SlideShare une entreprise Scribd logo
1  sur  8
OUTSIDE OF THE OFFICE   Threats from
                        the outside
BE AWARE

 We have covered many ways that you might be targeted while
  using your computer. However, there are other ways hackers
  may target T VA when you are out of the of fice. One example,
  given in the last session, was baiting. More methods than
  baiting threaten employees:
   Tailgating
   Shoulder Surfing
   Theft
TAILGATING AND SHOULDER SURFING

 Tailgating: when someone unknown enters through security by
  following someone else with a badge through the doors.
 Shoulder Surfing: When others look over your shoulder to see
  private information
AWARENESS CONTINUED

 You must be aware of your surroundings not only when you are
  traveling, but when you are at your of fice as well.
 Travel
     Be aware of shoulder surfing
     Use secure networks
     Keep private information secure
     Strong password
 Of fice
   Strong password
   Be aware of tailgating
   Keep identification on person
TRAVEL

 When traveling unsecure networks can leak information to
  prying eyes
   Always use your VPN (provided by TVA) when accessing the internet
    away from the office
   The VPN (virtual private network) encrypts your identification so
    prying eyes cannot decipher what your activities are
   If you are very worried about others looking at your screen you can
    always purchase a mirror for your laptop so you can see what people
    are doing behind you
AT THE OFFICE

 When leaving your of fice ALWAYS lock your computer (CTRL +
  ALT + DELETE)
 Never leave private information out in the open
 Do not keep lists of usernames and passwords
 Always keep your ID badge on you
 Keep your laptop locked into the dock if it is not being used
 Never leave your T VA credit card unattended
 Never leave your VPN tokens unattended
PASSWORD

 Password strength is vital for you security
   Must be at LEAST eight characters
   Do NOT use the same password at TVA for other programs (personal
    e-mail, ebay, amazon, ect…)
   Password must contain at least one lower case letter, upper case
    letter, number, and symbol (@#$%&!?)
   Try to use words that are not easily guessable
   Enter passwords quickly so shoulder surfing individuals cannot figure
    them out
   Never share your password with anyone
   Change your password regularly
LEAVING WORK

 When leaving work keep your laptop in a secure knapsack
 Do NOT leave your laptop in out in your car
 The trunk is also not safe. Thieves will first look in the trunk
  for valuables
 If you must leave your laptop in the car keep it in a locked
  container. This will assist in preventing theft

Contenu connexe

En vedette (11)

Packet sniffer repot
Packet sniffer repotPacket sniffer repot
Packet sniffer repot
 
Phishing
PhishingPhishing
Phishing
 
IPV4 vs IPV6
IPV4 vs IPV6IPV4 vs IPV6
IPV4 vs IPV6
 
Module 5 Sniffers
Module 5  SniffersModule 5  Sniffers
Module 5 Sniffers
 
Sniffer ppt
Sniffer pptSniffer ppt
Sniffer ppt
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Sniffer
SnifferSniffer
Sniffer
 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similaire à Day 3

Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
HaroldCo
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
MohanPandey31
 
Data theft
Data theftData theft
Data theft
Laura
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

Similaire à Day 3 (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Security Awareness 101
Security Awareness 101Security Awareness 101
Security Awareness 101
 
Protect your Privacy
Protect your PrivacyProtect your Privacy
Protect your Privacy
 
Mobile Security at the World Cup
Mobile Security at the World CupMobile Security at the World Cup
Mobile Security at the World Cup
 
Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security Penntech IT Solutions and cyber security
Penntech IT Solutions and cyber security
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Security in 10 slides
Security in 10 slidesSecurity in 10 slides
Security in 10 slides
 
Data theft
Data theftData theft
Data theft
 
Foiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money ThingFoiling Identity Theft - It's a Money Thing
Foiling Identity Theft - It's a Money Thing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Security awareness-checklist 2019
Security awareness-checklist 2019Security awareness-checklist 2019
Security awareness-checklist 2019
 
Cyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdfCyberhunter solutions cyber security toronto.pdf
Cyberhunter solutions cyber security toronto.pdf
 
The Net is Dangerous
The Net is DangerousThe Net is Dangerous
The Net is Dangerous
 
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 Cybersecurity Remote Working  a4 printable Flash Cards.pdf Cybersecurity Remote Working  a4 printable Flash Cards.pdf
Cybersecurity Remote Working a4 printable Flash Cards.pdf
 
Zcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security TipsZcsif presentation On Cyber Security Tips
Zcsif presentation On Cyber Security Tips
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Day 3

  • 1. OUTSIDE OF THE OFFICE Threats from the outside
  • 2. BE AWARE  We have covered many ways that you might be targeted while using your computer. However, there are other ways hackers may target T VA when you are out of the of fice. One example, given in the last session, was baiting. More methods than baiting threaten employees:  Tailgating  Shoulder Surfing  Theft
  • 3. TAILGATING AND SHOULDER SURFING  Tailgating: when someone unknown enters through security by following someone else with a badge through the doors.  Shoulder Surfing: When others look over your shoulder to see private information
  • 4. AWARENESS CONTINUED  You must be aware of your surroundings not only when you are traveling, but when you are at your of fice as well.  Travel  Be aware of shoulder surfing  Use secure networks  Keep private information secure  Strong password  Of fice  Strong password  Be aware of tailgating  Keep identification on person
  • 5. TRAVEL  When traveling unsecure networks can leak information to prying eyes  Always use your VPN (provided by TVA) when accessing the internet away from the office  The VPN (virtual private network) encrypts your identification so prying eyes cannot decipher what your activities are  If you are very worried about others looking at your screen you can always purchase a mirror for your laptop so you can see what people are doing behind you
  • 6. AT THE OFFICE  When leaving your of fice ALWAYS lock your computer (CTRL + ALT + DELETE)  Never leave private information out in the open  Do not keep lists of usernames and passwords  Always keep your ID badge on you  Keep your laptop locked into the dock if it is not being used  Never leave your T VA credit card unattended  Never leave your VPN tokens unattended
  • 7. PASSWORD  Password strength is vital for you security  Must be at LEAST eight characters  Do NOT use the same password at TVA for other programs (personal e-mail, ebay, amazon, ect…)  Password must contain at least one lower case letter, upper case letter, number, and symbol (@#$%&!?)  Try to use words that are not easily guessable  Enter passwords quickly so shoulder surfing individuals cannot figure them out  Never share your password with anyone  Change your password regularly
  • 8. LEAVING WORK  When leaving work keep your laptop in a secure knapsack  Do NOT leave your laptop in out in your car  The trunk is also not safe. Thieves will first look in the trunk for valuables  If you must leave your laptop in the car keep it in a locked container. This will assist in preventing theft