Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Information Management

No description
by

Maher Abu-Lail

on 21 March 2016

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Information Management

We have
A
Problem!!!
What are these RESOURCES?
Resource Management
Effective and Efficient
Information Asset Management
You have the right
information assets and
the right technical
capability to meet your
business needs
You don’t have
the right (form
of) information
assets to meet
your business
need

You don’t have the right technical capability to use your information assets to meet your business needs
You are maintaining technical support for information assets that you don’t need
Business Needs
Information Assets
You are maintaining
information assets
that you don’t need
You are maintaining technical capability that you don’t need
Effective and
Efficient Information
Asset Management:
You have business needs
that are not being met
Guess What ???!!!
What?
What?
What?
Storage
Backup
Processing
Power
Human Resources
What?
We will NOT do it !!!
Solution
Buy More
Storage
Buy
Backup
Appliance
Hire more
People
Buy More
Servers
Guess What Again ???!!!
Quote
"If you keep doing what you're doing you'll keep getting what you're getting"
You Own the Solution
1- Delete All Private Files (Movies, Music, Photos, ...etc)
2- Archive old Business Documents
3- Don't use business email for private use
4- Avoid sending large-sized emails
5- Use Shared Folder or Portal to share large files with other people
6- Use NG FTP Server to exchange large files with externals
IT Initiatives
1- We have migrated Email Accounts from PST to OST
2- Resigned Users Files have been backed up on an external storage and removed from servers to spare storage
3- We have stopped the ability to store Movies, Music, Photos, ...etc. unless there is a justified and approved request
Technical Services and Environment
Statistics About Security Threats & Attacks
2011/2012: The Surge of Security Threats

More than 286,000,000 New Threats
More than 55,000 new unique malware samples per day
93% Increase in Web-Attacks
1.3% Of Google search results are infected
30,000 New malicious URL /day
25% is DDOS share, 33% SQL Injection
Information Security
Dubai Police: More than half of the UAE’s 2.55 million internet users were victims of cybercrime from February 2010 to February 2011. Cyber crime victims lost Dh735m in 12 months

A Cyber War in the Middle East (Jan-Mar, 2012) with mutual DDoS and defacements was raging through the region. Hackers have dumped data using more than :-
450,000 Credit Cards
320,000 Facebook Accounts
105,000 Emails Accounts
Top Security Mistakes
Sharing passwords.
Information leakage to customers, vendors, employees…
Poor and common password selection.
Granting Vendors/Consultants/Trainees/Visitors extra uncontrolled privileges.
Leaving the PC/laptop unlocked while leaving the desk.
Placing Critical Info. Assets in inappropriate locations.
Sending unauthorized copy of Nuqul’s information.
Abusing system privileges.
Don't share suspicious pages on social networks.
Proper Use of Laptops/PCs
Lock your computer once you are away from your desk.
Do not download any software from Internet to Company Computers or Laptops.
Refer to IT HelpDesk for Any support needed.
Shutdown your Laptops before taking it home.
Be careful not to leave your Laptop in the car at
any time.
How to avoid becoming
a fraud victim?
Know and follow your work policies and procedures.
Protect your password.
Know where you can get help.
Never be afraid to ask.
Raise a flag.

Protect your Password
Use a unique password for all of your important accounts.
Password change should be enforced every 30 days.
Password length should not be less than 10 characters long.
Password Lock out should be enforced after three false attempts.
Password should be Complex, i.e. contains Capital Letters, Special Characters, and Numbers.
Passwords should be new.
Easy to remember & hard to guess.
Keep your password as a reminder & in a secret place that isn’t easily visible.
Case ....
Spam Emails
Suspicious emails subjects, senders, and domain names
Don’t open URLs and attachments in strange emails (Especially zipped files, Word, Excel, PowerPoint and PDF)
Never provide sensitive information if requested
What to do?
Open
Forward
Delete

Smart Phones Confidentiality Protection
Enable Security lock.
Use protection screen.
Avoid using unsecure wireless connection. (can be sniffed!).
Make Backup of Contacts/Data.
Use anti virus to protect your data.
Report stolen handsets Immediately to Physical Security & HelpDesk.
Don’t Install apps from untrusted sources.
Don’t Put any confidential documents on it.
Physical Security
Do’s
Respect the security officer.
Follow Security Procedures.
Keep your personal belongings safe guarded at all times (i.e.; Mobile, Purse, Laptop…).
Report a lost, stolen or damaged Access card or Personal belonging immediately to Security division
Physical Security
Don’ts
Give, share or loan your Access Card.
Hold the door for unidentified individuals; i.e. do not permit “tail gaiting”.
Leave Visitors unescorted.

Ways of submitting
a Helpdesk Ticket
Thank You
We are running
out of
R E S O U R C E S
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
RESOURCES
World's Biggest Data Breaches
http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Email
Simple Mode
Visual Mode
Add-In
Agenda
1 - Resource Management
2 - Information Asset Management
3 - Information Security
4 - Help Desk system
Help Desk System
Q & A

Password Exercise
Information Management Session
Full transcript