SlideShare a Scribd company logo
1 of 40
www.iita.orgA member of CGIAR consortium
“ICT Security is Everyone’s
Business”
Presented by
Adeoluwa Modupe
www.iita.orgA member of CGIAR consortium
Outline
Preambles
Terms of reference
Issues Identified
Justification
www.iita.orgA member of CGIAR consortium
INTRODUCTION
What is Computer Security?
- protection
- confidentiality,
- integrity
- availability
-computing systems and the data that they store or
access.
www.iita.orgA member of CGIAR consortium
Security refers to the degree of protection against
danger, damage, loss and crime.
Can refer to physical media, financial transactions,
computer hardware, data, application, email,
information and network security.
Terms of reference
www.iita.orgA member of CGIAR consortium
Sources that call for interest
• Internet
• Exchange of information on Network
within an organization
• Files
• Server
www.iita.orgA member of CGIAR consortium
RISKS AND REMEDY
Internet sites
e.g. Social Networking sites
On-line Scams
Information Security
Personal computers
www.iita.orgA member of CGIAR consortium
Social Networking sites
Hacking
Malicious applications that are
suggested for inclusion/update
www.iita.orgA member of CGIAR consortium
Hacking
• Sites such as Facebook, Tweeter, LinkedIn,
MySpace ask users to create profiles of
themselves in order to help build links with
friends and family.
• Anyone with a link to one of your friends, or
friend friend could potentially access the
information held on your page
www.iita.orgA member of CGIAR consortium
Malicious Applications
• Don’t respond to friend request from people
that you don’t recognise
• Check applications before installing them
• Call ICT helpdesk
www.iita.orgA member of CGIAR consortium
Phishing
• Use of e-mail purporting to be from banks or other
companies such as utilities to fool people
• The e-mail generally claims to be part of security
check. The URL used in the mail disguises the true
location of the sites.
• The destination pages are designed to look like the
genuine site.
• For example First Bank or GTB
www.iita.orgA member of CGIAR consortium
Pharming
• The “Troj/BankAsh-virus” is the latest attack
which divert people visiting legitimate bank
websites to fake domain addresses owned by
criminals.
• Unlike phishing, which relies on the user
clicking on a link to a bogus websites
•
www.iita.orgA member of CGIAR consortium
On-line Scams
• Never reply to phishing emails –once
asking you to confirm your bank
details.
• Never open email from people
unknown to you.
• Personal information of your finances
must be deleted from your emails
www.iita.orgA member of CGIAR consortium
• Who is a target?
• Who is responsible for
protection?
• How is protection done?
• What are the issues
involved (computer,
communication
network, files, file
systems, structures)
Files /Information
Systems
Network/
Communication
Global
Protection Layers- 4 layers
www.iita.orgA member of CGIAR consortium
Social engineering
(Hacking the mind!)
• The hack that requires no knowledge of code.
• Social engineering is the art of manipulating/tricking
people so they give up confidential information
• Accounts for an estimated 90% of security breaches.
• Everyone is a target and be vigilantly aware of anyone
asking for personal or private information.
www.iita.orgA member of CGIAR consortium
Social Engineering (Contd.)
• Criminals can only succeed if they obtain your secret
security information such as a PIN number or
password.
• No bank will ever ask you for your full PIN or
password when identifying you over the phone or
online.
• If asked to call back the number on the back of the
card; use another phone line or wait a few minutes
before using the same phone again.
www.iita.orgA member of CGIAR consortium
Social Engineering - Can lead to Identity Theft
• WHAT IS IDENTITY THEFT?
• It occurs when someone steals your
personal information – e.g., credit card or
Personal Identification number – and uses it
fraudulently.
• When your private financial information gets
into the wrong hands, the consequences can
be devastating.
www.iita.orgA member of CGIAR consortium
How to minimize the risk of becoming a victim of
identity theft
• Practice Safe Internet Use.
• keep your anti-virus software up-to-date. Delete spam emails that
ask for personal information.
• Shop online only with secure web pages (check the bottom of your
browser for an image of a lock or look for “https” in the address
bar).
• Never send credit card numbers and other personal information
via email.
• Regularly check your credit card statements.
• Destroy Private Records
Tear up or shred credit/debit card, ATM and bank deposit
statement/receipts.
www.iita.orgA member of CGIAR consortium
Social Engineering - Password Phishing
• Phishing is a form of social engineering that attempts to
obtain your username and password.
• Downloading unknown attachments could be dangerous
• Check the sender (trusted e.g. @cgiar.org)
• Check any web link (trusted links)
• Check hyperlink is the same as the web link
• Does the “feel” of the email seem right?
• If in doubt contact US! (Helpdesk x2255)
www.iita.orgA member of CGIAR consortium
What makes a good password?
Password
Length
Comparative time to Crack* Depends on currently
available processing speeds.
Character Set a-z plus upper
case (A-Z)
plus numbers
plus symbols
Set size 26 52 96
6 Seconds Minutes Few Minutes
7 Seconds Minutes Hours
8 Minutes Days Many months
9 Hours Year Years
A balance between “hackable” password and “easy-
to-remember”
www.iita.orgA member of CGIAR consortium
Password Policy
• Change every 180 days.
• Must be at least 8 characters from at least three of
the following sets:
• Lower case letters a-z
• UPPER CASE LETTERS A-Z
• Numerics 0-9
• Special characters (!"# $%& ' *+, -./ : ;<=>?@ []^_` {|}~ )
• If you feel your password has been compromised
change it immediately.
www.iita.orgA member of CGIAR consortium
How to change your password
• CTL-ALT-DEL and select change a password
• Windows
www.iita.orgA member of CGIAR consortium
How to change your password
• If outside of Ibadan you can use webmail.
• In OWA.IITA.ORG: Go to options, change
password
www.iita.orgA member of CGIAR consortium
Examples of false password change
requests (Phishing)
www.iita.orgA member of CGIAR consortium
Social Engineering - Phishing Attempts
www.iita.orgA member of CGIAR consortium
Social Engineering - Phishing attempts
www.iita.orgA member of CGIAR consortium
Email – genuine examples
• Email box nearly full
• Quota on server full
• Spam filter
• Bank update
www.iita.orgA member of CGIAR consortium
Email – box full
www.iita.orgA member of CGIAR consortium
Email - Spam filter
www.iita.orgA member of CGIAR consortium
Other security issues
• If sharing a folder specify who is allowed to
access it. Otherwise anyone can read or
possibly delete the information.
• Be careful when downloading and installing
software from the internet. Many links
especially to anti malware and anti-virus
sites are 419.
www.iita.orgA member of CGIAR consortium
Other security issues
Opendns blocks many malware sites
www.iita.orgA member of CGIAR consortium
Other security issues
• Lock your screen when leaving the office
• (use CTRL-ALT-DEL and select lock this
computer)
• Do not paste your password near your computer
www.iita.orgA member of CGIAR consortium
Other security issues
• Wireless SSID broadcasts
• Be aware which wireless networks you are
connecting to, especially if carrying out bank
transactions.
www.iita.orgA member of CGIAR consortium
Why Backups
• Systems do crash
• Media failures
• Hard disks fail
• USB sticks stolen
www.iita.orgA member of CGIAR consortium
Backups
• Keep any backup separate from your computer
• Copy all your files
• To a mixture of
• Network storage (Drive U:)
• External hard disk
• Removable media (Flash)
• Cloud
www.iita.orgA member of CGIAR consortium
Cyber security: The DOs
• If unclear about any aspect of cyber security, call
helpdesk
• Change password if suspicious it may have been
compromised
• Keep antivirus and software up to date
• Comply with the institutes acceptable usage / user policy
• Beware of the risks of using unsecured(open) wireless
networks in public places
• Know that cyber security is relevant to YOU and begins
with you.
www.iita.orgA member of CGIAR consortium
Cyber security: The DON’Ts
• Don’t disclose your password to anyone
• Don’t send unauthorized bulk email (Spam)
• Don’t leave your computer unlocked when not in use
• Don’t leave hard copies of confidential information unsecured
• Don’t give unauthorized access to your system or institutes
information
www.iita.orgA member of CGIAR consortium
Summary
• Security depends on all of us
90/10 rule:
• 10% of security safeguards are technical
• 90% rely on the computer user adhering to good
computer practices
• Beware of phishing attempts
• Passwords are to be changed regularly
• Beware of clicking on untrusted web sites
• Backup, backup and backup your data!
www.iita.orgA member of CGIAR consortium
ICT Help contacts
• Helpdesk: EXT.2255
• Email:IITA-Helpdesk@cgiar.org
• Skype: IITAhelpdesk
• Office: Bld500 Rm 221 upper floor
www.iita.orgA member of CGIAR consortium
THANK YOU
Merci pour votre attention
www.iita.orgA member of CGIAR consortium
?

More Related Content

What's hot

Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technicalStephen Cobb
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debateDavid Strom
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime caseOnline
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeMurray Security Services
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber CrimeDeepak Kumar
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationDr. Lydia Kostopoulos
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 

What's hot (20)

Cybersecurity for the non-technical
Cybersecurity for the non-technicalCybersecurity for the non-technical
Cybersecurity for the non-technical
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Building a cybercrime case
Building a cybercrime caseBuilding a cybercrime case
Building a cybercrime case
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Internet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber CrimeInternet of things, New Challenges in Cyber Crime
Internet of things, New Challenges in Cyber Crime
 
Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Cyber security and Cyber Crime
Cyber security and Cyber CrimeCyber security and Cyber Crime
Cyber security and Cyber Crime
 
Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)Eset cybersecurity awareness (laxman giri)
Eset cybersecurity awareness (laxman giri)
 
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to doNEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
NEDMA18 Keynote: Cyber Security – what you need to know, what you need to do
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 

Viewers also liked

Online Helpdesk System
Online Helpdesk SystemOnline Helpdesk System
Online Helpdesk SystemJayant Gope
 
Presentation of helpdesk
Presentation of helpdeskPresentation of helpdesk
Presentation of helpdeskArchana Negi
 
Online Help Desk ppt
Online  Help  Desk pptOnline  Help  Desk ppt
Online Help Desk pptnagarjunagoud
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009guest75acf2
 
IT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, TrendIT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, TrendVoyage Services Inc.
 
Service Desk Proposition Presentation
Service Desk Proposition PresentationService Desk Proposition Presentation
Service Desk Proposition PresentationSimonAnthony
 

Viewers also liked (8)

Help desk system report
Help desk system reportHelp desk system report
Help desk system report
 
Online Helpdesk System
Online Helpdesk SystemOnline Helpdesk System
Online Helpdesk System
 
Presentation of helpdesk
Presentation of helpdeskPresentation of helpdesk
Presentation of helpdesk
 
Online help desk
Online help deskOnline help desk
Online help desk
 
Online Help Desk ppt
Online  Help  Desk pptOnline  Help  Desk ppt
Online Help Desk ppt
 
Help Desk Presentation 09202009
Help Desk Presentation 09202009Help Desk Presentation 09202009
Help Desk Presentation 09202009
 
IT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, TrendIT / Help Desk Support Service : Introduction, Advantage, Trend
IT / Help Desk Support Service : Introduction, Advantage, Trend
 
Service Desk Proposition Presentation
Service Desk Proposition PresentationService Desk Proposition Presentation
Service Desk Proposition Presentation
 

Similar to ICT Security Presentation

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version Brian Pichman
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day ConferenceBrian Pichman
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information &amp; cyber security, Winter training ,bsnl. online
Information &amp; cyber security, Winter training ,bsnl. onlineInformation &amp; cyber security, Winter training ,bsnl. online
Information &amp; cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber securityKaushal Solanki
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younasShahzad Younas
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxprtabal_25
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessImran Khan
 

Similar to ICT Security Presentation (20)

Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
It security the condensed version
It security  the condensed version It security  the condensed version
It security the condensed version
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information &amp; cyber security, Winter training ,bsnl. online
Information &amp; cyber security, Winter training ,bsnl. onlineInformation &amp; cyber security, Winter training ,bsnl. online
Information &amp; cyber security, Winter training ,bsnl. online
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptxCyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
CyberSecurityPPdddsdsddssdsdssaT_V3_1.pptx
 
Cybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awarenessCybersecurity about Phishing and Secutity awareness
Cybersecurity about Phishing and Secutity awareness
 

More from International Institute of Tropical Agriculture

More from International Institute of Tropical Agriculture (20)

Make your research visible and create more impact using DataCite DOIs
Make your research visible and  create more impact using  DataCite DOIsMake your research visible and  create more impact using  DataCite DOIs
Make your research visible and create more impact using DataCite DOIs
 
Induction of early flowering in cassava through light supplementation and CM...
Induction of early flowering in cassava  through light supplementation and CM...Induction of early flowering in cassava  through light supplementation and CM...
Induction of early flowering in cassava through light supplementation and CM...
 
Producing yam mother plants to collect vines for propagation
Producing yam mother plants to collect  vines for propagationProducing yam mother plants to collect  vines for propagation
Producing yam mother plants to collect vines for propagation
 
Effects of moult and breeding on the body condition of some forest birds in s...
Effects of moult and breeding on the body condition of some forest birds in s...Effects of moult and breeding on the body condition of some forest birds in s...
Effects of moult and breeding on the body condition of some forest birds in s...
 
Conserving Nigeria’s rarest endemic bird: Ibadan Malimbe, Malimbusibadanensis
Conserving Nigeria’s rarest endemic bird: Ibadan Malimbe, MalimbusibadanensisConserving Nigeria’s rarest endemic bird: Ibadan Malimbe, Malimbusibadanensis
Conserving Nigeria’s rarest endemic bird: Ibadan Malimbe, Malimbusibadanensis
 
Cassava brown streak epidemiology in Eastern Democratic Republic of the Congo
Cassava brown streak epidemiology in Eastern Democratic  Republic of the CongoCassava brown streak epidemiology in Eastern Democratic  Republic of the Congo
Cassava brown streak epidemiology in Eastern Democratic Republic of the Congo
 
Assessment of genetic diversity among Rwandan cassava (Manihot esculenta) ger...
Assessment of genetic diversity among Rwandan cassava (Manihot esculenta) ger...Assessment of genetic diversity among Rwandan cassava (Manihot esculenta) ger...
Assessment of genetic diversity among Rwandan cassava (Manihot esculenta) ger...
 
9 osunbade identification of end users preferences of a cassava product
9 osunbade identification of end users preferences of a cassava product9 osunbade identification of end users preferences of a cassava product
9 osunbade identification of end users preferences of a cassava product
 
7 helen ufondu perception of yam landraces quality among value chain actors i...
7 helen ufondu perception of yam landraces quality among value chain actors i...7 helen ufondu perception of yam landraces quality among value chain actors i...
7 helen ufondu perception of yam landraces quality among value chain actors i...
 
8 kazeem quality attributes and consumer acceptability of cookies flavoured
8 kazeem quality attributes and consumer acceptability of cookies flavoured8 kazeem quality attributes and consumer acceptability of cookies flavoured
8 kazeem quality attributes and consumer acceptability of cookies flavoured
 
6 anajekwu ekpereka chemical, functional and pasting properties of flours pro...
6 anajekwu ekpereka chemical, functional and pasting properties of flours pro...6 anajekwu ekpereka chemical, functional and pasting properties of flours pro...
6 anajekwu ekpereka chemical, functional and pasting properties of flours pro...
 
5 seun olowote effect of drying method on caroteniod content of yellow maize
5 seun olowote effect of drying method on caroteniod content of yellow maize5 seun olowote effect of drying method on caroteniod content of yellow maize
5 seun olowote effect of drying method on caroteniod content of yellow maize
 
4 ayodele adenitan survey of dried plantain (musa paradisiaca) chips processo...
4 ayodele adenitan survey of dried plantain (musa paradisiaca) chips processo...4 ayodele adenitan survey of dried plantain (musa paradisiaca) chips processo...
4 ayodele adenitan survey of dried plantain (musa paradisiaca) chips processo...
 
2 akin olagunju does crop diversification influenc e food and nutrition secur...
2 akin olagunju does crop diversification influenc e food and nutrition secur...2 akin olagunju does crop diversification influenc e food and nutrition secur...
2 akin olagunju does crop diversification influenc e food and nutrition secur...
 
3 akinsola carotenoid apparent retention in ogi flour made from different pro...
3 akinsola carotenoid apparent retention in ogi flour made from different pro...3 akinsola carotenoid apparent retention in ogi flour made from different pro...
3 akinsola carotenoid apparent retention in ogi flour made from different pro...
 
1 pearl amadi assessing the level of consumption of pro vitamin a cassava pr...
1 pearl amadi assessing the level of consumption of pro  vitamin a cassava pr...1 pearl amadi assessing the level of consumption of pro  vitamin a cassava pr...
1 pearl amadi assessing the level of consumption of pro vitamin a cassava pr...
 
Prof janice olawoye
Prof janice olawoyeProf janice olawoye
Prof janice olawoye
 
Inqaba biotech presentation
Inqaba biotech presentationInqaba biotech presentation
Inqaba biotech presentation
 
Iarsaf symposium adaptation to climate change
Iarsaf symposium adaptation to climate changeIarsaf symposium adaptation to climate change
Iarsaf symposium adaptation to climate change
 
Bimaf iita iarsaf presentation-ibadan 21.05.19
Bimaf  iita iarsaf presentation-ibadan 21.05.19Bimaf  iita iarsaf presentation-ibadan 21.05.19
Bimaf iita iarsaf presentation-ibadan 21.05.19
 

Recently uploaded

(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...ResolutionFoundation
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.Christina Parmionova
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...Suhani Kapoor
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...Hemant Purohit
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...Christina Parmionova
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceHigh Profile Call Girls
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.Christina Parmionova
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Roomishabajaj13
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfahcitycouncil
 
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...Suhani Kapoor
 

Recently uploaded (20)

(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(NEHA) Bhosari Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIYA) Call Girls Saswad ( 7001035870 ) HI-Fi Pune Escorts Service
 
Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...Precarious profits? Why firms use insecure contracts, and what would change t...
Precarious profits? Why firms use insecure contracts, and what would change t...
 
Climate change and occupational safety and health.
Climate change and occupational safety and health.Climate change and occupational safety and health.
Climate change and occupational safety and health.
 
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
VIP Call Girls Service Bikaner Aishwarya 8250192130 Independent Escort Servic...
 
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...Human-AI Collaborationfor Virtual Capacity in Emergency Operation Centers (E...
Human-AI Collaboration for Virtual Capacity in Emergency Operation Centers (E...
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
“Exploring the world: One page turn at a time.” World Book and Copyright Day ...
 
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile ServiceCunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
Cunningham Road Call Girls Bangalore WhatsApp 8250192130 High Profile Service
 
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.WIPO magazine issue -1 - 2024 World Intellectual Property organization.
WIPO magazine issue -1 - 2024 World Intellectual Property organization.
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With RoomVIP Kolkata Call Girl Jatin Das Park 👉 8250192130  Available With Room
VIP Kolkata Call Girl Jatin Das Park 👉 8250192130 Available With Room
 
How to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the ThreatHow to Save a Place: 12 Tips To Research & Know the Threat
How to Save a Place: 12 Tips To Research & Know the Threat
 
Item # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdfItem # 4 - 231 Encino Ave (Significance Only).pdf
Item # 4 - 231 Encino Ave (Significance Only).pdf
 
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SER...
Call Girls Service Connaught Place @9999965857 Delhi 🫦 No Advance VVIP 🍎 SER...
 
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
(TARA) Call Girls Sanghavi ( 7001035870 ) HI-Fi Pune Escorts Service
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
VIP High Profile Call Girls Gorakhpur Aarushi 8250192130 Independent Escort S...
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

ICT Security Presentation

  • 1. www.iita.orgA member of CGIAR consortium “ICT Security is Everyone’s Business” Presented by Adeoluwa Modupe
  • 2. www.iita.orgA member of CGIAR consortium Outline Preambles Terms of reference Issues Identified Justification
  • 3. www.iita.orgA member of CGIAR consortium INTRODUCTION What is Computer Security? - protection - confidentiality, - integrity - availability -computing systems and the data that they store or access.
  • 4. www.iita.orgA member of CGIAR consortium Security refers to the degree of protection against danger, damage, loss and crime. Can refer to physical media, financial transactions, computer hardware, data, application, email, information and network security. Terms of reference
  • 5. www.iita.orgA member of CGIAR consortium Sources that call for interest • Internet • Exchange of information on Network within an organization • Files • Server
  • 6. www.iita.orgA member of CGIAR consortium RISKS AND REMEDY Internet sites e.g. Social Networking sites On-line Scams Information Security Personal computers
  • 7. www.iita.orgA member of CGIAR consortium Social Networking sites Hacking Malicious applications that are suggested for inclusion/update
  • 8. www.iita.orgA member of CGIAR consortium Hacking • Sites such as Facebook, Tweeter, LinkedIn, MySpace ask users to create profiles of themselves in order to help build links with friends and family. • Anyone with a link to one of your friends, or friend friend could potentially access the information held on your page
  • 9. www.iita.orgA member of CGIAR consortium Malicious Applications • Don’t respond to friend request from people that you don’t recognise • Check applications before installing them • Call ICT helpdesk
  • 10. www.iita.orgA member of CGIAR consortium Phishing • Use of e-mail purporting to be from banks or other companies such as utilities to fool people • The e-mail generally claims to be part of security check. The URL used in the mail disguises the true location of the sites. • The destination pages are designed to look like the genuine site. • For example First Bank or GTB
  • 11. www.iita.orgA member of CGIAR consortium Pharming • The “Troj/BankAsh-virus” is the latest attack which divert people visiting legitimate bank websites to fake domain addresses owned by criminals. • Unlike phishing, which relies on the user clicking on a link to a bogus websites •
  • 12. www.iita.orgA member of CGIAR consortium On-line Scams • Never reply to phishing emails –once asking you to confirm your bank details. • Never open email from people unknown to you. • Personal information of your finances must be deleted from your emails
  • 13. www.iita.orgA member of CGIAR consortium • Who is a target? • Who is responsible for protection? • How is protection done? • What are the issues involved (computer, communication network, files, file systems, structures) Files /Information Systems Network/ Communication Global Protection Layers- 4 layers
  • 14. www.iita.orgA member of CGIAR consortium Social engineering (Hacking the mind!) • The hack that requires no knowledge of code. • Social engineering is the art of manipulating/tricking people so they give up confidential information • Accounts for an estimated 90% of security breaches. • Everyone is a target and be vigilantly aware of anyone asking for personal or private information.
  • 15. www.iita.orgA member of CGIAR consortium Social Engineering (Contd.) • Criminals can only succeed if they obtain your secret security information such as a PIN number or password. • No bank will ever ask you for your full PIN or password when identifying you over the phone or online. • If asked to call back the number on the back of the card; use another phone line or wait a few minutes before using the same phone again.
  • 16. www.iita.orgA member of CGIAR consortium Social Engineering - Can lead to Identity Theft • WHAT IS IDENTITY THEFT? • It occurs when someone steals your personal information – e.g., credit card or Personal Identification number – and uses it fraudulently. • When your private financial information gets into the wrong hands, the consequences can be devastating.
  • 17. www.iita.orgA member of CGIAR consortium How to minimize the risk of becoming a victim of identity theft • Practice Safe Internet Use. • keep your anti-virus software up-to-date. Delete spam emails that ask for personal information. • Shop online only with secure web pages (check the bottom of your browser for an image of a lock or look for “https” in the address bar). • Never send credit card numbers and other personal information via email. • Regularly check your credit card statements. • Destroy Private Records Tear up or shred credit/debit card, ATM and bank deposit statement/receipts.
  • 18. www.iita.orgA member of CGIAR consortium Social Engineering - Password Phishing • Phishing is a form of social engineering that attempts to obtain your username and password. • Downloading unknown attachments could be dangerous • Check the sender (trusted e.g. @cgiar.org) • Check any web link (trusted links) • Check hyperlink is the same as the web link • Does the “feel” of the email seem right? • If in doubt contact US! (Helpdesk x2255)
  • 19. www.iita.orgA member of CGIAR consortium What makes a good password? Password Length Comparative time to Crack* Depends on currently available processing speeds. Character Set a-z plus upper case (A-Z) plus numbers plus symbols Set size 26 52 96 6 Seconds Minutes Few Minutes 7 Seconds Minutes Hours 8 Minutes Days Many months 9 Hours Year Years A balance between “hackable” password and “easy- to-remember”
  • 20. www.iita.orgA member of CGIAR consortium Password Policy • Change every 180 days. • Must be at least 8 characters from at least three of the following sets: • Lower case letters a-z • UPPER CASE LETTERS A-Z • Numerics 0-9 • Special characters (!"# $%& ' *+, -./ : ;<=>?@ []^_` {|}~ ) • If you feel your password has been compromised change it immediately.
  • 21. www.iita.orgA member of CGIAR consortium How to change your password • CTL-ALT-DEL and select change a password • Windows
  • 22. www.iita.orgA member of CGIAR consortium How to change your password • If outside of Ibadan you can use webmail. • In OWA.IITA.ORG: Go to options, change password
  • 23. www.iita.orgA member of CGIAR consortium Examples of false password change requests (Phishing)
  • 24. www.iita.orgA member of CGIAR consortium Social Engineering - Phishing Attempts
  • 25. www.iita.orgA member of CGIAR consortium Social Engineering - Phishing attempts
  • 26. www.iita.orgA member of CGIAR consortium Email – genuine examples • Email box nearly full • Quota on server full • Spam filter • Bank update
  • 27. www.iita.orgA member of CGIAR consortium Email – box full
  • 28. www.iita.orgA member of CGIAR consortium Email - Spam filter
  • 29. www.iita.orgA member of CGIAR consortium Other security issues • If sharing a folder specify who is allowed to access it. Otherwise anyone can read or possibly delete the information. • Be careful when downloading and installing software from the internet. Many links especially to anti malware and anti-virus sites are 419.
  • 30. www.iita.orgA member of CGIAR consortium Other security issues Opendns blocks many malware sites
  • 31. www.iita.orgA member of CGIAR consortium Other security issues • Lock your screen when leaving the office • (use CTRL-ALT-DEL and select lock this computer) • Do not paste your password near your computer
  • 32. www.iita.orgA member of CGIAR consortium Other security issues • Wireless SSID broadcasts • Be aware which wireless networks you are connecting to, especially if carrying out bank transactions.
  • 33. www.iita.orgA member of CGIAR consortium Why Backups • Systems do crash • Media failures • Hard disks fail • USB sticks stolen
  • 34. www.iita.orgA member of CGIAR consortium Backups • Keep any backup separate from your computer • Copy all your files • To a mixture of • Network storage (Drive U:) • External hard disk • Removable media (Flash) • Cloud
  • 35. www.iita.orgA member of CGIAR consortium Cyber security: The DOs • If unclear about any aspect of cyber security, call helpdesk • Change password if suspicious it may have been compromised • Keep antivirus and software up to date • Comply with the institutes acceptable usage / user policy • Beware of the risks of using unsecured(open) wireless networks in public places • Know that cyber security is relevant to YOU and begins with you.
  • 36. www.iita.orgA member of CGIAR consortium Cyber security: The DON’Ts • Don’t disclose your password to anyone • Don’t send unauthorized bulk email (Spam) • Don’t leave your computer unlocked when not in use • Don’t leave hard copies of confidential information unsecured • Don’t give unauthorized access to your system or institutes information
  • 37. www.iita.orgA member of CGIAR consortium Summary • Security depends on all of us 90/10 rule: • 10% of security safeguards are technical • 90% rely on the computer user adhering to good computer practices • Beware of phishing attempts • Passwords are to be changed regularly • Beware of clicking on untrusted web sites • Backup, backup and backup your data!
  • 38. www.iita.orgA member of CGIAR consortium ICT Help contacts • Helpdesk: EXT.2255 • Email:IITA-Helpdesk@cgiar.org • Skype: IITAhelpdesk • Office: Bld500 Rm 221 upper floor
  • 39. www.iita.orgA member of CGIAR consortium THANK YOU Merci pour votre attention
  • 40. www.iita.orgA member of CGIAR consortium ?

Editor's Notes

  1. The length of the password and the set of characters used.  A short password which is lower case only, and one which is in a dictionary can be cracked in seconds a modern PC.   If you use a complex password which is a combination of letters, (upper and lower case, A-Z, a-z), numbers (0-9) and special characters: !"# $%& '() *+, -./ : ;<=>?@ [\]^_` {|}~ then the crack time goes up dramatically: