IT L3

Cards (22)

  • Cybersecurity
    The practice of protecting computer systems, networks, and digital data from theft, damage, or unauthorized access
  • Cybersecurity
    • It encompasses a wide range of technologies, processes, and practices designed to safeguard digital information and assets from various threats and vulnerabilities
  • Cybersecurity awareness
    Educating individuals, employees, and the general public about the importance of cybersecurity, potential threats, and best practices to protect digital assets and information
  • Key aspects of cybersecurity awareness
    • Training and Education
    • Phishing Awareness
    • Password Security
    • Multi-Factor Authentication (MFA)
    • Safe Internet Browsing
    • Data Privacy
    • Mobile Device Security
    • Social Engineering Awareness
    • Reporting Incidents
    • Regular Updates and Patching
    • BYOD (Bring Your Own Device) Policies
    • Safe Email Practices
    • Secure File Sharing
    • Regular Security Awareness Assessments
    • Crisis Communication
  • Training and Education
    1. Providing regular cybersecurity training and education programs
    2. Teaching individuals how to recognize phishing emails, identify suspicious activities, and use strong, unique passwords
  • Phishing
    A common method used by cybercriminals to trick individuals into revealing sensitive information
  • Phishing Awareness
    Teaching people how to spot phishing attempts and not click on suspicious links or download attachments
  • Password Security
    • Encouraging the use of strong and unique passwords for each online account
    • Passwords should be regularly updated, and the use of password managers is recommended to keep track of complex passwords
  • Multi-Factor Authentication (MFA)

    Adds an extra layer of security by requiring users to provide multiple forms of verification, such as a password and a one-time code sent to their mobile device
  • Safe Internet Browsing
    Educating users about the importance of HTTPS, avoiding untrustworthy websites, and not downloading software or files from unknown sources
  • HTTPS
    Uses TSL (SSL) to encrypt normal HTTP requests and responses
  • Data Privacy
    • Protecting personal and sensitive information
    • Encouraging individuals to limit the amount of personal information shared online and to review privacy settings on social media platforms and other online accounts
  • Mobile Device Security
    • Mobile devices are susceptible to cyber threats
    • Users should be aware of the risks and practice secure mobile device usage, such as keeping devices updated and not connecting to unsecured Wi-Fi networks
  • Social Engineering
    Techniques used by cybercriminals to gain access to information through manipulation and deception
  • Social Engineering Awareness
    Teaching individuals to verify the identity of people and organizations online
  • Reporting Incidents
    Making it clear how to report cybersecurity incidents or suspicious activities within the organization
  • Regular Updates and Patching
    Keeping software, operating systems, and applications up-to-date with the latest security patches and updates
  • BYOD (Bring Your Own Device) Policies

    Establishing clear BYOD policies and educating employees on the security measures they should follow when using personal devices for work purposes
  • Safe Email Practices
    1. Training individuals not to open email attachments or click on links from unknown or untrusted sources
    2. Verifying the authenticity of emails from unfamiliar senders before taking any action
  • Secure File Sharing
    Encouraging the use of secure file sharing methods and tools, such as encrypted file transfer and secure cloud storage services
  • Regular Security Awareness Assessments
    Conducting simulated phishing exercises and other security awareness assessments to gauge the effectiveness of training programs and identify areas that need improvement
  • Crisis Communication
    Preparing individuals for how to respond in case of a cybersecurity incident, including who to contact and what steps to take to mitigate damage