Cyber Security Awareness

M.Syarifudin, ST, OSCP, OSWP
M.Syarifudin, ST, OSCP, OSWP Information Security Trainer
Cyber Security:
Be Paranoid Please
Presented by

M.Syarifudin, ST, OSCP, OSWP

Surabaya, 17 April 2018

Seminar of Cyber Security Awareness

PT PJB (Pembangkitan Jawa Bali)

!1
Hello From Me
• Information Security Trainer & Speaker

• OSCP & OSWP Certified

• Official Indonesian Kali Linux Translator

• Homepage: fl3x.us
!2
We are going to Talk About
• IT Security Awareness

• The Importance of Security Awareness

• Cyber Attack Trend

• Essential Tips

• ISO 27001 Overview

• Pentest is needed
!3
IT Security Awareness
• Vital for an organization

• Entire organization’s responsibility

• IT system increase in complexity

• The technologies and vendors are not the indication of
success
!4
IT Security Awareness
• Should be supported regularly

• A requirement for compliance

• Weak security culture in the organization

• Need a security awareness program
!5
Security Awareness Program
• A Way to ensure that everyone at the organization has a
sense of security. Then it will be their responsibility.
!6
Security Awareness Program
As A CULTURE
ATTITUDES
PRACTICES
POLICIES
PROCESSES
SUCCESS
!7
Security Awareness Program Components
Communication Content
Checklists Controls
!8
Communication
• Regular Conversation

• Clear, Relevant, and Fun

• Security is very important for business
!9
Checklists
• Keep organized for developing, delivering, and
maintaining security awareness program

• Who, What, When, Where, Why, How
!10
Content
• Some references about security

• Security handbook for all employees

• Training program

• Group chat ( security issue and discussion )

• Role based guidelines
!11
Controls
• Some rules

• Need an approval based on role

• Prevention
!12
The Importance of Security Awareness
• Reduce the biggest risk (employees)

• Improve the awareness for protecting sensitive
information

• Helping employees to handle information securely
!13
The Importance of Security Awareness
• Reduce the risks of mishandling information

• Increase organizational understanding implementation of
security best practice

• Helping organization to prevent attacks
!14
Cyber Attack Trend
• Malware

• Ransomware

• Phishing

• Web Application Attack

• DoS
!15
Bad Habits
• Default password

• Same password for all accounts

• Disclose sensitive information
!16
Essential Tips
• IT team “sell” the awareness mindset

• Remind each other regarding the information security

• Keep your privacy and sensitive information

• Avoid reuse password

• Enable two step verification
!17
Essential Tips
• Make sure always using secure connection

• Make sure to always use the original software

• Always update the software and make sure it’s the latest
version

• Backup the data regularly

• Avoid torrent download (pirates && not safe)
!18
ISO 27001
• ISO/IEC 27001 is the best-known standard in the family
providing requirements for an information security
management system (ISMS).

• Helps organizations keep information assets secure
!19
What is ISMS?
• ISMS is a systematic approach to managing sensitive
company information so that it remains secure. 

• By applying a risk management process.
People
Processes
IT System
!20
Pentest is needed
!21
What is PenTest ?
Real Attacks The Target Gain
Access
Application NetworkSystem
22
About PenTest
23
Compromise IT System Security
Find SecurityVulnerabilitiesMust Have a Permission
Be Creative Exploit the SecurityVuln.
Bypass Security MechanismThink like an Attacker
Penetration Testing Execution Standard
24
Intelligence GatheringPre-engagement
Threat ModellingVulnerability Analysis
Exploitation Post Exploitation
Reporting
http://www.pentest-standard.org
Sample XSS Attack Vector
Execute the
JavaScript code Stealing Cookies
Log in without
credentials
Get a shellG0t root
!25
References
• https://www.pcisecuritystandards.org/documents/
PCI_DSS_V1.0_Best_Practices_for_Implementing_Security
_Awareness_Program.pdf

• https://www.tripwire.com/state-of-security/security-
awareness/how-to-build-a-successful-it-security-
awareness-program/

• https://www.threatstack.com/blog/how-to-implement-a-
security-awareness-program-at-your-organization/

• https://www.iso.org/isoiec-27001-information-security.html
!26
1 of 26

Recommended

Cyber Security Awareness Month 2017-Wrap-Up by
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
731 views9 slides
Cyber Security –PPT by
Cyber Security –PPTCyber Security –PPT
Cyber Security –PPTRajat Kumar
1.3K views17 slides
2015: The year-ahead-in-cyber-security by
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-securityStephen Cobb
4.1K views37 slides
Cyber security by
Cyber security Cyber security
Cyber security Samidha Gandhi
136 views27 slides
Cyber Security - awareness, vulnerabilities and solutions by
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsinLabFIB
3.5K views31 slides
Ceh intro by
Ceh introCeh intro
Ceh introAnimesh Roy
70 views18 slides

More Related Content

What's hot

Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2 by
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Damir Delija
3.6K views43 slides
Cyber awareness program by
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
758 views21 slides
Cybersecurity Awareness Session by Adam by
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamMohammed Adam
456 views27 slides
Security awareness-checklist 2019 by
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019Mustafa Kuğu
5K views12 slides
Cyber security # Lec 1 by
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1Kabul Education University
1.2K views40 slides
Cybersecurity training seminars, courses, cybersecurity laws by
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity lawsBryan Len
357 views10 slides

What's hot(20)

Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2 by Damir Delija
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Encase cybersecurity alat za proaktivnu kontrolu korporativne it sigurnosti 2
Damir Delija3.6K views
Cyber awareness program by Avanzo net
Cyber awareness programCyber awareness program
Cyber awareness program
Avanzo net758 views
Cybersecurity Awareness Session by Adam by Mohammed Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
Mohammed Adam456 views
Security awareness-checklist 2019 by Mustafa Kuğu
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
Mustafa Kuğu5K views
Cybersecurity training seminars, courses, cybersecurity laws by Bryan Len
Cybersecurity training seminars, courses, cybersecurity lawsCybersecurity training seminars, courses, cybersecurity laws
Cybersecurity training seminars, courses, cybersecurity laws
Bryan Len357 views
CyberSecurity - UH IEEE Presentation 2015-04 by Kyle Lai
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
Kyle Lai972 views
Cyber security government ppt By Vishwadeep Badgujar by Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
Vishwadeep Badgujar7.8K views
Steps and Tips to Protect Yourself and your Private Information while Online.... by Abzetdin Adamov
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
Abzetdin Adamov1.4K views
Importance of cyber crime security by Pavan Kuls
Importance of cyber crime security Importance of cyber crime security
Importance of cyber crime security
Pavan Kuls2K views
Cyber Security Awareness Session for Executives and Non-IT professionals by Krishna Srikanth Manda
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security in the Interconnected World by Russell_Kennedy
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
Russell_Kennedy782 views
2015 Cybercrime Trends – Things are Going to Get Interesting by IBM Security
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
IBM Security7.6K views
Information Security Awareness by SnapComms
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms4.4K views
Cybercrime and the Hidden Perils of Patient Data by Stephen Cobb
Cybercrime and the Hidden Perils of Patient DataCybercrime and the Hidden Perils of Patient Data
Cybercrime and the Hidden Perils of Patient Data
Stephen Cobb983 views
Cyber Security 2017 Challenges by Leandro Bennaton
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
Leandro Bennaton20.6K views

Similar to Cyber Security Awareness

Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program by
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramFRSecure
1.3K views37 slides
Slide Deck - CISSP Mentor Program Class Session 1 by
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1FRSecure
2.2K views33 slides
Prepare Yourself to Become Infosec Professional by
Prepare Yourself to Become Infosec ProfessionalPrepare Yourself to Become Infosec Professional
Prepare Yourself to Become Infosec ProfessionalM.Syarifudin, ST, OSCP, OSWP
14.4K views26 slides
HDI Capital Area Slides August 17, 2018 by
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018hdicapitalarea
148 views49 slides
An Introduction To IT Security And Privacy In Libraries by
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In LibrariesBlake Carver
459 views84 slides
ISE - InfoSec Essentials .. an introduction by
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
1.3K views10 slides

Similar to Cyber Security Awareness(20)

Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program by FRSecure
Slide Deck – Class Session 1 – FRSecure CISSP Mentor ProgramSlide Deck – Class Session 1 – FRSecure CISSP Mentor Program
Slide Deck – Class Session 1 – FRSecure CISSP Mentor Program
FRSecure1.3K views
Slide Deck - CISSP Mentor Program Class Session 1 by FRSecure
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
FRSecure2.2K views
HDI Capital Area Slides August 17, 2018 by hdicapitalarea
HDI Capital Area Slides August 17, 2018HDI Capital Area Slides August 17, 2018
HDI Capital Area Slides August 17, 2018
hdicapitalarea148 views
An Introduction To IT Security And Privacy In Libraries by Blake Carver
 An Introduction To IT Security And Privacy In Libraries An Introduction To IT Security And Privacy In Libraries
An Introduction To IT Security And Privacy In Libraries
Blake Carver459 views
ISE - InfoSec Essentials .. an introduction by Dinesh O Bareja
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
Dinesh O Bareja1.3K views
Cybersecurity in 2016 by Ben Finke
Cybersecurity in 2016Cybersecurity in 2016
Cybersecurity in 2016
Ben Finke129 views
Using Technology and People to Improve your Threat Resistance and Cyber Security by Stephen Cobb
Using Technology and People to Improve your Threat Resistance and Cyber SecurityUsing Technology and People to Improve your Threat Resistance and Cyber Security
Using Technology and People to Improve your Threat Resistance and Cyber Security
Stephen Cobb723 views
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue by Murray Security Services
Global Shortage on Cyber Security Workforce - An Analysis of a Complex IssueGlobal Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
Global Shortage on Cyber Security Workforce - An Analysis of a Complex Issue
TIES 2013 Education Technology Conference by Evan Francen
TIES 2013 Education Technology ConferenceTIES 2013 Education Technology Conference
TIES 2013 Education Technology Conference
Evan Francen327 views
Information Security is NOT an IT Issue by Evan Francen
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
Evan Francen550 views
Cyber Security 101: Training, awareness, strategies for small to medium sized... by Stephen Cobb
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb21.6K views
Kaseya Kaspersky Breaches by Kaseya
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
Kaseya2.8K views
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies by David Dourgarian
The Works 2018 - Industry Track - Cybersecurity for Staffing AgenciesThe Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
The Works 2018 - Industry Track - Cybersecurity for Staffing Agencies
David Dourgarian58 views

More from M.Syarifudin, ST, OSCP, OSWP

My pwk & oscp journey by
My pwk & oscp journeyMy pwk & oscp journey
My pwk & oscp journeyM.Syarifudin, ST, OSCP, OSWP
25.5K views14 slides
Wireless LAN Security-Bimtek Kominfo by
Wireless LAN Security-Bimtek KominfoWireless LAN Security-Bimtek Kominfo
Wireless LAN Security-Bimtek KominfoM.Syarifudin, ST, OSCP, OSWP
13.3K views10 slides
Social Network Security & Backdooring email by
Social Network Security & Backdooring emailSocial Network Security & Backdooring email
Social Network Security & Backdooring emailM.Syarifudin, ST, OSCP, OSWP
16.6K views20 slides
iCrOSS 2013_Pentest by
iCrOSS 2013_PentestiCrOSS 2013_Pentest
iCrOSS 2013_PentestM.Syarifudin, ST, OSCP, OSWP
14.8K views39 slides
Pentest with Metasploit by
Pentest with MetasploitPentest with Metasploit
Pentest with MetasploitM.Syarifudin, ST, OSCP, OSWP
23.6K views36 slides
IPTV Security by
IPTV SecurityIPTV Security
IPTV SecurityM.Syarifudin, ST, OSCP, OSWP
18.4K views17 slides

Recently uploaded

Narration lesson plan by
Narration lesson planNarration lesson plan
Narration lesson planTARIQ KHAN
59 views11 slides
GSoC 2024 by
GSoC 2024GSoC 2024
GSoC 2024DeveloperStudentClub10
81 views15 slides
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptx by
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxGopal Chakraborty Memorial Quiz 2.0 Prelims.pptx
Gopal Chakraborty Memorial Quiz 2.0 Prelims.pptxDebapriya Chakraborty
684 views81 slides
11.30.23 Poverty and Inequality in America.pptx by
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptxmary850239
167 views33 slides
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdf by
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfCWP_23995_2013_17_11_2023_FINAL_ORDER.pdf
CWP_23995_2013_17_11_2023_FINAL_ORDER.pdfSukhwinderSingh895865
536 views6 slides
ICS3211_lecture 08_2023.pdf by
ICS3211_lecture 08_2023.pdfICS3211_lecture 08_2023.pdf
ICS3211_lecture 08_2023.pdfVanessa Camilleri
187 views30 slides

Recently uploaded(20)

Narration lesson plan by TARIQ KHAN
Narration lesson planNarration lesson plan
Narration lesson plan
TARIQ KHAN59 views
11.30.23 Poverty and Inequality in America.pptx by mary850239
11.30.23 Poverty and Inequality in America.pptx11.30.23 Poverty and Inequality in America.pptx
11.30.23 Poverty and Inequality in America.pptx
mary850239167 views
AI Tools for Business and Startups by Svetlin Nakov
AI Tools for Business and StartupsAI Tools for Business and Startups
AI Tools for Business and Startups
Svetlin Nakov111 views
Structure and Functions of Cell.pdf by Nithya Murugan
Structure and Functions of Cell.pdfStructure and Functions of Cell.pdf
Structure and Functions of Cell.pdf
Nithya Murugan701 views
Ch. 8 Political Party and Party System.pptx by Rommel Regala
Ch. 8 Political Party and Party System.pptxCh. 8 Political Party and Party System.pptx
Ch. 8 Political Party and Party System.pptx
Rommel Regala53 views
REPRESENTATION - GAUNTLET.pptx by iammrhaywood
REPRESENTATION - GAUNTLET.pptxREPRESENTATION - GAUNTLET.pptx
REPRESENTATION - GAUNTLET.pptx
iammrhaywood107 views
Psychology KS4 by WestHatch
Psychology KS4Psychology KS4
Psychology KS4
WestHatch90 views
The Accursed House by Émile Gaboriau by DivyaSheta
The Accursed House  by Émile GaboriauThe Accursed House  by Émile Gaboriau
The Accursed House by Émile Gaboriau
DivyaSheta212 views
Classification of crude drugs.pptx by GayatriPatra14
Classification of crude drugs.pptxClassification of crude drugs.pptx
Classification of crude drugs.pptx
GayatriPatra1492 views

Cyber Security Awareness