SlideShare uma empresa Scribd logo
1 de 3
Abstract
Cyber Security plays an important role in the field of information technology .Securing the
information have become one of the biggest challenges in the present day. Whenever we think
about the cyber security, the first thing that comes to our mind is ‘cyber crimes’ which are
increasing immensely day by day. Various Governments and companies are taking many
measures in order to prevent these cybercrimes. Besides various measures, cyber security is still
a very big concern to many. This paper mainly focuses on challenges faced by cyber security. It
also focuses on latest about the cyber security techniques, ethics and the trends changing the
face of cyber security.
Introduction
Today we are able to send and receive any form of data it may be an e-mail, an audio or video
just by the click of a button but did he ever think how securely our data is being transmitted or
sent to the other person safely without any leakage of information? The answer lies in cyber
security. Today Internet is the fastest growing infrastructure in everyday life. In today’s technical
environment, many latest technologies are changing the face of the humanity. However, due to
these emerging technologies, we are unable to safeguard our private information in a very
effective way and hence these days’ cybercrimes are increasing day by day. Today most of
commercial transactions are online, so this field required a high quality of security for transparent
and best transactions. Hence, cyber security has become a latest issue. The scope of cyber
security is not just limited to securing the information in IT industry but also to various other
fields like cyber space etc.
Cyber security awareness and practices
Survey Security
On the survey we prepared we included question asking the user knowledge and experience
regarding the cyber security. To make the survey secured we include password we provide to the
respondent for verification purpose before taking the online survey. We also ensure that only the
respondent will have the password.
Survey Feedback
We provided set of question that tackles cyber security for our respondents to answer to know
what is there opinion regarding cyber security. These questions focused on the daily situation
that we encounter. The respondents may be aware on some threats on the cyber space specially
the common once but base on the data we gather from the survey most of the employee is not
fully aware what cyber security is. They are not that knowledgeable in terms of the threats that
is within the cyber space or internet.
Based on the survey that we conduct these is our conclusions for the fout respondents.
Justine Reyes – is well aware of the cyber security base on his answers on the survey he answer
John Michale Vidal – his not fully aware on what is cyber security and failed to answer some of
the questions given
Paul Decena – is also well aware of the cyber security base on the answer he had given
Carlo Jimenez – is doesn’t have any knowledge what is cyber security
Based on the survey half of the respondents lacks knowledge on the data security, which is a bit
alarming because now a day most transaction are thru online.
Cyber security program awareness
We do prepare some slides that could help others to be aware what cyber security is and some
tips and guidelines to protect ourselves on potential threat on the cyber space titled Keeping-
Yourself-Safe-Physically-and-Online-in6-1
Policy and procedure
We prepared a set of Policy and Procedure for Clean Desk Policy to help data privacy more
secured to work environment
Cyber security awareness and practicesmaintenance
Discussion summary
In this study we made we saw some gaps about cyber security awareness and practices and the
impact these gaps might have on a workplace. One of them is lack of trainings or seminar for our
workforce we think that this should be address. Having policies on the work place would also be
a great practice to protect our data from aggressors that might steal our data
We do believe that the program that we deliver will help the company to start securing their data
and will help the workforce to be more knowledgeable in terms of data security not only on the
work place but also with their personal data and to protect it.
We think having trainings and seminars will be a big help a lot to address cyber security on
workspace to educate our work force. Developing company policy regarding on the cyber security
is necessary on our perspective for better data protection.
Information Update
We prepared the information update about Hoaxes entitled Click Bait

Mais conteúdo relacionado

Semelhante a portfolio.docx

How to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docHow to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docEmmanuelDaniel41
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdforage technologies
 
Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1brockdebroah
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Dana Gardner
 
CYBER AWARENESS.pptx cyber security ppt harika
CYBER AWARENESS.pptx cyber security ppt harikaCYBER AWARENESS.pptx cyber security ppt harika
CYBER AWARENESS.pptx cyber security ppt harikapalaharika13
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...Dana Gardner
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)Christopher Lisasi
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxjustine1simpson78276
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.netethnos
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia Randhawa
 

Semelhante a portfolio.docx (20)

How to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.docHow to Become a Cyber Security Specialist.doc
How to Become a Cyber Security Specialist.doc
 
Importance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdfImportance of Cyber Security for Company.pdf
Importance of Cyber Security for Company.pdf
 
Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1Answer each question in one to two paragraphs.Question 1
Answer each question in one to two paragraphs.Question 1
 
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
Cybersecurity Standards: The Open Group Explores Security and Ways to Assure ...
 
CYBER AWARENESS.pptx cyber security ppt harika
CYBER AWARENESS.pptx cyber security ppt harikaCYBER AWARENESS.pptx cyber security ppt harika
CYBER AWARENESS.pptx cyber security ppt harika
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
How to Migrate Your Organization to a More Security-Minded Culture – From Dev...
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
Ethnosit.net
Ethnosit.netEthnosit.net
Ethnosit.net
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Sonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovationSonia randhawa speaks on cybersecurity and innovation
Sonia randhawa speaks on cybersecurity and innovation
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

portfolio.docx

  • 1. Abstract Cyber Security plays an important role in the field of information technology .Securing the information have become one of the biggest challenges in the present day. Whenever we think about the cyber security, the first thing that comes to our mind is ‘cyber crimes’ which are increasing immensely day by day. Various Governments and companies are taking many measures in order to prevent these cybercrimes. Besides various measures, cyber security is still a very big concern to many. This paper mainly focuses on challenges faced by cyber security. It also focuses on latest about the cyber security techniques, ethics and the trends changing the face of cyber security. Introduction Today we are able to send and receive any form of data it may be an e-mail, an audio or video just by the click of a button but did he ever think how securely our data is being transmitted or sent to the other person safely without any leakage of information? The answer lies in cyber security. Today Internet is the fastest growing infrastructure in everyday life. In today’s technical environment, many latest technologies are changing the face of the humanity. However, due to these emerging technologies, we are unable to safeguard our private information in a very effective way and hence these days’ cybercrimes are increasing day by day. Today most of commercial transactions are online, so this field required a high quality of security for transparent and best transactions. Hence, cyber security has become a latest issue. The scope of cyber security is not just limited to securing the information in IT industry but also to various other fields like cyber space etc.
  • 2. Cyber security awareness and practices Survey Security On the survey we prepared we included question asking the user knowledge and experience regarding the cyber security. To make the survey secured we include password we provide to the respondent for verification purpose before taking the online survey. We also ensure that only the respondent will have the password. Survey Feedback We provided set of question that tackles cyber security for our respondents to answer to know what is there opinion regarding cyber security. These questions focused on the daily situation that we encounter. The respondents may be aware on some threats on the cyber space specially the common once but base on the data we gather from the survey most of the employee is not fully aware what cyber security is. They are not that knowledgeable in terms of the threats that is within the cyber space or internet. Based on the survey that we conduct these is our conclusions for the fout respondents. Justine Reyes – is well aware of the cyber security base on his answers on the survey he answer John Michale Vidal – his not fully aware on what is cyber security and failed to answer some of the questions given Paul Decena – is also well aware of the cyber security base on the answer he had given Carlo Jimenez – is doesn’t have any knowledge what is cyber security Based on the survey half of the respondents lacks knowledge on the data security, which is a bit alarming because now a day most transaction are thru online.
  • 3. Cyber security program awareness We do prepare some slides that could help others to be aware what cyber security is and some tips and guidelines to protect ourselves on potential threat on the cyber space titled Keeping- Yourself-Safe-Physically-and-Online-in6-1 Policy and procedure We prepared a set of Policy and Procedure for Clean Desk Policy to help data privacy more secured to work environment Cyber security awareness and practicesmaintenance Discussion summary In this study we made we saw some gaps about cyber security awareness and practices and the impact these gaps might have on a workplace. One of them is lack of trainings or seminar for our workforce we think that this should be address. Having policies on the work place would also be a great practice to protect our data from aggressors that might steal our data We do believe that the program that we deliver will help the company to start securing their data and will help the workforce to be more knowledgeable in terms of data security not only on the work place but also with their personal data and to protect it. We think having trainings and seminars will be a big help a lot to address cyber security on workspace to educate our work force. Developing company policy regarding on the cyber security is necessary on our perspective for better data protection. Information Update We prepared the information update about Hoaxes entitled Click Bait