SlideShare a Scribd company logo
1 of 10
CYBERSECURITY AWARENESS
BY TIMOTHY MWANJE
WHAT IS CYBER SECURITY?
also known as INFORMATION TECHNOLOGY SECURITY /
ELECTRONIC INFORMATION SECURITY
Cyber security is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks. It aims to reduce the risk
of cyber attacks and protect against the
unauthorized exploitation of systems,
networks, and technologies.
Defending / protecting your online personality
COMMON TYPES OF CYBER ATTACKS
MALWARE short for “malicious software”; ware >product
Adware: Advertising software which can be used to spread
malware.
Virus: A self-replicating program that attaches itself to
clean files and spreads throughout the computer files
without the knowledge of a user , infecting files with
malicious code. “From nowhere your PC blacks out or fails
to operate.”
Spyware: A program that secretly records what a user does,
so that cybercriminals can make use of this information. For
example, spyware could capture credit card details.
Ransomware: Malware which locks down a user’s files and
COMMON TYPES OF CYBER ATTACKS
PHISHING / SCAM/ JUNK: where someone (criminal) using internet services or
software to take advantage of victims, typically for financial gain or revealing
their personal information (for example, passwords, phone numbers, or social
security numbers).
SOCIAL MEDIA ATTACKS: Social media can give attackers a platform to
impersonate trusted people and brands or the information they need carry out
additional attacks, including social engineering and phishing
SOCIAL ENGINEERING ATTACKS: attackers uses psychological manipulation to
trick users into making security mistakes or giving away sensitive information
PASSWORD CRACKING ATTACKS: involves hackers attempting to crack or
determine a password.
PHONE HACKING … SIM JACKING
IMPACTS OF CYBER CRIMES:
THIS STARTS FROM AN INDIVIDUAL, BUT AFFECTS THE ENTIRE
ORGANIZATION – or your Circle / connections .
COSTS for retrieving lost data., purchasing new device..
Loss of identity to a hacker,
Financial stress due to a hacker getting loans with your cards.
Miscommunications with your circle due to a middle man
intercepting your data transfer.
WHAT ARE WE FIGHTING AGAINST ?
> CYBER CRIMINALS
Cyber crime is any criminal act dealing with computers and
networks.
GOALS OF CYBER SECURITY
• To protect information from being
stolen, compromised or attacked.
• Protect the confidentiality of
data.
• Preserve the integrity of data.
• Promote the availability of data
for authorized users.
• Maintaining safe and stable organizational operations
SECURITY TIPS TO PROTECT YOUR
INFORMATION
INDIVIDUAL-ORGANIZATIONAL LEVEL:
• Regular update of software and operating systems:
• Use anti-virus software.
• Use strong passwords > passphrases (Protect Document on Microsoft, doc/excel, BitLocker on
drive /files lock) change passwords periodically .
• Do not open email attachments from unknown senders / always confirm the sender.
• Do not click on links in emails from unknown senders or unfamiliar websites / confirm the URL.
• Avoid using unsecure Wi-Fi networks in public places. -- VPN
• Raise awareness among staff.
• Use VPN
• Turn on your firewalls.
• Always back up files.
• Inquire from a colleague they might have been victims and can help or suspect danger. Eg sim
jacking.
THANK YOU….
To be continued

More Related Content

Similar to CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 

Similar to CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. (20)

Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer security and
Computer security andComputer security and
Computer security and
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.

  • 2. WHAT IS CYBER SECURITY? also known as INFORMATION TECHNOLOGY SECURITY / ELECTRONIC INFORMATION SECURITY Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies. Defending / protecting your online personality
  • 3. COMMON TYPES OF CYBER ATTACKS MALWARE short for “malicious software”; ware >product Adware: Advertising software which can be used to spread malware. Virus: A self-replicating program that attaches itself to clean files and spreads throughout the computer files without the knowledge of a user , infecting files with malicious code. “From nowhere your PC blacks out or fails to operate.” Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details. Ransomware: Malware which locks down a user’s files and
  • 4. COMMON TYPES OF CYBER ATTACKS PHISHING / SCAM/ JUNK: where someone (criminal) using internet services or software to take advantage of victims, typically for financial gain or revealing their personal information (for example, passwords, phone numbers, or social security numbers). SOCIAL MEDIA ATTACKS: Social media can give attackers a platform to impersonate trusted people and brands or the information they need carry out additional attacks, including social engineering and phishing SOCIAL ENGINEERING ATTACKS: attackers uses psychological manipulation to trick users into making security mistakes or giving away sensitive information PASSWORD CRACKING ATTACKS: involves hackers attempting to crack or determine a password. PHONE HACKING … SIM JACKING
  • 5.
  • 6. IMPACTS OF CYBER CRIMES: THIS STARTS FROM AN INDIVIDUAL, BUT AFFECTS THE ENTIRE ORGANIZATION – or your Circle / connections . COSTS for retrieving lost data., purchasing new device.. Loss of identity to a hacker, Financial stress due to a hacker getting loans with your cards. Miscommunications with your circle due to a middle man intercepting your data transfer. WHAT ARE WE FIGHTING AGAINST ? > CYBER CRIMINALS Cyber crime is any criminal act dealing with computers and networks.
  • 7. GOALS OF CYBER SECURITY • To protect information from being stolen, compromised or attacked. • Protect the confidentiality of data. • Preserve the integrity of data. • Promote the availability of data for authorized users. • Maintaining safe and stable organizational operations
  • 8. SECURITY TIPS TO PROTECT YOUR INFORMATION INDIVIDUAL-ORGANIZATIONAL LEVEL: • Regular update of software and operating systems: • Use anti-virus software. • Use strong passwords > passphrases (Protect Document on Microsoft, doc/excel, BitLocker on drive /files lock) change passwords periodically . • Do not open email attachments from unknown senders / always confirm the sender. • Do not click on links in emails from unknown senders or unfamiliar websites / confirm the URL. • Avoid using unsecure Wi-Fi networks in public places. -- VPN • Raise awareness among staff. • Use VPN • Turn on your firewalls. • Always back up files. • Inquire from a colleague they might have been victims and can help or suspect danger. Eg sim jacking.
  • 9.
  • 10. THANK YOU…. To be continued