电脑桌面
添加EHS学习资料网到电脑桌面
安装后可以在桌面快捷访问

DNR-Security-Awareness-Training.pptxVIP专享VIP免费原创优质

DNR-Security-Awareness-Training.pptx_第1页
DNR-Security-Awareness-Training.pptx_第2页
DNR-Security-Awareness-Training.pptx_第3页
GetCompliant.GetTraceSecurity.InformationSecurityDNREmployeeAwarenessTrainingAndrewC.JohnsonWhatisInformationSecurity?Protectstheconfidentiality,integrity,andavailabilityofimportantdataControlscanbePhysicalorTechnicalLocksandsafes–encryptionandpasswordsTechnologyhasmadeourliveseasierinmanyways,butthisconveniencehasalsoincreasedourexposuretothreatsThievesandattackerscanalsoworkmoreeffectivelyWhyShouldICare?TheftisbecomingincreasinglydigitalEaseofidentity,account,andcredentialtheftmakeseveryoneanidealtargetAppliestoorganizationsthathousesuchdataorindividualsthemselvesCompromisemayaffectcustomers,coworkers,friends,andfamilyHistoricalPerspectiveManyhistoricalmethodsofmonetarytheftStagecoachRobberiesTrainHijackingArmedAssault“InsideJobs”Lossesfromtensofthousandsofdollars,upintothemillionsToday,mostbanksdonothouse“millionsofdollars”on-premisesLiquideconomyDataisthenewcommodityIn2006therewere7,272“robberies”totalingover$72,687,678Statistics$239.1million(2007)TotaldollarlossfromallreferredcasesoffraudIncreasedfrom$198.4millionin2006MalecomplainantsreportedgreaterlossthanfemalesHighestdollarlosseswerefoundamonginvestmentandcheckfraudvictimsEmailandwebpagesstillprimarymechanismsbyhowthefraudulentactionhappened*FederalBureauofInvestigationInternetCrimeComplaintCenter-CrimeReportfor2007ModernThreatsViruses,Trojans,Worms,andRootKitsAdware/SpywareSpam,Phishing,andotherEmailattacksIdentityTheftSocialEngineeringVirusesVirusesaremaliciousprogramsthathidethemselvesonyourcomputerUsuallyverysmallMayhaveaccesstoviewordeleteyourinformationOftencontractedthroughawebsite,email,orp2papplicationsMaydestroyyourdocuments,formatyourharddrive,sendemailsfromyourcomputeroravarietyofothernefariousactions–itjustdependsonthestrain!VirusesarecreatedforthesolepurposeofcausingtroubleTakingrevenge,politicalstatements,etc…Mostmodernvirusesarefinanciallymotivated–mayholddataforransomorstealinformationJustlikerealviruses,computervirusesspreadtoothers…OthercomputersonthenetworkSendingoutemailreplicationsofitselfAlwaysuseanti-virusprotection!Famousviruses:LoveBugCodeRedWorms,Trojans,andRootKitsTrojanappearsasalegitimateprogramPossibletorepackageTrojanswithlegitimateprogramsWormsareself-replicatingTypicallypropagatethroughun-patchedsystemsBlasterSasserRootKitsLowlevelprogramsthatembedthemselvesintheoperatingsystemitselfDifficultifnotimpossibletodetectAdware/SpywareSomemalwareisdesignedtosolicityou,orgatherinformationaboutyourcomputinghabitsWhichwebsitesyouvisit?When?Whattimes?Whatareyoupurchasing?Howlongdospendsurfingthewebsite?Howorwhatdoyouuseyourcomputerfor?Example:Sony“RootKit”Intendedfor“MarketingPurposes”Commonlyinstalledwithp2porfreesoftwareMaybeonlyanannoyanceandcausenoharmWhatelsemaybeinstalledalongsideadware?EmailCommonAttacksPhishingMaliciousattachmentsHoaxesSpamScams(offerstoogoodtobetrue)BestPracticesDon’topensuspiciousattachmentsDon’tfollowlinksDon’tattemptto“unsubscribe”PhishingDeceptiveemailstogetuserstoclickonmaliciouslinksEntersensitiveinformationRunapplicationsLookidenticaltolegitimateemailsYourBankPayPalGovernmentVariantsVishing–sameconceptbutwithvoiceUserinstructedtocallintosystemTextmessagesandpostalmailP...

1、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
3、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。

碎片内容

国企EHS+ 关注
实名认证
内容提供者

国企EHS小张,专门收集EHS资料

最新文章

    确认删除?
    企业微信
    • 微信客服
    客服QQ
    • QQ点击这里给我发消息
    人工电话
    回到顶部