmail 4- Hotmail 5- Myspace 6- Facebook 7- Skype 8- Google Desktop Search 9- AIM 10- Google Talk Rated by IT Security Professionals in Enterprises (330 responses)

10 Creative Commons Licensed by Scott Wright. 10 http://www.streetwise-security-zone.com Information Security Risks Use of unauthorized applications causes over half of reported… 1. 1.Lost productivity 2. 2.Identity theft 3. 3.Virus infections on networks 4. 4.Data loss incidents

11 Creative Commons Licensed by Scott Wright. 11 http://www.streetwise-security-zone.com Information Security Risks Use of unauthorized applications causes over half of reported… (according to InsightExpress Study 2008) 1. 1.Lost productivity 2. 2.Identity theft 3. 3.Virus infections on networks 4. 4.Data loss incidents Other causes of Data Loss 1- Misuse of corporate computers 2- Unauthorized physical or network access 3- Remote worker network copying 4- Sharing of passwords, or weak passwords 100 IT professionals and 100 users surveyed.

12 Creative Commons Licensed by Scott Wright. 12 http://www.streetwise-security-zone.com Information Security Threats Phishing is a type of attack where… 1. 1.Hackers probe a network looking for valuable information 2. 2.An employee takes property from work without permission 3. 3.Emails contain links to forged websites that collect usernames, passwords and other personal information 4. 4.An employee is bribed for inside information

13 Creative Commons Licensed by Scott Wright. 13 http://www.streetwise-security-zone.com Information Security Threats Phishing is a type of attack where… 1. 1.Hackers probe a network looking for valuable information 2. 2.An employee takes property from work without permission 3. 3.Emails contain links to forged websites that collect usernames, passwords and other personal information 4. 4.An employee is bribed for inside information

14 Creative Commons Licensed by Scott Wright. 14 http://www.streetwise-security-zone.com Join The Streetwise Security Zone Empower yourself and your team through Governance by Graffiti - Collaborating to secure your foundation for future growth Customize this presentation yourself, or get updates from… http://www.streetwise-security-zone.com http://www.streetwise-security-zone.com

15 Creative Commons Licensed by Scott Wright. 15 http://www.streetwise-security-zone.com This work is licensed under a Creative Commons Attribution 2.5 License. Creative Commons Attribution 2.5 License You may use it and change it, but please keep the attributions to the original author.


Download ppt "PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach"

Similar presentations


Ads by Google