SlideShare a Scribd company logo
Information Security
Awareness Training
ISO/IEC 27001:2013
An Asset that has value to the Organization
and that can exist in many forms
(written, spoken, sent, stored, printed, transmitted, …)
What is Information ?
What is Information Security?
Confidentiality Availability
Integrity
How do we practice “Confidentiality” ?
welcome123
W31(ome!@#
System passwords
VS
Clear desk clear screen policy
How do we practice “Integrity” ?
File permissions
Read
Execute
Write

X
X
Document version and
access restrictions
How do we practice “Availability” ?
Restoration
Backup
 Protects information from a wide range of threats
 Ensure business continuity
 Minimizes business damage
 Maximizes business opportunities
 Gaines customer confidence.
Information Security - Benefits
Antivirus
Firewall
Security
Tokens
Security
Policy
Audits
ISMS
ISO 27001

Key Drivers for Information Security
Information Security is TEAM WORK
□ It isn't just the sole responsibility of
the security officer or the IT
department.
□ All the departments must be
committed in protecting business
information.
Why Security Breaches occur ?
• Lack of awareness on Policies & Procedures.
• Compromising security for convenience.
• Excessive dependency on technical controls.
Key Security Topics for End Users
• A brief snapshot of policies &
procedures
Know the key people
S
No
Member’s Name Organizational Role ISSC Role
1
2
3
4
5
Asset Classification
Classification Description Example
Restricted This classification applies to the restricted
business information, which is intended strictly
for use within the organization or a group of
individuals at the organization. Its unauthorized
disclosure could adversely impact The
organization, its employees, and/or its
customers.
HR Employee records, invoices,
and Internal audit reports,
Designs, Project or Customer
related information, etc.
Sensitive This classification applies to all other
information, which does not clearly fit into any
of the other classifications. While its
unauthorized disclosure is against policy, it is
not expected to seriously or adversely impact
the organization, its employees / customers.
ISMS Policies, Procedures, ISMS
manuals, Departments’ SOP etc.
Public This classification applies to information, which
has been explicitly approved by the
organization’s management for release to the
employees. By definition, there is nothing as
unauthorized disclosure of this information and
it may be freely disseminated without potential
harm.
Information available in the
Internet sites, brochures,
pamphlets, newsletters, press
releases, Advertisements,Wall
papers, Event results,
Calendars, etc.
Please label your documents based on this classification
Physical Security
□ Employees, visitors and vendors shall wear staff passes at
all times in the company premises.
□ Challenge any unknown person without proper
identification such as a visitor pass.
□ Tailgating/ Piggybacking is strictly prohibited.
□ All physical security breaches should be reported to the
physical security personnel.
Environmental Security
• Know your Fire evacuation procedures
• Know where are the emergency exits
• Learn how to use the fire extinguishers
• Assemble in the safe assembly area outside
the premises for further instructions
• Attend fire drill sessions
Workstation Security
□ Lock the work station when not in use.
□ Installation of pirated or unlicensed software is prohibited.
□ Collect all printout immediately from the printer area.
□ All Sensitive documents to be cleared/shredded if not in use.
□ All information on white boards to be erased after use.
Mobile devices security - Laptops
□ While travelling, ensure that the laptop bag is physically
secured. Secure it with a cable lock.
□ While using restrooms at airports ensure your laptop is
safe.
□ Disable wireless auto-connection.
□ Avoid insecure wireless connections in public places.
□ Do not disable or ignore antivirus / patch updates.
Password Security
□ Keep your password confidential at all times.
□ Complexity: Minimum 8 characters long, with a combination of
upper and lower case, numbers and special characters.
□ Change: Once every 45 days – enforced by the system
□ Change your password immediately if you suspect your password
has been compromised.
E-mail Security
□ Email account should be used for business purposes only.
□ Don't open attachments from untrusted senders.
□ Create a strong email password.
□ Do not save your email account passwords in web browsers.
□ Do not forward chain/spam/junk e-mail.
□ Use disclaimer notice to e-mails sent through company e-
mail.
□ Do not create or distribute any e-mail message containing
offensive material to any person or organization using
company e-mail.
Removable media security
□ Authorization for usage of removable media is granted
on “need-to” basis with prior approval.
□ It should be used for business purposes only.
□ Regularly scan the removable media for viruses.
□ Media containing sensitive information must be
completely formatted/ deleted/ demagnetized/
scrapped if no longer in use.
Information Security Incident
 All security events & weaknesses must be reported to the
Information Security Team, incident response manager or directly
to the CISO.
 Some common, incidents that one should report are:-
□ Password changes (you can’t log in) or requests to share your
password,
□ Workstation infection from a virus, worm or Trojan, adware, or
spyware
□ Sudden workstation slowdowns,
□ File additions, changes, or deletions,
□ Access control door not functioning properly
• Beware of the threats around you
Security Awareness on Social Media
- LinkedIn, Facebook, Twitter, etc.
Social media is one of the fastest growing areas of online activity, and one of the
fastest growing areas for malicious cyber activity. Even if your organization
blocks access to social media sites, there are a tremendous number of risks you
have to make your self aware of. Here are some of the key points we
recommend concerning social media sites.
Privacy & Social Media:
• Privacy does not exist on social media sites.
• Yes, there are privacy options and controls, but too much can go wrong and
your sensitive information can end up being exposed.
• Things such as your account being hacked, your friend's accounts being
hacked, privacy controls changing, getting the privacy controls wrong, or
people who you thought were your friends are no longer your friends.
• Long story short, if you don't want mom or your boss reading it--don't post it.
• This means being careful and watching what your friends post about you,
including pictures. If nothing else, remember that employers now include sites
like Facebook and Twitter as part of any standard background check.
Scams & Social Media: Social media websites are a breeding ground for
scams. If one of your friend's posts seems odd or suspicious, it may be an attack.
For example, your friend posts that they have been mugged while on vacation in
London and need you to wire them money. Or perhaps they are posting links
about great ways to get rich, or some shocking incident you must see. Many of
these scams or malicious links are the very same attacks you have been
receiving in e-mail for years, but now bad guys are replicating them in social
media. If you see a friend posting very odd things, call or text them to verify that
they really posted the information.
Work & Social Media: Do not post anything sensitive about work. Be sure you
understand your organization's policies about what you can and cannot post
about your job.
Social media is a powerful way to communicate and stay in touch with people
around the world. We do not want to scare people away from it. Instead we
simply want to make people aware of the risks so that they can leverage
technology more effectively.
Security Awareness on Social Media -
LinkedIn, Facebook, Twitter, etc.
• The rules you must follow to avoid risks through social
media.
– When engaging online, do not post any confidential,
internal-use only or copyrighted information .
– Do not post anything that is offensive, harassing, or in
violation of any applicable law.
Security Awareness on Social Media -
LinkedIn, Facebook, Twitter, etc.
Phishing
• Phishing scams employ fraudulent e-mail messages or Web sites that try to fool you into
divulging personal information.
• Phishing e-mail messages often include misspellings, poor use of grammar, threats, and
exaggerations.
• To help protect yourself against phishing, use phishing filters, which helps in identifying and
remove phishing attacks.
Examples of phishing email messages & links
• Look forward to see you again……
The End
Thank You

More Related Content

What's hot

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
OoXair
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
Abdul Manaf Vellakodath
 
Security awareness
Security awarenessSecurity awareness
Security awareness
Josh Chandler
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
Ken Holmes
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Physical security
Physical securityPhysical security
Physical security
Tariq Mahmood
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
Mart Rovers
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
Community IT Innovators
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
PECB
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 

What's hot (20)

Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Physical security
Physical securityPhysical security
Physical security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Iso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training courseIso iec 27032 foundation - cybersecurity training course
Iso iec 27032 foundation - cybersecurity training course
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 

Similar to ISMS Awareness Training (2) (1).pptx

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
Courion Corporation
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
BarakaMuyengi
 
Team black
Team blackTeam black
Team black
hetvi naik
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
Denis kisina
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Apurva323420
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
klodianelezi1
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
Varinder K
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
QuiMo3
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
Excellence Foundation for South Sudan
 
Cyber security
Cyber securityCyber security
Cyber security
Sannith Reddy
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ncell
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
ARUN REDDY M
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
DWP Information Architects Inc.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 

Similar to ISMS Awareness Training (2) (1).pptx (20)

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Team black
Team blackTeam black
Team black
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Cyber security
Cyber securityCyber security
Cyber security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
it-security.ppt
it-security.pptit-security.ppt
it-security.ppt
 

Recently uploaded

ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 

Recently uploaded (20)

ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 

ISMS Awareness Training (2) (1).pptx

  • 2. An Asset that has value to the Organization and that can exist in many forms (written, spoken, sent, stored, printed, transmitted, …) What is Information ?
  • 3. What is Information Security? Confidentiality Availability Integrity
  • 4. How do we practice “Confidentiality” ? welcome123 W31(ome!@# System passwords VS Clear desk clear screen policy
  • 5. How do we practice “Integrity” ? File permissions Read Execute Write  X X Document version and access restrictions
  • 6. How do we practice “Availability” ? Restoration Backup
  • 7.  Protects information from a wide range of threats  Ensure business continuity  Minimizes business damage  Maximizes business opportunities  Gaines customer confidence. Information Security - Benefits
  • 9. Information Security is TEAM WORK □ It isn't just the sole responsibility of the security officer or the IT department. □ All the departments must be committed in protecting business information.
  • 10. Why Security Breaches occur ? • Lack of awareness on Policies & Procedures. • Compromising security for convenience. • Excessive dependency on technical controls.
  • 11. Key Security Topics for End Users • A brief snapshot of policies & procedures
  • 12. Know the key people S No Member’s Name Organizational Role ISSC Role 1 2 3 4 5
  • 13. Asset Classification Classification Description Example Restricted This classification applies to the restricted business information, which is intended strictly for use within the organization or a group of individuals at the organization. Its unauthorized disclosure could adversely impact The organization, its employees, and/or its customers. HR Employee records, invoices, and Internal audit reports, Designs, Project or Customer related information, etc. Sensitive This classification applies to all other information, which does not clearly fit into any of the other classifications. While its unauthorized disclosure is against policy, it is not expected to seriously or adversely impact the organization, its employees / customers. ISMS Policies, Procedures, ISMS manuals, Departments’ SOP etc. Public This classification applies to information, which has been explicitly approved by the organization’s management for release to the employees. By definition, there is nothing as unauthorized disclosure of this information and it may be freely disseminated without potential harm. Information available in the Internet sites, brochures, pamphlets, newsletters, press releases, Advertisements,Wall papers, Event results, Calendars, etc. Please label your documents based on this classification
  • 14. Physical Security □ Employees, visitors and vendors shall wear staff passes at all times in the company premises. □ Challenge any unknown person without proper identification such as a visitor pass. □ Tailgating/ Piggybacking is strictly prohibited. □ All physical security breaches should be reported to the physical security personnel.
  • 15. Environmental Security • Know your Fire evacuation procedures • Know where are the emergency exits • Learn how to use the fire extinguishers • Assemble in the safe assembly area outside the premises for further instructions • Attend fire drill sessions
  • 16. Workstation Security □ Lock the work station when not in use. □ Installation of pirated or unlicensed software is prohibited. □ Collect all printout immediately from the printer area. □ All Sensitive documents to be cleared/shredded if not in use. □ All information on white boards to be erased after use.
  • 17. Mobile devices security - Laptops □ While travelling, ensure that the laptop bag is physically secured. Secure it with a cable lock. □ While using restrooms at airports ensure your laptop is safe. □ Disable wireless auto-connection. □ Avoid insecure wireless connections in public places. □ Do not disable or ignore antivirus / patch updates.
  • 18. Password Security □ Keep your password confidential at all times. □ Complexity: Minimum 8 characters long, with a combination of upper and lower case, numbers and special characters. □ Change: Once every 45 days – enforced by the system □ Change your password immediately if you suspect your password has been compromised.
  • 19. E-mail Security □ Email account should be used for business purposes only. □ Don't open attachments from untrusted senders. □ Create a strong email password. □ Do not save your email account passwords in web browsers. □ Do not forward chain/spam/junk e-mail. □ Use disclaimer notice to e-mails sent through company e- mail. □ Do not create or distribute any e-mail message containing offensive material to any person or organization using company e-mail.
  • 20. Removable media security □ Authorization for usage of removable media is granted on “need-to” basis with prior approval. □ It should be used for business purposes only. □ Regularly scan the removable media for viruses. □ Media containing sensitive information must be completely formatted/ deleted/ demagnetized/ scrapped if no longer in use.
  • 21. Information Security Incident  All security events & weaknesses must be reported to the Information Security Team, incident response manager or directly to the CISO.  Some common, incidents that one should report are:- □ Password changes (you can’t log in) or requests to share your password, □ Workstation infection from a virus, worm or Trojan, adware, or spyware □ Sudden workstation slowdowns, □ File additions, changes, or deletions, □ Access control door not functioning properly
  • 22. • Beware of the threats around you
  • 23. Security Awareness on Social Media - LinkedIn, Facebook, Twitter, etc. Social media is one of the fastest growing areas of online activity, and one of the fastest growing areas for malicious cyber activity. Even if your organization blocks access to social media sites, there are a tremendous number of risks you have to make your self aware of. Here are some of the key points we recommend concerning social media sites. Privacy & Social Media: • Privacy does not exist on social media sites. • Yes, there are privacy options and controls, but too much can go wrong and your sensitive information can end up being exposed. • Things such as your account being hacked, your friend's accounts being hacked, privacy controls changing, getting the privacy controls wrong, or people who you thought were your friends are no longer your friends. • Long story short, if you don't want mom or your boss reading it--don't post it. • This means being careful and watching what your friends post about you, including pictures. If nothing else, remember that employers now include sites like Facebook and Twitter as part of any standard background check.
  • 24. Scams & Social Media: Social media websites are a breeding ground for scams. If one of your friend's posts seems odd or suspicious, it may be an attack. For example, your friend posts that they have been mugged while on vacation in London and need you to wire them money. Or perhaps they are posting links about great ways to get rich, or some shocking incident you must see. Many of these scams or malicious links are the very same attacks you have been receiving in e-mail for years, but now bad guys are replicating them in social media. If you see a friend posting very odd things, call or text them to verify that they really posted the information. Work & Social Media: Do not post anything sensitive about work. Be sure you understand your organization's policies about what you can and cannot post about your job. Social media is a powerful way to communicate and stay in touch with people around the world. We do not want to scare people away from it. Instead we simply want to make people aware of the risks so that they can leverage technology more effectively. Security Awareness on Social Media - LinkedIn, Facebook, Twitter, etc.
  • 25. • The rules you must follow to avoid risks through social media. – When engaging online, do not post any confidential, internal-use only or copyrighted information . – Do not post anything that is offensive, harassing, or in violation of any applicable law. Security Awareness on Social Media - LinkedIn, Facebook, Twitter, etc.
  • 26. Phishing • Phishing scams employ fraudulent e-mail messages or Web sites that try to fool you into divulging personal information. • Phishing e-mail messages often include misspellings, poor use of grammar, threats, and exaggerations. • To help protect yourself against phishing, use phishing filters, which helps in identifying and remove phishing attacks. Examples of phishing email messages & links
  • 27. • Look forward to see you again……