You are on page 1of 18

SECURITY AWARENESS

- ITS TRAINING NOT TESTING


Presented By :
Reshma Wawhal
SCIT
KEEP YOUR EYES OPEN AND LISTEN

2
DON’T DO OVER IT ( INFORMATION
TECHNOLOGY)

3
WHY IS AWARENESS IMPORTANT?

4
RESEARCH

5
WHY HUMAN ?

THERE IS NO
PATCH FOR
HUMAN
STUPIDITY 6
PASSWORD PROTECTION
Passwords should meet or exceed
complexity requirements based on the risk.
Passwords should be changed frequently
based on risk.
Passwords should be protected from
exposure.
Don’t share your passwords.

7
PASSWORD COMPLEXITY
 All passwords, including initial passwords, must be
constructed, implemented, and maintained according to
the following guidelines:
 Strong passwords contain a minimum length of (8)
characters and are composed of the following
characteristics
 At least one numeric character (0-9).
 At least one lower case character (a-z).
 At least one upper case character (A-Z).
 At least one non-alphanumeric character* (~, !, @, #, $, %, ^,
&, *, (, ), -, =, +, ?, [, ], {, }).
8
HANDLING, RECEIPT, TRANSMISSION,
STORAGE, AND DESTRUCTION OF DOCUMENT
 Don’t leave system unlocked.
 Keep your document at secure place or
in a password protected drive or folder.
 Don’t use yellow stick paper.

 Use paper shedder.

 Destroy records and sensitive


information in a manner that precludes
reconstruction.
 Don’t Plug and play without protection

 Take backup.

 Delete unwanted and duplicate


information. 9
EMAIL PROTECTION
 Always Use Signature
 Don’t open any email having “
No - Subject” or from stranger
email id because it can have
Trojan or Worm.
 In case if you think something is
wrong immediately call network
administrator.

10
INTERNET USAGE
 Don’t click any link.
 Beware of phishing.

 Don’t use social network sites


during office hours.
 Don’t do chatting and share your
personal information.
 Don’t download from internet
without taking permission from
the concern authority.
 Don’t use proxy sites.

11
OFFICE ETIQUETTES
 Refrain from being loud because
someone must doing
evasdropping.
 Stay Away from Gossip
 The source of some malicious
gossip can be traced back to you,
then your job can be in jeopardy.
 Don’t use unlicensed software.

12
PHYSICAL SECURITY
 Wear badge card everyday
while coming to the office.
 Don’t allow piggy back.

 Report security violations


immediately.

13
EXPECT TECHNICAL PROBLEMS

14
GET HELP IMMEDIATELY

15
KNOW YOUR CONSTRAINT

16
REFERENCE
 Wikipedia
 http://www.scribd.com/doc/8697084/Security-issues-and
-recommendations-for-online-social-networks
 http://www.scribd.com/doc/9303263/Information-securit
y-awareness-in-financial-organizations
 http://www.scribd.com/doc/23420336/Information-Tech
nology-Security-Awareness

17
THANK YOU

18

You might also like