0% found this document useful (0 votes)
57 views

Cyber Secutiy Awareness Program Presentation

The Cyber Security Awareness Program provides training focused on security best practices to protect personal and organizational data from common cyber threats like phishing, social engineering, and weak passwords. It emphasizes the importance of strong passwords, browser security, and safe use of removable media. Participants are encouraged to recognize phishing attempts and implement security measures to safeguard their information.

Uploaded by

Pravin Ghadole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
57 views

Cyber Secutiy Awareness Program Presentation

The Cyber Security Awareness Program provides training focused on security best practices to protect personal and organizational data from common cyber threats like phishing, social engineering, and weak passwords. It emphasizes the importance of strong passwords, browser security, and safe use of removable media. Participants are encouraged to recognize phishing attempts and implement security measures to safeguard their information.

Uploaded by

Pravin Ghadole
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

CYBER SECURITY AWARENESS

PROGRAM

Mr. Pravin Ghadole


WHAT IS CYBER SECURITY AWARENESS TRAINING?

 The Cyber Security Awareness training, is focused


on security best practices. It highlights actions to
practice to help keep your data secure.

 Security Awareness is about protecting


information for you and your company.
WHO SHOULD TAKE THIS TRAINING?

 This training is for any employee or individual


who wants to better understand the most
common cyber threats and what they can do to
protect themselves and their organizations.
WHAT IS PHISHING?

 Phishing is a cybercrime that uses tactics including


deceptive emails, websites and text messages to
steal confidential personal and corporate information.

 6 Clues That You Are A Target Of A Phishing Email


 Sender: Just because you know the person whose name is
on the email doesn't make it safe.

 Salutation: Take a good look at the salutation. If it says


"Dear client," "Dear Customer" or "Dear Valued
Customer," instead of your name, beware!

 Content: Scammers try to create a sense of urgency so


that you act rather that think (e.g., your account will be
blocked!). Poor grammar and spelling mistakes?
CONT.

 Link or Button: Emails usually try to get you to click a


link or button, which takes you to a fake website or
installs malware. Unless you can confirm the
sender's identity, you should never click.

 Attachment: When you open a scammer's


attachment, you open the door to malware. Malware
can wreak havoc on your computer or even your
organization's entire network.

 Contact Information: Legitimate organizations want


you to get in touch with them, if necessary. They
show their contact information in their email so you
can call them and verify that they are who they say
they are.
CONT. – EXAMPLE
https://infosecawareness.in/news
PASSWORDS

 A strong password is the main barrier keeping


most of your online accounts from being hacked.
Without up to date practices, you might be using
passwords that cyber-frauds can easily guess
within hours.

 How to Create a Strong Password?


 Is it long? Try for over 10-12 characters minimum but
aim to make it longer if possible.

 Is it hard to guess? You should avoid sequences


(“12345” “qwerty”)

 Does it use varied character types?


CONT.

 Does it avoid apparent character substitutes? For example,


you might use the number zero “0” in place of the letter
“O.

 Does it use a rule that’s hard for computers to guess?


where you are replacing the first two letters of each word
with numbers and symbols. This might look like: “?4ee” in
place of “tree”.

 To stay safe, don’t do the following:


 Write down passwords on paper.
 Save passwords in your phone’s notes app.
 Save in your browser’s autofill password saver.

 Ultimately, remember that if your password is convenient


for you, it’s probably convenient for hackers too. Complex
passwords are the best way for you to protect yourself.
BROWSER SECURITY

 Web browser security is an essential criterion to


safeguard user’s data which could be easily
accessible by attackers.

 How do we keep web security sanity?


 Update your Web browser to the latest version.
 Select Automatic clear history option when you exit
from the browser.
 Do not store passwords in your browser
 Using encrypted connections to access websites -
“http” (not encrypted) or “https” (encrypted)
CONT.
 Example: Brave is one of the safest browsers on
the market today.
INFORMATION SECURITY

 Information security as the "protection of


information and information systems from
unauthorized access, use, disclosure, disruption,
modification, or destruction to provide
confidentiality, integrity, and availability."

 How to ensure Information Security?


 Information Security Policy: Information security
policy is a document that an enterprise draws up,
based on its specific needs and quirks.

 It
helps to establish what data to protect and in what
ways.
REMOVABLE MEDIA

 Removable media and devices must only be


plugged or inserted into your computer if you
trust/know the source.

 Other preventive and detective measures would


be:
 Install, run, and update anti-malware/anti-virus
software on your computer.
 Do not enable auto-run features. These features
automatically run whatever programs are installed
on the media or device.
 Delete data on your computer, media, or device once
its usefulness has expired. Redundancy of data
results in more potential risks.
SOCIAL ENGINEERING

 Social engineering is the art of manipulating


people so they give up confidential information.
CONT.

 3 ways to spot social engineering techniques


 Using fear as a motivator: Sending threatening or
intimidating emails, phone calls and texts that
appear to come from an authority figure such as a
police officer, the tax department.

 Urgent requests: Suspicious emails or texts that


include urgent requests for personal information is a
major red flag that that someone is trying to trick
you.

 Irresistible
opportunities: If an online contact offers
you free access to an app, game or program in
exchange for login credentials, beware – you should
never shared your login credentials with anyone.
USEFUL LINKS

 https://www.csk.gov.in/

 https://infosecawareness.in/home/index.php

 https://infosecawareness.in/register

 https://cybercrime.gov.in/Default.aspx

 https://estore.nism.ac.in/cyber-security-foundatio
n
/

You might also like