Sie sind auf Seite 1von 31

BASIC IT & CYBER SECURITY

AWARENESS TRAINING
INDEX
 Basic Hardware Knowledge
 Basic Software Knowledge
 Computer Network Knowledge
 Organization Structure
 Information Security & Awareness
 IT & ERP Support Info

2
Block Diagram of a computer
TYPES OF COMPUTER
• Personal computer: A small, single-user computer based on a
microprocessor. In addition to the microprocessor, a personal
computer has a keyboard for entering data, a monitor for displaying
information, and a storage device for saving data.
• Workstation: A powerful, single-user computer. A workstation is like
a personal computer, but it has a more powerful microprocessor and
a higher-quality monitor.
• Minicomputer : A multi-user computer capable of supporting from 10
to hundreds of users simultaneously.
• Mainframe: A powerful multi-user computer capable of supporting
many hundreds or thousands of users simultaneously.
• Supercomputer: An extremely fast computer that can perform
hundreds of millions of instructions per second.
1.CPU
2.RAM
3.ROM
Input device
4.Keyboard
5.Mouse
6.Touch pad
7.Joystick
8.Scanner
Output devices
9.Monitors and
10.Printers are mainly common output devices.
Awareness: Hardware security
1.Always make sure that only authorized users
access the computers.
2.Use system’s screen locking functionality..
3.A continuous interruptible power supply should
be provided .
4.Do not plug the computer directly to the wall
outlet
5.Don’t eat food or drink by the PC.
6.There should be no magnets near to you PC.
7.Keep your PC clean.
IT & ERP Division

IT Networks IT Infrastructure

ERP
Production Server
Administration Server
Presentation Server
Web Server
Output Server
Integration Server
Enterprise Business Server
Data Warehouse Server
Workflow Server
Planning Server
Work Place Server
Software or operating system
Licensed Microsoft office package
Infor
Awareness : Software security
1.Don’t Use any third party software.
2.Dont download any software or try to use
USB device.
3.Change password after 3 months
4. If found any error contact with IT
administrator
Computer Network
The Computer Network is two or more computers that are connected together to
share resources such as hardware, data, and software.

LAN - Local Area Network.


WAN - Wide Area Network.
WLAN - Wireless Local Area Network.
MAN - Metropolitan Area Network.
SAN - Storage Area Network, System Area Network, Server Area Network, or
sometimes Small Area Network.
Network facility

We have high speed backbone internet connectivity

We have backup data connectivity in branch offices

Maintain wifi network facility in all branch offices.

We use CISCO high end firewall to protect our


network and enhance the network security.

We use CISCO manageable switches & Routers to


maintain high speed LAN in corporate office and
also in branch offices.

14
User and Network Authentication
• User Name
• Password
• Log in
• Log off
• Change password
• Lock Computer
Storage
• Network Storage
• Local Storage
Awareness : Network security
• Unauthorized web usage
• Important data store in
file server
• Stop social engineering
• Personal system at work
• Unknown e-mail attachments
• Don’t use personal mail
Computer Virus
What is computer virus?

Computer virus refers to a program


which damages computer systems
and/or destroys or erases data files.
• Virus
• Worm
• Trojan Horse / Logic Bomb
• Social Engineering
• Rootkits
• Botnets / Zombies
Logical bomb
Trojan Horse
• Logic Bomb: Malware logic executes upon certain
conditions. Program is often used for legitimate reasons.
– Software which malfunctions if maintenance fee is not paid
– Employee triggers a database erase when he is fired.

• Trojan Horse: Masquerades as beneficial program while


quietly destroying data or damaging your system.
– Download a game: Might be fun but has hidden part that emails
your password file without you knowing.
• Social engineering manipulates people into performing actions or
divulging confidential information. Similar to a confidence trick or
simple fraud, the term applies to the use of deception to gain
information, commit fraud, or access computer systems.
Email:
Phone Call: ABC Bank has
This is John, noticed a
the System problem with
Admin. What your account… I have come
is your to repair
In Person:
password? your
What ethnicity
are you? Your and have machine…
mother’s some
maiden name? software
patches
• Independent program which replicates itself and sends copies from
computer to computer across network connections. Upon arrival the
worm may be activated to replicate.

To Joe
To Ann
To Bob

Email List:
Joe@gmail.com
Ann@yahoo.com
Bob@uwp.edu
 A botnet is a large number of compromised computers that are
used to create and send spam or viruses or flood a network
with messages as a denial of service attack.
 The compromised computers are called zombies
Security Layers
Merry Christmas

(Lengthen)
Merry Xmas

MerryChrisToYou
(Synonym)
(Intertwine
MerryJul
Letters) (convert vowels (Abbreviate)
to numeric)
MaryJul
(Keypad shift MerChr2You
Right …. Up)
MXemrays
Glad*Jes*Birth
M5rryXm1s Mary*Jul
Good
,stuzc,sd Jq46Sjqw
Password mErcHr2yOu
Actions to prevent virus
infection
1.Always update your anti-virus software at
least weekly.
2.Back up your important files and ensure
that they can be restored.
3.Change the computer's boot sequence to
always start the PC from its hard drive
Economical impact
Chapter 8: IT & ERP Support Info

IT Network
• PABX: 32030

IT Infrastructure
• PABX: 32011

Business • PABX: 32021


Application
THANK YOU 

31

Das könnte Ihnen auch gefallen