cybersecurity
Jiale Zhang
20XX 年 2 月 2 日星期二 示例页脚文本 1
The organization
Our training organization recognizes the need for
cybersecurity management to feature as a consideration
in strategic and operational planning, day-to-day
cybersecurity management and decision making at all
levels in the organization
20XX 年 2 月 2 日星期二 示例页脚文本 2
Introduction:
The training organization has experienced a number Website hacking
of cyber threats recently including but not limited to: 6
•A ransomware attack
5
•A number of phishing activities
4
•Data leakage on a number of occasions
3
•Website hacking (two times in the last month)
2
0
Jan Feb Mar Apr
ransomware attack Phishing attack data leakage
20XX 年 2 月 2 日星期二 示例页脚文本 3
Scope of the Cybersecurity policy
• This policy is broad and applies to parties at our training organization that hold or process training
organization information, including:
• Students;
• Staff;
• Third parties (e.g. suppliers, contractors, consultants and partners);
• Visitors.
20XX 年 2 月 2 日星期二 示例页脚文本 4
Cybersecurity practices according to
organizational policies and procedures
Our training organization is committed to managing and
minimizing cyber risk by identifying, analyzing, evaluating,
and treating exposures that may impact on the training
organization achieving its objectives and/or the continued
efficiency and effectiveness of its operations.
We will Back up our data, Secure our devices and network,
Encrypt important information, Ensure to use of multi-factor
authentication (MFA), Monitor the use of computer equipment
and systems, and limit further damage of the cyber incident by
isolating the affected systems
20XX 年 2 月 2 日星期二 示例页脚文本 5
Training Schedule
WIA Training
Monday Tuesday Wednesday Friday
Organization
Back up data 8am-9am 8am-9am 8am-9am 8am-9am
handle sensitive data 12pm-1am 12pm-1am 12pm-1am 12pm-1am
Prepare for an
2pm-3pm 2pm-3pm 2pm-3pm 2pm-3pm
incident
Monitor use of
computer equipment 4pm-5pm 4pm-5pm 4pm-5pm 4pm-5pm
and systems
20XX 年 2 月 2 日星期二 示例页脚文本 6
Cybersecurity training requirements
and purpose
•To develop cyber security awareness in the work
area by developing one set of policies and
procedures for a work area that promote cyber
securityawareness and practices.
•Effective security awareness training helps
employees understand proper cyber hygiene, the
security risks associated with their actions and to
identify cyber attacks they may encounter via email
and the web.
20XX 年 2 月 2 日星期二 示例页脚文本 7
Phishing attacks
Staff Pattern who click the unsafe link
6
0
Financial team Acciunt team management team IT team
Financial team Acciunt team management team
20XX 年 2 月 2 日星期二 示例页脚文本 8
Removable media
•Removable media is any type of storage device that can be
removed from a computer while the system is running. Examples
of removable media include CDs, DVDs and Blu-Ray disks, as
well as diskettes and USB drives. Removable media makes it easy
for a user to move data from one computer to another.
•In a storage context, the main advantage of removable disks is
that they can deliver the fast data backup and recovery times
associated with storage area networks (SANs) while also
providing the portability of tape that may be required to meet
corporate backup and recovery requirements. The main drawback
of removable media is that it's more expensive than tape.
20XX 年 2 月 2 日星期二 示例页脚文本 9
Passwords and Password-Based Authentication is the process of gaining
access to resources which one is entitled to with the help of a
Authentication. set of credentials containing username and password. This is
a rampantly used method known for process simplicity and low
cost.
20XX 年 2 月 2 日星期二 示例页脚文本 10
Passwords and Authentication.
• Multi-factor authentication (MFA) is a verification
security process that requires you to provide two
or more proofs of your identity before you can
access your account. For example, a system will
require a password and a code sent to your mobile
device before access is granted. Multi-factor
authentication adds an additional layer of security
to make it harder for attackers to gain access to
your device or online accounts.
20XX 年 2 月 2 日星期二 示例页脚文本 11
Physical
security
20XX 年 2 月 2 日星期二 示例页脚文本 12
Mobile Device Security.
Mobile Device Security refers to the measures designed to
protect sensitive information stored on and transmitted by
laptops, smartphones, tablets, wearables, and other portable
devices. At the root of mobile device security is the goal of
keeping unauthorized users from accessing the enterprise
network. It is one aspect of a complete enterprise security plan.
working remotely security tips
Separate Work and Personal
Secure Your Home Office Secure Your Home Router Devices
ZOOM Google Meeting Voov Meeting Microsoft Team Wechat
Encrypt Your Devices. Use Supported Operating Systems.
14
Public Wifi
Malware, Viruses, and Worms. ...
Rogue Networks. ...
Unencrypted Connections. ...
Network Snooping. ...
Log-in Credential Vulnerability. ...
System Update Alerts. ...
Session Hijacking.
20XX 年 2 月 2 日星期二 示例页脚文本 15
Cloud Security
Cloud Security
18-29 30-40 40-45 45-55
20XX 年 2 月 2 日星期二 示例页脚文本 16
Any Questions?
20XX 年 2 月 2 日星期二 示例页脚文本 17
Thank you
Jiale Zhang
20XX 年 2 月 2 日星期二 示例页脚文本 18