SlideShare a Scribd company logo
1 of 21
Intro to Information Security
 We are living in an Information Age.
 Information is an asset which, like other
important business assets, has value to an
organization and consequently needs to be
suitably protected.
Can exist in many forms
 data stored on computers
 transmitted across networks
 printed out
 Exist on web
 Exist as videos, audio, sms
 written on a paper sent by fax
 stored on disks
 held on microfilm
 spoken in conversations over the
telephone
 ..
Whatever form the information takes, or means by which it is shared or
stored, it should always be appropriately protected throughout its life
cycle
Information Life Cycle
Information can be :
Created Stored Destroyed ?
Processed Transmitted
Used – (for proper and improper purposes)
Lost! Corrupted!
Copied
Natural calamities
4
Virus
Version Control
Problems
INET
Leased
Dial In
VSAT
Systems / Network
Failure
Theft , Sabotage,
Misuse, Hacking
Unrestricted Access
High User
knowledge of IT
sys.
Lack of
documentation
Fire
 protects information from a range of
threats
 Ensures IT uptime
 ensures business continuity
 Protects company’s reputation
 minimizes financial loss
 maximizes return on
investments and business
opportunities
Information Security is about protecting Information
through selection of appropriate Security Controls
I
n
f
o
r
m
a
t
i
o
n
S
y
s
t
e
m
s
L
o
g
i
c
a
l
S
e
c
u
r
i
t
y
P
h
y
s
i
c
a
l
S
e
c
u
r
i
t
y
O
r
g
a
n
i
s
a
t
i
o
n
a
l
a
n
d
P
r
o
c
e
d
u
r
a
l
S
e
c
u
r
i
t
y
 Information security is what keeps valuable information ‘free of
danger’ (protected, safe from harm)
 It is not something you buy, it is something you do
 It’s a process not a product
 It is achieved using a combination of suitable strategies and
approaches
 Determining the risks to information and treating them
accordingly (proactive risk management)
 Avoiding, preventing, detecting and recovering from incidents
 Securing people, processes and technology … not just IT!
Confidentiality
Making information
accessible only to those
authorized to use it
Integrity
Safeguarding the accuracy
and completeness of
information and processing
methods
Availability
Ensuring that information
is available when required
People who use or have an interest in our
information security include:
 Shareholders / owners
 Management & staff
 Customers / clients, suppliers & business
partners
 Service providers, contractors, consultants
& advisors
 Authorities, regulators & judges
Our biggest threats arise from people (social
engineers, unethical competitors, hackers,
fraudsters, careless workers, bugs, flaws …),
yet our biggest asset is our people (e.g.
security-aware employees who spot trouble
early)
 Processes are work practices or workflows, the steps
or activities needed to accomplish business objectives.
 Processes are described in procedures.
 Information security policies and procedures define
how we secure information appropriately and
repeatedly.
 Cabling, data/voice networks and equipment
 Telecommunications services (PABX, VoIP, ISDN,
videoconferencing)
 Phones, cellphones, PDAs
 Computer servers, desktops and associated data
storage devices (disks, tapes)
 Operating system and application software
 Paperwork, files
 Security technologies
 Locks, barriers, card-access systems, CCTV
So how do
we secure
our
information
assets?
ISO 27001 Information
Security Management
Standard formally specifies a
management system.
 Ensure your PC is getting antivirus updates and
patches.
 Protect your laptop during trips.
 Use corporate internet facilities only for
legitimate and authorized official purposes.
 Ensure sensitive information the computer
screen is not visible to others. Apply a Screen
Saver.
 Use corporate Email for official purposes only.
 Store confidential information (physical
documents / files) under lock and key.
 Protect your user ID and password.
 Ensure your important files are being taken
back-up of.
 Keep complex passwords and change them
routinely.
 Read and comply with company Information
Security Policies and Procedures.
×Don’t store sensitive information in portable
device without strong encryption.
×Don’t leave your computer / sensitive
documents unlocked.
×Don’t discuss something sensitive in public
place. People around you may be listening to
your conversation.
×Don't download data from doubtful sources.
×Don't visit untrustworthy sites out of
curiosity.
×Don't use illegal software and programs.
×Don't download programs without
permission of IT.
×Don't open email attachments from unknown
sources.
×Don't send mail bomb, forward or reply to
junk email or hoax message.
×Don’t click on links embedded in spam
mails.
×Don’t buy things or make charity donations
in response to spam email.
×Don’t share your Password or Id. Cards with
others.
×Don't let others watch over your shoulder
while logging in or doing online transactions
× Don’t allow unauthorized visitors in the
office premises
×Don’s use personal computing devices in
office unless authorized by management
×Don’t hack

More Related Content

Similar to Intro to Information Security.ppt

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecuritylearnt
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and driversFreeform Dynamics
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsKimarie Brown
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMANAND MURALI
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.IGN MANTRA
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0Jon Collins
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 

Similar to Intro to Information Security.ppt (20)

information security
information securityinformation security
information security
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
InformationSecurity
InformationSecurityInformationSecurity
InformationSecurity
 
Kevin Wharram Security Summit
Kevin Wharram Security SummitKevin Wharram Security Summit
Kevin Wharram Security Summit
 
Data security strategies and drivers
Data security strategies and driversData security strategies and drivers
Data security strategies and drivers
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
INFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEMINFORMATION SECURITY SYSTEM
INFORMATION SECURITY SYSTEM
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
ISO 27001 Awareness IGN Mantra 2nd Day, 1st Session.
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Secure Mobile Working 1.0
Secure Mobile Working 1.0Secure Mobile Working 1.0
Secure Mobile Working 1.0
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Intro to Information Security.ppt

  • 2.  We are living in an Information Age.  Information is an asset which, like other important business assets, has value to an organization and consequently needs to be suitably protected.
  • 3. Can exist in many forms  data stored on computers  transmitted across networks  printed out  Exist on web  Exist as videos, audio, sms  written on a paper sent by fax  stored on disks  held on microfilm  spoken in conversations over the telephone  .. Whatever form the information takes, or means by which it is shared or stored, it should always be appropriately protected throughout its life cycle Information Life Cycle Information can be : Created Stored Destroyed ? Processed Transmitted Used – (for proper and improper purposes) Lost! Corrupted! Copied
  • 4. Natural calamities 4 Virus Version Control Problems INET Leased Dial In VSAT Systems / Network Failure Theft , Sabotage, Misuse, Hacking Unrestricted Access High User knowledge of IT sys. Lack of documentation Fire
  • 5.  protects information from a range of threats  Ensures IT uptime  ensures business continuity  Protects company’s reputation  minimizes financial loss  maximizes return on investments and business opportunities Information Security is about protecting Information through selection of appropriate Security Controls I n f o r m a t i o n S y s t e m s L o g i c a l S e c u r i t y P h y s i c a l S e c u r i t y O r g a n i s a t i o n a l a n d P r o c e d u r a l S e c u r i t y
  • 6.  Information security is what keeps valuable information ‘free of danger’ (protected, safe from harm)  It is not something you buy, it is something you do  It’s a process not a product  It is achieved using a combination of suitable strategies and approaches  Determining the risks to information and treating them accordingly (proactive risk management)  Avoiding, preventing, detecting and recovering from incidents  Securing people, processes and technology … not just IT!
  • 7. Confidentiality Making information accessible only to those authorized to use it Integrity Safeguarding the accuracy and completeness of information and processing methods Availability Ensuring that information is available when required
  • 8.
  • 9. People who use or have an interest in our information security include:  Shareholders / owners  Management & staff  Customers / clients, suppliers & business partners  Service providers, contractors, consultants & advisors  Authorities, regulators & judges
  • 10. Our biggest threats arise from people (social engineers, unethical competitors, hackers, fraudsters, careless workers, bugs, flaws …), yet our biggest asset is our people (e.g. security-aware employees who spot trouble early)
  • 11.  Processes are work practices or workflows, the steps or activities needed to accomplish business objectives.  Processes are described in procedures.  Information security policies and procedures define how we secure information appropriately and repeatedly.
  • 12.  Cabling, data/voice networks and equipment  Telecommunications services (PABX, VoIP, ISDN, videoconferencing)  Phones, cellphones, PDAs  Computer servers, desktops and associated data storage devices (disks, tapes)  Operating system and application software  Paperwork, files  Security technologies  Locks, barriers, card-access systems, CCTV
  • 13.
  • 14. So how do we secure our information assets?
  • 15. ISO 27001 Information Security Management Standard formally specifies a management system.
  • 16.
  • 17.  Ensure your PC is getting antivirus updates and patches.  Protect your laptop during trips.  Use corporate internet facilities only for legitimate and authorized official purposes.  Ensure sensitive information the computer screen is not visible to others. Apply a Screen Saver.  Use corporate Email for official purposes only.
  • 18.  Store confidential information (physical documents / files) under lock and key.  Protect your user ID and password.  Ensure your important files are being taken back-up of.  Keep complex passwords and change them routinely.  Read and comply with company Information Security Policies and Procedures.
  • 19. ×Don’t store sensitive information in portable device without strong encryption. ×Don’t leave your computer / sensitive documents unlocked. ×Don’t discuss something sensitive in public place. People around you may be listening to your conversation. ×Don't download data from doubtful sources.
  • 20. ×Don't visit untrustworthy sites out of curiosity. ×Don't use illegal software and programs. ×Don't download programs without permission of IT. ×Don't open email attachments from unknown sources. ×Don't send mail bomb, forward or reply to junk email or hoax message. ×Don’t click on links embedded in spam mails.
  • 21. ×Don’t buy things or make charity donations in response to spam email. ×Don’t share your Password or Id. Cards with others. ×Don't let others watch over your shoulder while logging in or doing online transactions × Don’t allow unauthorized visitors in the office premises ×Don’s use personal computing devices in office unless authorized by management ×Don’t hack

Editor's Notes

  1. 3
  2. 4
  3. 5