SlideShare a Scribd company logo
SECURITY 
IT Essentials 5.0
Objectives 
• Understand why security is 
important 
• Describe security threats 
• Identify security procedures 
• Identify common preventive 
maintenance techniques for 
security
The Importance of Security 
• Private information, company 
secrets, financial data, computer 
equipment, and items of national 
security are placed at risk if 
proper security procedures are 
not followed. 
• A technician’s primary 
responsibilities include data and 
network security
Security Threats 
Internal threats 
• Employees can cause a 
malicious threat or an accidental 
threat. 
External Threats 
• Outside users can attack in an 
unstructured or structured way.
Types of attacks to computer security 
Physical 
• Theft, damage, or destruction to 
computer equipment. 
Data 
• Removal, corruption, denial of 
access, unauthorized access, or 
theft of information.
Adware, 
Spyware 
and 
Phishing 
• Adware - software program that displays 
advertising on your computer, often displayed 
in a pop-up window. 
• Spyware - distributed without user intervention 
or knowledge, monitors activity on the 
computer. 
• Phishing - attacker pretends to represent a 
legitimate organization and asks for verification 
of victims information such as password or 
username
Viruses, 
Worms 
• A virus is a software code that is deliberately 
created by an attacker. Viruses may collect 
sensitive information or may alter or destroy 
information. 
• A worm is a self-replicating program that uses 
the network to duplicate its code to the hosts 
on the network. At a minimum, worms consume 
bandwidth in a network.
Trojans & 
Rootkits • A Trojan is malicious software that is disguised 
as a legitimate program. It is named for its 
method of getting past computer defenses by 
pretending to be something useful. 
• A Rootkit is a malicious program that gains full 
access to a computer system. Often, a direct 
attack on a system using a known vulnerability 
or password.
Spam & Pop-ups 
• Spam is unsolicited email that 
can be used to send harmful 
links or deceptive content. 
• Popups are windows that 
automatically open and are 
designed to capture your 
attention and lead you to 
advertising sites.
Social 
Engineering 
A social engineer is a person who is able to gain 
access to equipment or a network by tricking 
people into providing the necessary access 
information. 
To protect against social engineering: 
• Never give out a password. 
• Never post your password. 
• Lock your computer when you leave your 
desk. 
• Do not let anyone follow you through a door 
that requires an access card
Security Policy 
A security policy should describe how a company 
addresses security issues. 
Questions to answer in writing local security policy: 
• What assets require protection? 
• What are the possible threats? 
• What should be done in the event of a security 
breach? 
• What training will be in place to educate the end 
users?
Usernames and Passwords 
• Change the default username for 
accounts such as administrator or 
guest. 
• Network admin defines a naming 
convention for usernames. 
• Three levels of password 
protection are recommended: 
• BIOS 
• Login 
• Network
Guidelines for creating strong passwords 
• Length - Use at least eight characters. 
• Complexity - Include letters, 
numbers, symbols, and punctuation, 
not just common letters and 
characters. 
• Variation - Change passwords often. 
Set a reminder to change the 
passwords every three to four months. 
• Variety - Use a different password for 
each site or computer that you use.
Security Basics

More Related Content

PPT
Web Application Security Testing
PPTX
Security Information and Event Management (SIEM)
PDF
Threat Hunting
PDF
Global Cyber Threat Intelligence
PPTX
Hyphenet Security Awareness Training
PPTX
Ethical Hacking n VAPT presentation by Suvrat jain
PDF
Breach and attack simulation tools
Web Application Security Testing
Security Information and Event Management (SIEM)
Threat Hunting
Global Cyber Threat Intelligence
Hyphenet Security Awareness Training
Ethical Hacking n VAPT presentation by Suvrat jain
Breach and attack simulation tools

What's hot (20)

PPTX
Cyber threats landscape and defense
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PDF
SIEM and Threat Hunting
PPT
The security sdlc
PDF
Building Security Operation Center
PPTX
Threat Hunting - Moving from the ad hoc to the formal
PPTX
Cyber Security(Password Cracking Presentation).pptx
PPTX
Cyber security
PPTX
Threat hunting foundations: People, process and technology.pptx
PDF
Information Security Awareness
PPTX
MITRE ATT&CK framework
PDF
Introduction to Web Application Penetration Testing
PPTX
Cybersecurity
PPTX
Physical security
PPTX
Security operation center (SOC)
PPSX
Introduction to threat_modeling
PDF
Building an effective Information Security Roadmap
PDF
Ch 10: Hacking Web Servers
PPTX
Web security
Cyber threats landscape and defense
PHDays 2018 Threat Hunting Hands-On Lab
Security Training: #3 Threat Modelling - Practices and Tools
SIEM and Threat Hunting
The security sdlc
Building Security Operation Center
Threat Hunting - Moving from the ad hoc to the formal
Cyber Security(Password Cracking Presentation).pptx
Cyber security
Threat hunting foundations: People, process and technology.pptx
Information Security Awareness
MITRE ATT&CK framework
Introduction to Web Application Penetration Testing
Cybersecurity
Physical security
Security operation center (SOC)
Introduction to threat_modeling
Building an effective Information Security Roadmap
Ch 10: Hacking Web Servers
Web security
Ad

Viewers also liked (19)

PPTX
Mobile Security Basics
PPTX
Computer security basics
ODP
Plmce mysql-101-security-basics
PPT
Network security chapter 6 and 7 internet architecture
PDF
Security Basics - Internet Safety
PPT
Network basics
PPTX
Network security & cryptography
PPT
Network Basics & Internet
PPT
Internet architecture
PPTX
Cryptography
PPTX
Cryptography
PDF
What exactly is the "Internet of Things"?
PPT
Basic concepts of computer Networking
PDF
IoT architecture
PPTX
Cryptography and network security
PPTX
Introduction to computer network
PPT
Internet of Things and its applications
PPT
Network Security Threats and Solutions
PPT
Network Security and Cryptography
Mobile Security Basics
Computer security basics
Plmce mysql-101-security-basics
Network security chapter 6 and 7 internet architecture
Security Basics - Internet Safety
Network basics
Network security & cryptography
Network Basics & Internet
Internet architecture
Cryptography
Cryptography
What exactly is the "Internet of Things"?
Basic concepts of computer Networking
IoT architecture
Cryptography and network security
Introduction to computer network
Internet of Things and its applications
Network Security Threats and Solutions
Network Security and Cryptography
Ad

Similar to Security Basics (20)

PPTX
Information security
PPTX
Cyber security
PPTX
BAIT1003 Chapter 11
PPTX
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
PPTX
Computer Security Presentation
PPTX
Lecture 3 security threats in data analysis.pptx
PPTX
Cysecc.pptx
PPTX
attack vectors by chimwemwe.pptx
PDF
Information & cyber security, Winter training ,bsnl. online
PDF
Information cyber security
PPT
11 Computer Privacy
PPTX
Cyber security detailed ppt and understand
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
PPTX
Network security and firewalls
PPTX
Protection from hacking attacks
PPTX
Computer Security.pptx
PPTX
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
PPTX
Computer Security risks Shelly
PPTX
hacking ,bluetooth
PPTX
hgfhvgggggggggggggggggggggggpresent.pptx
Information security
Cyber security
BAIT1003 Chapter 11
AN INTRODUCTION TO COMPUTER SECURITY TECHNIQUES.pptx
Computer Security Presentation
Lecture 3 security threats in data analysis.pptx
Cysecc.pptx
attack vectors by chimwemwe.pptx
Information & cyber security, Winter training ,bsnl. online
Information cyber security
11 Computer Privacy
Cyber security detailed ppt and understand
Cyber Security and Data Privacy in Information Systems.pptx
Network security and firewalls
Protection from hacking attacks
Computer Security.pptx
AHADCYBER SAFETY AHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SAFETYAHADCYBER SA...
Computer Security risks Shelly
hacking ,bluetooth
hgfhvgggggggggggggggggggggggpresent.pptx

Recently uploaded (20)

DOCX
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
PPTX
Relationship Management Presentation In Banking.pptx
DOCX
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
PDF
Swiggy’s Playbook: UX, Logistics & Monetization
PPTX
Human Mind & its character Characteristics
PDF
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
PPTX
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
PPTX
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
PPTX
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
DOC
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
PPTX
ART-APP-REPORT-FINctrwxsg f fuy L-na.pptx
PPTX
Introduction-to-Food-Packaging-and-packaging -materials.pptx
PPTX
Emphasizing It's Not The End 08 06 2025.pptx
PPTX
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
PPT
The Effect of Human Resource Management Practice on Organizational Performanc...
PPTX
Intro to ISO 9001 2015.pptx wareness raising
PPTX
The Effect of Human Resource Management Practice on Organizational Performanc...
PDF
Presentation1 [Autosaved].pdf diagnosiss
PDF
natwest.pdf company description and business model
PPTX
water for all cao bang - a charity project
"Project Management: Ultimate Guide to Tools, Techniques, and Strategies (2025)"
Relationship Management Presentation In Banking.pptx
ENGLISH PROJECT FOR BINOD BIHARI MAHTO KOYLANCHAL UNIVERSITY
Swiggy’s Playbook: UX, Logistics & Monetization
Human Mind & its character Characteristics
Nykaa-Strategy-Case-Fixing-Retention-UX-and-D2C-Engagement (1).pdf
Role and Responsibilities of Bangladesh Coast Guard Base, Mongla Challenges
S. Anis Al Habsyi & Nada Shobah - Klasifikasi Hambatan Depresi.pptx
PHIL.-ASTRONOMY-AND-NAVIGATION of ..pptx
学位双硕士UTAS毕业证,墨尔本理工学院毕业证留学硕士毕业证
ART-APP-REPORT-FINctrwxsg f fuy L-na.pptx
Introduction-to-Food-Packaging-and-packaging -materials.pptx
Emphasizing It's Not The End 08 06 2025.pptx
Non-Verbal-Communication .mh.pdf_110245_compressed.pptx
The Effect of Human Resource Management Practice on Organizational Performanc...
Intro to ISO 9001 2015.pptx wareness raising
The Effect of Human Resource Management Practice on Organizational Performanc...
Presentation1 [Autosaved].pdf diagnosiss
natwest.pdf company description and business model
water for all cao bang - a charity project

Security Basics

  • 2. Objectives • Understand why security is important • Describe security threats • Identify security procedures • Identify common preventive maintenance techniques for security
  • 3. The Importance of Security • Private information, company secrets, financial data, computer equipment, and items of national security are placed at risk if proper security procedures are not followed. • A technician’s primary responsibilities include data and network security
  • 4. Security Threats Internal threats • Employees can cause a malicious threat or an accidental threat. External Threats • Outside users can attack in an unstructured or structured way.
  • 5. Types of attacks to computer security Physical • Theft, damage, or destruction to computer equipment. Data • Removal, corruption, denial of access, unauthorized access, or theft of information.
  • 6. Adware, Spyware and Phishing • Adware - software program that displays advertising on your computer, often displayed in a pop-up window. • Spyware - distributed without user intervention or knowledge, monitors activity on the computer. • Phishing - attacker pretends to represent a legitimate organization and asks for verification of victims information such as password or username
  • 7. Viruses, Worms • A virus is a software code that is deliberately created by an attacker. Viruses may collect sensitive information or may alter or destroy information. • A worm is a self-replicating program that uses the network to duplicate its code to the hosts on the network. At a minimum, worms consume bandwidth in a network.
  • 8. Trojans & Rootkits • A Trojan is malicious software that is disguised as a legitimate program. It is named for its method of getting past computer defenses by pretending to be something useful. • A Rootkit is a malicious program that gains full access to a computer system. Often, a direct attack on a system using a known vulnerability or password.
  • 9. Spam & Pop-ups • Spam is unsolicited email that can be used to send harmful links or deceptive content. • Popups are windows that automatically open and are designed to capture your attention and lead you to advertising sites.
  • 10. Social Engineering A social engineer is a person who is able to gain access to equipment or a network by tricking people into providing the necessary access information. To protect against social engineering: • Never give out a password. • Never post your password. • Lock your computer when you leave your desk. • Do not let anyone follow you through a door that requires an access card
  • 11. Security Policy A security policy should describe how a company addresses security issues. Questions to answer in writing local security policy: • What assets require protection? • What are the possible threats? • What should be done in the event of a security breach? • What training will be in place to educate the end users?
  • 12. Usernames and Passwords • Change the default username for accounts such as administrator or guest. • Network admin defines a naming convention for usernames. • Three levels of password protection are recommended: • BIOS • Login • Network
  • 13. Guidelines for creating strong passwords • Length - Use at least eight characters. • Complexity - Include letters, numbers, symbols, and punctuation, not just common letters and characters. • Variation - Change passwords often. Set a reminder to change the passwords every three to four months. • Variety - Use a different password for each site or computer that you use.