SlideShare a Scribd company logo
BASIC IT & CYBER SECURITY
AWARENESS TRAINING
 Basic Hardware KnowledgeBasic Hardware Knowledge
 Basic Software KnowledgeBasic Software Knowledge
 Computer Network KnowledgeComputer Network Knowledge
 Organization StructureOrganization Structure
 Information Security & AwarenessInformation Security & Awareness
 IT & ERP Support InfoIT & ERP Support Info
INDEX
2
Block Diagram of a computer
TYPES OF COMPUTER
• Personal computer: A small, single-user computer based on a
microprocessor. In addition to the microprocessor, a personal
computer has a keyboard for entering data, a monitor for displaying
information, and a storage device for saving data.
• Workstation: A powerful, single-user computer. A workstation is like
a personal computer, but it has a more powerful microprocessor and
a higher-quality monitor.
• Minicomputer : A multi-user computer capable of supporting from 10
to hundreds of users simultaneously.
• Mainframe: A powerful multi-user computer capable of supporting
many hundreds or thousands of users simultaneously.
• Supercomputer: An extremely fast computer that can perform
hundreds of millions of instructions per second.
1.CPU
2.RAM
3.ROM
Input device
4.Keyboard
5.Mouse
6.Touch pad
7.Joystick
8.Scanner
Output devices
9.Monitors and
10.Printers are mainly common output devices.
Awareness: Hardware security
1.Always make sure that only authorized users
access the computers.
2.Use system’s screen locking functionality..
3.A continuous interruptible power supply should
be provided .
4.Do not plug the computer directly to the wall
outlet
5.Don’t eat food or drink by the PC.
6.There should be no magnets near to you PC.
7.Keep your PC clean.
IT & ERP DivisionIT & ERP Division
IT InfrastructureIT Infrastructure
ERPERP
IT NetworksIT Networks
BASIC IT AND CYBER SECURITY AWARENESS
Production Server
Administration Server
Presentation Server
Web Server
Output Server
Integration Server
Enterprise Business Server
Data Warehouse Server
Workflow Server
Planning Server
Work Place Server
Licensed Microsoft office package
Infor
Software or operating system
Awareness : Software security
1.Don’t Use any third party software.
2.Dont download any software or try to use
USB device.
3.Change password after 3 months
4. If found any error contact with IT
administrator
The Computer Network is two or more computers that are connected together to
share resources such as hardware, data, and software.
LAN - Local Area Network.
WAN - Wide Area Network.
WLAN - Wireless Local Area Network.
MAN - Metropolitan Area Network.
SAN - Storage Area Network, System Area Network, Server Area Network, or
sometimes Small Area Network.
Computer Network
BASIC IT AND CYBER SECURITY AWARENESS
We have high speed backbone internet connectivity
We have backup data connectivity in branch offices
Maintain wifi network facility in all branch offices.
We use CISCO high end firewall to protect our
network and enhance the network security.
We use CISCO manageable switches & Routers to
maintain high speed LAN in corporate office and
also in branch offices.
14
Network facilityNetwork facility
• User Name
• Password
• Log in
• Log off
• Change password
• Lock Computer
User and Network Authentication
• Network Storage
• Local Storage
Storage
Awareness : Network security
•Unauthorized web usage
• Important data store in
file server
• Stop social engineering
•Personal system at work
•Unknown e-mail attachments
•Don’t use personal mail
Computer Virus
Computer virus refers to a program
which damages computer systems
and/or destroys or erases data files.
What is computer virus?
• Virus
• Worm
• Trojan Horse / Logic Bomb
• Social Engineering
• Rootkits
• Botnets / Zombies
• Logic Bomb: Malware logic executes upon certain
conditions. Program is often used for legitimate reasons.
– Software which malfunctions if maintenance fee is not paid
– Employee triggers a database erase when he is fired.
• Trojan Horse: Masquerades as beneficial program while
quietly destroying data or damaging your system.
– Download a game: Might be fun but has hidden part that emails
your password file without you knowing.
Logical bomb
Trojan Horse
• Social engineering manipulates people into performing actions or
divulging confidential information. Similar to a confidence trick or
simple fraud, the term applies to the use of deception to gain
information, commit fraud, or access computer systems.
Phone Call:
This is John,
the System
Admin. What
is your
password?
Email:
ABC Bank has
noticed a
problem with
your account…
In Person:
What ethnicity
are you? Your
mother’s maiden
name?
and have
some
software
patches
I have come
to repair your
machine…
• Independent program which replicates itself and sends copies from
computer to computer across network connections. Upon arrival the
worm may be activated to replicate.
To Joe
To Ann
To Bob
Email List:
Joe@gmail.com
Ann@yahoo.com
Bob@uwp.edu
 A botnet is a large number of compromised computers that are used to
create and send spam or viruses or flood a network with messages as a
denial of service attack.
 The compromised computers are called zombies
Security Layers
Merry Christmas
Good
Password
Merry Xmas
mErcHr2yOu
MerryChrisToYou
MerChr2You
MerryJul
MaryJul
Mary*Jul
,stuzc,sd Jq46Sjqw
(Keypad shift
Right …. Up)
(Abbreviate)
(Lengthen)
(convert vowels
to numeric)
M5rryXm1s
MXemrays
(Intertwine
Letters)
Glad*Jes*Birth
(Synonym)
1.Always update your anti-virus software
at least weekly.
2.Back up your important files and ensure
that they can be restored.
3.Change the computer's boot sequence to
always start the PC from its hard drive
Actions to prevent virus
infection
Economical impact
Chapter 8: IT & ERP Support Info
IT Network
• PABX: 32030PABX: 32030
IT Infrastructure
• PABX: 32011PABX: 32011
Business
Application
• PABX: 32021PABX: 32021
BASIC IT AND CYBER SECURITY AWARENESS
THANK YOUTHANK YOU 
31

More Related Content

PPTX
Cyber security awareness for end users
PPT
Cyber security awareness training by cyber security infotech(csi)
PPT
Cyber Security Awareness Training by Win-Pro
PPT
Employee Security Training[1]@
DOCX
Computer security and privacy
PPT
Computer security
PPTX
Internet Security
PPTX
Computer Security 101
Cyber security awareness for end users
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Awareness Training by Win-Pro
Employee Security Training[1]@
Computer security and privacy
Computer security
Internet Security
Computer Security 101

What's hot (20)

PPTX
Threats to information security
PPTX
cyber_security
PPT
11 Computer Privacy
PPTX
Basic concepts in computer security
PDF
Computer Security Threats
PPTX
Computer security and
PPTX
Computer Security Presentation
PPT
New internet security
PPTX
Computer Security and Ethics
PPTX
Computer security
PPT
Computer Security
PPT
Building An Information Security Awareness Program
PDF
Information security awareness, middle management
PPTX
Threats to Information Resources - MIS - Shimna
PPTX
Ppt on cyber security
PDF
Information Security Awareness Training
PDF
Cyber Security Awareness (Reduce Personal & Business Risk)
PPTX
Security awareness
PPT
Internet Security
PPT
1 security goals
Threats to information security
cyber_security
11 Computer Privacy
Basic concepts in computer security
Computer Security Threats
Computer security and
Computer Security Presentation
New internet security
Computer Security and Ethics
Computer security
Computer Security
Building An Information Security Awareness Program
Information security awareness, middle management
Threats to Information Resources - MIS - Shimna
Ppt on cyber security
Information Security Awareness Training
Cyber Security Awareness (Reduce Personal & Business Risk)
Security awareness
Internet Security
1 security goals
Ad

Viewers also liked (19)

PPT
General Awareness On Cyber Security
PPTX
Social Media Cyber Security Awareness Briefing
PPT
End User Security Awareness Presentation
ODP
Cyber security awareness
PPTX
Cyber security
PPTX
Cyber crime and security ppt
PPTX
Cyber Security Awareness October 2014
PPTX
Cyber awareness program
PDF
Cyber Security Awareness
PDF
National Life IT Department's Cyber Security Awareness Presentation
PPT
Introduction to Cyber Security
PPTX
Cyber security presentation
PPTX
Cybercrime.ppt
PPTX
Cyber-crime PPT
PDF
Securing your cyberspace_Watson
PDF
What has changed in Corporate Cybersecurity?
PPT
Lec 1 apln security(4pd)
PPTX
Cyber 101 for smb execs v1
PPTX
10 Critical Corporate Cyber Security Risks
General Awareness On Cyber Security
Social Media Cyber Security Awareness Briefing
End User Security Awareness Presentation
Cyber security awareness
Cyber security
Cyber crime and security ppt
Cyber Security Awareness October 2014
Cyber awareness program
Cyber Security Awareness
National Life IT Department's Cyber Security Awareness Presentation
Introduction to Cyber Security
Cyber security presentation
Cybercrime.ppt
Cyber-crime PPT
Securing your cyberspace_Watson
What has changed in Corporate Cybersecurity?
Lec 1 apln security(4pd)
Cyber 101 for smb execs v1
10 Critical Corporate Cyber Security Risks
Ad

Similar to BASIC IT AND CYBER SECURITY AWARENESS (20)

PPTX
BCE L-3omputer security Basics.pptx
PPTX
Cybersecurity Training
PPT
IT Security for the Physical Security Professional
PPTX
Week 12
DOCX
Chapter 10.0
PPT
Cb12e basic ppt ch15
PPT
Chapter 6 effects of ict on society
PPT
Module0&1 intro-foundations-b
PPT
Cyber-Security-20211013105857 (1).ppt
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPT
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cybertestqas.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-.ppt
PPT
cs0123.ppt
BCE L-3omputer security Basics.pptx
Cybersecurity Training
IT Security for the Physical Security Professional
Week 12
Chapter 10.0
Cb12e basic ppt ch15
Chapter 6 effects of ict on society
Module0&1 intro-foundations-b
Cyber-Security-20211013105857 (1).ppt
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
Awareness Security 123.pptx
USG_Security_Awareness_Primer.pptx
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
cybertestqas.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-.ppt
cs0123.ppt

BASIC IT AND CYBER SECURITY AWARENESS

  • 1. BASIC IT & CYBER SECURITY AWARENESS TRAINING
  • 2.  Basic Hardware KnowledgeBasic Hardware Knowledge  Basic Software KnowledgeBasic Software Knowledge  Computer Network KnowledgeComputer Network Knowledge  Organization StructureOrganization Structure  Information Security & AwarenessInformation Security & Awareness  IT & ERP Support InfoIT & ERP Support Info INDEX 2
  • 3. Block Diagram of a computer
  • 4. TYPES OF COMPUTER • Personal computer: A small, single-user computer based on a microprocessor. In addition to the microprocessor, a personal computer has a keyboard for entering data, a monitor for displaying information, and a storage device for saving data. • Workstation: A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and a higher-quality monitor. • Minicomputer : A multi-user computer capable of supporting from 10 to hundreds of users simultaneously. • Mainframe: A powerful multi-user computer capable of supporting many hundreds or thousands of users simultaneously. • Supercomputer: An extremely fast computer that can perform hundreds of millions of instructions per second.
  • 5. 1.CPU 2.RAM 3.ROM Input device 4.Keyboard 5.Mouse 6.Touch pad 7.Joystick 8.Scanner Output devices 9.Monitors and 10.Printers are mainly common output devices.
  • 6. Awareness: Hardware security 1.Always make sure that only authorized users access the computers. 2.Use system’s screen locking functionality.. 3.A continuous interruptible power supply should be provided . 4.Do not plug the computer directly to the wall outlet 5.Don’t eat food or drink by the PC. 6.There should be no magnets near to you PC. 7.Keep your PC clean.
  • 7. IT & ERP DivisionIT & ERP Division IT InfrastructureIT Infrastructure ERPERP IT NetworksIT Networks
  • 9. Production Server Administration Server Presentation Server Web Server Output Server Integration Server Enterprise Business Server Data Warehouse Server Workflow Server Planning Server Work Place Server
  • 10. Licensed Microsoft office package Infor Software or operating system
  • 11. Awareness : Software security 1.Don’t Use any third party software. 2.Dont download any software or try to use USB device. 3.Change password after 3 months 4. If found any error contact with IT administrator
  • 12. The Computer Network is two or more computers that are connected together to share resources such as hardware, data, and software. LAN - Local Area Network. WAN - Wide Area Network. WLAN - Wireless Local Area Network. MAN - Metropolitan Area Network. SAN - Storage Area Network, System Area Network, Server Area Network, or sometimes Small Area Network. Computer Network
  • 14. We have high speed backbone internet connectivity We have backup data connectivity in branch offices Maintain wifi network facility in all branch offices. We use CISCO high end firewall to protect our network and enhance the network security. We use CISCO manageable switches & Routers to maintain high speed LAN in corporate office and also in branch offices. 14 Network facilityNetwork facility
  • 15. • User Name • Password • Log in • Log off • Change password • Lock Computer User and Network Authentication
  • 16. • Network Storage • Local Storage Storage
  • 17. Awareness : Network security •Unauthorized web usage • Important data store in file server • Stop social engineering •Personal system at work •Unknown e-mail attachments •Don’t use personal mail
  • 19. Computer virus refers to a program which damages computer systems and/or destroys or erases data files. What is computer virus?
  • 20. • Virus • Worm • Trojan Horse / Logic Bomb • Social Engineering • Rootkits • Botnets / Zombies
  • 21. • Logic Bomb: Malware logic executes upon certain conditions. Program is often used for legitimate reasons. – Software which malfunctions if maintenance fee is not paid – Employee triggers a database erase when he is fired. • Trojan Horse: Masquerades as beneficial program while quietly destroying data or damaging your system. – Download a game: Might be fun but has hidden part that emails your password file without you knowing. Logical bomb Trojan Horse
  • 22. • Social engineering manipulates people into performing actions or divulging confidential information. Similar to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit fraud, or access computer systems. Phone Call: This is John, the System Admin. What is your password? Email: ABC Bank has noticed a problem with your account… In Person: What ethnicity are you? Your mother’s maiden name? and have some software patches I have come to repair your machine…
  • 23. • Independent program which replicates itself and sends copies from computer to computer across network connections. Upon arrival the worm may be activated to replicate. To Joe To Ann To Bob Email List: Joe@gmail.com Ann@yahoo.com Bob@uwp.edu
  • 24.  A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.  The compromised computers are called zombies
  • 26. Merry Christmas Good Password Merry Xmas mErcHr2yOu MerryChrisToYou MerChr2You MerryJul MaryJul Mary*Jul ,stuzc,sd Jq46Sjqw (Keypad shift Right …. Up) (Abbreviate) (Lengthen) (convert vowels to numeric) M5rryXm1s MXemrays (Intertwine Letters) Glad*Jes*Birth (Synonym)
  • 27. 1.Always update your anti-virus software at least weekly. 2.Back up your important files and ensure that they can be restored. 3.Change the computer's boot sequence to always start the PC from its hard drive Actions to prevent virus infection
  • 29. Chapter 8: IT & ERP Support Info IT Network • PABX: 32030PABX: 32030 IT Infrastructure • PABX: 32011PABX: 32011 Business Application • PABX: 32021PABX: 32021
  • 31. THANK YOUTHANK YOU  31

Editor's Notes

  • #21: Each of these will be covered thoroughly in the slides that follow.
  • #23: Social Engineering can occur in-person, over the phone, in emails or fake web pages. Social Engineering: non-technical or low-technology means - such as lies, impersonation, tricks, bribes, blackmail, and threats - used to attack information systems. The next two slides discuss two types of Social Engineering: phishing and pharming.
  • #24: Worms Worms are more sophisticated viruses that can replicate automatically and send themselves to other computers by first taking control of certain software programs on your PC, such as email.
  • #25: When your computer becomes infected, it is likely to become a bot. Because attacks are international, they are hard to eliminate. Zombie: a compromised computer which may host pornography, illegal music and/or movies Botnet: a “zombie army,” or collection of compromised computers, zombies, used to send out spam, viruses or distributed denial of service attacks.
  • #27: Bad passwords on top, good passwords on bottom. Start with a word(s) and do some changes such as: abbreviating, keypad shift, intertwine letters, synonyms, etc.