Basic Security for your Computer System and Intellectual Property

SECURING YOUR COMPUTER SYSTEM and DATA

IT – WHY SECURITY IS REQUIRED

  • Paradigm shift from Manual Systems to  Automated IT systems
  • Business has become IT-centric
  • Lot of stake with loss of Virtual Data
  • Financial transactions gaining importance on the  Web.
  • Intellectual Property being highlighted as a  highly confidential matter hence to be highly  secured.

THE DARK SIDE OF THE WEB

  • Business has gained through the web media.  But… the dark side lurks somewhere to pounce on hapless, unsecured valuable data.
  • Hacking and virus attacks have grown over the years.
  • Financial frauds through the web has increased.

TYPICAL IT SECURITY THREATS

  • Malware
    • Virus
    • Spyware
    • Adware
  • Network Attacks
  • Software Flaw Exploitation
  • Social Engineering
    • Spam
    • Email Scam
    • Phishing

END USER SECURITY GUIDELINES

Main areas in which the End-Users need to  exercise caution

  • Emails
    • Using Emails safely
  • Surfing
    • Browsing/ Surfing Internet safely
  • Your PC
    • Necessary steps in PC HouseKeeping
  • Authorization
    • Ensure effective Password Management

GUIDELINE  FOR EMAILS

  • Beware of Emails from unknown parties/ groups/  individuals.
  • Do not open unsolicited emails. Most unsolicited  emails are known for social engineering scams. emails are known for social engineering scams.  E.g. You have won $1,000,000. Kindly send your  bank details for further action.
  • It’s your responsibility to carefully scan and  analyze INCOMING EMAILS.
  • It’s a big bad virtual world. Never believe/ trust  UNKNOWN parties.UNKNOWN parties.
  • Avoid exposing your contacts to suspect sites.
  • Do NOT OPEN emails containing executable files  (E.g. .exe, .com, .bat, .reg).
  • Suspicious attachments with very low or large  size must NOT BE OPENED.size must NOT BE OPENED.

Prevention from Phishing

  • Do NOT give out personal information
  • Ensure you are on the right website with the right  URL. Avoid clicking on any URL link within the URL. Avoid clicking on any URL link within the  email, website. Instead type out the URL that you  rely on.
  • Always refer to the Organization’s website since  many companies post scam alerts when their name is  used inappropriately.

GUIDELINE FOR SURFING

  • Do NOT SURF on sites that contain offensive/  banned material
  • REFRAIN from DOWNLOADING games,  screensavers and unnecessary gimmicks from the screensavers and unnecessary gimmicks from the  Internet. They may have embedded spyware,  malware or viruses.

GUIDELINE FOR  PC HOUSEKEEPING

  • Do NOT eat and drink near computers
  • Do NOT smoke in the vicinity of computers
  • Periodically BACKUP your data
    • On other systems
    • On external media
    • Lock your PC with a standard screensaver having effective password protection.
    • Ensure locking your PC when left unattended.
    • AVOID USE of pirated and unauthorized  software
    • Regularly EMPTY your RECYCLE BIN to  permanently remove all the deleted filespermanently remove all the deleted files
    • Ensure that your machine has the LATEST  VERSION of the anti-virus and anti-spyware.

GUIDELINE FOR  PASSWORD MANAGEMENT

  • Your password is the KEY to ensuring security  for your computer.
  • Ensure the following for your password
    • ATLEAST eight (8) charactersATLEAST eight (8) characters
    • Should CONTAIN both UPPERCASE and lowercase letters
    • Atleast ONE NUMBER
    • Atleast one SPECIAL Character (E.g. %{+?#$ etc.)
      • Avoid the following usage in Passwords
        • PASSWORDS should NOT:
          • Be based on personal information such as Names,
          • family member names, dates, addresses, phone family member names, dates, addresses, phone      numbers and so on.
          • Be based on work information such as Room
          • Numbers, building name, co-workers name, phone number.
          • Use word patterns usage such as aaabbb, qwerty,  122221, abc123 etc.
          • Passwords should be REGULARLY changed.
          • Passwords NOT to be shared with anyone.

A Difficult to guess passwords must be used. A poor   password will compromise your computer and  hence data.

REPORTING INCIDENCES

  • Reporting Security attacks ensures that you  avoid serious breaches in the future.
  • In Office/ School
    • Contact the appropriate responsible person in case of any security breach.
    • Inform your immediate supervisor.
  • At Home
    • Report any case of suspected malicious attacks to  your area cyber police.
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s