SlideShare a Scribd company logo
Submit Search
Upload
Login
Signup
How to Secure Your Organisation Data
Report
Phannarith Ou, G-CISO
Follow
Director of ICT Security | Assistant Professor, ISLA-(ISC)2-2016, CSO-ASEAN 2012 - IDG at Ministry of Posts and Telecommunications (MPTC)
Jan. 11, 2013
•
0 likes
•
674 views
1
of
31
How to Secure Your Organisation Data
Jan. 11, 2013
•
0 likes
•
674 views
Report
Education
Phannarith Ou, G-CISO
Follow
Director of ICT Security | Assistant Professor, ISLA-(ISC)2-2016, CSO-ASEAN 2012 - IDG at Ministry of Posts and Telecommunications (MPTC)
Recommended
A perspective for counter strategy against cybercrime and cyber espionage
Gohsuke Takama
1.1K views
•
50 slides
Learn Hacking
hackingtraining
404 views
•
16 slides
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
1.3K views
•
34 slides
HoneyPot for Network Security - building and testing against exploits.
Shantanu Kumar Das
1.1K views
•
74 slides
Data Privacy for Activists
Greg Stromire
574 views
•
71 slides
Honeypots, Deception, and Frankenstein
Phillip Maddux
4.8K views
•
75 slides
More Related Content
Viewers also liked
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
2.9K views
•
13 slides
Integrating info ops in operational level planning (no backup slides)
Ulrich Janßen
1.7K views
•
31 slides
Cyber Crime
aritraranjan
15.9K views
•
21 slides
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
2.3K views
•
22 slides
How to know you was hacked
Phannarith Ou, G-CISO
956 views
•
12 slides
Cyber crime
Rajendra Dangwal
14.9K views
•
16 slides
Viewers also liked
(10)
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
•
2.9K views
Integrating info ops in operational level planning (no backup slides)
Ulrich Janßen
•
1.7K views
Cyber Crime
aritraranjan
•
15.9K views
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
•
2.3K views
How to know you was hacked
Phannarith Ou, G-CISO
•
956 views
Cyber crime
Rajendra Dangwal
•
14.9K views
Cyber crime
Tushar Malhotra
•
18.5K views
Cyber Crime and Security
Dipesh Waghela
•
57.1K views
Cyber-crime PPT
Anshuman Tripathi
•
214.7K views
Cyber crime ppt
MOE515253
•
343.1K views
Similar to How to Secure Your Organisation Data
Ethi mini - ethical hacking
Being Uniq Sonu
698 views
•
17 slides
Ethical Hacking
Pushkar Pashupat
2.5K views
•
28 slides
LemonFish How do you know your Data Loss Prevention system is working ?
Mary Beth Borgwing, MBA
138 views
•
1 slide
Offensive malware usage and defense
Christiaan Beek
5.1K views
•
42 slides
Mobile Security: A Glimpse from the Trenches
Yair Amit
323 views
•
43 slides
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Codemotion Tel Aviv
610 views
•
43 slides
Similar to How to Secure Your Organisation Data
(20)
Ethi mini - ethical hacking
Being Uniq Sonu
•
698 views
Ethical Hacking
Pushkar Pashupat
•
2.5K views
LemonFish How do you know your Data Loss Prevention system is working ?
Mary Beth Borgwing, MBA
•
138 views
Offensive malware usage and defense
Christiaan Beek
•
5.1K views
Mobile Security: A Glimpse from the Trenches
Yair Amit
•
323 views
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Codemotion Tel Aviv
•
610 views
Deception in Cyber Security (League of Women in Cyber Security)
Phillip Maddux
•
250 views
Threat Modeling 101
Atlassian
•
9.2K views
Porque Investir em um time de segurança ofensiva?
Arthur Paixão
•
38 views
Why Personal Clouds Need A Network
Phil Wolff
•
957 views
Data security @ the personal level
Arnon Rotem-Gal-Oz
•
491 views
CERT Data Science in Cybersecurity Symposium
Bob Rudis
•
558 views
La Quadrature Du Cercle - The APTs That Weren't
pinkflawd
•
1.7K views
Contextual Cyber Security for IoT
MONICA-Project
•
274 views
Computer saftey may 2013
JimWhite
•
554 views
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
JoAnna Cheshire
•
255 views
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
•
15.5K views
Via forensics thotcon-2013-mobile-security-with-santoku-linux
viaForensics
•
2.3K views
Fantastic Beasts and where to hide from them
Vlad Styran
•
359 views
Information Security - The Missing Elements
ahmed_vr
•
737 views
More from Phannarith Ou, G-CISO
3 Security Tips for better security for personal computer
Phannarith Ou, G-CISO
536 views
•
10 slides
Understanding NMAP
Phannarith Ou, G-CISO
7.7K views
•
23 slides
Reconnaisance
Phannarith Ou, G-CISO
858 views
•
10 slides
Case - How to protect your information
Phannarith Ou, G-CISO
456 views
•
13 slides
Case - How to protect your website
Phannarith Ou, G-CISO
1K views
•
10 slides
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
1.4K views
•
16 slides
More from Phannarith Ou, G-CISO
(20)
3 Security Tips for better security for personal computer
Phannarith Ou, G-CISO
•
536 views
Understanding NMAP
Phannarith Ou, G-CISO
•
7.7K views
Reconnaisance
Phannarith Ou, G-CISO
•
858 views
Case - How to protect your information
Phannarith Ou, G-CISO
•
456 views
Case - How to protect your website
Phannarith Ou, G-CISO
•
1K views
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
•
1.4K views
Internet Security Policy - Khmer
Phannarith Ou, G-CISO
•
1.7K views
How to Protect Computer From Virus
Phannarith Ou, G-CISO
•
1.2K views
How to Secure Your WiFi
Phannarith Ou, G-CISO
•
1.1K views
Facebook Security in 3 Ways
Phannarith Ou, G-CISO
•
889 views
Understanding Keylogger
Phannarith Ou, G-CISO
•
2.4K views
Exchange Server 2003
Phannarith Ou, G-CISO
•
941 views
Network Security with ISA Server 2006
Phannarith Ou, G-CISO
•
1K views
Network Installation and Management in Windows 2008 Enterprise
Phannarith Ou, G-CISO
•
633 views
Secure System Development Proposal
Phannarith Ou, G-CISO
•
838 views
ូUnderstanding DNS Spoofing
Phannarith Ou, G-CISO
•
571 views
Understanding Malware by BBU Student
Phannarith Ou, G-CISO
•
926 views
Heartbleed vulnerability
Phannarith Ou, G-CISO
•
545 views
P12 r202t8 05-spam
Phannarith Ou, G-CISO
•
278 views
P12 r202t8 04-d-dos
Phannarith Ou, G-CISO
•
327 views
Recently uploaded
GenAI Cloud Jam.pdf
JAISHANABINDHUPRIYAJ
86 views
•
18 slides
Listen to the mountain 2.pptx
AncyTEnglish
248 views
•
15 slides
Monthly Information Session for MV Asterix (September 2023) - Web.pptx
Esquimalt MFRC
118 views
•
31 slides
Project Management Starters.pptx
AnkitaNayak83
74 views
•
13 slides
hand washing ppt
Suriya482923
52 views
•
41 slides
How does project-based learning help students?
PathwaysSchoolGurgaon
43 views
•
4 slides
Recently uploaded
(20)
GenAI Cloud Jam.pdf
JAISHANABINDHUPRIYAJ
•
86 views
Listen to the mountain 2.pptx
AncyTEnglish
•
248 views
Monthly Information Session for MV Asterix (September 2023) - Web.pptx
Esquimalt MFRC
•
118 views
Project Management Starters.pptx
AnkitaNayak83
•
74 views
hand washing ppt
Suriya482923
•
52 views
How does project-based learning help students?
PathwaysSchoolGurgaon
•
43 views
SY Sem 3 Paper 1 Electrochemistry 30sep 23.pdf
Dr. Aqeela Sattar
•
68 views
Google Cloud Study Jams
SahithiGurlinka
•
67 views
Personal Brand Exploration - Michael Q Trucks
Michael Trucks
•
233 views
UH 1.docx
nisrinamadani2
•
102 views
10 Years of World Heutagogy Day
London Knowledge Lab
•
168 views
clinical Neuroanatomy_of_ventricular_system_ and CSF suparna[1]-1.pptx
Kolkata,west bengal, India
•
93 views
listen to the mountain 1.pptx
AncyTEnglish
•
256 views
Elevating Food Safety:Tackling Hazards for a Stronger Food Safety Culture
SafetyChain Software
•
82 views
BPOPS203 PRINCIPLES OF PROGRAMMING USING C LAB Manual.pdf
Syed Mustafa
•
44 views
First five stanzas of Song of the Rain.pptx
AncyTEnglish
•
230 views
Accounting with Drones - Sri Akshay - 23COMD60
Kumarasamy Dr.PK
•
120 views
Forensic Accounting PPT - INCHARA J.M - 23COMA24.pptx
Kumarasamy Dr.PK
•
197 views
Congruency vs Equality
Manik Bhola
•
211 views
Generative AI
Corinne Weisgerber
•
100 views
How to Secure Your Organisation Data
1.
Mr.$OU$Phannarith$ Head$of$CamCERT$ Permanent$Member$of$$Cybercrime$ Law$Working$Group$$ National$ICT$Development$Authority$ OfHice$of$The$Council$of$Ministers$ Email:$phannarith[at]camcert.gov.kh$ $
1"
2.
! Basic"Understanding"of"Information"Security"
! Malware"Fundamental" ! Protect"Your"Password" ! Social"Engineering"and"Phishing"" ! Suggestion"and"Recommendation" ! Question"and"Answers" . - : @ . ! 2"
3.
3"
4.
ConIidentiality"–"of"the"information"
Confiden'ality- Information"on"the"company"or"organization" should"never"be"accessible"to"users"without" permission" " Integrity"–"of"application"and"information" Accuracy"and"completeness"of"information" are"preserved" " Availability- Integrity- Availability"–"of"the"system" Information"is"accessible"by"authorized"users" when"required" . - : @ . ! 4"
5.
Why"Information"Security"is"important?""
Protecting"computer"system"or"its"user"from"threats"that" may"occur"" Threats"and"Damage"will"differ"depending"on"computer" system’s"characteristic"" Protecting"the"system"and"its"users"from"threat"and" minimize"damage" . - : @ . ! 5"
6.
Relationship$between$threat,$vulnerability$and$loss$
Threat" Loss" Vulnera bility" Attacker$+$No$Security$Patch$=$Data$Destruction$ . - : @ . ! 6"
7.
Information$
Threats$ Assets$ Something"that"can"potentially" Information"stored"in"any" cause"damage"to"information"" Countermeasure$ manner"which"recognized"as" assets" ‘valuable’"to"the"organization"" Vulnerability$ A"Weakness"in"the" organization,"computer" system"or"network"that"can" be"exploited"by"threat" . - : @ . ! 7"
8.
Information$
Threats$ Assets$ Something"that"can"potentially" Information"stored"in"any" cause"damage"to"information"" Countermeasure$ manner"which"recognized"as" assets" ‘valuable’"to"the"organization"" Vulnerability$ If"vulnerability"exist,"threats" can"attack"your"information" assets" . - : @ . ! 8"
9.
Information$
Threats$ Assets$ Something"that"can"potentially" Information"stored"in"any" cause"damage"to"information"" Countermeasure$ manner"which"recognized"as" assets" ‘valuable’"to"the"organization"" Vulnerability$is$Hixed$ Information"assets"can"be" kept"secure,"even"if"threats" exist." . - : @ . ! 9"
10.
• Do"you"use"license"operating"system"(OS)?"
• Have"you"even"been"update"your"OS?"" • Have"you"even"been"update"your"daily"use" software?" • Do"you"update"your"antiavirus"regularly?" . - : @ . ! 10"
11.
.
- : @ . ! 11"
12.
Physical&&
The"most" difIicult" part"to" handle" Secure& Hardware& Human&& Your& && So6ware& Data& Policy&&& Standard& . - : @ . ! 12"
13.
13"
14.
Malware"or"Malicious"
Threats" software" Virus" Worm" Trojans" . - : @ . ! 14"
15.
• Infect"object"on"the"disk""
• Travel"autonomously"from"PC"to"PC" • Trigger"by"individual"action"such"as"Open" email"attachment" • Spread"automatically" • Install"itself"into"the"PC"and"looking"other" PCs"to"infect" • Email"worm"need"individual"action"to"spread" • Network"worm"spread"without"the"need"for" human"interaction" . - : @ . ! 15"
16.
• Install"silently"in"the"PC"by"Email"
attachment,"visit"infected"website,"…etc." • PC"work"normally"without"any"consent" from"the"users" • They"don’t"selfareplicate,"but"relies"on" connectivity"provided"by"the"Internet" • There"are"many"kinds"of"Trojans:" • Backdoor"Trojans" • Keyalogger"Trojans" • Banking"Trojans" . - : @ . ! 16"
17.
Can-done-anything:-Sending-Spam,-
Before" Collec'ng-confiden'al-data,-stealing- password,-etc.-and-espcially-connect-PC- with-PC-to-create-an-infected-network- (BOTNET).-- Virus" Worm" Trojans" Now"–"Hybrid"Malware" Virus& Worm& Trojans& . - : @ . ! 17"
18.
18"
19.
• How"often"do"you"change"your"password?"
• Do"you"use"your"name,"telephone,"date"of"birth," as"your"password?" • Do"you"use"the"same"password"for"every" services?" • Do"you"share"your"password"with"anybody?" . - : @ . ! 19"
20.
Easily"Guessed"Password"
• No"Password"is"set" • Password"same"as"the"account"name" Dictionary"Attack" • Prepared"words"that"the"user"is"likely"to"use"as" passwords"in"a"dictionary"Iile"and"attempt"to"Iind" matching"password" Brute"Force"Attack" • This"is"simple"method"to"try"all"possible"combinations"as" passwords" • It"take"huge"amount"of"time,"although,"theoretically,"it" can"break"any"password"without"fail" . - : @ . ! 20"
21.
Which"password"below"is"your"password?"
Top$25$Popular$Password$in$2011$ 1."password" "2."123456 "3."12345678 "4."qwerty" 5."abc123 "6."monkey "7."1234567 "8."letmein" 9."trustno1 "10."dragon "11."baseball "12."111111" 13."Iloveyou "14."master "15."sunshine "16."ashley" 17."bailey "18."passw0rd"19."shadow "20."123123" 21."654321 "22."superman"23."qazwsx "24."michael" 25."football" . - : @ . ! 21"
22.
How"to"secure"your"password" .
- : @ . ! 22"
23.
23"
24.
.
- : @ . ! 24"
25.
.
- : @ . ! 25"
26.
.
- : @ . ! 26"
27.
.
- : @ . ! 27"
28.
28"
29.
User"antiavirus"and"update"it"regularly""
Install"a"Personal"Firewall" Install"latest"security"update" Don’t"open"an"email"you"do"not"trust" Keep"learning!" . - : @ . ! 29"
30.
You"organization"data"security"is"depending"on"
the"weakness"link" Don’t"make"yourself"as"the"weakness"link" . - : @ . ! 30"
31.
Mr.$OU$Phannarith$ Head$of$CamCERT$ Permanent$Member$of$$Cybercrime$ Law$Working$Group$$ National$ICT$Development$Authority$ OfHice$of$The$Council$of$Ministers$ Email:$phannarith[at]camcert.gov.kh$ $
31"