Professional Documents
Culture Documents
Bizlearning
Bizlearning
the induction
INTRODUCTION
• Guessing a Password
• Cyber attack
• Motives Behind Brute Force Attacks
Social Engineering
•What is Social Engineering
obtaining confidential information by manipulation of
legitimate user
•How to avoid?
Eavesdropping attack
=
• Use virtual keyboards whenever possible
• Enable two-factor authentication
• Avoid entering passwords on unknown
networks
Identity
Internet & Email Usage Protection
Do's and Don'ts while accessing :
Internet
1. Downloading from internet
2. Connecting to a Network
3. Use of Messaging tools
Email
4. Accessing attachments/links in Email
5. Forwarding Emails
Conclusion
● Should not be taken lightly