Presentación de PowerPoint

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

. [Virtual Presenter] PYSCHOLOGY OF CYBER SECURITY.

Page 2 (9s)

[Audio] what we feed the mind is how it behaves, when we put all our efforts into something it shaping's our ideology. how people engage online and how this online activity impacts their offline, or real-world life is cyberpsychology..

Page 3 (27s)

[Audio] we Offen believe that cyber security has to do with our action and the mind has nothing to do with it but have you taught of what feeds this our actions. The mind is mankind's most valuable possession, and our perception of cybersecurity changes on a regular basis because our environment influences how we think at any given time. how we interpret threat, our actions towards it, and how prepared we are to face these threats protects us against these attacks. According to surveys, the energy, financial, and technological sectors are the ones that are most frequently targeted. remember cyber-attack is not far from us its knocking at our door everyday .In the past, cybersecurity experts use to warn organization with the phrase "it's not if but when" but in recent times their phrase is "it's not when but how often.".

Page 4 (1m 22s)

[Audio] in order to prevent or mitigate cyber attack the organization has to sensitize its employs on.

Page 5 (1m 43s)

[Audio] 1 Phishing - the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers: 2 Ransomware 3 fake president- someone acting to be who they are not in other to scam you, gain access or get information about the company. 4 social engineering (psychological manipulation) - popularly known as sakawa or fraud. 5 avoiding shadow IT - act or using your own ways to go about work in an improper manner ..

Page 6 (2m 30s)

[Audio] the organization should also 1 Adopt the right tools 2 keep existing software up to date 3 identify sensitive data to be protected 4 save and store data securely 5 strengthen user rights management 6 create a business continuity plan 7 raise employee awareness.

Page 7 (2m 59s)

[Audio] please do will to report any action taken unknowingly or knowingly to the authority to avoid these attacks. the attacks can impact greatly on both the individual and the organization. impacts such as 1 Loss Of Productivity - these attacks slow down productivity and in some case shuts productivity down. 2 loss Of Revenue - the organization might end up pumping lots of money to recover from these attacks, which will affect the core mandate of it. 3 Loss Of Reputation - the organization will lose its face in the eyes of the public not only the organization but the individual. people will start point fingers at you and end up losing credibility. 4 Psychological scars on the individual - how would you feel if it is known that the attack is a result of that bitcoin site you visited, you come to work early in the morning just because of that site you want to open before 8am and boom the organization is being hacked, how would you feel if all your hospital record is open to the public..

Page 8 (4m 7s)

[Audio] lets be our own security just as the safety slogan goes "a safer you, is a safer me" lets apply this to how we go about our daily activity. security is the state of mind are you in!.