Cybersecurity Awareness
Created by Com-Sec
Module 1: Introduction to Security Awareness & Common Cyber Threats
Training Objectives
Our Part in Security
Phishing Awareness
Malware Infections
Introduction
Introduction: What is Cybersecurity?
Cybersecurity is the practice of safeguarding digital systems, networks, and sensitive information from cyber threats, unauthorized access, and malicious activities. It involves a range of strategies, technologies, and best practices designed to protect an organization's digital assets and maintain the confidentiality, integrity, and availability of data.
Why is Security Awareness so Important?
Security Awaress Training is a MUST!
Cybersecurity awareness training is essential to educate individuals and organizations on safeguarding sensitive information, such as personal data, financial details, proprietary business data, and confidential client information.
Types of Sensitive Information
- Personal Identifiable Information (PII) - Personal Health Information (PHI) - Credit Card Information - Social Security Numbers
Our Part in Security
Humans Are The Weakest Link
Unfortunately, human actions can often serve as the weakest link in our defense against online threats. limited awareness and gaps in understanding regarding potential online risks can lead to unintentional disclosure of sensitive information or falling victim to scams. Cyber attackers skillfully exploit tactics like phishing emails and psychological manipulation, capitalizing on our trust and emotions.
88%
of all data breaches are caused by human mistakes
Common Cyber Threats: Malware
What is Malware?
Malware, or malicious software, is a term used to describe various types of harmful software designed to disrupt, damage, or gain unauthorized access to computer systems, often encompassing viruses, trojans, worms, and spyware. These can infect computers and networks, causing data breaches, system crashes, and unauthorized access.
Common Malware Infections
VirusA malicious software program that attaches to legitimate programs or files and spreads to other computers when those files are shared or executed. Trojan Malware that disguises itself as legitimate software to deceive users into downloading or executing it, enabling unauthorized access or control over the infected system. Worms Self-replicating malware that can spread across networks and systems without needing to attach themselves to other files, often causing disruptions and consuming resources. Spyware Secretly monitors and gathers information about a user's online activities and personal data without their consent.
Common Cyber Threats: Phishing
Phishing
Phishing is a type of cyber attack in which cybercriminals send messages to individuals, typically through email, pretending to be a trusted person or entity, causing them to perform actions such as installing a malicious file, clicking a malicious link, or revealing sensitive information.
Key Phishing Methods
Email PhishingFraudulent emails that appear to be from legitimate sources. SMS Phishing (smishing) Phishing attemps conducted through text message. Voice Phishing (vishing) Phishing attemps conducted through phone calls. Social Media Phishing Social media platforms are used to execute phishing attacks.
Phishing is the most common form of cyber crime
End of Module 1
Cybersecurity Awareness Training: Module 1
Rojin Rezaei
Created on August 11, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Essential Learning Unit
View
Akihabara Learning Unit
View
Genial learning unit
View
History Learning Unit
View
Primary Unit Plan
View
Vibrant Learning Unit
View
Art learning unit
Explore all templates
Transcript
Cybersecurity Awareness
Created by Com-Sec
Module 1: Introduction to Security Awareness & Common Cyber Threats
Training Objectives
Our Part in Security
Phishing Awareness
Malware Infections
Introduction
Introduction: What is Cybersecurity?
Cybersecurity is the practice of safeguarding digital systems, networks, and sensitive information from cyber threats, unauthorized access, and malicious activities. It involves a range of strategies, technologies, and best practices designed to protect an organization's digital assets and maintain the confidentiality, integrity, and availability of data.
Why is Security Awareness so Important?
Security Awaress Training is a MUST!
Cybersecurity awareness training is essential to educate individuals and organizations on safeguarding sensitive information, such as personal data, financial details, proprietary business data, and confidential client information.
Types of Sensitive Information
- Personal Identifiable Information (PII) - Personal Health Information (PHI) - Credit Card Information - Social Security Numbers
Our Part in Security
Humans Are The Weakest Link
Unfortunately, human actions can often serve as the weakest link in our defense against online threats. limited awareness and gaps in understanding regarding potential online risks can lead to unintentional disclosure of sensitive information or falling victim to scams. Cyber attackers skillfully exploit tactics like phishing emails and psychological manipulation, capitalizing on our trust and emotions.
88%
of all data breaches are caused by human mistakes
Common Cyber Threats: Malware
What is Malware?
Malware, or malicious software, is a term used to describe various types of harmful software designed to disrupt, damage, or gain unauthorized access to computer systems, often encompassing viruses, trojans, worms, and spyware. These can infect computers and networks, causing data breaches, system crashes, and unauthorized access.
Common Malware Infections
VirusA malicious software program that attaches to legitimate programs or files and spreads to other computers when those files are shared or executed. Trojan Malware that disguises itself as legitimate software to deceive users into downloading or executing it, enabling unauthorized access or control over the infected system. Worms Self-replicating malware that can spread across networks and systems without needing to attach themselves to other files, often causing disruptions and consuming resources. Spyware Secretly monitors and gathers information about a user's online activities and personal data without their consent.
Common Cyber Threats: Phishing
Phishing
Phishing is a type of cyber attack in which cybercriminals send messages to individuals, typically through email, pretending to be a trusted person or entity, causing them to perform actions such as installing a malicious file, clicking a malicious link, or revealing sensitive information.
Key Phishing Methods
Email PhishingFraudulent emails that appear to be from legitimate sources. SMS Phishing (smishing) Phishing attemps conducted through text message. Voice Phishing (vishing) Phishing attemps conducted through phone calls. Social Media Phishing Social media platforms are used to execute phishing attacks.
Phishing is the most common form of cyber crime
End of Module 1