SlideShare une entreprise Scribd logo
1  sur  13
INFORMATION SECURITY
     PERSONAL PROTECTION
COMPUTER PROTECTION

    • Use updated legal Operating System (OS) & apps
    • Updated legal Anti Virus/Malware/Firewall is a must
    • Periodically updated, cleaning apps trash, backup
      (settings, OS & application configuration, data)
    • Do backup 3 times with different external media &
      keep it safe at several places. Backup cost is always
      cheaper than recovery cost
    • Use protection tools (Deep Freeze, Windows Steady
      State etc.) & never log in as Administrator level users
    • Never trust any external devices/media/files/apps

2
PUBLIC ACCESS PROTECTION

    • Make sure cold boot the computer before use it
    • Takes several minutes to check any suspicious or
      hidden activity at Task Manager, do quick virus &
      malware scanning check with your own trusted &
      secure protected portable tools
    • Beware of hijacking tools (keylog, remote access)
    • Never use public access terminal for critical
      transaction i.e. email (private), internet banking, e-
      commerce, company data transfer
    • Don’t leave terminal unattended & unprotected,
      not a second
3
WIRELESS ACCESS PROTECTION

    • Always ask Wireless SSID’s & never trust “Free WiFi
      Access” alike SSID’s. Could be attacker/fake AP
    • Wireless is open network, important to know about
      sniffing, side jacking, MITM, hidden camera
    • Never open network sharing, make sure always turn
      off others wireless data connection i.e. bluetooth
    • Never use public access terminal for critical
      transaction i.e. email (private), internet banking, e-
      commerce, company data transfer
    • Don’t leave terminal unattended & unprotected,
      not a second
4
SURFING PROTECTION

    • Use only HTTPS, check validity of CA
    • No script, no pop up, read before click! You can
      click NO/CANCEL, pay attention in every warning
    • Always use parental control for your kids (default
      features in every latest browser), beware of phising
      site, use DNS filter, never trust downloadable
      materials, use “open in a new tab” features not
      “new windows”, employ any useful add on
    • Make sure clean log out, clear & clean up swap,
      cache, cookies, history, bookmark (use private
      browsing features), don’t save username passwords
5
EMAIL PROTECTION

    • Always use plain text not rich text (HTML, MIME etc.)
    • Turn off auto open files (attachment, HTML) mode &
      always use latest & updated email anti virus/SPAM
    • Never trust any attachment files, scan it, always ask
      confirmation from the sender before you open it
    • Always use email client at own trusted computer or
      use portable email client with portable device
    • Use PKI (i.e. GPG) to make sure email authorization
    • Use secure encrypted protocol (POP, IMAP, SMTP)


6
MESSAGING PROTECTION

    • Use latest most secure updated messaging apps &
      never spread ID to others peers that you’re not trust
    • Never trust unknown new friends, always double
      check, ask first to make sure & to identify who they
      really are. Stranger background check necessary
    • Never trust DCC files/materials/links, double check it
    • If you should download files/materials: scan it with
      latest anti virus & anti malware before you open it
    • Use DNS filtering services to protect most phising
      sites, ads, SPAM, malware spreading sites & any
      others untrusted content
7
E-COMMERCE PROTECTION

    • Never use unsecured/public access terminal. If you
      should make sure it safe & clean before transaction
    • Make sure always connected in secure (HTTPS) &
      always check CA validity, the expiry date etc.
    • Make sure that access to real official web site not a
      fake, beware of phising attack. Never click external
      links from email, chat, any others pops up
    • Always use DNS filtering protection, latest anti virus,
      anti SPAM, anti malware, anti phising. Make it
      double if necessary because it will never enough to
      prevent any such incident possible & losses
8
SOCIAL NETWORK PROTECTION

    • Never add unknown new friends. Always ask for
      confirmation to mutual friends. Leave direct basic
      questions message to the suspicious account
    • Be conservative. Limiting privacy exposure, decide
      how much to share. Not everybody needs yours
    • Never use free mail. Use private domain & email
      addresses or corporate account (if it’s allowed)
    • If something happens, report to admin, broadcast
      alert to all of your friends, hope you have backup,
      make new account & tag your old account as
      impersonating & fraud. Ask everybody to do it
9
ATM & SMS PROTECTION

 • Knowing latest updated technology & procedures
   to understand weakness, loop holes, fraud tech,
   detect unusual process, using PIN management &
   one time token. Ask your banks about latest update
 • Knowing card types (mangnetic stripes, chip, RFID)
   & kind of sevices (debit/credit, ecash). Protect card
   physically, hiding CVV2 code, anti magnetic sleeve
 • Never trust. Double check in any transaction careful
   while in the middle of transaction, watch the EDC
 • Look physical environment, consider all possibilities:
   skimming, hidden camera, unauthorized assistance
10
PASSWORD PROTECTION

 • Change password periodically, more often better &
   never share password to anybody for any reasons
 • Longer complicated combination is more stronger.
   Not easy to remember/reveal. Unpredicted phrase
 • Keep in safe secret places. Nobody’s know. Ever
 • Use password management application or services
   or one time token password services. The problem is
   how to make sure & to secure the token delivery
   channel from the system to the end user. Most of
   delivery channel is open public network i.e. SMS
 • Don’t use one for all password, use different each
11
PORTABLE DEVICES PROTECTION

 • Password protected any of your rewritable portable
   devices (flash disk, external drive, gadget, ipod
   etc.). Consider to use encryption
 • Use the most possible, secure, limited sophisticated
   file system NTFS, HFS+ (MacOS), Ext2/Ext3 (Linux) etc.
 • Always make 3 backup, latest Anti Virus & Malware
 • Keep devices with you, never lend it to anybody
 • Beware safety surroundings physical environtment
 • Do highest secure wiping procedures for disposal


12
Thank You

•   Ravindo Tower 17th Floor
•   Kebon Sirih Raya, Kav. 75
•   Central Jakarta, 10340
•   Phone +62 21 3192 5551 ; Fax +62 21 3193 5556
•   office@idsirtii.or.id ; www.idsirtii.or.id

Contenu connexe

Tendances

8. operations security
8. operations security8. operations security
8. operations security
7wounders
 

Tendances (20)

osi vs tcp/ip
osi vs tcp/iposi vs tcp/ip
osi vs tcp/ip
 
7 Deadlocks
7 Deadlocks7 Deadlocks
7 Deadlocks
 
Information Security
Information SecurityInformation Security
Information Security
 
Information Security Life Cycle
Information Security Life CycleInformation Security Life Cycle
Information Security Life Cycle
 
Deadlock Prevention
Deadlock PreventionDeadlock Prevention
Deadlock Prevention
 
Distributed Operating System_1
Distributed Operating System_1Distributed Operating System_1
Distributed Operating System_1
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
password.ppt
password.pptpassword.ppt
password.ppt
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Dbms4
Dbms4Dbms4
Dbms4
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Process synchronization in Operating Systems
Process synchronization in Operating SystemsProcess synchronization in Operating Systems
Process synchronization in Operating Systems
 
The need for security
The need for securityThe need for security
The need for security
 
Operating system architecture
Operating system architectureOperating system architecture
Operating system architecture
 
Hardware Security
Hardware SecurityHardware Security
Hardware Security
 
Device Management
Device ManagementDevice Management
Device Management
 
Mass Storage Structure
Mass Storage StructureMass Storage Structure
Mass Storage Structure
 
Distributed dbms architectures
Distributed dbms architecturesDistributed dbms architectures
Distributed dbms architectures
 
Branch and bounding : Data structures
Branch and bounding : Data structuresBranch and bounding : Data structures
Branch and bounding : Data structures
 
8. operations security
8. operations security8. operations security
8. operations security
 

En vedette

En vedette (20)

Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-GovernmentTasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
 
Summary report cc brti
Summary report cc brtiSummary report cc brti
Summary report cc brti
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
02. R U Sure U R Secure
02. R U Sure U R Secure02. R U Sure U R Secure
02. R U Sure U R Secure
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi NasionalSkema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
 
Telkom sigma keminfo materi
Telkom sigma keminfo materiTelkom sigma keminfo materi
Telkom sigma keminfo materi
 
04. SAKTTI Introduction
04. SAKTTI Introduction04. SAKTTI Introduction
04. SAKTTI Introduction
 
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDFRusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
 
Chuan weihoo_IISF2011
Chuan weihoo_IISF2011Chuan weihoo_IISF2011
Chuan weihoo_IISF2011
 
Global informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuanGlobal informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuan
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Developing a Legal Framework for Privacy
Developing a Legal Framework for PrivacyDeveloping a Legal Framework for Privacy
Developing a Legal Framework for Privacy
 
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk IndonesiaDR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
 
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRISurat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
 
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan InformasiRancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
 

Similaire à Personal security

Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
amiinaaa
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

Similaire à Personal security (20)

ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Internet
InternetInternet
Internet
 
Information security
Information securityInformation security
Information security
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security
Cyber security Cyber security
Cyber security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Information Security
Information Security Information Security
Information Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 

Plus de Directorate of Information Security | Ditjen Aptika

Plus de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Dernier (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Personal security

  • 1. INFORMATION SECURITY PERSONAL PROTECTION
  • 2. COMPUTER PROTECTION • Use updated legal Operating System (OS) & apps • Updated legal Anti Virus/Malware/Firewall is a must • Periodically updated, cleaning apps trash, backup (settings, OS & application configuration, data) • Do backup 3 times with different external media & keep it safe at several places. Backup cost is always cheaper than recovery cost • Use protection tools (Deep Freeze, Windows Steady State etc.) & never log in as Administrator level users • Never trust any external devices/media/files/apps 2
  • 3. PUBLIC ACCESS PROTECTION • Make sure cold boot the computer before use it • Takes several minutes to check any suspicious or hidden activity at Task Manager, do quick virus & malware scanning check with your own trusted & secure protected portable tools • Beware of hijacking tools (keylog, remote access) • Never use public access terminal for critical transaction i.e. email (private), internet banking, e- commerce, company data transfer • Don’t leave terminal unattended & unprotected, not a second 3
  • 4. WIRELESS ACCESS PROTECTION • Always ask Wireless SSID’s & never trust “Free WiFi Access” alike SSID’s. Could be attacker/fake AP • Wireless is open network, important to know about sniffing, side jacking, MITM, hidden camera • Never open network sharing, make sure always turn off others wireless data connection i.e. bluetooth • Never use public access terminal for critical transaction i.e. email (private), internet banking, e- commerce, company data transfer • Don’t leave terminal unattended & unprotected, not a second 4
  • 5. SURFING PROTECTION • Use only HTTPS, check validity of CA • No script, no pop up, read before click! You can click NO/CANCEL, pay attention in every warning • Always use parental control for your kids (default features in every latest browser), beware of phising site, use DNS filter, never trust downloadable materials, use “open in a new tab” features not “new windows”, employ any useful add on • Make sure clean log out, clear & clean up swap, cache, cookies, history, bookmark (use private browsing features), don’t save username passwords 5
  • 6. EMAIL PROTECTION • Always use plain text not rich text (HTML, MIME etc.) • Turn off auto open files (attachment, HTML) mode & always use latest & updated email anti virus/SPAM • Never trust any attachment files, scan it, always ask confirmation from the sender before you open it • Always use email client at own trusted computer or use portable email client with portable device • Use PKI (i.e. GPG) to make sure email authorization • Use secure encrypted protocol (POP, IMAP, SMTP) 6
  • 7. MESSAGING PROTECTION • Use latest most secure updated messaging apps & never spread ID to others peers that you’re not trust • Never trust unknown new friends, always double check, ask first to make sure & to identify who they really are. Stranger background check necessary • Never trust DCC files/materials/links, double check it • If you should download files/materials: scan it with latest anti virus & anti malware before you open it • Use DNS filtering services to protect most phising sites, ads, SPAM, malware spreading sites & any others untrusted content 7
  • 8. E-COMMERCE PROTECTION • Never use unsecured/public access terminal. If you should make sure it safe & clean before transaction • Make sure always connected in secure (HTTPS) & always check CA validity, the expiry date etc. • Make sure that access to real official web site not a fake, beware of phising attack. Never click external links from email, chat, any others pops up • Always use DNS filtering protection, latest anti virus, anti SPAM, anti malware, anti phising. Make it double if necessary because it will never enough to prevent any such incident possible & losses 8
  • 9. SOCIAL NETWORK PROTECTION • Never add unknown new friends. Always ask for confirmation to mutual friends. Leave direct basic questions message to the suspicious account • Be conservative. Limiting privacy exposure, decide how much to share. Not everybody needs yours • Never use free mail. Use private domain & email addresses or corporate account (if it’s allowed) • If something happens, report to admin, broadcast alert to all of your friends, hope you have backup, make new account & tag your old account as impersonating & fraud. Ask everybody to do it 9
  • 10. ATM & SMS PROTECTION • Knowing latest updated technology & procedures to understand weakness, loop holes, fraud tech, detect unusual process, using PIN management & one time token. Ask your banks about latest update • Knowing card types (mangnetic stripes, chip, RFID) & kind of sevices (debit/credit, ecash). Protect card physically, hiding CVV2 code, anti magnetic sleeve • Never trust. Double check in any transaction careful while in the middle of transaction, watch the EDC • Look physical environment, consider all possibilities: skimming, hidden camera, unauthorized assistance 10
  • 11. PASSWORD PROTECTION • Change password periodically, more often better & never share password to anybody for any reasons • Longer complicated combination is more stronger. Not easy to remember/reveal. Unpredicted phrase • Keep in safe secret places. Nobody’s know. Ever • Use password management application or services or one time token password services. The problem is how to make sure & to secure the token delivery channel from the system to the end user. Most of delivery channel is open public network i.e. SMS • Don’t use one for all password, use different each 11
  • 12. PORTABLE DEVICES PROTECTION • Password protected any of your rewritable portable devices (flash disk, external drive, gadget, ipod etc.). Consider to use encryption • Use the most possible, secure, limited sophisticated file system NTFS, HFS+ (MacOS), Ext2/Ext3 (Linux) etc. • Always make 3 backup, latest Anti Virus & Malware • Keep devices with you, never lend it to anybody • Beware safety surroundings physical environtment • Do highest secure wiping procedures for disposal 12
  • 13. Thank You • Ravindo Tower 17th Floor • Kebon Sirih Raya, Kav. 75 • Central Jakarta, 10340 • Phone +62 21 3192 5551 ; Fax +62 21 3193 5556 • office@idsirtii.or.id ; www.idsirtii.or.id