Cyber Security Awareness
Cyber Security Awareness
HEADQUARTERS
301 (NEC) COMMUNITY DEFENSE CENTER, 3RD RCDG, RESCOM, PA
Camp BGen Manuel B Tinio, Cabanatuan City
CYBER SECURITY
AWARENESS
Honor. Patriotism. Duty
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
LESSON REFERENCES
• https://www.webroot.com/us/en/busine
ss/resources/cybersecurity-awareness-
training-ppt
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
OUTCOME OBJECTIVES
1. identify the situations in which it is important
to make contact;
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
OUTCOME OBJECTIVES
7. recognize that information is an important part of the
nation's critical infrastructure;
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Passwords
Passwords
Passwords are important tools protecting VA
information systems. They ensure you have access to
the information you need.
Keep your password secret to protect yourself and your
work. If you have several passwords, it is permissible to
record and store them in a safe place, to which only
you have access.
Passwords can be easily stolen or duplicated if
constructed poorly. Most password thefts occur as a
result of poorly constructed passwords or social
engineering. We’ll discuss social engineering later in
this course.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Passwords
Password must:
Be constructed of at least eight characters (i.e., Gabc123&).
Use at least three of the following four kinds of characters:
Upper case letters (ABC...)
Lower-case letters (...xyz)
Numbers (0123456789)
Special characters," such as #, &, *, or @.
Be changed at least every 90 days.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Poor Password
Construction
Many factors can contribute to poor passwords. Some of
the most notable are:
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Risk Awareness
Username and password combinations, the primary method used, provide a
guarantee that you are who you say you are. Your username and password also limit
you to only actions within your level of authorization.
Once the details of your username and password have been shared with others,
you have lost control over how they may be used or abused.
It is worth noting that in most cases, usernames are very easy to get and tend to
follow a pattern which relates directly to your own name. This is a necessary risk.
Therefore, constructing strong passwords and maintaining their confidentiality is of
great importance.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Confidentiality
Confidentiality is a must. Confidentiality is the condition in which
information is available to only those people who need it to do their
jobs.
Breaches in confidentiality can occur when:
you walk away from your computer without logging off
paper documents are not adequately controlled
you are accidentally given access to too much computer information.
you have conversations about cases in public places such as elevators
and hallways.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Privacy
The Privacy Act requires that we as government employees take special care when we
provide information to anyone about our veteran employees and other customers.
Providing personal information to anyone, including veterans themselves, must be done
only by persons authorized to do so.
The same applies to requesting and receiving information about ourselves as employees
and/or as veterans.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Risk Awareness
Privacy laws are designed primarily to protect the people whose data you
work with on a day-to-day basis.
The laws are there to ensure that veterans and their beneficiaries have
recourse against intentional or unintentional misuse and abuse of
protected data.
Your protection within the VA is to adhere to the procedures and check
when you are unsure of how to handle information.
If you deviate from the established procedures, you and/or the VA could
potentially become liable for any losses incurred in the event of legal
action.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
E-Mail
Proper use of VA electronic mail is essential to ensure this resource is uninterrupted
and used in legal ways.
Chain letters and hoax messages rob us of valuable network capacity, computer
space, and processing speed. You should not forward these messages to others. In
fact, don't even request the sender stop sending you messages. Just delete them.
These "please stop" messages sent by the thousands slow down our e-mail systems!
Sensitive information should not be sent using e-mail unless it can be done securely.
Before you send sensitive information on e-mail, you must ensure that it can be done
securely.
Some computer viruses attack e-mail systems, making them unavailable. You should
learn to recognize the signs of a virus infection.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
E-mail is not considered private. You should have no expectation of privacy when
using e-mail to transmit, store and communicate information.
Private information about veterans and employees is not permitted to be
transmitted by e-mail unless it is encrypted.
E-mail is not considered secure. E-mail systems, are vulnerable to virus attacks. In
fact, most computer viruses are spread through e-mail messages.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Viruses
Computer viruses can be one of the biggest causes of breaching securities and the
data we depend on to fulfill our mission can compromised by a virus.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Viruses
Improvements in technology have to institute an anti-virus defense
program.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Symptoms
IIf your computer has any of these symptoms, there may be a problem. Please call the
Help desk (x4357) immediately if you have reason to believe your computer has been
infected with a virus.
reacts slower than usual.
stops running for no apparent reason.
fails to boot.
seems to be missing important files.
prevents you from saving your work.
All computers are required to have virus protection software. New updates are usually
issued every week.
While many sites automatically update virus protection software on networked
computers, remember that non- networked computers, will not receive automatic
updates to virus protection software.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Virus Protection
Protect yourself:
Delete e-mail messages with unusual subject lines, for example, "Open this
immediately."
Never stop or disable your anti-virus program.
Always allow an anti-virus program to perform its routines without interruption.
Back up your files on a regular schedule.
Have your virus protection software set to scan your e- mails and attachments.
Be cautious and sensitive to attachments that have file extensions that execute
system commands or applications. For example: .exe, .vbs, .js, .jse, .wsf,
.vbe and .wsh.
Unless you can verify, do not delete any system files based on a request made on
e-mail.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Reporting Computer-Related
Incidents
It is important to let you know others when you witness
computer-related incidents, such as:
• Electronic viruses
• Stolen and vandalized computers.
• Use of computers to distribute sensitive information to
those not authorized to receive it.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Risk Awareness
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Risk Awareness
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Social Engineering
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Risk Awareness
As a result of improvements in system security, hackers
generally require more information from different sources in
order to compromise modern systems.
This progress in risk mitigations systems and techniques has
created a rise in the number and sophistication of the social
engineering techniques employed by hackers.
Social engineers will rarely ask for secure or confidential
information directly and instead will gradually gain your
confidence, often asking for nothing the first call in favor of
building up confidence for a later time.
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Ethics
•Ethics deals with placing a "value" on acts
according to whether they are "good" or "bad."
Every society has its rules about whether certain
acts are ethical or not. The same thing is true when
using a computer system to access confidential
information.
"Ethics is about understanding how your actions affect
other people, knowing what is right and wrong, and taking
personal responsibility for your actions…"
- Winn Schwartau
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
Risk Awareness
H O N O R . PAT R I O T I S M . D U T Y.
A R M Y 2 0 4 0 : W O R L D - C L A S S . M U LT I - M I S S I O N R E A D Y. C R O S S - D O M A I N C A PA B L E .
END OF PRESENTATION
H O N O R . PAT R I O T I S M . D U T Y.