You are on page 1of 18

Security Awareness

- Its training not testing


Presented By :
Reshma Wawhal
SCIT
1
Keep your eyes open and listen

2
Don’t Do over IT ( Information
Technology)

3
Why is Awareness Important?

4
Research

5
Why Human ?

O PATCH FOR HUMAN S

6
Password Protection
üPasswo rds sho uld me e t o r e xc e e d 
c o mplexity re quire me nts base d o n 
the  risk.
üPasswo rds sho uld be  c hange d 
fre que ntly base d o n risk.
üPasswo rds sho uld be  pro te c te d 
fro m expo sure .
üDo n’ t share  yo ur passwo rds.

7
Password Complexity
 All passwords, including initial passwords,
must be constructed, implemented, and
maintained according to the following
guidelines:
 Strong passwords contain a minimum length
of (8) characters and are composed of the
following characteristics
 At least one numeric character (0-9).
 At least one lower case character (a-z).
 At least one upper case character (A-Z).
 At least one non-alphanumeric character* (~, !,
@, #, $, %, ^, &, *, (, ), -, =, +, ?, [, ], {, }).
8
Handling, Receipt, Transmission, Storage,
and Destruction of Document
 Don’t leave system unlocked.
 Keep your document at secure
place or in a password
protected drive or folder.
 Don’t use yellow stick paper.
 Use paper shedder.
 Destroy records and sensitive
information in a manner that
precludes reconstruction.
 Don’t Plug and play without
protection
 Take backup.
 Delete unwanted and duplicate
9
information.

Email Protection
 Always Use Signature
 Don’t open any email
having “ No - Subject” or
from stranger email id
because it can have
Trojan or Worm.
 In case if you think
something is wrong
immediately call network
administrator.

10
Internet Usage
 Don’t click any link.
 Beware of phishing.

 Don’t use social network


sites during office hours.
 Don’t do chatting and share
your personal information.
 Don’t download from
internet without taking
permission from the
concern authority.
 Don’t use proxy sites.
11


Office etiquettes
 Refrain from being loud
because someone must
doing evasdropping.
 Stay Away from Gossip
 The source of some
malicious gossip can be
traced back to you, then
your job can be in
jeopardy.
 Don’t use unlicensed
software.

12


Physical Security
 Wear badge card
everyday while coming
to the office.
 Don’t allow piggy back.

 Report security violations


immediately.

13
Expect technical Problems

14
Get help Immediately

15
Know Your Constraint

16
Reference
 Wikipedia
 http://www.scribd.com/doc/8697084/Security-issues-an

 http://www.scribd.com/doc/9303263/Information-securi

 http://www.scribd.com/doc/23420336/Information-Techn

17
Thank You

18

You might also like