IS Awareness Flashcards
Slide 1 - Information Security Awareness
What is Information Security?
What is Information?
Why do you think it needs Security?
What is Information?
Information is that which gives a sense of understanding on something. Something that people can learn, know about.
For us information is an asset and it is essential to an organization’s business.
Example: Newspaper contains information about world, politics, sports, media, science. etc.
Customer Records contains information of person, bank information, services purchased etc.
Now that we know what is Information. Why do you think it needs Security?
Slide 2: Taking Responsibility and protecting Information and assets entrusted.
Now that we know what is Information. Why do you think it needs Security?
Any information that can lead to misuse or which can imply destruction or damage of persons or organization or technology etc. and it needs to be protected or secured.
We that is each of us should take responsibility and protect information and assets which are given to us against unauthorized use or access. Which ensures information security.
Slide 3: Why should we know this?
Most security breach analysis data shows that 90% of all cases of identity theft have occurred due to poor password security or opening spam emails or phishing emails.
Over one third of all IT security Incidents are caused by Phishing attacks
48% of all IT security incidents are caused by Human Error
Average cost of data breach is 3.86 million dollars.
For example: there was recent security breach occurred with Identity Management services provider company called OKTA, The hackers have stolen an administrator credential and have accessed to sensitive information on their customer support platforms. the hackers tried to use those information to hack their clients.
Once they have announced the data breach to the public, the company’s reputation got damaged, share prices fell down around 21%, lost market value of 2 billion.
Therefore, We can say Security vulnerabilities are not just caused by machines or systems.
We play an important role of managing, operating these machines. Ultimately Machines just follow or do the set of instructions we give them.
So let us not be the weakest links and fail at Information Security.
Slide 4: What needs to be Protected?
So what do you think we need to protect?
What do we at Accenture have to Protect ?
- Accenture Data
a. Examples: Pricing Information, Procurement data, financial data, Org strategic plans, trade secrets, Client presentations or information etc. - Client Data
a. Client Business, customer information, clients internal information, sensitive data, formulas and trade secrets (software code, designs, unique business processes, etc.) - Information assets or technologies
a. Laptop tokens, smartphones, tablets, documents etc. which could accenture owned or client owned.
Slide 5: Pillars of Information Security
3 Pillars of Information Security or the driving focus of information security?
Can anybody guess? what the 3 pillars are?
- Confidentiality
Confidentiality is ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes.
a. Right Person - Integrity
Protecting the accuracy of completeness of information/assets.
a. Right information - Availability
Information or property of being accessible and usable as needed by an authorized entity.
a. Right time.
Slide 6: Where do I START?
Where do you think is our First line of Security is Or What is our First Line of Security?
Passwords
Is the first line of Security, we protect all our assets with passwords - laptops, devices, bank accounts, lockers, emails etc.
Slide 7: Protect your Password
How should we configure our password ?
- Passwords unique
- Never reuse passwords
- Do not use Accenture credentials for personal websites
- Do not write down passwords
- Always change default passwords (especially for shared/admin accounts)
Slide 8: What next?
Let’s say now that we have created a good strong passwords, what should we do Next or what should we use it for?
Protect the DATA.
What Data?
Now that we have different types of data, data can be non-business, non-sensitive or you may have data of no values or use-case, the data which is widely available in the internet. Does that require password protection?
Slide 9: Let’s Classify?
Not every information/data needs to be protected. Certainly we need “Classify” or Categorize the Data.
In Accenture, we have four different classifications to protect data? Does anybody know that?
1. Restricted
2. Highly Confidential
3. Confidential
4. Unrestricted
Slide 10: Let’s use Permissions?
We have classified information, we need to have proper tools to protect.
In Accenture we have Permissions tool enabled in mostly used Microsoft Applications such as Outlook and Office Applications.
Levels of Encryption
1. Do not forward
2. Internal use Editable
3. Internal use with Contractors
4. Internal use Read only
5. Everyone has full Control (unencrypted)
You can see the Encrypt/Sensitivity Option available in Draft Mail box and options to 4 different classifications we talked about earlier.
Why should we use Permissions?
1. When we use permissions it will encrypt the message, setting restrictions and controls.
2. Limit access
3. You can send external emails with permissions, so the message stays encrypted and only the recipient able to read it.
4. Control - read, forward, save, modify, print or copy etc.
5. Retains protection even after a document is downloaded.
Slide 11: Avoid getting Phished?
Are you all aware of what the term phishing means?
- Phishing
- One third of security incidents are
Question?
- Social Engineering Technique
- Sophisticated phishing - Targeted phishing.
- Keep an eye for these indicators
a. Do i Know the Sender
b. Seem Legitimate
c. Request Something
d. Suspicious Links - Report Phishing
- Forward to Spam
- Note - PPP Program
Slide 12: Use Approved Software and storage
- Only use Accenture or Client approved collabration tools
- Do not put sensitive information on personal devices or personal emails
- Do not store or transmit sensitive internal information via client systems
Slide 13: Guidelines for Zoom Software
- Policy 57 strictly prohibits use of personal accounts to conduct business.
- Assume zoom is unprotected - no sensitive accenture information files or personal information
- Only install zoom from trusted sources
- Do not click links from unknown or untrusted sources, zoom lacks security controls to protect malicious links.
Slide 15: Portect your devices
- Follow CDP guidelines when using devices
- Lock your screens
- Perform reconciliation of client provided devices
- Get client devices approved of TPRA
Slide 16: Comply with workstation Requirements
- Restart your system at least once a week.
- Do not install any software without an appropriate NSSR
- Use our tech support channels for any tech issues
a. protect my Tech
b. MyTech Chat bot
c. Tech self- support.accenture.com