SlideShare une entreprise Scribd logo
1  sur  13
INFORMATION SECURITY
     PERSONAL PROTECTION
COMPUTER PROTECTION

    • Use updated legal Operating System (OS) & apps
    • Updated legal Anti Virus/Malware/Firewall is a must
    • Periodically updated, cleaning apps trash, backup
      (settings, OS & application configuration, data)
    • Do backup 3 times with different external media &
      keep it safe at several places. Backup cost is always
      cheaper than recovery cost
    • Use protection tools (Deep Freeze, Windows Steady
      State etc.) & never log in as Administrator level users
    • Never trust any external devices/media/files/apps

2
PUBLIC ACCESS PROTECTION

    • Make sure cold boot the computer before use it
    • Takes several minutes to check any suspicious or
      hidden activity at Task Manager, do quick virus &
      malware scanning check with your own trusted &
      secure protected portable tools
    • Beware of hijacking tools (keylog, remote access)
    • Never use public access terminal for critical
      transaction i.e. email (private), internet banking, e-
      commerce, company data transfer
    • Don’t leave terminal unattended & unprotected,
      not a second
3
WIRELESS ACCESS PROTECTION

    • Always ask Wireless SSID’s & never trust “Free WiFi
      Access” alike SSID’s. Could be attacker/fake AP
    • Wireless is open network, important to know about
      sniffing, side jacking, MITM, hidden camera
    • Never open network sharing, make sure always turn
      off others wireless data connection i.e. bluetooth
    • Never use public access terminal for critical
      transaction i.e. email (private), internet banking, e-
      commerce, company data transfer
    • Don’t leave terminal unattended & unprotected,
      not a second
4
SURFING PROTECTION

    • Use only HTTPS, check validity of CA
    • No script, no pop up, read before click! You can
      click NO/CANCEL, pay attention in every warning
    • Always use parental control for your kids (default
      features in every latest browser), beware of phising
      site, use DNS filter, never trust downloadable
      materials, use “open in a new tab” features not
      “new windows”, employ any useful add on
    • Make sure clean log out, clear & clean up swap,
      cache, cookies, history, bookmark (use private
      browsing features), don’t save username passwords
5
EMAIL PROTECTION

    • Always use plain text not rich text (HTML, MIME etc.)
    • Turn off auto open files (attachment, HTML) mode &
      always use latest & updated email anti virus/SPAM
    • Never trust any attachment files, scan it, always ask
      confirmation from the sender before you open it
    • Always use email client at own trusted computer or
      use portable email client with portable device
    • Use PKI (i.e. GPG) to make sure email authorization
    • Use secure encrypted protocol (POP, IMAP, SMTP)


6
MESSAGING PROTECTION

    • Use latest most secure updated messaging apps &
      never spread ID to others peers that you’re not trust
    • Never trust unknown new friends, always double
      check, ask first to make sure & to identify who they
      really are. Stranger background check necessary
    • Never trust DCC files/materials/links, double check it
    • If you should download files/materials: scan it with
      latest anti virus & anti malware before you open it
    • Use DNS filtering services to protect most phising
      sites, ads, SPAM, malware spreading sites & any
      others untrusted content
7
E-COMMERCE PROTECTION

    • Never use unsecured/public access terminal. If you
      should make sure it safe & clean before transaction
    • Make sure always connected in secure (HTTPS) &
      always check CA validity, the expiry date etc.
    • Make sure that access to real official web site not a
      fake, beware of phising attack. Never click external
      links from email, chat, any others pops up
    • Always use DNS filtering protection, latest anti virus,
      anti SPAM, anti malware, anti phising. Make it
      double if necessary because it will never enough to
      prevent any such incident possible & losses
8
SOCIAL NETWORK PROTECTION

    • Never add unknown new friends. Always ask for
      confirmation to mutual friends. Leave direct basic
      questions message to the suspicious account
    • Be conservative. Limiting privacy exposure, decide
      how much to share. Not everybody needs yours
    • Never use free mail. Use private domain & email
      addresses or corporate account (if it’s allowed)
    • If something happens, report to admin, broadcast
      alert to all of your friends, hope you have backup,
      make new account & tag your old account as
      impersonating & fraud. Ask everybody to do it
9
ATM & SMS PROTECTION

 • Knowing latest updated technology & procedures
   to understand weakness, loop holes, fraud tech,
   detect unusual process, using PIN management &
   one time token. Ask your banks about latest update
 • Knowing card types (mangnetic stripes, chip, RFID)
   & kind of sevices (debit/credit, ecash). Protect card
   physically, hiding CVV2 code, anti magnetic sleeve
 • Never trust. Double check in any transaction careful
   while in the middle of transaction, watch the EDC
 • Look physical environment, consider all possibilities:
   skimming, hidden camera, unauthorized assistance
10
PASSWORD PROTECTION

 • Change password periodically, more often better &
   never share password to anybody for any reasons
 • Longer complicated combination is more stronger.
   Not easy to remember/reveal. Unpredicted phrase
 • Keep in safe secret places. Nobody’s know. Ever
 • Use password management application or services
   or one time token password services. The problem is
   how to make sure & to secure the token delivery
   channel from the system to the end user. Most of
   delivery channel is open public network i.e. SMS
 • Don’t use one for all password, use different each
11
PORTABLE DEVICES PROTECTION

 • Password protected any of your rewritable portable
   devices (flash disk, external drive, gadget, ipod
   etc.). Consider to use encryption
 • Use the most possible, secure, limited sophisticated
   file system NTFS, HFS+ (MacOS), Ext2/Ext3 (Linux) etc.
 • Always make 3 backup, latest Anti Virus & Malware
 • Keep devices with you, never lend it to anybody
 • Beware safety surroundings physical environtment
 • Do highest secure wiping procedures for disposal


12
Thank You

•   Ravindo Tower 17th Floor
•   Kebon Sirih Raya, Kav. 75
•   Central Jakarta, 10340
•   Phone +62 21 3192 5551 ; Fax +62 21 3193 5556
•   office@idsirtii.or.id ; www.idsirtii.or.id

Contenu connexe

Tendances

Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
12 security policies
12 security policies12 security policies
12 security policiesSaqib Raza
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and MaintenanceNada G.Youssef
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITYafaque jaya
 
Database Security
Database SecurityDatabase Security
Database Securityalraee
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction pptSubhash Gupta
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecturebabak danyal
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 

Tendances (20)

Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
12 security policies
12 security policies12 security policies
12 security policies
 
Information Security
Information SecurityInformation Security
Information Security
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Data security
Data securityData security
Data security
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Security audit
Security auditSecurity audit
Security audit
 
Database Security
Database SecurityDatabase Security
Database Security
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Linux security
Linux securityLinux security
Linux security
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 

En vedette

En vedette (20)

Protecting Data Privacy
Protecting Data PrivacyProtecting Data Privacy
Protecting Data Privacy
 
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
Budaya keamanan informasi dari perspektif psikologi ia-14 mar2012
 
Information Security Governance
Information Security GovernanceInformation Security Governance
Information Security Governance
 
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-GovernmentTasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
Tasdik Kinanto - Interoperabilitas Dokumen Perkantoran dalam e-Government
 
Summary report cc brti
Summary report cc brtiSummary report cc brti
Summary report cc brti
 
Security Development Life Cycle
Security Development Life CycleSecurity Development Life Cycle
Security Development Life Cycle
 
02. R U Sure U R Secure
02. R U Sure U R Secure02. R U Sure U R Secure
02. R U Sure U R Secure
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Privacy and Data Protection
Privacy and Data ProtectionPrivacy and Data Protection
Privacy and Data Protection
 
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi NasionalSkema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
Skema Akreditasi-Sertifikasi ISO 27001 Komite Akreditasi Nasional
 
Telkom sigma keminfo materi
Telkom sigma keminfo materiTelkom sigma keminfo materi
Telkom sigma keminfo materi
 
04. SAKTTI Introduction
04. SAKTTI Introduction04. SAKTTI Introduction
04. SAKTTI Introduction
 
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDFRusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
Rusmanto - Pengantar PDF dan Aplikasi Open Source terkait PDF
 
Chuan weihoo_IISF2011
Chuan weihoo_IISF2011Chuan weihoo_IISF2011
Chuan weihoo_IISF2011
 
Global informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuanGlobal informationsecurityissue_ZainalHasibuan
Global informationsecurityissue_ZainalHasibuan
 
20111214 iisf shinoda_
20111214 iisf shinoda_20111214 iisf shinoda_
20111214 iisf shinoda_
 
Developing a Legal Framework for Privacy
Developing a Legal Framework for PrivacyDeveloping a Legal Framework for Privacy
Developing a Legal Framework for Privacy
 
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk IndonesiaDR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
DR. Taufik Hasan - Aplikasi Pendukung Interoperabilitas Dokumen untuk Indonesia
 
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRISurat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
Surat kepada seluruh Rektor Perguruan Tinggi dan Ketua Prodi di NKRI
 
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan InformasiRancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
Rancangan Peraturan Menteri Sistem Manajemen Pengamanan Informasi
 

Similaire à Personal security

Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security InnovationPriyanka Aash
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxbinowe
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular usersGeoffrey Vaughan
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Innovation
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02amiinaaa
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfVarinder K
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online PrivacyKazi Sarwar Hossain
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Information Security
Information Security Information Security
Information Security Dio Pratama
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptxCharithraaAR
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_WatsonPatricia M Watson
 

Similaire à Personal security (20)

ACESnWS cyber security tips
ACESnWS cyber security tipsACESnWS cyber security tips
ACESnWS cyber security tips
 
Personal Threat Models
Personal Threat ModelsPersonal Threat Models
Personal Threat Models
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Wfh security risks - Ed Adams, President, Security Innovation
Wfh security risks  - Ed Adams, President, Security InnovationWfh security risks  - Ed Adams, President, Security Innovation
Wfh security risks - Ed Adams, President, Security Innovation
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
Internet
InternetInternet
Internet
 
Information security
Information securityInformation security
Information security
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Security best practices for regular users
Security best practices for regular usersSecurity best practices for regular users
Security best practices for regular users
 
Security Best Practices for Regular Users
Security Best Practices for Regular UsersSecurity Best Practices for Regular Users
Security Best Practices for Regular Users
 
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02Onlinesecurityrecomendations2014 141230081030-conversion-gate02
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
 
CyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdfCyberSecurity Cyber24x7.pdf
CyberSecurity Cyber24x7.pdf
 
Users awarness programme for Online Privacy
Users awarness programme for Online PrivacyUsers awarness programme for Online Privacy
Users awarness programme for Online Privacy
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Cyber security
Cyber security Cyber security
Cyber security
 
Information Security
Information Security Information Security
Information Security
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
Securing your cyberspace_Watson
Securing your cyberspace_WatsonSecuring your cyberspace_Watson
Securing your cyberspace_Watson
 

Plus de Directorate of Information Security | Ditjen Aptika

Plus de Directorate of Information Security | Ditjen Aptika (20)

Sosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor KesehatanSosialisasi Keamanan Informasi_Sektor Kesehatan
Sosialisasi Keamanan Informasi_Sektor Kesehatan
 
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan TelekomunikasiSosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
Sosialisasi Keamanan Informasi_Penyelenggaraan Telekomunikasi
 
Sosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor TranportasiSosialisasi Keamanan Informasi_Sektor Tranportasi
Sosialisasi Keamanan Informasi_Sektor Tranportasi
 
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan UdaraSosialisasi Keamanan Informasi_Bidang Perhubungan Udara
Sosialisasi Keamanan Informasi_Bidang Perhubungan Udara
 
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan BatubaraSosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
Sosialisasi Keamanan Informasi_Bidang Mineral dan Batubara
 
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang KetenagalistrikanSosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
Sosialisasi Keamanan Informasi_Bidang Ketenagalistrikan
 
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
Sosialisasi Keamanan Informasi_Bidang Energi Baru, Terbarukan dan Konservasi ...
 
Fetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelolaFetri Miftach_Uji publik rpm tata kelola
Fetri Miftach_Uji publik rpm tata kelola
 
Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118Hasyim Gautama_Tata kelola tik 20151118
Hasyim Gautama_Tata kelola tik 20151118
 
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasiStandar rujukan keamanan informasi sub sektor perangkat telekomunikasi
Standar rujukan keamanan informasi sub sektor perangkat telekomunikasi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made WiryawanDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_I Made Wiryawan
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior LazuardiDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_Junior Lazuardi
 
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim GautamaDiskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
Diskusi Publik RPM Perangkat Lunak Sistem Elektronik_DR Hasyim Gautama
 
Teguh arifiyadi ls skse
Teguh arifiyadi ls skseTeguh arifiyadi ls skse
Teguh arifiyadi ls skse
 
Konny sagala skema kelaikan se
Konny sagala skema kelaikan seKonny sagala skema kelaikan se
Konny sagala skema kelaikan se
 
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronikIntan rahayu tata cara sertifikasi kelaikan sistem elektronik
Intan rahayu tata cara sertifikasi kelaikan sistem elektronik
 
Uji Publik RPM SMPI Fetri Miftah
Uji Publik RPM SMPI  Fetri MiftahUji Publik RPM SMPI  Fetri Miftah
Uji Publik RPM SMPI Fetri Miftah
 
RPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim GautamaRPM SMPI 20150805 Hasim Gautama
RPM SMPI 20150805 Hasim Gautama
 
SNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar SiregarSNI ISO 27001 Anwar Siregar
SNI ISO 27001 Anwar Siregar
 
RPM SMPI
RPM SMPIRPM SMPI
RPM SMPI
 

Dernier

How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryCeline George
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxMohamed Rizk Khodair
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Denish Jangid
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptxPoojaSen20
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Mohamed Rizk Khodair
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatmentsaipooja36
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文中 央社
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024CapitolTechU
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Celine George
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnershipsexpandedwebsite
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project researchCaitlinCummins3
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxNehaChandwani11
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...Nguyen Thanh Tu Collection
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptxPoojaSen20
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxheathfieldcps1
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Mark Carrigan
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...Nguyen Thanh Tu Collection
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽中 央社
 

Dernier (20)

How to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 InventoryHow to Manage Closest Location in Odoo 17 Inventory
How to Manage Closest Location in Odoo 17 Inventory
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
Basic Civil Engineering notes on Transportation Engineering, Modes of Transpo...
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024Capitol Tech Univ Doctoral Presentation -May 2024
Capitol Tech Univ Doctoral Presentation -May 2024
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
SURVEY I created for uni project research
SURVEY I created for uni project researchSURVEY I created for uni project research
SURVEY I created for uni project research
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
The Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptxThe Ball Poem- John Berryman_20240518_001617_0000.pptx
The Ball Poem- John Berryman_20240518_001617_0000.pptx
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
The basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptxThe basics of sentences session 4pptx.pptx
The basics of sentences session 4pptx.pptx
 
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...Navigating the Misinformation Minefield: The Role of Higher Education in the ...
Navigating the Misinformation Minefield: The Role of Higher Education in the ...
 
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 

Personal security

  • 1. INFORMATION SECURITY PERSONAL PROTECTION
  • 2. COMPUTER PROTECTION • Use updated legal Operating System (OS) & apps • Updated legal Anti Virus/Malware/Firewall is a must • Periodically updated, cleaning apps trash, backup (settings, OS & application configuration, data) • Do backup 3 times with different external media & keep it safe at several places. Backup cost is always cheaper than recovery cost • Use protection tools (Deep Freeze, Windows Steady State etc.) & never log in as Administrator level users • Never trust any external devices/media/files/apps 2
  • 3. PUBLIC ACCESS PROTECTION • Make sure cold boot the computer before use it • Takes several minutes to check any suspicious or hidden activity at Task Manager, do quick virus & malware scanning check with your own trusted & secure protected portable tools • Beware of hijacking tools (keylog, remote access) • Never use public access terminal for critical transaction i.e. email (private), internet banking, e- commerce, company data transfer • Don’t leave terminal unattended & unprotected, not a second 3
  • 4. WIRELESS ACCESS PROTECTION • Always ask Wireless SSID’s & never trust “Free WiFi Access” alike SSID’s. Could be attacker/fake AP • Wireless is open network, important to know about sniffing, side jacking, MITM, hidden camera • Never open network sharing, make sure always turn off others wireless data connection i.e. bluetooth • Never use public access terminal for critical transaction i.e. email (private), internet banking, e- commerce, company data transfer • Don’t leave terminal unattended & unprotected, not a second 4
  • 5. SURFING PROTECTION • Use only HTTPS, check validity of CA • No script, no pop up, read before click! You can click NO/CANCEL, pay attention in every warning • Always use parental control for your kids (default features in every latest browser), beware of phising site, use DNS filter, never trust downloadable materials, use “open in a new tab” features not “new windows”, employ any useful add on • Make sure clean log out, clear & clean up swap, cache, cookies, history, bookmark (use private browsing features), don’t save username passwords 5
  • 6. EMAIL PROTECTION • Always use plain text not rich text (HTML, MIME etc.) • Turn off auto open files (attachment, HTML) mode & always use latest & updated email anti virus/SPAM • Never trust any attachment files, scan it, always ask confirmation from the sender before you open it • Always use email client at own trusted computer or use portable email client with portable device • Use PKI (i.e. GPG) to make sure email authorization • Use secure encrypted protocol (POP, IMAP, SMTP) 6
  • 7. MESSAGING PROTECTION • Use latest most secure updated messaging apps & never spread ID to others peers that you’re not trust • Never trust unknown new friends, always double check, ask first to make sure & to identify who they really are. Stranger background check necessary • Never trust DCC files/materials/links, double check it • If you should download files/materials: scan it with latest anti virus & anti malware before you open it • Use DNS filtering services to protect most phising sites, ads, SPAM, malware spreading sites & any others untrusted content 7
  • 8. E-COMMERCE PROTECTION • Never use unsecured/public access terminal. If you should make sure it safe & clean before transaction • Make sure always connected in secure (HTTPS) & always check CA validity, the expiry date etc. • Make sure that access to real official web site not a fake, beware of phising attack. Never click external links from email, chat, any others pops up • Always use DNS filtering protection, latest anti virus, anti SPAM, anti malware, anti phising. Make it double if necessary because it will never enough to prevent any such incident possible & losses 8
  • 9. SOCIAL NETWORK PROTECTION • Never add unknown new friends. Always ask for confirmation to mutual friends. Leave direct basic questions message to the suspicious account • Be conservative. Limiting privacy exposure, decide how much to share. Not everybody needs yours • Never use free mail. Use private domain & email addresses or corporate account (if it’s allowed) • If something happens, report to admin, broadcast alert to all of your friends, hope you have backup, make new account & tag your old account as impersonating & fraud. Ask everybody to do it 9
  • 10. ATM & SMS PROTECTION • Knowing latest updated technology & procedures to understand weakness, loop holes, fraud tech, detect unusual process, using PIN management & one time token. Ask your banks about latest update • Knowing card types (mangnetic stripes, chip, RFID) & kind of sevices (debit/credit, ecash). Protect card physically, hiding CVV2 code, anti magnetic sleeve • Never trust. Double check in any transaction careful while in the middle of transaction, watch the EDC • Look physical environment, consider all possibilities: skimming, hidden camera, unauthorized assistance 10
  • 11. PASSWORD PROTECTION • Change password periodically, more often better & never share password to anybody for any reasons • Longer complicated combination is more stronger. Not easy to remember/reveal. Unpredicted phrase • Keep in safe secret places. Nobody’s know. Ever • Use password management application or services or one time token password services. The problem is how to make sure & to secure the token delivery channel from the system to the end user. Most of delivery channel is open public network i.e. SMS • Don’t use one for all password, use different each 11
  • 12. PORTABLE DEVICES PROTECTION • Password protected any of your rewritable portable devices (flash disk, external drive, gadget, ipod etc.). Consider to use encryption • Use the most possible, secure, limited sophisticated file system NTFS, HFS+ (MacOS), Ext2/Ext3 (Linux) etc. • Always make 3 backup, latest Anti Virus & Malware • Keep devices with you, never lend it to anybody • Beware safety surroundings physical environtment • Do highest secure wiping procedures for disposal 12
  • 13. Thank You • Ravindo Tower 17th Floor • Kebon Sirih Raya, Kav. 75 • Central Jakarta, 10340 • Phone +62 21 3192 5551 ; Fax +62 21 3193 5556 • office@idsirtii.or.id ; www.idsirtii.or.id