SlideShare a Scribd company logo
1 of 29
Information Security
Awareness Training
ISO/IEC 27001:2013
An Asset that has value to the Organization
and that can exist in many forms
(written, spoken, sent, stored, printed, transmitted, …)
What is Information ?
What is Information Security?
Confidentiality Availability
Integrity
How do we practice “Confidentiality” ?
welcome123
W31(ome!@#
System passwords
VS
Clear desk clear screen policy
How do we practice “Integrity” ?
File permissions
Read
Execute
Write

X
X
Document version and
access restrictions
How do we practice “Availability” ?
Restoration
Backup
 Protects information from a wide range of threats
 Ensure business continuity
 Minimizes business damage
 Maximizes business opportunities
 Gaines customer confidence.
Information Security - Benefits
Antivirus
Firewall
Security
Tokens
Security
Policy
Audits
ISMS
ISO 27001

Key Drivers for Information Security
Information Security is TEAM WORK
□ It isn't just the sole responsibility of
the security officer or the IT
department.
□ All the departments must be
committed in protecting business
information.
Why Security Breaches occur ?
• Lack of awareness on Policies & Procedures.
• Compromising security for convenience.
• Excessive dependency on technical controls.
Key Security Topics for End Users
• A brief snapshot of policies &
procedures
Know the key people
S
No
Member’s Name Organizational Role ISSC Role
1
2
3
4
5
Asset Classification
Classification Description Example
Restricted This classification applies to the restricted
business information, which is intended strictly
for use within the organization or a group of
individuals at the organization. Its unauthorized
disclosure could adversely impact The
organization, its employees, and/or its
customers.
HR Employee records, invoices,
and Internal audit reports,
Designs, Project or Customer
related information, etc.
Sensitive This classification applies to all other
information, which does not clearly fit into any
of the other classifications. While its
unauthorized disclosure is against policy, it is
not expected to seriously or adversely impact
the organization, its employees / customers.
ISMS Policies, Procedures, ISMS
manuals, Departments’ SOP etc.
Public This classification applies to information, which
has been explicitly approved by the
organization’s management for release to the
employees. By definition, there is nothing as
unauthorized disclosure of this information and
it may be freely disseminated without potential
harm.
Information available in the
Internet sites, brochures,
pamphlets, newsletters, press
releases, Advertisements,Wall
papers, Event results,
Calendars, etc.
Please label your documents based on this classification
Physical Security
□ Employees, visitors and vendors shall wear staff passes at
all times in the company premises.
□ Challenge any unknown person without proper
identification such as a visitor pass.
□ Tailgating/ Piggybacking is strictly prohibited.
□ All physical security breaches should be reported to the
physical security personnel.
Environmental Security
• Know your Fire evacuation procedures
• Know where are the emergency exits
• Learn how to use the fire extinguishers
• Assemble in the safe assembly area outside
the premises for further instructions
• Attend fire drill sessions
Workstation Security
□ Lock the work station when not in use.
□ Installation of pirated or unlicensed software is prohibited.
□ Collect all printout immediately from the printer area.
□ All Sensitive documents to be cleared/shredded if not in use.
□ All information on white boards to be erased after use.
Mobile devices security - Laptops
□ While travelling, ensure that the laptop bag is physically
secured. Secure it with a cable lock.
□ While using restrooms at airports ensure your laptop is
safe.
□ Disable wireless auto-connection.
□ Avoid insecure wireless connections in public places.
□ Do not disable or ignore antivirus / patch updates.
Password Security
□ Keep your password confidential at all times.
□ Complexity: Minimum 8 characters long, with a combination of
upper and lower case, numbers and special characters.
□ Change: Once every 45 days – enforced by the system
□ Change your password immediately if you suspect your password
has been compromised.
E-mail Security
□ Email account should be used for business purposes only.
□ Don't open attachments from untrusted senders.
□ Create a strong email password.
□ Do not save your email account passwords in web browsers.
□ Do not forward chain/spam/junk e-mail.
□ Use disclaimer notice to e-mails sent through company e-
mail.
□ Do not create or distribute any e-mail message containing
offensive material to any person or organization using
company e-mail.
Removable media security
□ Authorization for usage of removable media is granted
on “need-to” basis with prior approval.
□ It should be used for business purposes only.
□ Regularly scan the removable media for viruses.
□ Media containing sensitive information must be
completely formatted/ deleted/ demagnetized/
scrapped if no longer in use.
Information Security Incident
 All security events & weaknesses must be reported to the
Information Security Team, incident response manager or directly
to the CISO.
 Some common, incidents that one should report are:-
□ Password changes (you can’t log in) or requests to share your
password,
□ Workstation infection from a virus, worm or Trojan, adware, or
spyware
□ Sudden workstation slowdowns,
□ File additions, changes, or deletions,
□ Access control door not functioning properly
• Beware of the threats around you
Security Awareness on Social Media
- LinkedIn, Facebook, Twitter, etc.
Social media is one of the fastest growing areas of online activity, and one of the
fastest growing areas for malicious cyber activity. Even if your organization
blocks access to social media sites, there are a tremendous number of risks you
have to make your self aware of. Here are some of the key points we
recommend concerning social media sites.
Privacy & Social Media:
• Privacy does not exist on social media sites.
• Yes, there are privacy options and controls, but too much can go wrong and
your sensitive information can end up being exposed.
• Things such as your account being hacked, your friend's accounts being
hacked, privacy controls changing, getting the privacy controls wrong, or
people who you thought were your friends are no longer your friends.
• Long story short, if you don't want mom or your boss reading it--don't post it.
• This means being careful and watching what your friends post about you,
including pictures. If nothing else, remember that employers now include sites
like Facebook and Twitter as part of any standard background check.
Scams & Social Media: Social media websites are a breeding ground for
scams. If one of your friend's posts seems odd or suspicious, it may be an attack.
For example, your friend posts that they have been mugged while on vacation in
London and need you to wire them money. Or perhaps they are posting links
about great ways to get rich, or some shocking incident you must see. Many of
these scams or malicious links are the very same attacks you have been
receiving in e-mail for years, but now bad guys are replicating them in social
media. If you see a friend posting very odd things, call or text them to verify that
they really posted the information.
Work & Social Media: Do not post anything sensitive about work. Be sure you
understand your organization's policies about what you can and cannot post
about your job.
Social media is a powerful way to communicate and stay in touch with people
around the world. We do not want to scare people away from it. Instead we
simply want to make people aware of the risks so that they can leverage
technology more effectively.
Security Awareness on Social Media -
LinkedIn, Facebook, Twitter, etc.
• The rules you must follow to avoid risks through social
media.
– When engaging online, do not post any confidential,
internal-use only or copyrighted information .
– Do not post anything that is offensive, harassing, or in
violation of any applicable law.
Security Awareness on Social Media -
LinkedIn, Facebook, Twitter, etc.
Phishing
• Phishing scams employ fraudulent e-mail messages or Web sites that try to fool you into
divulging personal information.
• Phishing e-mail messages often include misspellings, poor use of grammar, threats, and
exaggerations.
• To help protect yourself against phishing, use phishing filters, which helps in identifying and
remove phishing attacks.
Examples of phishing email messages & links
• Look forward to see you again……
The End
Thank You

More Related Content

What's hot

ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1Tanmay Shinde
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.pptHasnolAhmad2
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkPECB
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2Tanmay Shinde
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMSAkhil Garg
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance BOC Group
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementationRalf Braga
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 

What's hot (20)

ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1ISO 27001 - information security user awareness training presentation - Part 1
ISO 27001 - information security user awareness training presentation - Part 1
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2ISO 27001 - information security user awareness training presentation -part 2
ISO 27001 - information security user awareness training presentation -part 2
 
ISO 27001:2022 Introduction
ISO 27001:2022 IntroductionISO 27001:2022 Introduction
ISO 27001:2022 Introduction
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance What is GRC – Governance, Risk and Compliance
What is GRC – Governance, Risk and Compliance
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Steps to iso 27001 implementation
Steps to iso 27001 implementationSteps to iso 27001 implementation
Steps to iso 27001 implementation
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 

Similar to ISMS Awareness Training (2) (1).pptx

Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxBarakaMuyengi
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfklodianelezi1
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxQuiMo3
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 

Similar to ISMS Awareness Training (2) (1).pptx (20)

Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Team black
Team blackTeam black
Team black
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Free_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdfFree_business_IT_security_policy_template_v5.pdf
Free_business_IT_security_policy_template_v5.pdf
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
CYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptxCYBER_SECURITY_BASICS_FINAL.pptx
CYBER_SECURITY_BASICS_FINAL.pptx
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Cyber security
Cyber securityCyber security
Cyber security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 

ISMS Awareness Training (2) (1).pptx

  • 2. An Asset that has value to the Organization and that can exist in many forms (written, spoken, sent, stored, printed, transmitted, …) What is Information ?
  • 3. What is Information Security? Confidentiality Availability Integrity
  • 4. How do we practice “Confidentiality” ? welcome123 W31(ome!@# System passwords VS Clear desk clear screen policy
  • 5. How do we practice “Integrity” ? File permissions Read Execute Write  X X Document version and access restrictions
  • 6. How do we practice “Availability” ? Restoration Backup
  • 7.  Protects information from a wide range of threats  Ensure business continuity  Minimizes business damage  Maximizes business opportunities  Gaines customer confidence. Information Security - Benefits
  • 9. Information Security is TEAM WORK □ It isn't just the sole responsibility of the security officer or the IT department. □ All the departments must be committed in protecting business information.
  • 10. Why Security Breaches occur ? • Lack of awareness on Policies & Procedures. • Compromising security for convenience. • Excessive dependency on technical controls.
  • 11. Key Security Topics for End Users • A brief snapshot of policies & procedures
  • 12. Know the key people S No Member’s Name Organizational Role ISSC Role 1 2 3 4 5
  • 13. Asset Classification Classification Description Example Restricted This classification applies to the restricted business information, which is intended strictly for use within the organization or a group of individuals at the organization. Its unauthorized disclosure could adversely impact The organization, its employees, and/or its customers. HR Employee records, invoices, and Internal audit reports, Designs, Project or Customer related information, etc. Sensitive This classification applies to all other information, which does not clearly fit into any of the other classifications. While its unauthorized disclosure is against policy, it is not expected to seriously or adversely impact the organization, its employees / customers. ISMS Policies, Procedures, ISMS manuals, Departments’ SOP etc. Public This classification applies to information, which has been explicitly approved by the organization’s management for release to the employees. By definition, there is nothing as unauthorized disclosure of this information and it may be freely disseminated without potential harm. Information available in the Internet sites, brochures, pamphlets, newsletters, press releases, Advertisements,Wall papers, Event results, Calendars, etc. Please label your documents based on this classification
  • 14. Physical Security □ Employees, visitors and vendors shall wear staff passes at all times in the company premises. □ Challenge any unknown person without proper identification such as a visitor pass. □ Tailgating/ Piggybacking is strictly prohibited. □ All physical security breaches should be reported to the physical security personnel.
  • 15. Environmental Security • Know your Fire evacuation procedures • Know where are the emergency exits • Learn how to use the fire extinguishers • Assemble in the safe assembly area outside the premises for further instructions • Attend fire drill sessions
  • 16. Workstation Security □ Lock the work station when not in use. □ Installation of pirated or unlicensed software is prohibited. □ Collect all printout immediately from the printer area. □ All Sensitive documents to be cleared/shredded if not in use. □ All information on white boards to be erased after use.
  • 17. Mobile devices security - Laptops □ While travelling, ensure that the laptop bag is physically secured. Secure it with a cable lock. □ While using restrooms at airports ensure your laptop is safe. □ Disable wireless auto-connection. □ Avoid insecure wireless connections in public places. □ Do not disable or ignore antivirus / patch updates.
  • 18. Password Security □ Keep your password confidential at all times. □ Complexity: Minimum 8 characters long, with a combination of upper and lower case, numbers and special characters. □ Change: Once every 45 days – enforced by the system □ Change your password immediately if you suspect your password has been compromised.
  • 19. E-mail Security □ Email account should be used for business purposes only. □ Don't open attachments from untrusted senders. □ Create a strong email password. □ Do not save your email account passwords in web browsers. □ Do not forward chain/spam/junk e-mail. □ Use disclaimer notice to e-mails sent through company e- mail. □ Do not create or distribute any e-mail message containing offensive material to any person or organization using company e-mail.
  • 20. Removable media security □ Authorization for usage of removable media is granted on “need-to” basis with prior approval. □ It should be used for business purposes only. □ Regularly scan the removable media for viruses. □ Media containing sensitive information must be completely formatted/ deleted/ demagnetized/ scrapped if no longer in use.
  • 21. Information Security Incident  All security events & weaknesses must be reported to the Information Security Team, incident response manager or directly to the CISO.  Some common, incidents that one should report are:- □ Password changes (you can’t log in) or requests to share your password, □ Workstation infection from a virus, worm or Trojan, adware, or spyware □ Sudden workstation slowdowns, □ File additions, changes, or deletions, □ Access control door not functioning properly
  • 22. • Beware of the threats around you
  • 23. Security Awareness on Social Media - LinkedIn, Facebook, Twitter, etc. Social media is one of the fastest growing areas of online activity, and one of the fastest growing areas for malicious cyber activity. Even if your organization blocks access to social media sites, there are a tremendous number of risks you have to make your self aware of. Here are some of the key points we recommend concerning social media sites. Privacy & Social Media: • Privacy does not exist on social media sites. • Yes, there are privacy options and controls, but too much can go wrong and your sensitive information can end up being exposed. • Things such as your account being hacked, your friend's accounts being hacked, privacy controls changing, getting the privacy controls wrong, or people who you thought were your friends are no longer your friends. • Long story short, if you don't want mom or your boss reading it--don't post it. • This means being careful and watching what your friends post about you, including pictures. If nothing else, remember that employers now include sites like Facebook and Twitter as part of any standard background check.
  • 24. Scams & Social Media: Social media websites are a breeding ground for scams. If one of your friend's posts seems odd or suspicious, it may be an attack. For example, your friend posts that they have been mugged while on vacation in London and need you to wire them money. Or perhaps they are posting links about great ways to get rich, or some shocking incident you must see. Many of these scams or malicious links are the very same attacks you have been receiving in e-mail for years, but now bad guys are replicating them in social media. If you see a friend posting very odd things, call or text them to verify that they really posted the information. Work & Social Media: Do not post anything sensitive about work. Be sure you understand your organization's policies about what you can and cannot post about your job. Social media is a powerful way to communicate and stay in touch with people around the world. We do not want to scare people away from it. Instead we simply want to make people aware of the risks so that they can leverage technology more effectively. Security Awareness on Social Media - LinkedIn, Facebook, Twitter, etc.
  • 25. • The rules you must follow to avoid risks through social media. – When engaging online, do not post any confidential, internal-use only or copyrighted information . – Do not post anything that is offensive, harassing, or in violation of any applicable law. Security Awareness on Social Media - LinkedIn, Facebook, Twitter, etc.
  • 26. Phishing • Phishing scams employ fraudulent e-mail messages or Web sites that try to fool you into divulging personal information. • Phishing e-mail messages often include misspellings, poor use of grammar, threats, and exaggerations. • To help protect yourself against phishing, use phishing filters, which helps in identifying and remove phishing attacks. Examples of phishing email messages & links
  • 27. • Look forward to see you again……