Lecture 3.pptx
Document Details

Uploaded by HotIntellect
Full Transcript
Information Protection Measures & Security Tips Protection Measures A. Email Safety B. Computer and Network Safety C. Safe Browsing D. Password Protection E. Privacy Policies & Agreements F. Physical Security G. Data Backup H. Other security measures Lecture 3 2 A. Email Safety 1. Do not respond to...
Information Protection Measures & Security Tips Protection Measures A. Email Safety B. Computer and Network Safety C. Safe Browsing D. Password Protection E. Privacy Policies & Agreements F. Physical Security G. Data Backup H. Other security measures Lecture 3 2 A. Email Safety 1. Do not respond to unknown recipients. The “From” can be tamper to deceive you. 2. Do not open unknown attachments. 3. Emails can be tapped. 4. Have backups for important emails. 5. Always log out. And do not log in through untrusted computers or networks. 6.Do not click directly on a link provided in such e-mails. Lecture 3 3 B. Computer & Network Safety Anti-virus Software – detects and removes or quarantines computer viruses. Firewall – hardware and/or software that protects a computer or network by monitoring all outgoing and incoming traffic. OS and software should always be updated. Only trusted open-source applications should be used. Examples of antivirus and firewalls: Lecture 3 4 C. Safe Browsing Lecture 3 5 D. Password Protection Should be strong and changed periodically. Should contain uppercase, lowercase, numbers and special characters if possible. Never use same passwords in all accounts and never share your password. Use two-factor authentication which is a method that requires two ways to verify your credentials. For example, bank applications require both password and a sent code. Lecture 3 6 D. Password Protection (cont.) The table below shows a comparison of the time taken to crack a password using skiddy (a very easy and simple cracking code) passwords of only lower cases and passwords of all characters between short and long password. All Characters Only Lowercase Password Length minute 1.36 Seconds 046. Characters 4 centuries 2.10 days 2.42 Characters 8 millennia 20 months 2.07 Characters 9 Lecture 3 7 D. Password Protection (cont.) Which one of these passwords do you think is easier to crack? C0mpl3x! ThisIsMyPasswrd Lecture 3 8 E. Privacy Policies & Agreements Companies need information about their employees or clients and users to run their business effectively. Consumers want businesses to: Know who they are, but not to know too much. Provide what they want, but not gather information on them. Read the privacy agreement policy and make sure to understand it. Lecture 3 9 F. Physical Security Restricting access to physical equipment. Monitoring area of work. Lecture 3 10 G. Data Backup - Data backup limits the damages and ensures work continuity. - Protects the individual and organization reputation and integrity. - Important to support legal matters. Backup tools: - USBs and CDs - Hard Disk - Cloud Lecture 3 11 H. Other Security Measures Anti-rootkit Software – stops outsiders taking control of your machine. Encryption – scrambles the contents of a file so that you can’t read it without the decryption key. Biometrics – the use of physiological characteristics for identification purposes, such as Fingerprint and Iris (eye) scanners. Lecture 3 12 Top Internet Security Tips 1. Never include personal information in an email message when you don’t know the recipient. 2. Never enter personal information on a website provided as a link in an email message. 3. Never include personal information in an internet forum, discussion group, or newsgroup message. 4. Never use the same password for all your electronic accounts. 5. Never expose personal information to others over an instant message connection. Lecture 3 13 Top Internet Security Tips (cont.) 6. Never buy from an online store that doesn’t offer a secure, encrypted connection when you’re prompted for your personal information and credit card number. 7. Never download a file from a website you don’t trust. 8. Never allow a stranger to connect to your laptop. 9. Never allow children to use the Internet without guidance and supervision. Lecture 3 14