Presentation is loading. Please wait.

Presentation is loading. Please wait.

What is Information Security?

Similar presentations


Presentation on theme: "What is Information Security?"— Presentation transcript:

1 What is Information Security?
Information security consists of preserving the following elements: Confidentiality: ensuring that information can only be accessed by those with the proper authorization Integrity: safeguarding the accuracy and completeness of information and the ways in which it is processed Availability: ensuring that authorized users have access to information and associated assets whenever required Information can exist in many forms. It can be printed or written on paper, stored electronically, transmitted by post or using electronic means, shown on films, or spoken in conversation. Whatever form the Information takes, whatever the means by which it is shared or stored, it should always be appropriately protected.

2 Conficker- The Computer Worm
How can it spread? OS patches missing Through file sharing and via removable drives, such as USB drives How can you find out if its Conficker? When the drive is used, the AutoPlay dialog box will show one additional option. Can also disable important services on your computer. What can you do to protect your computer? OS should be up-to-date with latest security updates (Microsoft Patch: MS08-067) Antivirus software should be up-to-date with latest virus definition Sharing of drives should be forbidden Administrator password should be set

3 Always lock your PC before you leave your desk
Press CTRL+ALT+DEL Shut down your PC and monitor before leaving from work everyday Do not share your password with anyone, not even your colleague Do not download any unauthorized software on your PC Do not store personal data on your PC

4 Always lock your PC before you leave your desk (Press CTRL+ALT+DEL)
Do’s Always lock your PC before you leave your desk (Press CTRL+ALT+DEL) Shut down your PC and monitor before leaving from work everyday Don’ts Do not share your password with anyone, not even your colleague Do not download any unauthorized software on your PC Do not store personal data on your PC

5 Anti Virus: Installed? Updated?
Ensure that Anti-Virus is installed on your machine Ensure that virus definitions are up-to-date

6 How to Identify a Phishing Attack
Likely Phishing Attack Request for personal financial information Alarming claims like Warning That Your Account is compromised Generic greeting like ‘Dear valued customer’ Misspellings or substitute characters (e.g.:’1nformati0n’): These are generally inserted in an attempt to bypass anti-spam software Secure URL starting with Look in the Browser Status Bar: The actual location to which a URL points may be different what you see in your browser Padlock Icon: Also look for a small padlock icon on the browser’s status bar

7 You are responsible for…..
Print outs that lie unattended………… Do not leave any print outs lying unattended Collect the prints immediately Shred/ Discard/Tear-off the pages which are not of any use Take print outs only if it is absolutely necessary

8 (e.g.: pnb123,pnb_123, etc.) Do not have default passwords for your machines Keep separate passwords for login and mailbox (alpha numeric, special characters, length of at least 8 characters) Strength of password should be high


Download ppt "What is Information Security?"

Similar presentations


Ads by Google