Effective security awareness training with basic needs for the organization and its employees. It should also be engaging and interactive, using a variety of formats such as videos, quizzes, simulations, and case studies.
This document discusses phishing, which is an attempt to acquire personal information like usernames, passwords, and credit card details under false pretenses. It covers common phishing techniques like link manipulation and website forgery. It also discusses types of phishing like deceptive, malware-based, and DNS-based phishing. The document outlines causes of phishing like misleading emails and lack of user awareness. It proposes both technical and social approaches to anti-phishing and examines the effects of phishing like identity theft and financial loss. Finally, it recommends defenses like education and detection tools to counter phishing attacks.
Slideshare that can be used as an educational training tool for employees to be aware of the risks of phishing attacks. This presentation covers the threat of phishing and what strategies can be done to mitigate phishing attacks.
PhishingBox is an online system for organizations to easily conduct simulated phishing attacks and educate their end users through awareness training. This helps identify vulnerabilities and mitigate risk. Our system is simple to use, cost-effective and helps clients reduce risk and achieve cybersecurity objectives.
Cyber Security Awareness training outlines key topics to help employees secure MCB information systems and data from cyber attacks. The training covers password security, email security, safe web browsing, social engineering, and MCB security policies. Case studies of real-world cyber attacks show how hackers have stolen millions from banks by exploiting human and technical vulnerabilities. The training emphasizes that security is everyone's responsibility and all employees must follow security protocols to protect MCB networks and data.
Cybersecurity Awareness Training Presentation v1.3DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to educate them on ways to avoid scams and attacks and become more security aware. This slide deck is based on version 1.3 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, it was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have worksheets free and downloadable worksheets referenced in the training. We have a free cybersecurity quiz that is based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
We also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Want to take this content and present it in your own community? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or using ‘Make a Copy’ in Google Slides.
https://www.treetopsecurity.com/slides
This month, Community IT presents basic IT security training for end users. Learn about common threats and the best techniques for dealing with them. This webinar is intended for a broad audience of both technical and non-technical staff.
The document provides an overview of an employee information security awareness training. It summarizes key topics covered in the training including identifying security risks, developing good security practices, protecting classified and sensitive company information, securing workstations and mobile devices, safe email practices, and guarding against social engineering. It emphasizes the importance of protecting company information and passwords at all times.
This document discusses social engineering and why organizations should use it. Social engineering involves using psychological manipulation to trick people into revealing confidential information. It works because people are inherently lazy, want to help, and are curious. The document outlines common social engineering techniques like phishing, impersonation, and physical security compromises. It recommends that organizations conduct social engineering assessments of their own employees to identify vulnerabilities and provide ongoing training. Regular social engineering tests can help educate employees and strengthen an organization's security over time.
1) Employee training and awareness is a critical element for cybersecurity resilience. Successful programs focus on changing employee behavior and aligning security practices both inside and outside of work.
2) Traditional awareness programs often fail because they are not engaging for employees and do not lead to real behavior change. Effective programs treat security messaging like marketing and use multiple channels, contexts, and reminders to reinforce the message.
3) Measuring outcomes is important for security awareness programs. Objectives should be clearly defined and focused on discrete, measurable goals rather than vague concepts like "increasing awareness."
This document discusses phishing, which is a form of online fraud that aims to steal users' sensitive information such as usernames, passwords, and credit card details. It does this through deceptive messages that appear to come from legitimate organizations but actually lead to fake websites or download malware. The document provides information on how phishing works, techniques used to detect and prevent it, and tips for users to avoid falling victim to phishing scams.
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to help them better understand ways they can avoid scams, cyber attacks, and become more security aware. This slide deck is based on version 2024.03 of our wildly popular materials we originally released as open-source in September 2019. In just over 6 months, version 1.0 was downloaded thousands of times and in over 150 countries! Since then, it has been downloaded hundreds of thousands of times and it is downloaded or viewed over 10,000 per month... And those are just the views we can count!
On our website, you will also find several other related, free goodies. For example, we have free and downloadable worksheets referenced in the training. These worksheets provide material that attendees can take back home with them to try out and continue the security conversation. We also have free cybersecurity quizzes that are based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
On our website, we also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Do you want to take this content and present it in your own community or business? Fantastic! You can download this slide deck as editable content right from our website. Once again, completely free and with no sign-ups! This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or Google Slides using ‘Make a Copy’. Those downloadable versions from our website also include speaker notes to provide talking points or tips for anyone delivering the content.
https://www.treetopsecurity.com/slides
This document provides training on cybersecurity best practices for Borough of West Chester personnel. It defines cybersecurity as protecting information and systems from unauthorized access, use, disclosure, disruption or destruction. It outlines common cyber threats like viruses, worms, ransomware, and social engineering. It emphasizes using strong passwords, antivirus software, firewalls, and regular software updates. It also recommends avoiding malicious emails and websites, and backing up important data.
This document provides an overview of network security concepts. It discusses the importance of protecting information assets as the most valuable company assets. It then covers key network security topics like the CIA triad of confidentiality, integrity and availability. It defines threats at both the network and application levels, and discusses how to overcome threats through policies, user awareness training, and security technologies like firewalls, IDS/IPS, antivirus software, VPNs, spam filters and web content filtering. The document aims to educate about network threats and appropriate security controls and protections.
Cyber Security Awareness introduction. Why is Cyber Security important? What do I have to do to protect me from Cyber attacks? How to create a IT Security Awareness Plan ?
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
This free cybersecurity awareness training slide deck is meant to be used by organizations and end users to help them better understand ways they can avoid scams, cyber attacks, and become more security aware. This slide deck is based on version 2021.08 of our wildly popular slide deck we originally released as open-source in September 2019. In just over 6 months, version 1.0 was downloaded thousands of times and in over 150 countries!
On our website, you will also find several other related goodies. For example, we have free and downloadable worksheets referenced in the training. These worksheets provide material that attendees can take back home with them to try out and continue the security conversation. We also have free cybersecurity quizzes that are based directly off of this material so anyone can test their awareness knowledge. We even have a downloadable 'certificate of completion' for this training, which allows attendees to fill-in their name and date so they can then print it out to show others (or even their employer) that they are now more cyber aware.
https://www.treetopsecurity.com/cat
On our website, we also have a video/webinar presentation of this material if you would like to share it with others.
https://www.treetopsecurity.com/cat#video
Do you want to take this content and present it in your own community or business? Fantastic! You may download this slide deck as editable content. This allows you to make changes and present it at your local library, business events, co-working spaces, schools, etc. The latest version is always available on our website as a Microsoft PowerPoint presentation (.pptx) or Google Slides using ‘Make a Copy’. Those downloadable versions from our website also include speaker notes to provide talking points or tips for anyone delivering the content.
https://www.treetopsecurity.com/slides
This document provides tips for safely using computers and the internet. It recommends keeping software updated, using antivirus software, firewalls, and strong passwords. It also suggests using private browsing, HTTPS, and ad blockers when surfing the internet. When using social media and email, it advises only giving permissions to trusted applications and being wary of unknown links or downloads. Basic tips for protecting identity and banking information are also included.
This document discusses the importance of security for computer users and provides tips to improve security practices. It notes that the internet allows attackers to strike from anywhere in the world and that poor security can lead to identity theft, monetary theft, legal issues, and job termination. It distinguishes between security, which protects computers and data, and safety, which protects users from technology risks. The document provides examples of different types of attackers and threats like viruses, worms, Trojan horses, and botnets. It offers recommendations for creating strong passwords, avoiding suspicious emails and links, and not installing unauthorized programs or plugging in personal devices without permission.
This document discusses various types of cyber crimes including crimes against individuals, property, organizations and society. It describes causes of cyber crimes such as passion of youngsters, desire for recognition or money, and security issues. It then focuses on specific cyber crimes like unauthorized access, viruses, trojans, hacking, social engineering techniques like phishing and baiting, and spam. Common hacking tools are also outlined. Throughout, methods of prevention and popular examples are provided for each topic.
It’s used to disrupt the target company’s operations, either by halting trading, damaging their reputation, or causing havoc. Several government agencies have been targeted by malicious denial-of-service attacks. A denial of service assault can also be employed to keep the target organization’s information security staff occupied while a more sophisticated attack is carried out.
This document discusses cyber crimes and how to secure computers from cyber threats. It is divided into several sections that cover the definition of cyber crimes, types of cyber crimes such as against persons and property, and types of hackers such as black hats and white hats. The document also provides tips for securing computers, including choosing a secure operating system, internet browser, and security software like firewalls, antivirus programs, and using safe internet practices.
Computer viruses, malware, spyware, and Trojan horses are types of malicious software that can harm computers. Viruses spread by infecting files or programs and getting copied to other computers. Malware performs unwanted tasks like displaying ads or stealing data. Spyware monitors users' online activities without consent. Trojan horses deliver malware hidden within seemingly harmless programs or files. Antivirus software and firewalls help prevent infection by viruses, malware, and other cyber threats.
The document provides information about cybersecurity awareness and discusses various cyber threats such as computer viruses, social engineering attacks, and preventive measures. The objective is to educate university students on cybersecurity issues. It defines important terms like cyber crime and cyber security. It describes common cyber attacks like ransomware, phishing and social media attacks. It also discusses computer viruses, social engineering techniques, and provides tips to create strong passwords and protect personal information online. The document emphasizes that education and awareness are important to prevent cyber crimes.
In a world so connected, cyber security awareness is key to a safe online experience, because the weakest information security link to any organisation is the users of technology. This presentation speaks to basic cyber security awareness for everyday internet users
Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette).
Vinay Yadav is presenting on sample cyber attacks for his course on BTech (CSE) at Dr. Ram Manohar Lohia Awadh University. The document discusses several common types of cyber attacks like malware, phishing, man-in-the-middle attacks, denial-of-service attacks, and SQL injection. It provides examples of each attack type and recommends preventative measures like using strong passwords, keeping software updated, and educating yourself on common scams.
Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. Some common cybersecurity threats include phishing, ransomware, malware, and social engineering. Phishing involves fraudulent emails attempting to steal sensitive data. Ransomware uses malicious software to block access to files until ransom is paid. Malware comes in different forms to gain unauthorized access or cause damage. Social engineering tricks users into revealing information. Effective cybersecurity requires layers of protection across technology, processes, and user awareness to defend against evolving cyber attacks.
This presentation includes 60+ slides that mainly deals with three Computer Security aspects i.e
1. Security Attacks and Threats
2. Security Services
3. Security Mechanisms
Along with that we've also includes Security Awareness and Security Policies
The document discusses various topics related to cyber security including threats like phishing, malware, ransomware and business email compromise. It explains concepts such as the CIA triad of confidentiality, integrity and availability and how cyber criminals can target these areas. The document also covers security domains, vulnerabilities, and different types of hackers and their motivations.
Cyber security refers to technologies, processes, and practices designed to protect networks, devices, programs, and data from attacks, damage or unauthorized access. The top threats include phishing, malware like viruses and ransomware, identity theft, and business email compromise. To protect information according to the CIA triad, systems aim to maintain confidentiality by restricting access, integrity by preventing unauthorized data changes, and availability by ensuring authorized access. Common vulnerabilities are exploited by threats. Cyber security professionals work to mitigate these threats and vulnerabilities through technical and organizational measures.
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
This document provides an introduction to cyber security. It discusses the importance of cyber security and some of the risks of poor security practices, such as identity theft, monetary theft, and legal ramifications. It then covers key topics in cyber security including security domains, the CIA triad of confidentiality, integrity and availability, threats and vulnerabilities, and specific attack types like phishing, ransomware, and business email compromise. It also addresses current cyber security trends and how to protect information.
Malware infections in hospitals can endanger patient safety by causing issues with monitoring equipment and devices. Hospitals often use outdated operating systems that are vulnerable to attacks. Infections usually originate from the internal network or devices brought into the hospital. Infected computers and equipment must be taken offline until cleaned, limiting available resources.
Cyber attacks come in many forms, including virus attacks which infect software with viruses and destroy data, hack attacks which gain unauthorized access to information, and injection attacks which insert malicious code. The article outlines five ways to protect yourself from cyber attacks: use antivirus software and firewalls, protect your data with encryption and disabling third party apps, use security software, check for cyber attack alerts from organizations like NIST, and monitor your computer activity and check for warning signs to detect potential attacks.
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
Cyber security is extremely important to protect networks, devices, programs and data from unauthorized access or cyber attacks. There are many threats like phishing, malware, and ransomware that exploit system vulnerabilities. It is crucial for organizations to implement proper security measures and train employees on cyber security best practices to minimize risks and cyber attacks.
Similar to Cybersecurity Awareness Training for Employees.pptx (20)
Choosing the right web hosting provider can be a daunting task, especially with the plethora of options available. To help you make an informed decision, we’ve compiled comprehensive reviews of some of the top web hosting providers for 2024, with a special focus on Hosting Mastery Hub. This guide will cover the features, pros, cons, and unique offerings of each provider. By the end, you’ll have a clearer understanding of which hosting service best suits your needs.
DataVinci: Expert Google Analytics Agency offering GA4 Consulting Services, GTM Consulting Services, and CRO solutions to elevate your digital strategy and optimize conversions.
The Money Wave 2024 Review: Is It the Key to Financial Success?nirahealhty
What is The Money Wave?
The Money Wave is a wealth manifestation software designed to help individuals attract financial abundance through audio tracks. Created by James Rivers, this program uses scientifically-backed methods to improve cognitive functions and reduce stress, thereby enhancing one's ability to manifest wealth.
How Does The Money Wave Audio Program Work?
The Cash Wave program works by utilizing the force of sound frequencies to overhaul your cerebrum. These audio tracks are designed to promote deep relaxation and improve cognitive functions. The underlying science suggests that specific sound waves can influence brain activity, leading to enhanced problem-solving abilities and reduced stress levels.
How to Use The Money Wave Program?
Using The Money Wave program is straightforward:
Download the Audio Tracks: Once purchased, you can download the audio files from the official website.
Listen Daily: For best results, listen to the tracks daily. Consistency is key.
Relax and Visualize: Find a quiet place, relax, and visualize your financial goals as you listen.
Follow the Guide: The program includes a detailed guide to help you maximize the benefits.
The Money Wave 2024 Review_ Is It the Key to Financial Success.pdfnirahealhty
What is The Money Wave?
The Money Wave is a comprehensive financial program designed to equip individuals with the knowledge and tools necessary for achieving financial independence. It encompasses a range of resources, including educational materials, webinars, and community support, all aimed at helping users understand and leverage various financial opportunities.
➡️ Click here to get The Money Wave from the official website.
Key Features of The Money Wave
Educational Resources: The Money Wave offers a wealth of educational materials that cover essential financial topics, including budgeting, investing, and wealth-building strategies. These resources are designed to empower users with the knowledge needed to make informed financial decisions.
Expert Guidance: Users gain access to insights from financial experts who share their experiences and strategies for success. This guidance can be invaluable for individuals looking to navigate the complexities of personal finance.
Community Support: The program fosters a supportive community where users can connect with like-minded individuals. This network provides encouragement, accountability, and shared experiences that can enhance the learning process.
Actionable Strategies: The Money Wave emphasizes practical, actionable strategies that users can implement immediately. This focus on real-world application sets it apart from other financial programs that may be more theoretical in nature.
Flexible Learning: The program is designed to accommodate various learning styles and schedules. Users can access materials at their convenience, making it easier to integrate financial education into their daily lives.
Benefits of The Money Wave
Increased Financial Literacy: One of the primary benefits of The Money Wave is the enhancement of financial literacy. Users learn essential concepts that enable them to make better financial decisions, ultimately leading to improved financial health.
Empowerment: By providing users with the tools and knowledge needed to take control of their finances, The Money Wave empowers individuals to take proactive steps toward achieving their financial goals.
Networking Opportunities: The community aspect of The Money Wave allows users to connect with others who share similar financial aspirations. This network can lead to valuable partnerships, collaborations, and support systems.
Long-Term Success: The strategies taught in The Money Wave are designed for long-term success. Users are encouraged to adopt a mindset of continuous learning and growth for sustained financial well-being.
Accessibility: With its online format, The Money Wave is accessible to anyone with an internet connection. This inclusivity allows individuals from various backgrounds to benefit from the program.
THE SOCIAL STEM- #1 TRUSTED DIGITAL MARKETING COMPANYthesocialstem05
WELCOME TO DIGITAL WORLD!
THE SOCIAL STEM, #1 trusted digital marketing company in jalandhar, is a trusted digital partner.
As DIGITAL THINKERS, social stem is dedicated to enhancing the presence of your business digitally, so get ready to dive in the ocean of digital world.
THE SOCIAL STEM offers a full range of Digital Marketing Services including SEO, SMO, PPC, website designing, web development,Content marketing, and many more.
We at social stem know how to boost your online presence and announce your brand to millions of customers.
At THE SOCIAL STEM, we are passionate about harnessing the power of digital marketing to elevate brands and drive business success. Our expert platoon is dedicated to creating customized strategies that align with your goals and drive measurable results.
From SEO and content marketing to social media management and PPC campaigns, we utilize a multifaceted approach to ensure your brand stands out in the digital landscape.
OUR VISION AND MISSION
THE SOCIAL STEM#1 trusted digital marketing company in jalandhar visions to become the leading digital marketing company in Jalandhar, renowned for our innovative strategies, extraordinary customised services and superlative results.
THE SOCIAL STEM#1 trusted digital marketing company in jalandhar mission is to provide our clients with expert digital solutions that drive ROI.We also empower businesses by enhancing their online visibility and turning into loyal customers. We endeavour to create customised marketing strategies, aligning with our clients’ goals, ensuring sustainable growth and success.
This guide explains how businesses can prepare for and respond to Disaster Recovery IT Services Orange County. It covers the basics of keeping important data safe, quickly recovering systems after problems, and minimizing downtime to ensure business operations continue smoothly.
Learn More: https://skywardit.com/services/
How Can Microsoft Office 365 Improve Your Productivity?Digital Host
Microsoft Office 365 is a cloud-based subscription service offering essential productivity tools. It includes Word for documents, Excel for data analysis, PowerPoint for presentations, Outlook for email, OneDrive for cloud storage, and Teams for collaboration. Key benefits are accessibility from any device, advanced security, and regular updates. Office 365 enhances collaboration with real-time co-authoring and Teams, streamlines communication with Outlook and Teams Chat, and improves data management with OneDrive and SharePoint. For reliable office 365 hosting, Digital Host offers various subscription plans, setup support, and training resources. Visit https://www.digitalhost.com/email-office/office-365/
3. What is Cybersecurity?
Cybersecurity is the practice of protecting computers, mobile
devices, electronic systems, networks, and data from
malicious attacks.
In other words: Cybersecurity is the art of protecting
networks, devices, and data from unauthorized access or
criminal use and the practice of ensuring confidentiality,
integrity, and availability of information.
4. Why ShouldYou be aware of
Cybersecurity?
In today’s digital world, we cannot ignore cybersecurity. A single security breach can
expose the personal information of employees, project participants, donor details,
and financial data of the organization.These breaches have a strong financial
impact on the organisation and result in the loss of the trust of donors.
Pandemic, cryptocurrency, and the rise in remote working are coming together to
create a target-rich environment for criminals to take advantage of.
Hence, cybersecurity awareness is very essential to protect organisational and
individual data from spammers and cybercriminals.
6. Types of Attack…
• Every attack has a motivation; the primary motivation for attacks is money.
Hackers breach the system and demand a ransom from the victims. Other motives
include a financial loss to the target, attaining a state's military purpose, harming
the target's reputation, or political manipulation.
The main five types of attacks:
• Distributed denial of service(DDoS)
• Man in the middle
• Email attacks
• Password attacks
• Malware attacks
The DDoS and MITM will note be cover in this sessions.
7. Phishing
A phishing attack is a category of cyber-attack in
which hackers send messages pretending to be a
trusted person or entity.
Phishing messages influence users, causing them
to perform actions like installing malicious files,
clicking harmful links, or exposing sensitive
information such as bank account credentials.
This message can be sent to the target via emails,
messaging applications, or even SMS services.
9. Prevention from Phishing Attacks…
Email Authenticity:
Always double-check the source and
contents of a sensitive email that
requests private information. Checking
the sender's address, whether from a
bank or a shopping website, is the first
step in safeguarding oneself.
10. Prevention from Phishing Attacks…
HTTPS Websites:
Users must make every effort to only
visit websites with an HTTPS
certification. In addition to being less
likely to be phishing websites, it is
more difficult to launch network
attacks on such secure websites.
11. Prevention from Phishing Attacks…
Avoid Pop-Ups:
One must avoid following random pop-
ups that advertise games or enticing
monetary rewards for clicking on them.
Designed to dupe innocent users, these
pop-ups are primarily used to inject
malware into a target system or steal
important credentials.
12. Prevention from Phishing Attacks…
Password Rotation:
To ensure the best security of our data,
you must change our passwords every
few months. For example, even if a
phishing website successfully obtains
some credentials, there is a good
possibility the target has already reset
the compromised password.
14. Spam Emails
Spam email is unsolicited and unwanted
junk email sent out in bulk to an
indiscriminate recipient list.
Typically, spam is sent for commercial
purposes. It can be sent in massive volume
by botnets, networks of infected
computers.
15. Email Attachments
Email attachments are one of the most
common ways to get viruses or malware.
Even though an attachment might look like a
document Excel file.PDF etc. it might contain
a virus or malware.
A significant number of people open
attachments from unknown email addresses.
But it's critical that if you don’t know who an
email is coming from then don't open or
download the attachment.
Download these attachments only if you are
sure that it is a legitimate email.
17. Dictionary attack & Brute force
To crack a password or find a password, hackers
use these techniques:
Dictionary attack:
In this method, hacker handle every password that
is possible through the dictionary.
Brute force:
This is a trial and error method used to decode the
password or data.This attack takes the most
amount of time.
18. Key Logger
As the name suggests, a key logger records all
keystrokes on a keyboard. Most hackers use key
loggers to get passwords and account details.
20. Rainbow table
There are rainbow tables that contain
precomputed hash values.
Attackers use this table to find the password of
the user.
21. Tips for Password Safety
1. Make sure to use unique passwords across all websites and applications.
2. Enable and utilize 2FA, or two-factor authentication, on all websites that allow it.
3. When you're creating security questions, make sure to choose unique, non-true
answers, so you don't have to worry about someone resetting your password by
knowing information about your personal life, or finding information on your social
media accounts.
4. If a data breach does occur, make sure to fully change your password, not just the
number and symbol, and make sure to change your security questions as well.
22. Search Engine Safety
Search engines are being used by users to ask any question they can
think of.
People write in questions about how to do their duties at work, seek up
formulas and terms, plan projects, download documents and templates
that have already been customized to their needs, and much more.
The problem is that some users click on search results without first
checking to see if the website is legitimate.
Additionally, social networking sites frequently experience this.They
click on the link because a friend posted something because they
believe it to be secure.
23. Tips for Safe Search
• Stick to clicking on sites on the first page of results.
After you start going past the first page, start being very cautious about things that you
click on, because that’s when you're getting results that are not as reputable, not as
commonly clicked on, and don't have as much related content.
• Be careful when clicking on non-name recognizable sites as you don't know where it's
going to take you.
• Be very careful when you're downloading anything that says that it's free, because even if
it is actually free and it is a legitimate download, they might put something on your
computer that you didn't want, or something that is malicious.
25. Virus
A computer virus is a malicious code that
replicates by copying itself to another program or
document and changes how a computer works.
The virus requires someone to knowingly or
unknowingly spread the infection without the
knowledge or permission of a user or system
administrator.
26. Worm
A computer worm is a type of malware whose
primary function is to self-replicate and infect
other computers while remaining active on
infected systems.
A computer worm duplicates itself to spread to
uninfected computers.
27. Malware's Functions
Overwhelming system resources:
Malware, especially worms, can spread
around and overwhelm a system or network.
Some malware creates so many folders that
no memory is left and slows a computer
down.
28. Malware's Functions…
Creating a backdoor:
Explanation by an example:
Microsoft sends updates every Sunday on all
Windows platforms. How do these updates reach
to yourWindows OS?
They create backdoors from where they can send
updates.
Similarly, hackers create backdoors from where
they can continuously send viruses after getting
into a system.
29. Malware's Functions…
Disabling security functions:
Some malware can disable antivirus software, as
well as security updates.This malware tends to
last longer because there is no security to stop it.
They tend to keep the system vulnerable to other
malware.
30. Malware's Functions…
Creating botnets:
Hackers make botnets by purely coding.A
botmaster controls botnets, and they are usually
used to crash websites.
Botmaster tells all botnets to flood the website by
accessing the website at the same time.
32. Sources of Malware
• Removable media, like Pen drive, CDs, and DVDs.
• Viruses can be hidden in document files with the .exe extension.As soon as you open
them, the virus activates.
• If you download from untrusted websites, there may be chances that those files will
contain viruses, and as soon as you open them, the hacker might get access to your
system.
• If the network is unsecured, then it can be accessed by anyone.
• Never open email attachments unless the sender can be trusted.These files may contain
viruses to create backdoors.
• Never click on ads that you don’t trust.They are created so that you can click on them, and
hackers will receive details about you.
33. Data Backup
Data backup involves creating copies of data to secure
and protect it from loss or damage. Data can exist in
various forms, including documents, images, audio files,
videos, and databases.
Backing up data plays a crucial role in maintaining
business continuity by providing access to critical
information when needed.
34. Data Backup
• Local Backup: Local backups provide a practical means of safeguarding data
against cyber threats.They are easy to set up and ensure the availability of an
extra copy of important files stored securely in case of unforeseen events. Local
backups can be performed on same computer different drive and storage devices
like external hard drives.
• Cloud Backup: Cloud backup is an increasingly popular form of data backup,
offering secure storage accessible from anywhere in the world.
Editor's Notes
Hello everyone today we're here to talk about cybersecurity and how it affects our organization.
Cyber security awareness training will help us to identify, prevent and respond to cyber threats.
The goal is to create a culture of security awareness within Afghanaid, so that all employees are better equipped to protect organisational data from cyber attacks.