Security Awareness – Essential Part of Security Management Ilze Murane.

Slides:



Advertisements
Similar presentations
Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Advertisements

Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Threats to I.T Internet security By Cameron Mundy.
Information Security Information Technology and Computing Services Information Technology and Computing Services
Issues Raised by ICT.
Online Safety 2.02 Remember the rules of online safety.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Final Exam Part 1. Internet Regulation Internet regulation according to internet society states that it is about restricting or controlling certain pieces.
Security for Seniors SeniorNet Help Desk
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
Spam Act 2003 Consumer Education and Awareness. About the ACA Independent government regulator Ensures industry compliance with legislation (Telecommunications.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Remember the rules of online safety.. Never disclose personal information Full name Home address Phone number Social security number Passwords Names of.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Safety and Security issues of using ICT Alys brooks.
What is Spam? d min.
Online Safety 2.02 Remember the rules of online safety.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
3.02 Rememberl the rules of online safety. Slide 1 AGENDA – OCTOBER 10, 2011 Lesson 3.2 – Online Safety (Read the Lesson) CW #14a – Vocabulary Matrix CW.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Technological Awareness for Teens and Young Adults.
Building Our IT Security Lines of Defense Working together to protect Government’s IT systems.
Online Safety The Campion School.
Information Technology Acceptable Use An Overview
2.02 Remember the rules of online safety.
Remember the rules of online safety.
2.02 Remember the rules of online safety.
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Security Awareness – Essential Part of Security Management Ilze Murane

Agenda  Security management  Security awareness in organization  Security awareness for home user  Questions for discussion

ISF Standard  Information Security Forum  The Standard of Good Practice for Information Security 

Security Management I  Management commitment  Security policy  Security organization –Information security function –Security awareness –Security classification –Ownership –Information risk analysis

Security Management II  Secure environment –Security architecture –Information privacy –Physical protection –Business continuity –Use of cryptography –Remote working

Security Management III  Malicious attack –Virus protection –Intrusion detection –Forensic investigations –Patch management  Management review –Security audit/review –Security monitoring

Security Awareness  Information security awareness is the degree to which every member of staff understands the importance of information security, their individual security responsibilities …and acts accordingly

Security Awareness in organization  Principle –Specific activities should be undertaken, such as a security awareness programme, to promote security awareness to all individuals who have access to the information and systems of the enterprise  Objective –To ensure all relevant individuals understand the key elements of information security and why it is needed, and understand their personal information security responsibilities

IT security lessons: example I  Passwords –Do not share passwords –Use ‘strong’ passwords –Don’t write passwords down

IT security lessons: example II  Viruses –Beware of viruses, particularly in attachments –Ensure that anti-virus software is installed and updated

IT security lessons: example III  and Internet use –Don’t send sensitive information over the Internet –Don’t publish your address in the Internet –Internet use must comply with corporate policies

Case study  Awareness “history” –IT security –Information security –Business Continuity Testing –Security including physical security  Regular seminars

From awareness to behaviour change  Security-positive behaviour should be encouraged by –making attendance at security awareness training compulsory –publicizing security successes and failures throughout the organization –linking security to personal performance objectives

Security Awareness for home user  No regulations  Personal risk experience  More electronic information –Internet banking  Everyone is in the Internet

Lessons for everybody  Main risks –Viruses –Spyware –Phishing –Spam  About –Safe usage –Safe internet browsing –Securing your computer

At school?  Other security (safety) –road traffic regulation –electricity (physics) –fire protection  IT security...

Questions? Discussion...

?  Is IT security concerns everybody  How to educate society  Special software/game  What are our responsibilities ...