End-User Computer Security
About: This 3-hour course is designed to immerse participants in the fundamental aspects of computer security, emphasizing practical measures to protect sensitive information, prevent data breaches, and ensure business continuity.
Throughout the session, participants will engage in interactive quizzes using their mobile phones to test their knowledge and reinforce learning.
Introduction to Computer Security
- Importance of Computer Security
- Protecting sensitive information
- Preventing data breaches
- Ensuring business continuity
- Basic Concepts
- Confidentiality, Integrity, Availability (CIA Triad)
- Threats and vulnerabilities
Common Cyber Threats
- Phishing
- Definition and examples
- Techniques used (e.g., email phishing, spear phishing)
- How to recognize phishing attempts
- Smishing
- Definition and examples
- Techniques used (e.g., SMS phishing)
- How to recognize smishing attempts
- Vishing
- Definition and examples
- Techniques used (e.g., voice phishing)
- How to recognize vishing attempts
- Other Hacking Techniques
- Malware (viruses, ransomware, spyware)
- Keyloggers
- Trojan horses
- Man-in-the-middle attacks
- Malvertising
Preventative Measures
- Individual Measures
- Using strong, unique passwords
- Enabling multi-factor authentication
- Regularly updating software and operating systems
- Recognizing and avoiding suspicious links and attachments
- Using antivirus and anti-malware software
- Departmental Measures
- Implementing access controls and permissions
- Conducting regular security training and awareness programs
- Monitoring and auditing user activities
- Establishing incident response protocols
- Company-Wide Measures
- Developing and enforcing security policies and procedures
- Regularly conducting security assessments and audits
- Implementing network security measures (firewalls, intrusion detection systems)
- Encrypting sensitive data
- Ensuring physical security of devices and infrastructure
Best Practices for Safe Internet Use
- Safe Browsing Habits
- Avoiding suspicious websites
- Using secure connections (HTTPS)
- Recognizing and avoiding typosquatting and website spoofing
- Email Security
- Identifying and avoiding spam and phishing emails
- Using email filters and security tools
- Social Media Security
- Managing privacy settings
- Avoiding oversharing personal information
- Recognizing social engineering attacks
Mobile Device Security
- Risks Associated with Mobile Devices
- Smishing and mobile malware
- Unsecured Wi-Fi connections
- Preventative Measures
- Using mobile security apps
- Keeping devices updated
- Avoiding public Wi-Fi for sensitive transactions
Cloud Security
- Understanding Cloud Services
- Benefits and risks of cloud storage
- Securing Cloud Data
- Using strong authentication methods
- Encrypting data stored in the cloud
- Regularly reviewing access permissions
Internet of Things (IoT) Security
- Risks of IoT Devices
- Vulnerabilities in connected devices
- Securing IoT Devices
- Changing default passwords
- Regularly updating firmware
- Monitoring network traffic