Skip navigation. Press enter to return to the slide.
Menu
✔Security awareness
✔Presentation of the course
✔Summary
INTRODUCTION (17 min.)
Importance of IT security
Consequences of a security breach
Is it possible to be protected?
What is a compromised computer used for?
Who are hackers?
Who do hackers work for?
Why me?
Why me? Targeted attacks
Botnet
The value of a compromised system
Your role is essential
✔WEB BROWSING(10 min.)
✔Web browser
✔Cryptography
Apple vs FBI
Is the connection secure?
Are we using a secure connection?
Dangers of suspect downloads
Don’t trust anyone!
Defend yourself from suspect downloads
Hotspot
✔Question 1
Question 2
Question 3
Question 4
END OF THE FIRST MODULE
✔E-MAIL (22 min.)
✔Scam
Phishing
Phishing: mode of action
Phishing: two-factor authentication
Recognising scam e-mails
Recognising dangerous attachments
Extensions
Dangerous extensions
Can e-mails be faked?
How to reduce undesired e-mails?
E-mails: what should I look for?
Scam mail: example
✔Phishing test
✔Phishing 1
✔Phishing 2
Phishing 3
Phishing 4
Phishing 5
Phishing 6
Phishing 7
Phishing 8
Question 5
Question 6
Question 7
Question 8
Question 9
PROTECT YOUR PRIVACY (10 min.)
✔Identity theft
✔Identity theft: causes
Sharing responsibly
Tags
Tags office, exif
Question 10
Question 11
Question 12
Question 13
Question 14
END OF THE SECOND MODULE
DATA SECURITY (14 min.)
Vulnerability of operating systems
✔The importance of constant updating
✔Software can also represent a risk
Illegal file sharing and downloads
High-risk contents
Antivirus and antimalware software
Be careful of offers of free programmes
Protecting sensitive information
The importance of backups
Using data encryption
Don’t leave devices unguarded
Using data encryption
Loss/theft of a device
Examples
The importance of a passcode
Malicious usb memories
The importance of a passcode
Question 17
Question 18
Question 19
Question 20
PASSWORD MANAGEMENT (17 min.)
Correct criteria for choosing a password
✔Create your own system for memorising
Example
Is this method secure?
Passphrase
The errors to avoid
Differentiate the password according to the purpose
Password managers
View the extensions
Password managers: exemple
Avoid post-its
Destroy paper documents
Passwords: the last barrier
Practice
Question 21
Question 22
Question 23
Question 24
SOCIAL ENGINEERING (11 min.)
Social engineering_1
Social Engineering: characteristics
✔Who uses Social Engineering?
✔Why social engineering?
What’s useful for a social engineer
How to find information on the victim?
How useful information is extrapolated
Why are we vulnerable?
How to defend ourselves against social engineering?
Classify sensitive information
Final recommendations
Question 25
Question 26
Question 27
RULES (6 min.)
Set of Rules 1
Set of Rules 2
✔End of the course
Resources
Security awareness
Security awareness
M
M