\documentclass[10pt,a4paper]{article} % Packages \usepackage{fancyhdr} % For header and footer \usepackage{multicol} % Allows multicols in tables \usepackage{tabularx} % Intelligent column widths \usepackage{tabulary} % Used in header and footer \usepackage{hhline} % Border under tables \usepackage{graphicx} % For images \usepackage{xcolor} % For hex colours %\usepackage[utf8x]{inputenc} % For unicode character support \usepackage[T1]{fontenc} % Without this we get weird character replacements \usepackage{colortbl} % For coloured tables \usepackage{setspace} % For line height \usepackage{lastpage} % Needed for total page number \usepackage{seqsplit} % Splits long words. %\usepackage{opensans} % Can't make this work so far. Shame. Would be lovely. \usepackage[normalem]{ulem} % For underlining links % Most of the following are not required for the majority % of cheat sheets but are needed for some symbol support. \usepackage{amsmath} % Symbols \usepackage{MnSymbol} % Symbols \usepackage{wasysym} % Symbols %\usepackage[english,german,french,spanish,italian]{babel} % Languages % Document Info \author{George\_ITO} \pdfinfo{ /Title (information-security-awareness.pdf) /Creator (Cheatography) /Author (George\_ITO) /Subject (Information Security Awareness Cheat Sheet) } % Lengths and widths \addtolength{\textwidth}{6cm} \addtolength{\textheight}{-1cm} \addtolength{\hoffset}{-3cm} \addtolength{\voffset}{-2cm} \setlength{\tabcolsep}{0.2cm} % Space between columns \setlength{\headsep}{-12pt} % Reduce space between header and content \setlength{\headheight}{85pt} % If less, LaTeX automatically increases it \renewcommand{\footrulewidth}{0pt} % Remove footer line \renewcommand{\headrulewidth}{0pt} % Remove header line \renewcommand{\seqinsert}{\ifmmode\allowbreak\else\-\fi} % Hyphens in seqsplit % This two commands together give roughly % the right line height in the tables \renewcommand{\arraystretch}{1.3} \onehalfspacing % Commands \newcommand{\SetRowColor}[1]{\noalign{\gdef\RowColorName{#1}}\rowcolor{\RowColorName}} % Shortcut for row colour \newcommand{\mymulticolumn}[3]{\multicolumn{#1}{>{\columncolor{\RowColorName}}#2}{#3}} % For coloured multi-cols \newcolumntype{x}[1]{>{\raggedright}p{#1}} % New column types for ragged-right paragraph columns \newcommand{\tn}{\tabularnewline} % Required as custom column type in use % Font and Colours \definecolor{HeadBackground}{HTML}{333333} \definecolor{FootBackground}{HTML}{666666} \definecolor{TextColor}{HTML}{333333} \definecolor{DarkBackground}{HTML}{00087A} \definecolor{LightBackground}{HTML}{F7F7FA} \renewcommand{\familydefault}{\sfdefault} \color{TextColor} % Header and Footer \pagestyle{fancy} \fancyhead{} % Set header to blank \fancyfoot{} % Set footer to blank \fancyhead[L]{ \noindent \begin{multicols}{3} \begin{tabulary}{5.8cm}{C} \SetRowColor{DarkBackground} \vspace{-7pt} {\parbox{\dimexpr\textwidth-2\fboxsep\relax}{\noindent \hspace*{-6pt}\includegraphics[width=5.8cm]{/web/www.cheatography.com/public/images/cheatography_logo.pdf}} } \end{tabulary} \columnbreak \begin{tabulary}{11cm}{L} \vspace{-2pt}\large{\bf{\textcolor{DarkBackground}{\textrm{Information Security Awareness Cheat Sheet}}}} \\ \normalsize{by \textcolor{DarkBackground}{George\_ITO} via \textcolor{DarkBackground}{\uline{cheatography.com/36063/cs/11346/}}} \end{tabulary} \end{multicols}} \fancyfoot[L]{ \footnotesize \noindent \begin{multicols}{3} \begin{tabulary}{5.8cm}{LL} \SetRowColor{FootBackground} \mymulticolumn{2}{p{5.377cm}}{\bf\textcolor{white}{Cheatographer}} \\ \vspace{-2pt}George\_ITO \\ \uline{cheatography.com/george-ito} \\ \end{tabulary} \vfill \columnbreak \begin{tabulary}{5.8cm}{L} \SetRowColor{FootBackground} \mymulticolumn{1}{p{5.377cm}}{\bf\textcolor{white}{Cheat Sheet}} \\ \vspace{-2pt}Not Yet Published.\\ Updated 13th April, 2017.\\ Page {\thepage} of \pageref{LastPage}. \end{tabulary} \vfill \columnbreak \begin{tabulary}{5.8cm}{L} \SetRowColor{FootBackground} \mymulticolumn{1}{p{5.377cm}}{\bf\textcolor{white}{Sponsor}} \\ \SetRowColor{white} \vspace{-5pt} %\includegraphics[width=48px,height=48px]{dave.jpeg} Measure your website readability!\\ www.readability-score.com \end{tabulary} \end{multicols}} \begin{document} \raggedright \raggedcolumns % Set font size to small. Switch to any value % from this page to resize cheat sheet text: % www.emerson.emory.edu/services/latex/latex_169.html \footnotesize % Small font. \begin{multicols*}{2} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Introduction - Information Security}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Computer-related crimes affecting businesses or consumers are frequently in the news. While companies normally have technical defense systems in place, end-users and staff members also need to know how to protect and maintain their computer systems so they can steer clear of fraudsters. Here is a short set of recommendations for keeping yourself safe online.% Row Count 8 (+ 8) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Private data and its value}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{{\bf{Protect your and your client's data}} \newline % Row Count 1 (+ 1) Hackers find private data very valuable. It is important that you protect ALL types of data as these can be used for many purposes, such as \newline % Row Count 4 (+ 3) - Identity theft \newline % Row Count 5 (+ 1) - Targeted attacks \newline % Row Count 6 (+ 1) - Data sold to other parties for data mining \newline % Row Count 7 (+ 1) Data such as personal information and system credentials are very sought after and will fetch a hacker a good price. Be always aware and always protect the information you handle.% Row Count 11 (+ 4) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Phishing}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Phishing is one of the most common methods of attack nowadays. Phishing involves tricking a user into giving their password into a seemingly legitimate site. Use the list of tips below to increase your awareness and prevent your credentials from being stolen: \newline % Row Count 6 (+ 6) {\bf{Be wary of emails asking for confidential information}} \newline % Row Count 8 (+ 2) Especially information of a financial or personal nature. Legitimate organizations will never request sensitive information via email, and most banks in NZ will tell you that they won't ask for your information unless you're the one contacting them. \newline % Row Count 13 (+ 5) {\bf{Don't get pressured into providing sensitive information.}} \newline % Row Count 15 (+ 2) Phishers like to use scare tactics, and may threaten to disable an account or delay services until you update certain information. Be sure to contact the merchant directly to confirm the authenticity of their request. \newline % Row Count 20 (+ 5) {\bf{Watch out for generic-looking requests for information.}} \newline % Row Count 22 (+ 2) Phishing emails are often not personalized, while authentic emails from your bank often reference an account you have with them. Many phishing emails begin with "Dear Sir/Madam", and some come from a bank with which you don't even have an account with. \newline % Row Count 28 (+ 6) {\bf{Never submit confidential information via forms embedded within email messages.}} \newline % Row Count 30 (+ 2) } \tn \end{tabularx} \par\addvspace{1.3em} \vfill \columnbreak \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Phishing (cont)}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Senders are often able to track all information entered into a form. If you suspect you may have entered information into an illegitimate form, proceed to change your passwords ASAP. \newline % Row Count 4 (+ 4) {\bf{Never use links in an email to connect to a website unless you are absolutely sure they are authentic.}} \newline % Row Count 7 (+ 3) Instead, open a new browser window and type the URL directly into the address bar. Often a phishing website will look identical to the original - look at the address bar to make sure that this is the case.% Row Count 12 (+ 5) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Other types of attacks}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{{\bf{Be aware of other types of attacks you may encounter}} \newline % Row Count 2 (+ 2) {\bf{Smishing}} \newline % Row Count 3 (+ 1) SMS Phishing is called smishing, and it is a form of social engineering technique that attempts to acquire personal information (such as your password) by masquerading as a trustworthy company via text messages on your mobile phone. If you receive an unsolicited, seemingly legitimate SMS text from a bank, service or company, don't open the accompanying link. Instead, call them directly in regards to the text message contents if required. \newline % Row Count 12 (+ 9) {\bf{Vishing}} \newline % Row Count 13 (+ 1) Vishing is the telephone equivalent of phishing. It is often an attempt of acquiring information using the telephone. Oftentimes these are calls from IRD, Microsoft or other service providers with an apparently legitimate query for further information. Be wary and if in doubt always hang up and call their known, main number instead.% Row Count 20 (+ 7) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Best Practices}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{{\bf{Be careful where and how you connect to the Internet.}} \newline % Row Count 2 (+ 2) A public computer, such as at an Internet café or hotel business center, may not have up-to-date security software and could be infected with malware. Also, for online banking or shopping, avoid connecting your computer, tablet or smartphone to a wireless network at a public "hotspot" (such as a coffee shop, hotel or airport). \newline % Row Count 9 (+ 7) {\bf{Be suspicious of unsolicited e-mails and text messages asking you to click on a link or download an attachment. }} \newline % Row Count 12 (+ 3) It's easy for fraudsters to copy corporate or government logos into fake e-mails that can install malware on your computer. \newline % Row Count 15 (+ 3) Your best bet is to ignore any unsolicited request for immediate action or personal information, no matter how genuine it looks. If you decide to validate the request by contacting the party that it is supposedly from, use a phone number or e-mail address that you have used before or otherwise know to be correct. Don't rely on the one provided in the e-mail. \newline % Row Count 23 (+ 8) {\bf{Use "strong" IDs and passwords and keep them secret.}} \newline % Row Count 25 (+ 2) Choose combinations of upper- and lower-case letters, numbers and symbols that are hard for a hacker to guess. Don't, for example, use your birth date or address. Also don't use the same password for different accounts because a criminal who obtains one password can log in to other accounts. Finally, make sure to change your passwords on a regular basis.% Row Count 33 (+ 8) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} \begin{tabularx}{8.4cm}{X} \SetRowColor{DarkBackground} \mymulticolumn{1}{x{8.4cm}}{\bf\textcolor{white}{Data leaks}} \tn \SetRowColor{white} \mymulticolumn{1}{x{8.4cm}}{Preventing data leaks is something everyone can do. Follow these recommendations to ensure that you are not unknowingly disposing of private data that could end in the wrong hands: \newline % Row Count 4 (+ 4) 1. Always shred or destroy private information you no longer need \newline % Row Count 6 (+ 2) 2. Do not take USB pendrives with confidential data out of the office if possible \newline % Row Count 8 (+ 2) 3. Use encrypted USB drives for data you need to take out of the office \newline % Row Count 10 (+ 2) 4. Always securely dispose of devices (computers, laptops and cellphones) to avoid data being leaked by accident.% Row Count 13 (+ 3) } \tn \hhline{>{\arrayrulecolor{DarkBackground}}-} \end{tabularx} \par\addvspace{1.3em} % That's all folks \end{multicols*} \end{document}