SlideShare a Scribd company logo
1 of 21
Toru Nakata
(Senior Researcher,
AIST, Japan)
 Good security sticks to efficiency of business.
 Not protection of information. Utilize them.
 Bad security is reactive and passive.
 You should close your company, if your goal
is just to avoid information leakage.
 Dwell on why you are using a number of
information and computers.
 Good goal is more concrete and intentional
about business; it mentions about service
time, service quality and security quality.
 The Weakest link dooms your company
◦ A security expert company, which has excellent
management on email and web, was attacked via
FAX. A fraud FAX deceived the employee into
changing security settings.
 Survey all equipment, systems, information
flows in your company.
 Imagine your business scene.
◦ “Go out for the customers with bringing laptops.
Give presentation, Negotiate, send mail and so on.”
 When, where, why, what, and how much is
information needed?
 Reveal the minimum set of necessary
information.
 Over 90% of accidents is caused by
employees; lost of information, sending
wrong address, and mistakes about system
settings.
 Apply Systematic protection
◦ Email system to prevent wrong emailing.
 Make Management more practical
◦ Consider why your employees behave so risky to
bring out the information. Is there any
inconvenience at your office?
 Wrong security policy is dangerous.
◦ “Do not connect PCs to the net.”  People uses USB
memories to convey files.  Lose memories.
 There is no silver bullet. Even the best
methods have some bad side effects.
 Compare several ways to promote your
business and security.
 Information security is the main issue of
company performance.
 The best and brightest employees should
take care of it.
 Technology experts are to support.
 Plan before incidents
 Reinforce the security policy periodically
 Drill against human error incidents and cyber
attacks.
 The 3 typical tactics of cyber fraud
1. Authority impersonation
◦ “The security department require you to read the
attachment file of this mail!”
2. Panic maker
◦ “I am meeting the customer and need to open a
locked file. Please tell me the password now!”
3. Lightly-favored trap
◦ “Lights of someone’s car in the parking is left on.
The photo is attacked to this mail.”
 Change typical mail addresses as decoys
◦ admin@your.com, webmaster@your.com, etc.
 Prepare decoy names of company employees
and organizations
◦ Adversary: “Sorry, I forget the name of the person I
met yesterday.”
◦ Employee: “Well, Mr. Suzuki is our boss.”
◦ Adversary: “Yes, Mr. Suzuki is he.”
◦ Employee: “There is no such person in our
company!”
 Passwords are hard to hide perfectly.
◦ Key logger, reusing same password, etc.
 Do not rely only on passwords.
 Require additional and physical keys to
access.
 Naïve passwords are often attacked, but they
are very popular.
◦ “123456”, “password”, “admin” , etc.
 Even complex passwords are breakable when
they are challenged limitless times. (Offline
attack)
◦ Locking files by passwords are not safe.
 Very complex passwords will be written down
and posted around the desk.
 Two-factor authentication is recommended
for various business uses.
 Guessing is very easy.
◦ Birthday date, year.
◦ Telephone number
◦ Car number
◦ Postal code
 Isn’t it?
 The present state may be not safe anymore.
◦ Technology changes quickly.
◦ Severe security holes are found every month.
◦ Old-fashioned technology like FAX should be
reconsidered to be continued.
 Buy powerful solutions, if you have enough
budget.
 Otherwise, change the policy more protective.
 Watch “122” and read as “112”
 Separate long sequences of digits into 2-digit
clusters
◦ Write as “12-2”
 PC can read numbers aloud. Hear the voice to
check the numbers.
 Risks are often hidden individually.
◦ Violations of security policy.
◦ Virus-affected PC.
◦ Passwords known only by one person.
 During long vacation, the risks cannot be
hide.
 Retiring employees bring information with
them.
◦ Knowledge in the brain is inerasable. There is no
perfect control.
 Have audits with them, and make consensus
about information management.
◦ What kinds of information are left, and what are not.
 Do not put all eggs in one basket
◦ Files accessible for everyone?
◦ PCs open to everyone?
◦ Administrators always use powerful admin account?
 Put partitions for information.
 Information becomes power when it is
exchanged.
 If you say nothing, the counterpart says
nothing.
◦ Too strict security policy stops your business.
 Plan win-win strategy
◦ Some of your information can be given to the
counterpart without damaging you.
◦ Likewise, some of their information are vice versa.
 Information flow must not stop especially
under disasters.
◦ Natural disasters
◦ Business disasters (Terrors against your products)
 Keep several channels to communicate with
customers, employees, and neighborhoods.
 Utilize social networking services.

More Related Content

What's hot

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationJamie Proctor-Brassard
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefieldcentralohioissa
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program Dtex Systems
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slidesjubke
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Social Engineering
Social EngineeringSocial Engineering
Social EngineeringAhmed Musaad
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingRob Ragan
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersJoel Cardella
 

What's hot (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Security Awareness Training Summary
Security Awareness Training SummarySecurity Awareness Training Summary
Security Awareness Training Summary
 
National Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness PresentationNational Life IT Department's Cyber Security Awareness Presentation
National Life IT Department's Cyber Security Awareness Presentation
 
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the BattlefieldPhil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
 
10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program 10 Tips to Strengthen Your Insider Threat Program
10 Tips to Strengthen Your Insider Threat Program
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and PhishingInterop 2017 - Defeating Social Engineering, BEC, and Phishing
Interop 2017 - Defeating Social Engineering, BEC, and Phishing
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
GRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of usersGRRCON 2013: Imparting security awareness to all levels of users
GRRCON 2013: Imparting security awareness to all levels of users
 

Similar to 20 tips for information security around human factors and human error

Security Transformation
Security TransformationSecurity Transformation
Security TransformationFaisal Yahya
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techiesBrenton Johnson
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield
 
TECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxTECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxHAFIDHISAIDI1
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 

Similar to 20 tips for information security around human factors and human error (20)

10 things to teach end users
10 things to teach end users10 things to teach end users
10 things to teach end users
 
Presentation 10.pptx
Presentation 10.pptxPresentation 10.pptx
Presentation 10.pptx
 
Security Transformation
Security TransformationSecurity Transformation
Security Transformation
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Are you the next target?
Are you the next target?Are you the next target?
Are you the next target?
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Keeping Your Cloud Data in Check
Keeping Your Cloud Data in CheckKeeping Your Cloud Data in Check
Keeping Your Cloud Data in Check
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Security 101 for No- techies
Security 101 for No- techiesSecurity 101 for No- techies
Security 101 for No- techies
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Stackfield Cloud Security 101
Stackfield Cloud Security 101Stackfield Cloud Security 101
Stackfield Cloud Security 101
 
TECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptxTECHNIQUES DATA PRO.pptx
TECHNIQUES DATA PRO.pptx
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 

More from Toru Nakata

Typical Accident Pattern Detection
Typical Accident Pattern DetectionTypical Accident Pattern Detection
Typical Accident Pattern DetectionToru Nakata
 
Improve Reliability of Check Tasks
Improve Reliability of Check TasksImprove Reliability of Check Tasks
Improve Reliability of Check TasksToru Nakata
 
情報漏洩対策 20のツボ
情報漏洩対策 20のツボ情報漏洩対策 20のツボ
情報漏洩対策 20のツボToru Nakata
 
Start small, fail fast の理論
Start small, fail fast の理論Start small, fail fast の理論
Start small, fail fast の理論Toru Nakata
 
人的要因から見た情報セキュリティ(Japanese)
人的要因から見た情報セキュリティ(Japanese)人的要因から見た情報セキュリティ(Japanese)
人的要因から見た情報セキュリティ(Japanese)Toru Nakata
 
Human Error Prevention
Human Error PreventionHuman Error Prevention
Human Error PreventionToru Nakata
 
ヒューマンエラーの防ぎ方(Japanese)
ヒューマンエラーの防ぎ方(Japanese)ヒューマンエラーの防ぎ方(Japanese)
ヒューマンエラーの防ぎ方(Japanese)Toru Nakata
 

More from Toru Nakata (9)

Typical Accident Pattern Detection
Typical Accident Pattern DetectionTypical Accident Pattern Detection
Typical Accident Pattern Detection
 
Nakata1503 jsse
Nakata1503 jsseNakata1503 jsse
Nakata1503 jsse
 
Nakata1503 jss
Nakata1503 jssNakata1503 jss
Nakata1503 jss
 
Improve Reliability of Check Tasks
Improve Reliability of Check TasksImprove Reliability of Check Tasks
Improve Reliability of Check Tasks
 
情報漏洩対策 20のツボ
情報漏洩対策 20のツボ情報漏洩対策 20のツボ
情報漏洩対策 20のツボ
 
Start small, fail fast の理論
Start small, fail fast の理論Start small, fail fast の理論
Start small, fail fast の理論
 
人的要因から見た情報セキュリティ(Japanese)
人的要因から見た情報セキュリティ(Japanese)人的要因から見た情報セキュリティ(Japanese)
人的要因から見た情報セキュリティ(Japanese)
 
Human Error Prevention
Human Error PreventionHuman Error Prevention
Human Error Prevention
 
ヒューマンエラーの防ぎ方(Japanese)
ヒューマンエラーの防ぎ方(Japanese)ヒューマンエラーの防ぎ方(Japanese)
ヒューマンエラーの防ぎ方(Japanese)
 

Recently uploaded

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

20 tips for information security around human factors and human error

  • 2.  Good security sticks to efficiency of business.  Not protection of information. Utilize them.  Bad security is reactive and passive.
  • 3.  You should close your company, if your goal is just to avoid information leakage.  Dwell on why you are using a number of information and computers.  Good goal is more concrete and intentional about business; it mentions about service time, service quality and security quality.
  • 4.  The Weakest link dooms your company ◦ A security expert company, which has excellent management on email and web, was attacked via FAX. A fraud FAX deceived the employee into changing security settings.  Survey all equipment, systems, information flows in your company.
  • 5.  Imagine your business scene. ◦ “Go out for the customers with bringing laptops. Give presentation, Negotiate, send mail and so on.”  When, where, why, what, and how much is information needed?  Reveal the minimum set of necessary information.
  • 6.  Over 90% of accidents is caused by employees; lost of information, sending wrong address, and mistakes about system settings.  Apply Systematic protection ◦ Email system to prevent wrong emailing.  Make Management more practical ◦ Consider why your employees behave so risky to bring out the information. Is there any inconvenience at your office?
  • 7.  Wrong security policy is dangerous. ◦ “Do not connect PCs to the net.”  People uses USB memories to convey files.  Lose memories.  There is no silver bullet. Even the best methods have some bad side effects.  Compare several ways to promote your business and security.
  • 8.  Information security is the main issue of company performance.  The best and brightest employees should take care of it.  Technology experts are to support.
  • 9.  Plan before incidents  Reinforce the security policy periodically  Drill against human error incidents and cyber attacks.
  • 10.  The 3 typical tactics of cyber fraud 1. Authority impersonation ◦ “The security department require you to read the attachment file of this mail!” 2. Panic maker ◦ “I am meeting the customer and need to open a locked file. Please tell me the password now!” 3. Lightly-favored trap ◦ “Lights of someone’s car in the parking is left on. The photo is attacked to this mail.”
  • 11.  Change typical mail addresses as decoys ◦ admin@your.com, webmaster@your.com, etc.  Prepare decoy names of company employees and organizations ◦ Adversary: “Sorry, I forget the name of the person I met yesterday.” ◦ Employee: “Well, Mr. Suzuki is our boss.” ◦ Adversary: “Yes, Mr. Suzuki is he.” ◦ Employee: “There is no such person in our company!”
  • 12.  Passwords are hard to hide perfectly. ◦ Key logger, reusing same password, etc.  Do not rely only on passwords.  Require additional and physical keys to access.
  • 13.  Naïve passwords are often attacked, but they are very popular. ◦ “123456”, “password”, “admin” , etc.  Even complex passwords are breakable when they are challenged limitless times. (Offline attack) ◦ Locking files by passwords are not safe.  Very complex passwords will be written down and posted around the desk.  Two-factor authentication is recommended for various business uses.
  • 14.  Guessing is very easy. ◦ Birthday date, year. ◦ Telephone number ◦ Car number ◦ Postal code  Isn’t it?
  • 15.  The present state may be not safe anymore. ◦ Technology changes quickly. ◦ Severe security holes are found every month. ◦ Old-fashioned technology like FAX should be reconsidered to be continued.  Buy powerful solutions, if you have enough budget.  Otherwise, change the policy more protective.
  • 16.  Watch “122” and read as “112”  Separate long sequences of digits into 2-digit clusters ◦ Write as “12-2”  PC can read numbers aloud. Hear the voice to check the numbers.
  • 17.  Risks are often hidden individually. ◦ Violations of security policy. ◦ Virus-affected PC. ◦ Passwords known only by one person.  During long vacation, the risks cannot be hide.
  • 18.  Retiring employees bring information with them. ◦ Knowledge in the brain is inerasable. There is no perfect control.  Have audits with them, and make consensus about information management. ◦ What kinds of information are left, and what are not.
  • 19.  Do not put all eggs in one basket ◦ Files accessible for everyone? ◦ PCs open to everyone? ◦ Administrators always use powerful admin account?  Put partitions for information.
  • 20.  Information becomes power when it is exchanged.  If you say nothing, the counterpart says nothing. ◦ Too strict security policy stops your business.  Plan win-win strategy ◦ Some of your information can be given to the counterpart without damaging you. ◦ Likewise, some of their information are vice versa.
  • 21.  Information flow must not stop especially under disasters. ◦ Natural disasters ◦ Business disasters (Terrors against your products)  Keep several channels to communicate with customers, employees, and neighborhoods.  Utilize social networking services.