Cyber Security Training
Cyber Security Training
Missio
n• Promoting
state.
cybersecurity awareness and best practices within the
• MP-CERT offers technical advice and guidance to system administrators and users to
enhance computer security measures.
• The team actively monitors and tracks cyber activities within the state to identify and
address potential security issues.
• MP-CERT plays a crucial role in creating cybersecurity awareness by educating the cyber
community about best practices and safe online behaviours.
Source: https://www.cert-in.org.in/
Virus/ Malicious Code 184131
Phishing 869
Others 6895
INTRODUCTION TO CYBER SECURIT
Cyber security refers to the practice of protecting computers, networks, programs, and data from digital
attacks, theft, damage, or unauthorized access. It involves various measures, technologies, and strategies
that are used to safeguard sensitive information and ensure the integrity, confidentiality, and availability of
data and systems.
Importance of cyber
security
Personal Life Professional Life
Protection of Personal Protection of Corporate Data
Data
Preventing Identity Theft Safeguarding Against
Cyberattacks
Securing Online Compliance with Regulations
Transactions
Privacy Protection Protection from Insider Threats
Insider
TYPES OF Malware Malware is malicious software
Threats
CYBER designed to harm, exploit, or
otherwise compromise devices and
THREATS networks.
1.Prevention of Damage: Early detection can prevent significant harm to systems and data,
reducing the risk of financial loss and reputational damage.
2.Minimizing Downtime: Identifying threats quickly can help organizations respond effectively,
ensuring that systems remain operational and minimizing disruption to services.
3.Protecting Sensitive Information: Prompt identification helps safeguard personal and sensitive
information from being exploited by cybercriminals.
4.Regulatory Compliance: Many industries are subject to regulations that require prompt reporting
and management of cyber threats. Timely identification helps organizations remain compliant.
5.Strengthening Security Posture: Recognizing threats early allows organizations to refine their
security measures and improve their overall defenses against future attacks.
By staying vigilant and responsive to cyber threats, we can protect ourselves and our digital
CYBER SECURITY FOR EVERYONE
As more aspects of our personal lives are conducted online, from banking and shopping to socializing and
working, the importance of cybersecurity for individuals has never been more critical. Protecting your
personal information, devices, and online activities is essential to prevent identity theft, financial fraud,
privacy violations, and cyberattacks.
01 02 03 04 05 06 07 08 09 10
s
a secure cloud service to ➢ Don't leave devices
prevent data loss. unattended.
➢ Always scan files downloaded ➢ Don't open unknown
from the internet before attachments or attachment
opening them to check for from unknown source.
malware. ➢ Ensure all electronic devices,
➢ Log Off After Use. including USB drives, are
➢ Maintain reputable antivirus. secured and scanned for
➢ Be watchful for shoulder malware.
surfers.
REAL WORLD
SCENARIOS
Story 1: "The Invisible
Invader"
Let's meet Ravi, a bright employee at ABC Corp. One day, Ravi received an
email with a link saying, “Check out this cool video!” Excited, Ravi clicked the
link without a second thought. But little did Ravi know, this click was about to
unleash a hidden
The malware, likevillain - Malware!
an invisible invader, sneaked into Ravi's computer. It started
to gather secret information and even spread to other computers in the
network. But how did this happen?
The email was not from a friend, but from a cyber villain, cleverly
disguised. The link was a trap, and the 'cool video' was actually a
malware attack in disguise!
reallyygreatsite.com
LESSON LEARNED:
LESSON LEARNED:
reallyygreatsite.com
1.Be Wary of Unknown Links and Downloads: Avoid clicking on suspicious
links or downloading unverified attachments.
2.Immediate Response to Threats: Quickly isolate affected systems and
inform IT security in case of a suspected attack.
3.Don’t turn off the system: Do not switch off the computer till evidence
for analysis have been taken by authorized team.
4.Regular Backups and Recovery Plans: Ensure regular backups of critical
data and have a recovery plan in place.
Overview of CISO
Portal
With the rapid digitalization of functions and processes in government and government
organizations, the need to adopt secure cyber practices has become essential. As a result, Chief
Information Security Officers (CISOs) are being appointed in every government department.
These CISOs will be responsible for identifying and documenting the Information Security (IS)
requirements that arise from various sources, such as:
(a) An assessment of risks (RA) to the organization in the
context of its business strategy and objectives. This
process identifies threats to the organization’s
information assets, evaluates vulnerabilities and the
likelihood of occurrence, and estimates their potential
impact;
mpcert@mp.go
v.in
cert.mp.gov
.in
5th Floor, Annexe 3, Secretariat, Vallabh
Bhawan, Bhopal-462004
For regular updates and
information, follow our social
media channels
mp_cert
MPcert
@cert_mp