Enviar búsqueda
Cargar
How to Secure Your Organisation Data
•
3 recomendaciones
•
681 vistas
Phannarith Ou, G-CISO
Seguir
Educación
Denunciar
Compartir
Denunciar
Compartir
1 de 31
Recomendados
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
Gohsuke Takama
Learn Hacking
Learn Hacking
hackingtraining
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.
Shantanu Kumar Das
Data Privacy for Activists
Data Privacy for Activists
Greg Stromire
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
Phillip Maddux
Honeypots
Honeypots
Bilal ZIANE
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
Recomendados
A perspective for counter strategy against cybercrime and cyber espionage
A perspective for counter strategy against cybercrime and cyber espionage
Gohsuke Takama
Learn Hacking
Learn Hacking
hackingtraining
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Zivaro Inc
HoneyPot for Network Security - building and testing against exploits.
HoneyPot for Network Security - building and testing against exploits.
Shantanu Kumar Das
Data Privacy for Activists
Data Privacy for Activists
Greg Stromire
Honeypots, Deception, and Frankenstein
Honeypots, Deception, and Frankenstein
Phillip Maddux
Honeypots
Honeypots
Bilal ZIANE
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
Cyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)
Ulrich Janßen
Cyber Crime
Cyber Crime
aritraranjan
Cyber security vs information assurance
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
How to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
Cyber crime
Cyber crime
Rajendra Dangwal
Cyber crime
Cyber crime
Tushar Malhotra
Cyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
Cyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
Cyber crime ppt
Cyber crime ppt
MOE515253
Ethi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
Ethical Hacking
Ethical Hacking
Pushkar Pashupat
LemonFish How do you know your Data Loss Prevention system is working ?
LemonFish How do you know your Data Loss Prevention system is working ?
Mary Beth Borgwing, MBA
Offensive malware usage and defense
Offensive malware usage and defense
Christiaan Beek
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Codemotion Tel Aviv
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
Yair Amit
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
Phillip Maddux
Threat Modeling 101
Threat Modeling 101
Atlassian
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
Arthur Paixão
Why Personal Clouds Need A Network
Why Personal Clouds Need A Network
Phil Wolff
Data security @ the personal level
Data security @ the personal level
Arnon Rotem-Gal-Oz
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity Symposium
Bob Rudis
Más contenido relacionado
Destacado
Cyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)
Ulrich Janßen
Cyber Crime
Cyber Crime
aritraranjan
Cyber security vs information assurance
Cyber security vs information assurance
Vaughan Olufemi ACIB, AICEN, ANIM
How to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
Cyber crime
Cyber crime
Rajendra Dangwal
Cyber crime
Cyber crime
Tushar Malhotra
Cyber Crime and Security
Cyber Crime and Security
Dipesh Waghela
Cyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
Cyber crime ppt
Cyber crime ppt
MOE515253
Destacado
(10)
Cyber security from military point of view
Cyber security from military point of view
Integrating info ops in operational level planning (no backup slides)
Integrating info ops in operational level planning (no backup slides)
Cyber Crime
Cyber Crime
Cyber security vs information assurance
Cyber security vs information assurance
How to know you was hacked
How to know you was hacked
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber Crime and Security
Cyber Crime and Security
Cyber-crime PPT
Cyber-crime PPT
Cyber crime ppt
Cyber crime ppt
Similar a How to Secure Your Organisation Data
Ethi mini - ethical hacking
Ethi mini - ethical hacking
Being Uniq Sonu
Ethical Hacking
Ethical Hacking
Pushkar Pashupat
LemonFish How do you know your Data Loss Prevention system is working ?
LemonFish How do you know your Data Loss Prevention system is working ?
Mary Beth Borgwing, MBA
Offensive malware usage and defense
Offensive malware usage and defense
Christiaan Beek
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Codemotion Tel Aviv
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
Yair Amit
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
Phillip Maddux
Threat Modeling 101
Threat Modeling 101
Atlassian
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
Arthur Paixão
Why Personal Clouds Need A Network
Why Personal Clouds Need A Network
Phil Wolff
Data security @ the personal level
Data security @ the personal level
Arnon Rotem-Gal-Oz
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity Symposium
Bob Rudis
La Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren't
pinkflawd
Contextual Cyber Security for IoT
Contextual Cyber Security for IoT
MONICA-Project
Computer saftey may 2013
Computer saftey may 2013
JimWhite
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
JoAnna Cheshire
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
viaForensics
Fantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from them
Vlad Styran
Information Security - The Missing Elements
Information Security - The Missing Elements
ahmed_vr
Similar a How to Secure Your Organisation Data
(20)
Ethi mini - ethical hacking
Ethi mini - ethical hacking
Ethical Hacking
Ethical Hacking
LemonFish How do you know your Data Loss Prevention system is working ?
LemonFish How do you know your Data Loss Prevention system is working ?
Offensive malware usage and defense
Offensive malware usage and defense
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security Attacks: A Glimpse from the Trenches - Yair Amit, Skycure
Mobile Security: A Glimpse from the Trenches
Mobile Security: A Glimpse from the Trenches
Deception in Cyber Security (League of Women in Cyber Security)
Deception in Cyber Security (League of Women in Cyber Security)
Threat Modeling 101
Threat Modeling 101
Porque Investir em um time de segurança ofensiva?
Porque Investir em um time de segurança ofensiva?
Why Personal Clouds Need A Network
Why Personal Clouds Need A Network
Data security @ the personal level
Data security @ the personal level
CERT Data Science in Cybersecurity Symposium
CERT Data Science in Cybersecurity Symposium
La Quadrature Du Cercle - The APTs That Weren't
La Quadrature Du Cercle - The APTs That Weren't
Contextual Cyber Security for IoT
Contextual Cyber Security for IoT
Computer saftey may 2013
Computer saftey may 2013
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
The Role of Threat Intelligence and Layered Securiy for Intrusion Prevention ...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Via forensics thotcon-2013-mobile-security-with-santoku-linux
Fantastic Beasts and where to hide from them
Fantastic Beasts and where to hide from them
Information Security - The Missing Elements
Information Security - The Missing Elements
Más de Phannarith Ou, G-CISO
3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
Phannarith Ou, G-CISO
Understanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
Reconnaisance
Reconnaisance
Phannarith Ou, G-CISO
Case - How to protect your information
Case - How to protect your information
Phannarith Ou, G-CISO
Case - How to protect your website
Case - How to protect your website
Phannarith Ou, G-CISO
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
Internet Security Policy - Khmer
Internet Security Policy - Khmer
Phannarith Ou, G-CISO
How to Protect Computer From Virus
How to Protect Computer From Virus
Phannarith Ou, G-CISO
How to Secure Your WiFi
How to Secure Your WiFi
Phannarith Ou, G-CISO
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Phannarith Ou, G-CISO
Understanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
Exchange Server 2003
Exchange Server 2003
Phannarith Ou, G-CISO
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Phannarith Ou, G-CISO
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Phannarith Ou, G-CISO
Secure System Development Proposal
Secure System Development Proposal
Phannarith Ou, G-CISO
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Phannarith Ou, G-CISO
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Phannarith Ou, G-CISO
Heartbleed vulnerability
Heartbleed vulnerability
Phannarith Ou, G-CISO
P12 r202t8 05-spam
P12 r202t8 05-spam
Phannarith Ou, G-CISO
P12 r202t8 04-d-dos
P12 r202t8 04-d-dos
Phannarith Ou, G-CISO
Más de Phannarith Ou, G-CISO
(20)
3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
Understanding NMAP
Understanding NMAP
Reconnaisance
Reconnaisance
Case - How to protect your information
Case - How to protect your information
Case - How to protect your website
Case - How to protect your website
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Internet Security Policy - Khmer
Internet Security Policy - Khmer
How to Protect Computer From Virus
How to Protect Computer From Virus
How to Secure Your WiFi
How to Secure Your WiFi
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Understanding Keylogger
Understanding Keylogger
Exchange Server 2003
Exchange Server 2003
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Secure System Development Proposal
Secure System Development Proposal
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Heartbleed vulnerability
Heartbleed vulnerability
P12 r202t8 05-spam
P12 r202t8 05-spam
P12 r202t8 04-d-dos
P12 r202t8 04-d-dos
Último
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
MiaBumagat1
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
lancelewisportillo
Transaction Management in Database Management System
Transaction Management in Database Management System
Christalin Nelson
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
VanesaIglesias10
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
mary850239
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
Humphrey A Beña
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
shraddhaparab530
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
leah joy valeriano
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
YousafMalik24
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
Humphrey A Beña
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
iammrhaywood
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
lakshayb543
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Carlos105
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
JoshuaGantuangco2
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Celine George
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Jemuel Francisco
Último
(20)
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Transaction Management in Database Management System
Transaction Management in Database Management System
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Visit to a blind student's school🧑🦯🧑🦯(community medicine)
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
How to Secure Your Organisation Data
1.
Mr.$OU$Phannarith$ Head$of$CamCERT$ Permanent$Member$of$$Cybercrime$ Law$Working$Group$$ National$ICT$Development$Authority$ OfHice$of$The$Council$of$Ministers$ Email:$phannarith[at]camcert.gov.kh$ $
1"
2.
! Basic"Understanding"of"Information"Security"
! Malware"Fundamental" ! Protect"Your"Password" ! Social"Engineering"and"Phishing"" ! Suggestion"and"Recommendation" ! Question"and"Answers" . - : @ . ! 2"
3.
3"
4.
ConIidentiality"–"of"the"information"
Confiden'ality- Information"on"the"company"or"organization" should"never"be"accessible"to"users"without" permission" " Integrity"–"of"application"and"information" Accuracy"and"completeness"of"information" are"preserved" " Availability- Integrity- Availability"–"of"the"system" Information"is"accessible"by"authorized"users" when"required" . - : @ . ! 4"
5.
Why"Information"Security"is"important?""
Protecting"computer"system"or"its"user"from"threats"that" may"occur"" Threats"and"Damage"will"differ"depending"on"computer" system’s"characteristic"" Protecting"the"system"and"its"users"from"threat"and" minimize"damage" . - : @ . ! 5"
6.
Relationship$between$threat,$vulnerability$and$loss$
Threat" Loss" Vulnera bility" Attacker$+$No$Security$Patch$=$Data$Destruction$ . - : @ . ! 6"
7.
Information$
Threats$ Assets$ Something"that"can"potentially" Information"stored"in"any" cause"damage"to"information"" Countermeasure$ manner"which"recognized"as" assets" ‘valuable’"to"the"organization"" Vulnerability$ A"Weakness"in"the" organization,"computer" system"or"network"that"can" be"exploited"by"threat" . - : @ . ! 7"
8.
Information$
Threats$ Assets$ Something"that"can"potentially" Information"stored"in"any" cause"damage"to"information"" Countermeasure$ manner"which"recognized"as" assets" ‘valuable’"to"the"organization"" Vulnerability$ If"vulnerability"exist,"threats" can"attack"your"information" assets" . - : @ . ! 8"
9.
Information$
Threats$ Assets$ Something"that"can"potentially" Information"stored"in"any" cause"damage"to"information"" Countermeasure$ manner"which"recognized"as" assets" ‘valuable’"to"the"organization"" Vulnerability$is$Hixed$ Information"assets"can"be" kept"secure,"even"if"threats" exist." . - : @ . ! 9"
10.
• Do"you"use"license"operating"system"(OS)?"
• Have"you"even"been"update"your"OS?"" • Have"you"even"been"update"your"daily"use" software?" • Do"you"update"your"antiavirus"regularly?" . - : @ . ! 10"
11.
.
- : @ . ! 11"
12.
Physical&&
The"most" difIicult" part"to" handle" Secure& Hardware& Human&& Your& && So6ware& Data& Policy&&& Standard& . - : @ . ! 12"
13.
13"
14.
Malware"or"Malicious"
Threats" software" Virus" Worm" Trojans" . - : @ . ! 14"
15.
• Infect"object"on"the"disk""
• Travel"autonomously"from"PC"to"PC" • Trigger"by"individual"action"such"as"Open" email"attachment" • Spread"automatically" • Install"itself"into"the"PC"and"looking"other" PCs"to"infect" • Email"worm"need"individual"action"to"spread" • Network"worm"spread"without"the"need"for" human"interaction" . - : @ . ! 15"
16.
• Install"silently"in"the"PC"by"Email"
attachment,"visit"infected"website,"…etc." • PC"work"normally"without"any"consent" from"the"users" • They"don’t"selfareplicate,"but"relies"on" connectivity"provided"by"the"Internet" • There"are"many"kinds"of"Trojans:" • Backdoor"Trojans" • Keyalogger"Trojans" • Banking"Trojans" . - : @ . ! 16"
17.
Can-done-anything:-Sending-Spam,-
Before" Collec'ng-confiden'al-data,-stealing- password,-etc.-and-espcially-connect-PC- with-PC-to-create-an-infected-network- (BOTNET).-- Virus" Worm" Trojans" Now"–"Hybrid"Malware" Virus& Worm& Trojans& . - : @ . ! 17"
18.
18"
19.
• How"often"do"you"change"your"password?"
• Do"you"use"your"name,"telephone,"date"of"birth," as"your"password?" • Do"you"use"the"same"password"for"every" services?" • Do"you"share"your"password"with"anybody?" . - : @ . ! 19"
20.
Easily"Guessed"Password"
• No"Password"is"set" • Password"same"as"the"account"name" Dictionary"Attack" • Prepared"words"that"the"user"is"likely"to"use"as" passwords"in"a"dictionary"Iile"and"attempt"to"Iind" matching"password" Brute"Force"Attack" • This"is"simple"method"to"try"all"possible"combinations"as" passwords" • It"take"huge"amount"of"time,"although,"theoretically,"it" can"break"any"password"without"fail" . - : @ . ! 20"
21.
Which"password"below"is"your"password?"
Top$25$Popular$Password$in$2011$ 1."password" "2."123456 "3."12345678 "4."qwerty" 5."abc123 "6."monkey "7."1234567 "8."letmein" 9."trustno1 "10."dragon "11."baseball "12."111111" 13."Iloveyou "14."master "15."sunshine "16."ashley" 17."bailey "18."passw0rd"19."shadow "20."123123" 21."654321 "22."superman"23."qazwsx "24."michael" 25."football" . - : @ . ! 21"
22.
How"to"secure"your"password" .
- : @ . ! 22"
23.
23"
24.
.
- : @ . ! 24"
25.
.
- : @ . ! 25"
26.
.
- : @ . ! 26"
27.
.
- : @ . ! 27"
28.
28"
29.
User"antiavirus"and"update"it"regularly""
Install"a"Personal"Firewall" Install"latest"security"update" Don’t"open"an"email"you"do"not"trust" Keep"learning!" . - : @ . ! 29"
30.
You"organization"data"security"is"depending"on"
the"weakness"link" Don’t"make"yourself"as"the"weakness"link" . - : @ . ! 30"
31.
Mr.$OU$Phannarith$ Head$of$CamCERT$ Permanent$Member$of$$Cybercrime$ Law$Working$Group$$ National$ICT$Development$Authority$ OfHice$of$The$Council$of$Ministers$ Email:$phannarith[at]camcert.gov.kh$ $
31"