We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byHailey Dean
Modified over 4 years ago
Copyright © 2011 IsecT Ltd. Securing people Security awareness seminar for IT professionals Information Security Awareness September 2011
2 Copyright © 2011 IsecT Ltd. Introduction Do you use Facebook, MySpace, Flickr, Linked In, Blogger or Twitter? Do your colleagues, friends or family use them? Do you tend to trust the people you know? Are you human?
3 Copyright © 2011 IsecT Ltd. The risks
4 Copyright © 2011 IsecT Ltd. Low-end risk
5 Copyright © 2011 IsecT Ltd. High-end risk? Personal information on as many as 35 million users of a South Korean social network site may have been exposed as the result of what has been described as the country's biggest ever hack attack … Names, phone numbers, email addresses, and other details may have been exposed through the Cyworld hack, which follows previous attacks against South Korean government sites and financial service firms. North Korea has been implicated in some of these hacks. … The RegisterThe Register 28 th July 2011
6 Copyright © 2011 IsecT Ltd. Leveraging information
7 Copyright © 2011 IsecT Ltd. Social engineering
8 Copyright © 2011 IsecT Ltd. Social engineering
9 Copyright © 2011 IsecT Ltd. Social engineering
10 Copyright © 2011 IsecT Ltd. D elay A uthenticate R esist T ransfer Dealing with social engineers General employees Front-line employees
11 Copyright © 2011 IsecT Ltd. Other controls
12 Copyright © 2011 IsecT Ltd. Conclusion You may believe you are immune to the kinds of attacks we have discussed … but are your colleagues, friends, bosses, family members, suppliers …? Please help us raise awareness: knowing that we might be attacked, what forms attacks may take, and how to respond (remember DART) are important controls
13 Copyright © 2011 IsecT Ltd. Further information Speak to colleagues Visit the intranet Security Zone Contact the Information Security Manager Read these books …
Building our security culture
Copyright © 2011 IsecT Ltd. Social engineering Spot it and stop it September 2011 Security awareness seminar.
Making Your Business Grow
Minimum Data-set for all mental health referrals.
© 2011 Amadeus North America, Inc. All rights reserved. Trademark of Amadeus North America, Inc. and/or affiliates. Amadeus is a registered trademark of.
Final Year Projects Some tips
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Tyntec Research: Brazilian and Russian Social Media Users Are Concerned About Identity Theft – UK and US Counterparts Worry Most About Lack of Information.
Thank you for your cooperation. We will begin shortly.
LGA: AFS Submission & GRAP Updates 06 September 2013.
Penn State Smeal MBA Program Establishing your LinkedIn Profile presented by Emily Giacomini August 22, 2012.
25 % of users don’t bother with privacy settings 1.11 billion users 665 million daily users 23 % of users check their account 5 times a day 1in10 people.
East Midlands Councils Member Development Skills Portal Survey February 2012.
Sedex: Registration and Account Set Up Instructions
TASK 2: WHO DO YOU SEE?. TASK 2: WHO DO YOU SEE?
Privacy: Facebook, Twitter
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks Reporter : 鄭志欣 Advisor: Hsing-Kuo Pao Date : 2010/12/06 1.
SECURITY AND SOCIAL ENGINEERING US Department of Commerce Office of Security Updated 09/26/11 Security is Everyone's Responsibility – See Something, Say.
Using LinkedIn. LinkedIn At A Glance LinkedIn is a social network aimed toward professionals More than 50 million users Usually seen as an online version.
© 2018 SlidePlayer.com Inc. All rights reserved.