Submit Search
Upload
Security awareness rgesit
•
0 likes
•
277 views
R. Gesit Prasasti Alam, PSM®
Follow
Technology
Education
Report
Share
Report
Share
1 of 30
Recommended
Network security
Network security
Ashish Gaurkhede
Client server network threat
Client server network threat
Raj vardhan
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
dtimal
Formal and Practical Aspects of Security of Operating System
Formal and Practical Aspects of Security of Operating System
Meghaj Mallick
Computer basic maintenance
Computer basic maintenance
ralphabarquez1
Security vulnerability
Security vulnerability
A. Shamel
Program Threats
Program Threats
guestab0ee0
Recommended
Network security
Network security
Ashish Gaurkhede
Client server network threat
Client server network threat
Raj vardhan
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
Modern Malware by Nir Zuk Palo Alto Networks
Modern Malware by Nir Zuk Palo Alto Networks
dtimal
Formal and Practical Aspects of Security of Operating System
Formal and Practical Aspects of Security of Operating System
Meghaj Mallick
Computer basic maintenance
Computer basic maintenance
ralphabarquez1
Security vulnerability
Security vulnerability
A. Shamel
Program Threats
Program Threats
guestab0ee0
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
Network security and viruses
Network security and viruses
Aamlan Saswat Mishra
Types of Cyber-Attacks
Types of Cyber-Attacks
techexpert2345
Ch03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
newbie2019
Data base security and injection
Data base security and injection
A. Shamel
Safety and Security of Web-applications (Presentation)
Safety and Security of Web-applications (Presentation)
MrCoffee94
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Student
What's new in CEHv11?
What's new in CEHv11?
EC-Council
Security & Protection in Operating System
Security & Protection in Operating System
Meghaj Mallick
Types of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
Cyber attacks
Cyber attacks
Anuradha Moti T
Anti Virus Software
Anti Virus Software
Pradeepkrajyaguru
Maranan chap2 lab2
Maranan chap2 lab2
maranan_zyra
Network attacks
Network attacks
Manjushree Mashal
Ericom Shield datasheet
Ericom Shield datasheet
Ericom Software
Vulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control System
Centextech
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
Jose Luis Balbiano
System Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Kenny Huang Ph.D.
Sakitmu Menyelamatkanmu
Sakitmu Menyelamatkanmu
R. Gesit Prasasti Alam, PSM®
UTC Unpacking The Codes
UTC Unpacking The Codes
R. Gesit Prasasti Alam, PSM®
More Related Content
What's hot
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
RohitK71
Network security and viruses
Network security and viruses
Aamlan Saswat Mishra
Types of Cyber-Attacks
Types of Cyber-Attacks
techexpert2345
Ch03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
newbie2019
Data base security and injection
Data base security and injection
A. Shamel
Safety and Security of Web-applications (Presentation)
Safety and Security of Web-applications (Presentation)
MrCoffee94
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Student
What's new in CEHv11?
What's new in CEHv11?
EC-Council
Security & Protection in Operating System
Security & Protection in Operating System
Meghaj Mallick
Types of Cyber Attacks
Types of Cyber Attacks
Rubal Sagwal
Cyber attacks
Cyber attacks
Anuradha Moti T
Anti Virus Software
Anti Virus Software
Pradeepkrajyaguru
Maranan chap2 lab2
Maranan chap2 lab2
maranan_zyra
Network attacks
Network attacks
Manjushree Mashal
Ericom Shield datasheet
Ericom Shield datasheet
Ericom Software
Vulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control System
Centextech
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
Jose Luis Balbiano
System Security- Firewalls and ID System
System Security- Firewalls and ID System
Gayathridevi120
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Kenny Huang Ph.D.
What's hot
(20)
OPERATING SYSTEM SECURITY
OPERATING SYSTEM SECURITY
Network security and viruses
Network security and viruses
Types of Cyber-Attacks
Types of Cyber-Attacks
Ch03 Network and Computer Attacks
Ch03 Network and Computer Attacks
Pertemuan 14 keamanan sistem operasi
Pertemuan 14 keamanan sistem operasi
Data base security and injection
Data base security and injection
Safety and Security of Web-applications (Presentation)
Safety and Security of Web-applications (Presentation)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
Sigfree ppt (International Journal of Computer Science and Mobile Computing)
What's new in CEHv11?
What's new in CEHv11?
Security & Protection in Operating System
Security & Protection in Operating System
Types of Cyber Attacks
Types of Cyber Attacks
Cyber attacks
Cyber attacks
Anti Virus Software
Anti Virus Software
Maranan chap2 lab2
Maranan chap2 lab2
Network attacks
Network attacks
Ericom Shield datasheet
Ericom Shield datasheet
Vulnerabilities In Industrial Control System
Vulnerabilities In Industrial Control System
"EL ATAQUE INTERNO"
"EL ATAQUE INTERNO"
System Security- Firewalls and ID System
System Security- Firewalls and ID System
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
Viewers also liked
Sakitmu Menyelamatkanmu
Sakitmu Menyelamatkanmu
R. Gesit Prasasti Alam, PSM®
UTC Unpacking The Codes
UTC Unpacking The Codes
R. Gesit Prasasti Alam, PSM®
Mengenal Dewan Dakwah Islamiyah Indonesia (DDII)
Mengenal Dewan Dakwah Islamiyah Indonesia (DDII)
R. Gesit Prasasti Alam, PSM®
Tarhib ramadhan @rgesit
Tarhib ramadhan @rgesit
R. Gesit Prasasti Alam, PSM®
part1 Cloud computing rgesit
part1 Cloud computing rgesit
R. Gesit Prasasti Alam, PSM®
Sprint review and Retrospective
Sprint review and Retrospective
R. Gesit Prasasti Alam, PSM®
Bicaramu celakamu @rgesit
Bicaramu celakamu @rgesit
R. Gesit Prasasti Alam, PSM®
Viewers also liked
(7)
Sakitmu Menyelamatkanmu
Sakitmu Menyelamatkanmu
UTC Unpacking The Codes
UTC Unpacking The Codes
Mengenal Dewan Dakwah Islamiyah Indonesia (DDII)
Mengenal Dewan Dakwah Islamiyah Indonesia (DDII)
Tarhib ramadhan @rgesit
Tarhib ramadhan @rgesit
part1 Cloud computing rgesit
part1 Cloud computing rgesit
Sprint review and Retrospective
Sprint review and Retrospective
Bicaramu celakamu @rgesit
Bicaramu celakamu @rgesit
Similar to Security awareness rgesit
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
uzair
Unit 5.pptx
Unit 5.pptx
Rajanarayanan subramanian
Network security
Network security
nafisarayhana1
Types of cyber attacks
Types of cyber attacks
krishh sivakrishna
Security in Windows operating system
Security in Windows operating system
abdullah roomi
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
srtwgwfwwgw
Cyber security
Cyber security
ankit yadav
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
F-Secure Corporation
Ne Course Part Two
Ne Course Part Two
backdoor
Computer security system Unit1.pptx
Computer security system Unit1.pptx
VIRAJDEY1
Cyber security
Cyber security
Sakib Sami
WordPress Security Hardening
WordPress Security Hardening
Ida Bagus Budanthara
Basics of hacking
Basics of hacking
Ali Asghar Jafari Lari
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
3 Hkcert Trend
3 Hkcert Trend
SC Leung
BackDoors Seminar
BackDoors Seminar
Chaitali Patel
Recent cyber Attacks
Recent cyber Attacks
S.M. Towhidul Islam
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
AashishTanania
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Eric Vanderburg
Similar to Security awareness rgesit
(20)
What is Remote Buffer Overflow Attack.pdf
What is Remote Buffer Overflow Attack.pdf
Unit 5.pptx
Unit 5.pptx
Network security
Network security
Types of cyber attacks
Types of cyber attacks
Security in Windows operating system
Security in Windows operating system
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Cyber security
Cyber security
Security A to Z: Glossary of the most important terms
Security A to Z: Glossary of the most important terms
Ne Course Part Two
Ne Course Part Two
Computer security system Unit1.pptx
Computer security system Unit1.pptx
Cyber security
Cyber security
WordPress Security Hardening
WordPress Security Hardening
Basics of hacking
Basics of hacking
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
3 Hkcert Trend
3 Hkcert Trend
BackDoors Seminar
BackDoors Seminar
Recent cyber Attacks
Recent cyber Attacks
Cyber Security Presentation By(Aashish Tanania)
Cyber Security Presentation By(Aashish Tanania)
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
More from R. Gesit Prasasti Alam, PSM®
it-fun-hackathon-2018.pdf
it-fun-hackathon-2018.pdf
R. Gesit Prasasti Alam, PSM®
Non Toxic Team with Mastering Civility
Non Toxic Team with Mastering Civility
R. Gesit Prasasti Alam, PSM®
Pair programming ?
Pair programming ?
R. Gesit Prasasti Alam, PSM®
The Learning loop of Devops in Enterprise
The Learning loop of Devops in Enterprise
R. Gesit Prasasti Alam, PSM®
Please don't test your product - Agile Testing
Please don't test your product - Agile Testing
R. Gesit Prasasti Alam, PSM®
Dfresh - Public Speaking: Sekali dan Berarti - rgesit
Dfresh - Public Speaking: Sekali dan Berarti - rgesit
R. Gesit Prasasti Alam, PSM®
Daily scrum-rgesit
Daily scrum-rgesit
R. Gesit Prasasti Alam, PSM®
Home schooling - rgesit
Home schooling - rgesit
R. Gesit Prasasti Alam, PSM®
Scrum - Sprint Planning
Scrum - Sprint Planning
R. Gesit Prasasti Alam, PSM®
Abdurrahman Ad Dakhil - Andalusia
Abdurrahman Ad Dakhil - Andalusia
R. Gesit Prasasti Alam, PSM®
Hijrah Abdurrahman Ad Dakhil - Andalusia
Hijrah Abdurrahman Ad Dakhil - Andalusia
R. Gesit Prasasti Alam, PSM®
DFresh outdoor - Grand Briefing IT Family Gathering
DFresh outdoor - Grand Briefing IT Family Gathering
R. Gesit Prasasti Alam, PSM®
Introduction Web Developmenth
Introduction Web Developmenth
R. Gesit Prasasti Alam, PSM®
Perang uhud غزوة أحد
Perang uhud غزوة أحد
R. Gesit Prasasti Alam, PSM®
Press Release Panada conference 2014
Press Release Panada conference 2014
R. Gesit Prasasti Alam, PSM®
Hadits Berbakti Kepada Kedua Orang Tua
Hadits Berbakti Kepada Kedua Orang Tua
R. Gesit Prasasti Alam, PSM®
CV @rgesit 2013
CV @rgesit 2013
R. Gesit Prasasti Alam, PSM®
المعتزلة (Mu'tazilah) - @rgesit
المعتزلة (Mu'tazilah) - @rgesit
R. Gesit Prasasti Alam, PSM®
Relay On Linux Presentation
Relay On Linux Presentation
R. Gesit Prasasti Alam, PSM®
Internet technology
Internet technology
R. Gesit Prasasti Alam, PSM®
More from R. Gesit Prasasti Alam, PSM®
(20)
it-fun-hackathon-2018.pdf
it-fun-hackathon-2018.pdf
Non Toxic Team with Mastering Civility
Non Toxic Team with Mastering Civility
Pair programming ?
Pair programming ?
The Learning loop of Devops in Enterprise
The Learning loop of Devops in Enterprise
Please don't test your product - Agile Testing
Please don't test your product - Agile Testing
Dfresh - Public Speaking: Sekali dan Berarti - rgesit
Dfresh - Public Speaking: Sekali dan Berarti - rgesit
Daily scrum-rgesit
Daily scrum-rgesit
Home schooling - rgesit
Home schooling - rgesit
Scrum - Sprint Planning
Scrum - Sprint Planning
Abdurrahman Ad Dakhil - Andalusia
Abdurrahman Ad Dakhil - Andalusia
Hijrah Abdurrahman Ad Dakhil - Andalusia
Hijrah Abdurrahman Ad Dakhil - Andalusia
DFresh outdoor - Grand Briefing IT Family Gathering
DFresh outdoor - Grand Briefing IT Family Gathering
Introduction Web Developmenth
Introduction Web Developmenth
Perang uhud غزوة أحد
Perang uhud غزوة أحد
Press Release Panada conference 2014
Press Release Panada conference 2014
Hadits Berbakti Kepada Kedua Orang Tua
Hadits Berbakti Kepada Kedua Orang Tua
CV @rgesit 2013
CV @rgesit 2013
المعتزلة (Mu'tazilah) - @rgesit
المعتزلة (Mu'tazilah) - @rgesit
Relay On Linux Presentation
Relay On Linux Presentation
Internet technology
Internet technology
Recently uploaded
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
HostedbyConfluent
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
OnBoard
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
AndikSusilo4
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
Hyundai Motor Group
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
Michael W. Hawkins
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Memoori
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
null - The Open Security Community
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Delhi Call girls
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Mark Billinghurst
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Recently uploaded
(20)
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Security awareness rgesit
1.
Security Awareness
2.
Definition wikipedia } Security awareness isthe knowledgeand attitudemembersof anorganization possessregardingthe protectionofthe physicaland especially, informationassetsof thatorganization. Manyorganizations requireformal securityawareness trainingforall workerswhenthey jointheorganization andperiodically thereafter,usually annually.
3.
backgroundWhy and for
what ?
4.
Hiddenbugs
5.
That'sNotaBug, It'saFeatureRequest
6.
Pointofview
7.
Preventionis better
8.
EnjoyyourLife
9.
Type of AttackSpecial
for ‘you’ guys
10.
BruteForce a cryptanalytic attack that can,
in theory, be used against any encrypted data
11.
CommandExecution the process of
using a web interface in order to execute OS commands on a web server
12.
CSRF CrossSiteRequestForgery a type of
malicious exploit of a website whereby unauthorized commands are transmitted from a user that the website trusts
13.
FileInclusion It allows an
attacker to include a remote/local file, usually through a script on the web server
14.
SQLInjection a code injection technique that exploits
a security vulnerability in an application's software
15.
FileUpload depend on functionality
that allows an attacker to upload a script file that can then be executed on the server
16.
XSS CrossSiteScripting XSS enables attackers to inject client-side
script into Web pagesviewed by other users
17.
Tips & Tricks Before,
currently and after
18.
Don’tbepanic
19.
DoInvestigations
20.
Coverthehole!!!
21.
Monitoring
22.
MultipleSecurity
23.
SuperTrap!!!
24.
updateandshare yourknowledge
25.
Strongfoundation Plan
26.
checkall possibilities Analyze
27.
ThinkDifferent Development & Implementation
28.
Test&Benchmark UAT & Deploy
29.
Preiodicchecks Evaluation
30.
Let’sdiscuss&thanks rgesit