SlideShare a Scribd company logo
TRANSNATIONAL RAILWAY
SECURITY OVERVIEW
SENSITIVE DATA
• Memorize your password
• Do not share your password (even with technical staff)
• Create a complex password
• Always lock your computer when you are away from your desk
• Do not install non whitelisted programs on your computer
• Do not enter personal data on questionable websites
• Do not use work email for personal websites
• Keep personal web use to a minimum

More Related Content

What's hot

Belenko, sklyarov dark and bright sides of i cloud (in)security
Belenko, sklyarov   dark and bright sides of i cloud (in)securityBelenko, sklyarov   dark and bright sides of i cloud (in)security
Belenko, sklyarov dark and bright sides of i cloud (in)securityDefconRussia
 
5penpctechnology
5penpctechnology5penpctechnology
5penpctechnology
vennela venni
 
Ярослав Воронцов — Пара слов о mobile security.
Ярослав Воронцов — Пара слов о mobile security.Ярослав Воронцов — Пара слов о mobile security.
Ярослав Воронцов — Пара слов о mobile security.
DataArt
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)
Jonathan Engelsma
 
Breaking The Confinement Cycle Using Linux
Breaking The Confinement Cycle Using LinuxBreaking The Confinement Cycle Using Linux
Breaking The Confinement Cycle Using Linux
Spencer Hunley
 
Content Creation on the iPad
Content Creation on the iPadContent Creation on the iPad
Content Creation on the iPadManesh Lad
 
Tech in the library narrated by Bill
Tech in the library narrated by BillTech in the library narrated by Bill
Tech in the library narrated by Billsmlweiss
 
Mobile Knife Fighting at JSConf US
Mobile Knife Fighting at JSConf US Mobile Knife Fighting at JSConf US
Mobile Knife Fighting at JSConf US
Brian LeRoux
 
Powerpoint ftw
Powerpoint ftwPowerpoint ftw
Powerpoint ftw
Mel A
 
iRidium for TECO
iRidium for TECOiRidium for TECO
iRidium for TECO
iRidiumMobile365
 
Nokia X
Nokia XNokia X

What's hot (12)

Belenko, sklyarov dark and bright sides of i cloud (in)security
Belenko, sklyarov   dark and bright sides of i cloud (in)securityBelenko, sklyarov   dark and bright sides of i cloud (in)security
Belenko, sklyarov dark and bright sides of i cloud (in)security
 
5penpctechnology
5penpctechnology5penpctechnology
5penpctechnology
 
Ярослав Воронцов — Пара слов о mobile security.
Ярослав Воронцов — Пара слов о mobile security.Ярослав Воронцов — Пара слов о mobile security.
Ярослав Воронцов — Пара слов о mobile security.
 
Fsoss 2010 en
Fsoss 2010 enFsoss 2010 en
Fsoss 2010 en
 
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)
iOS Bootcamp: learning to create awesome apps on iOS using Swift (Lecture 09)
 
Breaking The Confinement Cycle Using Linux
Breaking The Confinement Cycle Using LinuxBreaking The Confinement Cycle Using Linux
Breaking The Confinement Cycle Using Linux
 
Content Creation on the iPad
Content Creation on the iPadContent Creation on the iPad
Content Creation on the iPad
 
Tech in the library narrated by Bill
Tech in the library narrated by BillTech in the library narrated by Bill
Tech in the library narrated by Bill
 
Mobile Knife Fighting at JSConf US
Mobile Knife Fighting at JSConf US Mobile Knife Fighting at JSConf US
Mobile Knife Fighting at JSConf US
 
Powerpoint ftw
Powerpoint ftwPowerpoint ftw
Powerpoint ftw
 
iRidium for TECO
iRidium for TECOiRidium for TECO
iRidium for TECO
 
Nokia X
Nokia XNokia X
Nokia X
 

Viewers also liked

Ecografos EDAN 2016
Ecografos EDAN 2016Ecografos EDAN 2016
Ecografos EDAN 2016
brygahuman
 
Administrador tipo 01 ga
Administrador tipo 01 gaAdministrador tipo 01 ga
Administrador tipo 01 gaMariana Lima
 
La grande consultation des entrepreneurs / Vague 8 - Mars 2016
La grande consultation des entrepreneurs / Vague 8 - Mars 2016La grande consultation des entrepreneurs / Vague 8 - Mars 2016
La grande consultation des entrepreneurs / Vague 8 - Mars 2016
contactOpinionWay
 
Ivan ttomas tomas mateo diego weapons and wearfare1
Ivan ttomas tomas mateo diego weapons and  wearfare1Ivan ttomas tomas mateo diego weapons and  wearfare1
Ivan ttomas tomas mateo diego weapons and wearfare1adriana miranda
 
Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1
Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1
Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1
Bruno Moreno
 
Que es un disco duro
Que es un disco duroQue es un disco duro
Que es un disco duro
Glenda Carolina Torres Gonzalez
 
กฎหมายมรดก
กฎหมายมรดก กฎหมายมรดก
กฎหมายมรดก
Yosiri
 
Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4
Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4
Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4Cuong NGUYEN
 
Mutual Evaluation of Jamaica - 2017
Mutual Evaluation of Jamaica - 2017Mutual Evaluation of Jamaica - 2017
Mutual Evaluation of Jamaica - 2017
FATF - Financial Action Task Force
 

Viewers also liked (14)

Newsletter PDF Interactive HQ
Newsletter PDF Interactive HQNewsletter PDF Interactive HQ
Newsletter PDF Interactive HQ
 
Jeremy Redmond
Jeremy RedmondJeremy Redmond
Jeremy Redmond
 
Ecografos EDAN 2016
Ecografos EDAN 2016Ecografos EDAN 2016
Ecografos EDAN 2016
 
tipos de empresas
tipos de empresastipos de empresas
tipos de empresas
 
Administrador tipo 01 ga
Administrador tipo 01 gaAdministrador tipo 01 ga
Administrador tipo 01 ga
 
Jose rumenia
Jose rumeniaJose rumenia
Jose rumenia
 
La grande consultation des entrepreneurs / Vague 8 - Mars 2016
La grande consultation des entrepreneurs / Vague 8 - Mars 2016La grande consultation des entrepreneurs / Vague 8 - Mars 2016
La grande consultation des entrepreneurs / Vague 8 - Mars 2016
 
Ivan ttomas tomas mateo diego weapons and wearfare1
Ivan ttomas tomas mateo diego weapons and  wearfare1Ivan ttomas tomas mateo diego weapons and  wearfare1
Ivan ttomas tomas mateo diego weapons and wearfare1
 
Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1
Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1
Norma ambiental mais simples põe em risco sítios arqueológicos_13 10-6.1
 
Agendaoctubre142013
Agendaoctubre142013Agendaoctubre142013
Agendaoctubre142013
 
Que es un disco duro
Que es un disco duroQue es un disco duro
Que es un disco duro
 
กฎหมายมรดก
กฎหมายมรดก กฎหมายมรดก
กฎหมายมรดก
 
Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4
Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4
Nguyen, Phuong LIT5203 Strengthening Literacy - Module 4
 
Mutual Evaluation of Jamaica - 2017
Mutual Evaluation of Jamaica - 2017Mutual Evaluation of Jamaica - 2017
Mutual Evaluation of Jamaica - 2017
 

Recently uploaded

ÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docx
ÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docxÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docx
ÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docx
ngochaavk33a
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
Chandrakant Divate
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
ssuser8d5e2d1
 
Program Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdfProgram Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdf
Michael Herlache, MBA
 
CHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docx
CHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docxCHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docx
CHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docx
ngochaavk33a
 
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdfCollocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
ngochaavk33a
 
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptxEthical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
TANMAYJAIN511570
 

Recently uploaded (7)

ÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docx
ÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docxÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docx
ÔN TẬP CỤM THÀNH NGỮ TIẾNG ANH CỰC HAY.docx
 
UNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the NatureUNIVERSAL HUMAN VALUES- Harmony in the Nature
UNIVERSAL HUMAN VALUES- Harmony in the Nature
 
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINTSOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
SOCIOLOGY PPT. SOCIAL SECURITY POWER POINT
 
Program Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdfProgram Your Destiny eBook - Destiny University.pdf
Program Your Destiny eBook - Destiny University.pdf
 
CHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docx
CHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docxCHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docx
CHUYÊN ĐỀ READING ÔN THI HSG THPT HAY.docx
 
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdfCollocation thường gặp trong đề thi THPT Quốc gia.pdf
Collocation thường gặp trong đề thi THPT Quốc gia.pdf
 
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptxEthical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
Ethical_dilemmas_MDI_Gurgaon-Business Ethics Case 1.pptx
 

Transnational railway security overview

  • 2. SENSITIVE DATA • Memorize your password • Do not share your password (even with technical staff) • Create a complex password • Always lock your computer when you are away from your desk
  • 3. • Do not install non whitelisted programs on your computer • Do not enter personal data on questionable websites • Do not use work email for personal websites • Keep personal web use to a minimum