SlideShare a Scribd company logo
1 of 13
Examine general training of employees of
your organization with respect to IT.
TEAM BLACK:
HETVI NAIK 101212340
PRIYANKA RAVIKUMAR 101265268
SUBASH GIRI 101165549
UMMEY HUMAYRA PONEY 101308277
UMANG PATEL 101235317
INTRODUCTION
• Why the general training is to be given
to the employees?
• The answer to that question is humans
are the most vulnerable asset of any
corporate organisation.
• Human factors needs to be considered
and make them secure first.
• In 2019 state of IT security survey found
that email and employee training was
listed on the top of problems faced by
IT security professionals.
• The Email scams (phishing)
• Malware
• Password security
• Removable media
• The safe internet habits
• Social engineering attacks
• Physical security and environment controls
• Clean desk policy
• Data management and privacy
• Bring Your Own Device(BYOD) policy.
THINGS TO
KEEP IN
MIND
Let's start..
Solution?
• Spread awareness about this kind
of social attacks with practical
drills.
• Not to open unsolicited emails
• Filter spam
• Be suspicious of attachments in
emails, websites and other
medias.
• Don’t install unauthorized
software or drives.
• Keep antivirus running and up to
date
EMAIL & MALWARE
• Email scams are phishing attacks,
one of the most common method
used by attacker to bypass a
corporate network, people are
most vulnerable to this tricks.
• Malware is dangerous piece of
software which gain access into
organisation and steals the data.
There are number of ways in
which they could get in but one of
them is phishing email.
PASSWORD
SECURITY
This may look like small thing but protecting password is really
important , poor password security is one of the biggest threats to
enterprise.
How to create strong password.
• Use unique password for each online account.
• Randomly generate password.
• It should be combination of alphabets , numerical and symbols.
• Using password manager is a good practice.
• Using of multi factor authentication is best way.
• Biometric authentication will be strongest solution to access.
REMOVABLE MEDIA
• USBs and CD are useful tools, but
they are threat to organisation at the
same time.
• As they can be manipulated by
attackers to enable malware to
bypass network security defences.
• This can cost a lot of damage to the
corporation.
How to be safe from this kind of
activities?
• Never plug untrusted removable
media into a computer
• Submit doubtful devices to
IT/security department.
• Disable autorun on all computers
SAFE INTERNET HABITS
Nowadays the number of malicious
websites are increasing day by day so
safe surfing on internet is very
important.
Employees should be aware of not
opening any of the untrusted websites.
This phony websites are using similar
domain names and just change it
slightly for example googgle.com
instead of google.com.
How to prevent this?
• Employees should know the
difference between the real and
fake one. Along with that the
difference between HTTP and
HTTPS and ability to identify
insecure connection.
• Downloading from torrent sites
should strictly be prohibited.
SOCIAL ENGINEERING ATTACKS
It is very dangerous and
unexpected , in this hackers try to
crack the opposite persons mind
and get the information on a
phone call. This type of attack is
known as “Vishing attack”.
Here the attacker will use phony
name and status and convince
victim to give information.
How to be safe?
• Do not trust anyone and give
information without inquiring about
that person who claims to be the
one.
• Training should be given and
awareness about this kind of attack
should be spread.
PHYSICAL
SECURITY AND
ENVIRONMENTAL
CONTROLS
Security isn’t about
computer only .
Shoulder surfing ,
impersonation, tailgating,
leave password on paper or
notebook page or on sticky
notes.
Leaving the devices control
after the use.
Physical security
malfunctioning.
How to be safe?
Check the security before
typing the password.
Secure your devices (lock in
safe place / use security
cable)
Always keep an eye behind
you so no once can tailgate.
Asking for ID and proper
verification of defend
against impersonation
CLEAN DESK POLICY
 Risk of information theft due to
sensitive information being left
unattended and visible in plain
view.
 Compliance requirement (ISO
27001, Data Protection Act).
 Besides, Clean = Green = Cheap.
 How to be safe?
• CDP should be part of an overall
Company Security Strategy.
• Should be written in clear instruction.
• Should be part of employee
orientation program.
• Regular check-up / monitoring of
policy implementation.
• Always check the surrounding for
suspicious activity.
DATA
MANAGEMENT
AND PRIVACY
Organisation have sensitive
information if any of it is exposed
then organisation would be in great
conflict.
They might face significant penalties.
How to keep it safe?
Protect data at every level.
Implement policies for keeping data
safe. Use of encryption software.
Appropriate storage location for
sensitive data.
Multi factor authentication and
password policies.
BYOD(BRING-
YOUR-OWN-
DEVICE)POLICY
This enable employees to bring their own device, but
this also falls into the category of a vulnerability as
personal devices are at a great risk.
How to protect personal devices from getting
exploited?
• First, to protect it with a secure strong password.
• Full data encryption on it.
• Usage of private network when the Wi-Fi is not
trustworthy.
• A proper update firewall and anti virus suggested
by security department.
• Regular scanning and not downloading stuff
from malicious websites.
CONCLUSION
Employees are a great assets in advancement of
company but are the biggest threat too. They should
be trained about attacks and the policies of keeping
the data safe. Monthly training and meetings to
spread knowledge and suggest tactics to defend this
type of malicious activities should be planned.

More Related Content

What's hot

Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social mediasanjeev kumar
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technologyBrad McAllister
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 nFatimaAmin26
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for SeniorsConnectSafely
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for ParentsMarian Merritt
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationjpl17
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threatsmkinzie
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidConnectSafely
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyMariam Sb
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2FatimaAmin26
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for ParentsRodolfo Salazar
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for ParentsScott Burnett
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 

What's hot (20)

Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Dos and don's on social media
Dos and don's on social mediaDos and don's on social media
Dos and don's on social media
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
Parents guide to technology
Parents guide to technologyParents guide to technology
Parents guide to technology
 
LIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to ChildrenLIFARS - Social Media Dangers to Children
LIFARS - Social Media Dangers to Children
 
Social Networking and Internet Safety
Social Networking and Internet SafetySocial Networking and Internet Safety
Social Networking and Internet Safety
 
Pp e safe online p2 n
Pp e safe online p2 nPp e safe online p2 n
Pp e safe online p2 n
 
Internet safety for kids
Internet safety for kidsInternet safety for kids
Internet safety for kids
 
Online Safety for Seniors
Online Safety for SeniorsOnline Safety for Seniors
Online Safety for Seniors
 
Internet Safety Presentation for Parents
Internet Safety Presentation for ParentsInternet Safety Presentation for Parents
Internet Safety Presentation for Parents
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Smartphone safety
Smartphone safetySmartphone safety
Smartphone safety
 
Cyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online ThreatsCyber Safety How Children Can Protect Themselves From Online Threats
Cyber Safety How Children Can Protect Themselves From Online Threats
 
Filters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aidFilters and monitoring: Panacea or band-aid
Filters and monitoring: Panacea or band-aid
 
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman ConsultancyCyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
Cyber Safety Hacks for Women and Children by Catalyst Woman Consultancy
 
Cyber saftey for parents
Cyber saftey for parentsCyber saftey for parents
Cyber saftey for parents
 
Pp e safe online p2
Pp e safe online p2Pp e safe online p2
Pp e safe online p2
 
Online Safety for Parents
Online Safety for ParentsOnline Safety for Parents
Online Safety for Parents
 
Internet Safety for Parents
Internet Safety for ParentsInternet Safety for Parents
Internet Safety for Parents
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 

Similar to Team black

1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSPreetiDevidas
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?Barry Caplin
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecuritySina Manavi
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups Marc Gallardo
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekomChristina Azzam
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Ruth Edmonds
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & ManufacturingEvan Francen
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 

Similar to Team black (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?IT Consumerization – iPad’ing the Enterprise or BYO Malware?
IT Consumerization – iPad’ing the Enterprise or BYO Malware?
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Byod
ByodByod
Byod
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 
An Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile SecurityAn Introduction on Design and Implementation on BYOD and Mobile Security
An Introduction on Design and Implementation on BYOD and Mobile Security
 
Privacy for tech startups
Privacy for tech startups Privacy for tech startups
Privacy for tech startups
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
TLabs - deutsche telekom
TLabs -  deutsche telekomTLabs -  deutsche telekom
TLabs - deutsche telekom
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
Cybersecurity: An FBI perspective: how cyber criminals exploit the goodness o...
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 

More from hetvi naik

plan for penetration test
plan for penetration testplan for penetration test
plan for penetration testhetvi naik
 
Cleaning equipment
Cleaning equipmentCleaning equipment
Cleaning equipmenthetvi naik
 
disadvantages of learning foreign language
disadvantages of learning foreign languagedisadvantages of learning foreign language
disadvantages of learning foreign languagehetvi naik
 
Face detection and recognition report with pi in single poster
Face detection and recognition report with pi in single posterFace detection and recognition report with pi in single poster
Face detection and recognition report with pi in single posterhetvi naik
 
BMC report for face detection and recognition using pi-3
BMC report for face detection and recognition using pi-3BMC report for face detection and recognition using pi-3
BMC report for face detection and recognition using pi-3hetvi naik
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition reporthetvi naik
 
Face detection and recognition with pi
Face detection and recognition with piFace detection and recognition with pi
Face detection and recognition with pihetvi naik
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pihetvi naik
 
Wireless power transfer report
Wireless power transfer reportWireless power transfer report
Wireless power transfer reporthetvi naik
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transferhetvi naik
 
Nb iot (naik hetvi)
Nb iot (naik hetvi)Nb iot (naik hetvi)
Nb iot (naik hetvi)hetvi naik
 
Region filling
Region fillingRegion filling
Region fillinghetvi naik
 
Number plate recogition
Number plate recogitionNumber plate recogition
Number plate recogitionhetvi naik
 

More from hetvi naik (16)

plan for penetration test
plan for penetration testplan for penetration test
plan for penetration test
 
Final ppt g08
Final ppt g08Final ppt g08
Final ppt g08
 
Cleaning equipment
Cleaning equipmentCleaning equipment
Cleaning equipment
 
disadvantages of learning foreign language
disadvantages of learning foreign languagedisadvantages of learning foreign language
disadvantages of learning foreign language
 
Face detection and recognition report with pi in single poster
Face detection and recognition report with pi in single posterFace detection and recognition report with pi in single poster
Face detection and recognition report with pi in single poster
 
BMC report for face detection and recognition using pi-3
BMC report for face detection and recognition using pi-3BMC report for face detection and recognition using pi-3
BMC report for face detection and recognition using pi-3
 
Face detection and recognition report
Face detection and recognition reportFace detection and recognition report
Face detection and recognition report
 
Face detection and recognition with pi
Face detection and recognition with piFace detection and recognition with pi
Face detection and recognition with pi
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
 
Wireless power transfer report
Wireless power transfer reportWireless power transfer report
Wireless power transfer report
 
wireless power transfer
wireless power transferwireless power transfer
wireless power transfer
 
Nb iot (naik hetvi)
Nb iot (naik hetvi)Nb iot (naik hetvi)
Nb iot (naik hetvi)
 
GRO n GO
GRO n GO GRO n GO
GRO n GO
 
AAA server
AAA serverAAA server
AAA server
 
Region filling
Region fillingRegion filling
Region filling
 
Number plate recogition
Number plate recogitionNumber plate recogition
Number plate recogition
 

Recently uploaded

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...Amil Baba Dawood bangali
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 

Recently uploaded (20)

Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
NO1 Certified Black Magic Specialist Expert Amil baba in Uae Dubai Abu Dhabi ...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 

Team black

  • 1. Examine general training of employees of your organization with respect to IT. TEAM BLACK: HETVI NAIK 101212340 PRIYANKA RAVIKUMAR 101265268 SUBASH GIRI 101165549 UMMEY HUMAYRA PONEY 101308277 UMANG PATEL 101235317
  • 2. INTRODUCTION • Why the general training is to be given to the employees? • The answer to that question is humans are the most vulnerable asset of any corporate organisation. • Human factors needs to be considered and make them secure first. • In 2019 state of IT security survey found that email and employee training was listed on the top of problems faced by IT security professionals.
  • 3. • The Email scams (phishing) • Malware • Password security • Removable media • The safe internet habits • Social engineering attacks • Physical security and environment controls • Clean desk policy • Data management and privacy • Bring Your Own Device(BYOD) policy. THINGS TO KEEP IN MIND
  • 4. Let's start.. Solution? • Spread awareness about this kind of social attacks with practical drills. • Not to open unsolicited emails • Filter spam • Be suspicious of attachments in emails, websites and other medias. • Don’t install unauthorized software or drives. • Keep antivirus running and up to date EMAIL & MALWARE • Email scams are phishing attacks, one of the most common method used by attacker to bypass a corporate network, people are most vulnerable to this tricks. • Malware is dangerous piece of software which gain access into organisation and steals the data. There are number of ways in which they could get in but one of them is phishing email.
  • 5. PASSWORD SECURITY This may look like small thing but protecting password is really important , poor password security is one of the biggest threats to enterprise. How to create strong password. • Use unique password for each online account. • Randomly generate password. • It should be combination of alphabets , numerical and symbols. • Using password manager is a good practice. • Using of multi factor authentication is best way. • Biometric authentication will be strongest solution to access.
  • 6. REMOVABLE MEDIA • USBs and CD are useful tools, but they are threat to organisation at the same time. • As they can be manipulated by attackers to enable malware to bypass network security defences. • This can cost a lot of damage to the corporation. How to be safe from this kind of activities? • Never plug untrusted removable media into a computer • Submit doubtful devices to IT/security department. • Disable autorun on all computers
  • 7. SAFE INTERNET HABITS Nowadays the number of malicious websites are increasing day by day so safe surfing on internet is very important. Employees should be aware of not opening any of the untrusted websites. This phony websites are using similar domain names and just change it slightly for example googgle.com instead of google.com. How to prevent this? • Employees should know the difference between the real and fake one. Along with that the difference between HTTP and HTTPS and ability to identify insecure connection. • Downloading from torrent sites should strictly be prohibited.
  • 8. SOCIAL ENGINEERING ATTACKS It is very dangerous and unexpected , in this hackers try to crack the opposite persons mind and get the information on a phone call. This type of attack is known as “Vishing attack”. Here the attacker will use phony name and status and convince victim to give information. How to be safe? • Do not trust anyone and give information without inquiring about that person who claims to be the one. • Training should be given and awareness about this kind of attack should be spread.
  • 9. PHYSICAL SECURITY AND ENVIRONMENTAL CONTROLS Security isn’t about computer only . Shoulder surfing , impersonation, tailgating, leave password on paper or notebook page or on sticky notes. Leaving the devices control after the use. Physical security malfunctioning. How to be safe? Check the security before typing the password. Secure your devices (lock in safe place / use security cable) Always keep an eye behind you so no once can tailgate. Asking for ID and proper verification of defend against impersonation
  • 10. CLEAN DESK POLICY  Risk of information theft due to sensitive information being left unattended and visible in plain view.  Compliance requirement (ISO 27001, Data Protection Act).  Besides, Clean = Green = Cheap.  How to be safe? • CDP should be part of an overall Company Security Strategy. • Should be written in clear instruction. • Should be part of employee orientation program. • Regular check-up / monitoring of policy implementation. • Always check the surrounding for suspicious activity.
  • 11. DATA MANAGEMENT AND PRIVACY Organisation have sensitive information if any of it is exposed then organisation would be in great conflict. They might face significant penalties. How to keep it safe? Protect data at every level. Implement policies for keeping data safe. Use of encryption software. Appropriate storage location for sensitive data. Multi factor authentication and password policies.
  • 12. BYOD(BRING- YOUR-OWN- DEVICE)POLICY This enable employees to bring their own device, but this also falls into the category of a vulnerability as personal devices are at a great risk. How to protect personal devices from getting exploited? • First, to protect it with a secure strong password. • Full data encryption on it. • Usage of private network when the Wi-Fi is not trustworthy. • A proper update firewall and anti virus suggested by security department. • Regular scanning and not downloading stuff from malicious websites.
  • 13. CONCLUSION Employees are a great assets in advancement of company but are the biggest threat too. They should be trained about attacks and the policies of keeping the data safe. Monthly training and meetings to spread knowledge and suggest tactics to defend this type of malicious activities should be planned.