Professional Documents
Culture Documents
Cybersecurity Real-
Life Applicable Skills
Cybersecurity
Awareness &
Mindset
Information Security
PART 1: CYBER RENAISSANCE-
CURRICULUM
Installing Installing updates and patches for the operating system and other software
Computer and mobile device hardening is the
process of securing a device by reducing its attack Disabling Disabling unnecessary services and protocols
surface and making it more resistant to tampering
and unauthorized access. Encrypting Encrypting sensitive data
Use strong, unique passwords for all of Be cautious of clicking on links or Avoid sharing sensitive personal
your social media accounts and enable downloading attachments from information, such as your home address
two-factor authentication. unknown sources. or phone number.
Be aware of the privacy settings on Keep your computer and mobile device
Avoid using public Wi-Fi networks when
each platform you use and adjust them updated with the latest security
accessing your social media accounts.
accordingly. patches.
Definition:
Phishing is a type of cyber-attack where the attacker
poses as a legitimate entity to trick individuals into
providing sensitive information, such as login
credentials or financial data.
PHISHING AWARENESS IN CYBERSECURITY
Secure • Secure entry points: Invest in security gates and doors or require
access cards and deploy “smart locks”.
Install • Install alarms: These devices are crucial security elements for warding
off intruders.
Guard maintain their data center in the room. So monitoring and even
securing access with security gates/access doors is especially
important.
Establish A Solid Security Posture: Leveraging physical security to enhance your cybersecurity.
Know who is on your property or in your building at all times by leveraging surveillance cameras!
(360 Visibility)
Consider when and how the person(s) got in! (Interview the person to Identify Access Points Used
To Enter)
Ensure that the person(s) present in your building with public/private access are authorized to be
PHYSICAL SECURITY AS A there; this leads to safer environment. (Verify identity and access privilege)
COMPONENT OF Lock down all areas of the property or office that house sensitive information or equipment.
CYBERSECURITY
Implement a system auditable via logs for the few designated and trusted individuals. Ex: server
rooms or HR offices with employees’ personal information, financial/medical/educational records
Identify and classify your assets and resources (what to protect): Use a tool like Qualys and other
managements system to establish IT Asset & Vulnerabilities Management.
Identify plausible threats (who to protect our assets from=hackers, competitors, malicious insiders,
egregious strangers, overly curious individuals= Threat Assessment)
Know the plausible vulnerabilities that threats may exploit (The likelihood of holes in the defense
to be exploited = outdated software/hardware/operating systems/anti-virus = attack-surface)
Identify the expected cost if bad things occur (financial losses, reputational damage, existential
threat, compliance hiccups) = the consequences<-->Risk Assessment
PHYSICAL SECURITY AS A COMPONENT
OF CYBERSECURITY
We understand physical security Human error and accidents may
Most cybersecurity solutions
risks. For example, an open door cause harm to people, property,
concentrate on anti-malware
increases the risk of and devices important for
tools as well as firewall
unauthorized people entering. cybersecurity(ex: Firewalls).
configurations and other data
Valuable goods that are visible Physical security is equally
security measures.
could be taken easily. important as cybersecurity.
Please Note:
Despite security innovations, risks have never been more impactful.
THANK YOU
FOR TUNING IN!
SECREDKNOWLEDGEINC@GMAIL.COM
INTERACTIVE Q&A
THANK YOU
FOR TUNING IN!
SECREDKNOWLEDGEINC@GMAIL.COM
CREATINGHAPPYHUMANS@GMAIL.COM
518-954-4464 / 518-414-4821