SlideShare a Scribd company logo
OUTSIDE OF THE OFFICE   Threats from
                        the outside
BE AWARE

 We have covered many ways that you might be targeted while
  using your computer. However, there are other ways hackers
  may target T VA when you are out of the of fice. One example,
  given in the last session, was baiting. More methods than
  baiting threaten employees:
   Tailgating
   Shoulder Surfing
   Theft
TAILGATING AND SHOULDER SURFING

 Tailgating: when someone unknown enters through security by
  following someone else with a badge through the doors.
 Shoulder Surfing: When others look over your shoulder to see
  private information
AWARENESS CONTINUED

 You must be aware of your surroundings not only when you are
  traveling, but when you are at your of fice as well.
 Travel
     Be aware of shoulder surfing
     Use secure networks
     Keep private information secure
     Strong password
 Of fice
   Strong password
   Be aware of tailgating
   Keep identification on person
TRAVEL

 When traveling unsecure networks can leak information to
  prying eyes
   Always use your VPN (provided by TVA) when accessing the internet
    away from the office
   The VPN (virtual private network) encrypts your identification so
    prying eyes cannot decipher what your activities are
   If you are very worried about others looking at your screen you can
    always purchase a mirror for your laptop so you can see what people
    are doing behind you
AT THE OFFICE

 When leaving your of fice ALWAYS lock your computer (CTRL +
  ALT + DELETE)
 Never leave private information out in the open
 Do not keep lists of usernames and passwords
 Always keep your ID badge on you
 Keep your laptop locked into the dock if it is not being used
 Never leave your T VA credit card unattended
 Never leave your VPN tokens unattended
PASSWORD

 Password strength is vital for you security
   Must be at LEAST eight characters
   Do NOT use the same password at TVA for other programs (personal
    e-mail, ebay, amazon, ect…)
   Password must contain at least one lower case letter, upper case
    letter, number, and symbol (@#$%&!?)
   Try to use words that are not easily guessable
   Enter passwords quickly so shoulder surfing individuals cannot figure
    them out
   Never share your password with anyone
   Change your password regularly
LEAVING WORK

 When leaving work keep your laptop in a secure knapsack
 Do NOT leave your laptop in out in your car
 The trunk is also not safe. Thieves will first look in the trunk
  for valuables
 If you must leave your laptop in the car keep it in a locked
  container. This will assist in preventing theft

More Related Content

Viewers also liked

Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repotKunal Thakur
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
Devang Doshi
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffersleminhvuong
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
Allan Pratt MBA
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
Ravi Teja Reddy
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (11)

Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Phishing
PhishingPhishing
Phishing
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Sniffer
SnifferSniffer
Sniffer
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Day 3

Identity theft
Identity theftIdentity theft
Identity theft
bhabagrahi dash
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101HaroldCo
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
Marcos Lopez-Carlson
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
Lookout
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
Penntech IT Solutions
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
Andre Debilloez
 
Data theft
Data theftData theft
Data theftLaura
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money Thing
Tim McAlpine
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
selcukca84
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
B2BPlanner Ltd.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
Mustafa Kuğu
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter Cyber Security
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
Gihan Dias
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
Data Hops
 
Zcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security TipsZcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security Tips
John Tshinseki
 

Similar to Day 3 (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Data theft
Data theftData theft
Data theft
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money Thing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 
Zcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security TipsZcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security Tips
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 

Day 3

  • 1. OUTSIDE OF THE OFFICE Threats from the outside
  • 2. BE AWARE  We have covered many ways that you might be targeted while using your computer. However, there are other ways hackers may target T VA when you are out of the of fice. One example, given in the last session, was baiting. More methods than baiting threaten employees:  Tailgating  Shoulder Surfing  Theft
  • 3. TAILGATING AND SHOULDER SURFING  Tailgating: when someone unknown enters through security by following someone else with a badge through the doors.  Shoulder Surfing: When others look over your shoulder to see private information
  • 4. AWARENESS CONTINUED  You must be aware of your surroundings not only when you are traveling, but when you are at your of fice as well.  Travel  Be aware of shoulder surfing  Use secure networks  Keep private information secure  Strong password  Of fice  Strong password  Be aware of tailgating  Keep identification on person
  • 5. TRAVEL  When traveling unsecure networks can leak information to prying eyes  Always use your VPN (provided by TVA) when accessing the internet away from the office  The VPN (virtual private network) encrypts your identification so prying eyes cannot decipher what your activities are  If you are very worried about others looking at your screen you can always purchase a mirror for your laptop so you can see what people are doing behind you
  • 6. AT THE OFFICE  When leaving your of fice ALWAYS lock your computer (CTRL + ALT + DELETE)  Never leave private information out in the open  Do not keep lists of usernames and passwords  Always keep your ID badge on you  Keep your laptop locked into the dock if it is not being used  Never leave your T VA credit card unattended  Never leave your VPN tokens unattended
  • 7. PASSWORD  Password strength is vital for you security  Must be at LEAST eight characters  Do NOT use the same password at TVA for other programs (personal e-mail, ebay, amazon, ect…)  Password must contain at least one lower case letter, upper case letter, number, and symbol (@#$%&!?)  Try to use words that are not easily guessable  Enter passwords quickly so shoulder surfing individuals cannot figure them out  Never share your password with anyone  Change your password regularly
  • 8. LEAVING WORK  When leaving work keep your laptop in a secure knapsack  Do NOT leave your laptop in out in your car  The trunk is also not safe. Thieves will first look in the trunk for valuables  If you must leave your laptop in the car keep it in a locked container. This will assist in preventing theft