SlideShare a Scribd company logo
1 of 13
By Josh Chandler
Required Training Areas 
Security Issues That Impact Privacy 
General Security Awareness 
Virus Protection 
Accessing The System 
Password Management 
Wireless Use 
Potential Outbreaks 
Internet Usage
General Security Awareness 
Data Security 
Keeping the information safe and system include 
Virus Protection 
Software and Hardware 
Personal Policies 
Information practice policies 
Preparing for disaster 
General oversight for each area
What is the purpose of security? 
To protect the system from unauthorized 
Access 
Use 
Infection 
Compromising of information
General Security Awareness 
Computer/Electronic Security 
Faxes 
E-mails 
Passwords and logins 
Placement of PC 
Computer Virus Protection
Virus Protection 
Only use trusted and approved sites 
Never use p2p or torrent sites 
Never download from an unknown source 
Keep antivirus software up to date 
Never share a computer with another user 
Always shut down after use
What to know when accessing the 
system 
Never share a session 
Be aware of any and all disciplinary actions 
Termination of Access 
Report any and all discrepancies 
Always logout of a session 
Keep password secret and secure
Password Management 
What is password security? 
Never write down passwords 
Never give password to anyone 
If you do change it a.s.a.p. 
Type in password on trusted machines 
Do this in private
Password Management 
Guidelines 
Do Don’t 
Use 6 to 8 characters Use a password from a dictionary 
Use upper and lower case letters Share password with others 
Commit to memory Use the user id as password 
Change to a completely new password Reuse old password of any configuration 
Use 2 alpha and 1 numeric Use public and private information
System and PC Protection 
Follow the correct policies 
Report ANY suspicious activity 
Be aware of the potential for harm 
Don’t download unapproved programs 
Never open unknown e-mails 
Make sure to keep updates current
Key Points to Remember about Security 
Building and computer security are very important 
Foundations of good password management 
Practicing safe and secure surfing 
Keeping security up to date 
Most of all security affects privacy!!
Questions or Comments?? 
Address any and all comments to the IT administrator 
Contact IT department by e-mail or phone for technical support/issues
Thank You and Stay Secure

More Related Content

What's hot

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 

What's hot (20)

Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 

Similar to Security awareness

Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
Travis Good
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
stuimrozsm
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 

Similar to Security awareness (20)

Security awareness training ip5
Security awareness training ip5Security awareness training ip5
Security awareness training ip5
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Presented to Compass
Presented to CompassPresented to Compass
Presented to Compass
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 
ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Network security primer
Network security primerNetwork security primer
Network security primer
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Legal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing InformaticsLegal and Ethical Considerations in Nursing Informatics
Legal and Ethical Considerations in Nursing Informatics
 
Super billing computer ethics, privacy and security
Super billing computer ethics, privacy and securitySuper billing computer ethics, privacy and security
Super billing computer ethics, privacy and security
 
Windows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITProsWindows 10: Windows 10 de ITPros a ITPros
Windows 10: Windows 10 de ITPros a ITPros
 
Defensive information warfare
Defensive information warfareDefensive information warfare
Defensive information warfare
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
LEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGYLEGAL ANND ETHICAL USE OF TECHNOLOGY
LEGAL ANND ETHICAL USE OF TECHNOLOGY
 

Recently uploaded

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

Security awareness

  • 2. Required Training Areas Security Issues That Impact Privacy General Security Awareness Virus Protection Accessing The System Password Management Wireless Use Potential Outbreaks Internet Usage
  • 3. General Security Awareness Data Security Keeping the information safe and system include Virus Protection Software and Hardware Personal Policies Information practice policies Preparing for disaster General oversight for each area
  • 4. What is the purpose of security? To protect the system from unauthorized Access Use Infection Compromising of information
  • 5. General Security Awareness Computer/Electronic Security Faxes E-mails Passwords and logins Placement of PC Computer Virus Protection
  • 6. Virus Protection Only use trusted and approved sites Never use p2p or torrent sites Never download from an unknown source Keep antivirus software up to date Never share a computer with another user Always shut down after use
  • 7. What to know when accessing the system Never share a session Be aware of any and all disciplinary actions Termination of Access Report any and all discrepancies Always logout of a session Keep password secret and secure
  • 8. Password Management What is password security? Never write down passwords Never give password to anyone If you do change it a.s.a.p. Type in password on trusted machines Do this in private
  • 9. Password Management Guidelines Do Don’t Use 6 to 8 characters Use a password from a dictionary Use upper and lower case letters Share password with others Commit to memory Use the user id as password Change to a completely new password Reuse old password of any configuration Use 2 alpha and 1 numeric Use public and private information
  • 10. System and PC Protection Follow the correct policies Report ANY suspicious activity Be aware of the potential for harm Don’t download unapproved programs Never open unknown e-mails Make sure to keep updates current
  • 11. Key Points to Remember about Security Building and computer security are very important Foundations of good password management Practicing safe and secure surfing Keeping security up to date Most of all security affects privacy!!
  • 12. Questions or Comments?? Address any and all comments to the IT administrator Contact IT department by e-mail or phone for technical support/issues
  • 13. Thank You and Stay Secure