Data Security PPT - Version 1
Data Security PPT - Version 1
Security &
Privacy
Internal
1 7
2 6
Table of
3 Contents 5
Data Privacy 2
Internal
Data or Information Security Basics
When data is processed, organized, structured or presented in a given context so as it make it useful.
Information
Example: Percentage of weather as cold or warm is an information
In terms of security
Information
Internal
Three Pillars of Data or Information security
Internal
Understanding the basics
Assets Any tangible or intangible thing or characteristics that has value to the organization
Hurricane
An unwanted incident, which may cause
Software harm to the system by utilizing the
vulnerabilities in it
services
Risk
Loss of Data or
Hardware information and
Risk is commonly defined as exposure to disruption in business as a
harm or loss resulting from breaches or result
attacks on information systems
Internal
Common Threats
Internal
How to Identify Phishing Emails
• Seem to be from legitimate companies like banks, internet service providers, credit
card companies, etc.
• Are unsolicited (you didn't ask for it; they just sent it to you)
• Offer something seemingly valuable, like a prize or discount - Use poor spelling
and grammar
• Have strange email addresses or typos in the email address - Have crazy titles
Internal
Common Phishing Email Examples
Phishing:- A seemingly trustworthy entity asks for sensitive information such as SSN, credit card numbers, login IDs or passwords via
email.
Internal
Tips for Avoiding Phishing Scams
First, don't click on suspicious links in your email, especially those that ask for personal
information. If you're not sure whether an email is legitimate, don't open it...and
definitely don't click on its links.
If possible, contact the company or organization directly through a known and trusted
channel before responding to any emails asking for personal information
Finally, pay attention to the tone and content of the email. Is it unusually urgent? Are
there misspelled words? Is there an offer that seems too good to be true? If it seems
"phishy", it probably is.
Internal
Malware
Any program or file that is harmful to a computer user
Internal
Ransomware
Ransomware is a form of malware designed to encrypt files on a device, rendering any files and systems that
rely on them unusable. Malicious actors then demand ransom in exchange for decryption.
Best practices:
Internal
Consequences of Data security breach
Organization: Individual:
• Direct and indirect financial loss • Breach of bank account or credit card information
• Competitive edge in the industry jeopardized • Legal ramification
• Business disruption • Damage to reputation
• Damage to reputation • Compromise of personal information and credentials
• Legal or regulatory penalty or fine • Financial loss
• Loss of market and customer confidence • Lead to non material damage
• Loss of intellectual property
• Loss of customer, employee data
Internal
Data Security Strategy
Data Privacy 13
Internal
How do organizations protect data?
Data Privacy 14
Internal
Secure Password
Internal
This includes safeguarding data
against various risks such as
What is Data Privacy? hacking, data breaches, identity
theft, and unauthorized
surveillance
Data Privacy 16
Internal
Why is Data Privacy Important?
Protection of Personal
Ethical Data Practices
Information
Data Privacy 17
Internal
Data Privacy vs Data Protection
Refers to the proper handling of sensitive data, including when and Focuses on protecting data from unauthorized access, theft, or
how personal data can be collected and shared. It's about the corruption. It encompasses tools and practices like encryption,
ethical and responsible use of data. password management, and network monitoring..
Data Privacy 18
Internal
Key takeaways – Do’s
Sign off or lock your screen when you leave Only use organization email for business
1 your desk 6 purpose
Internal
Key takeaways – Don’ts
Do not leave the computer or laptop Access any information that you do not
1 unattended or unsecured 5 have a need to know
Internal
Internal
Internal