SlideShare a Scribd company logo
1 of 26
Download to read offline
Current Situation IT Security Awareness
and Education in Afghanistan
	
Zohra	Zekeria	
19	December	2016
“Any	technical	defense	measure	would	be	useless	if	the	en>re	
staff	is	not	cyber-aware”	
Steve	Durbin(Managing	director	of		Informa>on	Security	Forum	ISF)	
	
	
16-12-19	 2
Agenda
•  Introduc)on	
•  Why	IT	Security	is	important?		
•  Vulnerabili)es	
•  What	to	do?	
•  What	security	awareness	and	educa)on	is?	
•  Situa)on	in	Afghanistan	
•  Solu)on	and	Conclusion	
16-12-19	 3
Introduction
•  Advances	in	informa>on	and	communica>ons	
technologies	have	revolu>onised	government	,	
educa>onal	and	commercial		infrastructures	
(Afghanistan	Payment	System	AFPay).	
•  The	opera>onal	stability	and	security	of	cri>cal	
informa>on	infrastructure	is	vital	for	economic	security	
of	the	country.	
•  Personal	files,	bank	account	details,	client	informa>on,	
and	payment	informa>on	can	be	hard	to	replace	and	
poten>ally	dangerous	if	it	falls	into	the	wrong	hands.	To	
mi>gate	against	risks	resul>ng	from	data	leakage,	it	is	of	
paramount	importance	to	have	an	IT	security	system.	
16-12-19	 4
Why IT Security is Important?
	
	
16-12-19	 5
16-12-19	 6
Attacks in last two months around the world [1]
	
	
16-12-19	 7
Leak of Azerbaijani Banking and Military Data
•  Monte	Melkonian	Cyber	Army	(MMCA)		
•  Personal	data	of	1200	Azerbaijani	officers	including	names,	ID	
numbers,	phone	numbers	residence	addresses	and	other	details	
•  Hacked	several	Azeri	embassies	and	government	websites:	Azeri	
embassy	in	Bulgaria,	Netherlands	and	Qatar,	Ministry	of	Foreign	
Affairs	AIDA.	
	
16-12-19	 8
16-12-19	 9
16-12-19	 10
Vulnerabili)es	
Technical	
Vulnerabili>es	
Web	applica>on:	
Injec>on,	Broken	
authen>ca>on	…etc.	
Organiza>onal	
Vulnerabili>es	
	
Human	
Behavior	,Social	
Engineering	
16-12-19	 11
Human Behavior
16-12-19	 12
Human Behavior
16-12-19	 13
Social Engineering
	
“Amateurs	hack	systems,	professionals	hack	people”	
	 	 	 	 	 	 	 	Bruce	Schneier	
	
	
16-12-19	 14
What to do?[3]
	
16-12-19	 15	
Security	
Policies	
Security	
Awareness		
Security	
Technologies
16-12-19	 16
Security Awareness
•  Awareness	is	not	training	
•  The	purpose	of	awareness	presenta>ons	is	simply	to	focus	aben>on	
on	security	
•  Awareness	presenta>ons	are	intended	to	allow	individuals	to	
recognize	IT	security	concerns	and	respond	accordingly	[4]	
	
16-12-19	 17
16-12-19	 18
Situation In Afghanistan
•  Afghanistan	as	developing	na>on	have	par>ally	implemented	IT	
services.	
•  Either	technical	and	non	technical	staffs	do	not	have	informa>on	
about	security.	
•  Just	some	organiza>on	have	security	professionals	but	the	other	
staff	are	not	aware	of	security	
16-12-19	 19
Common Mistakes Creates big Problems
16-12-19	 20	
Foreign	Rela>on	Affairs	System		
Managers	
	
Teachers	
Unauthorized	Applica>ons	
Culture
Solution
•  Security	Awareness	
•  Not	just	for	the	geeks!	
•  Security	Training	at	all	levels	
•  Con>nuing	educa>on	and	awareness	–	not	a	one->me	shot!	
•  Make	it	part	of	the	culture	
16-12-19	 21
Contd …
•  Iden>fy	in	which	domain	you	have	to	rise	the	Awareness	
•  	Know	your	audience	
•  	Address	the	audience	in	the	best	way	
•  Test	the	effec>vity	of	the	awareness	rising	campaign	
16-12-19	 22
Conclusion
•  The	only	way	to	mi>gate	the	threats	are	to	combine	the	
policies	,technology	and	awareness.	
•  Informa>on		Security	is	the	responsibility	of	everyone	
•  Afghanistan	needs	Awareness	programs		
•  Make	it	part	of	the	culture	
	
16-12-19	 23
Informa>on	security	is	as	simple	as	A	B	C:	
Always Be Careful!
Thank You
J
16-12-19	 24
References
[1]	Morgan,	L.	(2016,	September	27).	List	of	data	breaches	and	cyber	
abacks	in	September	2016.	Retrieved	November	30,	2016,	from	
hbp://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyber-
abacks-in-september-2016/	
[2]	Armenian	Hackers	Leak	Azerbaijani	Banking	and	Military	Data.	
(2016,	September	25).	Retrieved	from	hbps://www.hackread.com/
armenian-hackers-leak-azeri-banking-military-data/	
[3]	R.	Von	Solms	and	J.	Van	Niekerk,	“From	informa>on	security	to	
cyber	security,”	computers	&	security,	vol.	38,	pp.	97–102,	2013.	
[4]	M.	Wilson	and	J.	Hash,	“SP	800-50.	Building	an	Informa>on	
Technology	Security	Awareness	and	Training	Program,”	2003.	
16-12-19	 25
16-12-19	 26

More Related Content

Similar to Current Situation IT Security Awareness and Education in Afghanistan

SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustryKyna Tsai
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
Implication of it practice
Implication of it practiceImplication of it practice
Implication of it practiceOginni Olajumoke
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data securityAshish Jhalani
 
Assessing The Impact Of Information And Communication Technologies On The Per...
Assessing The Impact Of Information And Communication Technologies On The Per...Assessing The Impact Of Information And Communication Technologies On The Per...
Assessing The Impact Of Information And Communication Technologies On The Per...Rick Vogel
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxeresavenzon
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexShivamSharma909
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security smallHenry Worth
 
Informationsecurity
InformationsecurityInformationsecurity
InformationsecurityUmme habiba
 
Tech Talent Workforce Towards Economica and Societal Growth_Lars.pdf
Tech Talent Workforce Towards Economica and Societal Growth_Lars.pdfTech Talent Workforce Towards Economica and Societal Growth_Lars.pdf
Tech Talent Workforce Towards Economica and Societal Growth_Lars.pdfEkoInnovationCentre
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...subramanian K
 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012Arun Bhatia
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFAlexander Goodwin
 

Similar to Current Situation IT Security Awareness and Education in Afghanistan (20)

SPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security IndustrySPEEDA INSIGHTS_Market Prospects for the Security Industry
SPEEDA INSIGHTS_Market Prospects for the Security Industry
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
Implication of it practice
Implication of it practiceImplication of it practice
Implication of it practice
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
Cloud computing nigeria
Cloud computing nigeriaCloud computing nigeria
Cloud computing nigeria
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
Assessing The Impact Of Information And Communication Technologies On The Per...
Assessing The Impact Of Information And Communication Technologies On The Per...Assessing The Impact Of Information And Communication Technologies On The Per...
Assessing The Impact Of Information And Communication Technologies On The Per...
 
REPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptxREPORT USE OF CYBERSECURITY.pptx
REPORT USE OF CYBERSECURITY.pptx
 
The importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity indexThe importance of understanding the global cybersecurity index
The importance of understanding the global cybersecurity index
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
project2.pptx
project2.pptxproject2.pptx
project2.pptx
 
Informationsecurity
InformationsecurityInformationsecurity
Informationsecurity
 
Information security
Information securityInformation security
Information security
 
Tech Talent Workforce Towards Economica and Societal Growth_Lars.pdf
Tech Talent Workforce Towards Economica and Societal Growth_Lars.pdfTech Talent Workforce Towards Economica and Societal Growth_Lars.pdf
Tech Talent Workforce Towards Economica and Societal Growth_Lars.pdf
 
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...Iob gm's lecture 7th jan 2014  GRC and corporate governance in Financial serv...
Iob gm's lecture 7th jan 2014 GRC and corporate governance in Financial serv...
 
State of IT security 2012
State of IT security 2012State of IT security 2012
State of IT security 2012
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Information Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDFInformation Security - Hiring Trends and Trends for the Future PDF
Information Security - Hiring Trends and Trends for the Future PDF
 

Recently uploaded

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxMarkSteadman7
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaWSO2
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...FIDO Alliance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformWSO2
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceIES VE
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 

Recently uploaded (20)

Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 

Current Situation IT Security Awareness and Education in Afghanistan