Lecture 8
Lecture 8
Lecture 8
Plan:
1.Security risks of information and their classification. Industry of cybersafety.
2.Cybersafety and control of the Internet. Malicious applications. Measures and means of
information protection.
3.Standards and specifications in information security field. The acts of the Republic of
Kazakhstan governing legal relations in the sphere of information security. Digital signature.
Encoding.
Aim of the lecture: to give an idea of legal regulation that covers the information security.
Having studied this session the student will be able to:
Identify the types of computer threats that you may meet with the software and
hardware of your computers
Take safety precautions to minimize threats to your computer
Identify and solve privacy issues
Understand what copyright is
Avoid using computers illegally
Understand the other legal regulations related to computers
Wikipedia
In the other words, Computer Security is the protection of computing systems and the data
they store or access. Here, it is required to assure that your information are protected in terms of
Confidentiality, Integrity, and Availability as illustrated in the Figure 22 below.
Information security plays a major role in your computing system, especially when the
computer is connected to the internet or any other network. Due to being attacked, an
unprotected computer can become infected or compromised within a few seconds after it is
connected to the
network. In the other hand it can be a case for the other computers which are available in its
network.
Possible attacks
Following is a list of attacks that may arise with your computer if not proper security
measures taken. In other words, following are the ways that your computer may behave due to
being hacked.
Security measures
The following steps can be followed to prevent being attacked.
Use good, cryptic passwords that can‟t be easily guessed. And keep your passwords
secret.
Make sure your computer‟s operating system and applications are protected with all
necessary security “patches” and updates.
Make sure your computer is protected with up-to-date anti-virus and anti-spyware
software.
Don‟t click on unknown or unsolicited links or attachments, and don‟t download
unknown files or programs onto your computer.
Remember that information and passwords sent via standard, unencrypted wireless are
especially easy for hackers to intercept.
Look for “https” in the URL before you enter any sensitive information or a password
(The “s” stands for “secure”).
Also avoid standard, unencrypted email and unencrypted Instant Messaging (IM) if
you‟re concerned about privacy.
Solution: Consider using a Combined Surge Protector (CSP) and Uninterruptible Power
Supply(UPS). See Figure 23 and 24 below for a CSP and UPS used for PCs respectively.
Age.It is not an amazing thing that as computers age they tend to fails more often.
Electronic components are stressed over time as they heat up and cool down. Mechanical
components simply wear out. Some of these failures will be dramatic; something will just stop
working.
Some, however, can be slow and not obvious. Unfortunately, it‟s not a question of “if”, but
“when” in regard to equipment failure.
Solution: Keep an eye on the specials after three to five years.
Incompatibilities
You can have hardware problems on a perfectly healthy PC if you have devices installed
that do not properly share interrupts. Sometimes problems are immediately obvious, other times
they are subtle and depend upon certain events to happen at just the wrong time, and then
suddenly strange things happen.
Solution: Make a really good backup before installing anything (hardware or software) so
youcan revert the system back to a stable state which should something crop up.
Finger Faults
Your fingers may make mistakes when using the keyboard and frequent cause of data
corruption. This commonly happens when replace one file but actually get another.
the mouse and they are too you are intending to delete or
If you are using a laptop computer or a notebook, another finger fault problem arises with
touchpads below the space bar. It‟s very easy to brush the touchpad when you are typing away
and suddenly find yourself entering characters in a screen location very different from where you
were before you touched the pad.
Solution: Be careful and look up now and again to make certain your cursor is where you
wantit.
Malicious or Careless Damage
Someone may accidentally or purposely delete or change a file on your PC when you‟re not
around. If you don‟t keep your PC locked in a safe, then this is a risk. Sometimes, you may not
detect that something has happened to your data while you are not around. Most of this type of
damage is done unintentionally by someone you probably know. This person didn‟t mean to
cause trouble; they simply didn‟t know what they were doing when they used your PC. That may
be a person who is new to use computers.
Solution: Never run the computer as an administrative user and have guest accounts
available forothers who use the computer. Keep up-to-date backups as well.
Data carriers
One possible source for computer infections is the Customer Engineer (CE), or repairman.
When a CE comes for a service call, they will almost always run a diagnostic program from CD.
It‟s very easy for these CDs to become infected and spread the infection to your computer. Sales
representatives showing demonstrations via CDs are also possibly spreading viruses. Always
check your system after other people have placed their data carriers such as CDs, Portable Hard
disks, and USB pen drives into it. (Better yet, if you can, check their disk with up-to-date anti-
virus software before anything is run.)
Solution: Insist on testing their CD/Pen drive/portable hard disk before use or make
certainthey‟ve used an up-to-date anti-virus before coming to your location.
Magnetic Zaps
Computer data is generally stored as a series of magnetic changes on disks. While hard disks
are generally safe from most magnetic threats because they are encased within the computer
compartment, the older technology: floppy disks are highly vulnerable to magnets. You may be
happy that Floppy disks are not now in use with your PC.
The obvious threat would be to post a floppy disk to the refrigerator with a magnet. Some of
the more subtle sources of magnetism include:
Computer Monitor: Don‟t put floppy disks anywhere near the monitor; it generates a
magneticfield. (Generally applies to the older CRT displays.)
Telephone: When ringing, telephones (particularly older phones with a bell) generate a
magneticfield.
Solution: Stay away from magnets or sources of static of all kinds when working with
acomputer.
Note: There are tools to assist in recovery from disk problems, but how do you know all the
datais OK? These tools do not always recover good copies of the original files. Active action on
your part before disaster strikes is your best defense. It’s best to have a good, current backup
and, for better protection, a complete up-to-date integrity-check map of everything on your disk.
3.Standards and specifications in information security field. The acts of the Republic of
Kazakhstan governing legal relations in the sphere of information security. Digital
signature. Encoding.
Exposure in browsing Web
Sometimes, you may think that you are unidentified an unexposed to other users when you
browse web sites. But there may be a possibility of leaving information about you left behind.
However, you can reduce the amount of such information that reveals about you to other users
by following some privacy policies. Next sections will discuss how to protect your privacy when
using Web.
Information that reveals you
The following information may be automatically sent to the web sites when you visit them.
IP address of your computer: the Internet Protocol address assigned to each computer on
theinternet. It may be a static one which remains unchanged or it may be dynamic which changes
time to time as you access internet.
Domain name: the domain (division of internet) to which your user account associated
with.
Software particulars: There is a possibility for an organization of identifying the
operatingsystem used and the details of the web browser you use.
Details of pages visit: what pages and for how long you stay on a particular page, and the
factwhether you used a search engine to access that page can be identified
Other information: some non-critical information such as the web browsing pattern and
somecritical information such as passwords saved in temporary memory also can be detected if
the web site uses cookies.
Limiting the information collection
You can follow the actions mentioned below in order to reduce the amount of information
that can be collect about you.
Pay special attention when supply personal data: If you don‟t trust any site, don‟t give
yourpersonal data such as your credit card details, account details, passwords, etc.
Limiting cookies: the cookies can provide the store data about you to the attackers who
accessyour computer. You cannot limit it. But you can limit the use of cookies. Check and delete
cookies: All popular browsers let users view and delete cookies installed on their computer.
Methods vary by browser. For instance on Internet Explorer 8, go to the "Tools" menu, pull
down to "Internet Options" and under the "General" tab there are options for deleting some or all
cookies. There might be hundreds, so deleting all might be easiest. But the next time you visit a
favorite site, you may need to retype passwords or other login data previously stored
automatically by one of those cookies.
Adjust Browser Settings: Once you've deleted cookies, you can limit the installation of
newones. Major browsers let you accept some cookies and block others. To maintain logins and
settings for sites you visit regularly, but limit tracking, block "third-party" cookies. Safari
automatically does this; other browsers must be set manually.
Browse safely: If you see that the site you access is suspicious, then immediately leave the
site.Keep your virus definitions updated. Scan your computer for spyware.
Protecting your privacy
To protect your identity and prevent an attacker from easily accessing additional information
about you, you are required to avoid providing certain personal information such as your birth
date, your phone number, and social security number online. Further, the following help protect
your privacy.
Privacy Policy: You are advised to look for the privacy policy statement given in the
sitesbefore you submit your information such as e-mail address, name, phone number, etc.
Usually, the privacy policy must state how the information they request are used and whether
they are going to distribute those data to other organizations, etc.
Encrypt the information provide: Many sites use SSL (Secure Socket Layer) certificate
toencrypt the information you provide to that site so that other attacker or an organization cannot
access your information collected by the site.
Work only with trusted companies: When you do business with some sites, you are
required toassure that you trust them. You may answer yourself to the facts such as whether the
company is a reputed, well established one, is it providing assurance on privacy of information
provided, is there legitimate contact information provided that enables you decide that the
company is a trusted one.
Avoid using primary e-mail address: When performing online submissions, use an
additionale-mail address in place of your primary e-mail address to avoid accumulation of spam
or unwanted messages.
Avoid using Debit Cards for online purchasing: Your Credit card usually give the
protectionto some extents. However, the Debit cards do not give such protection and they deduct
charges immediately from your account. So, if an attacker obtains your debit card details, they
will completely use your money in the account even without giving you a time to realize it.
Use Options in providing information: You might have found that some options are there
withcertain web sites to make your work easy without concerning your security. Prompting an
option to remember your password is an example for such instances and such options may make
your data readily available for the attackers. We can take the privacy settings given to your
account in social networks such as Face book as another example. You can restrict the other
parties accessing your data by setting the privacy options to reduce the risk of attackers.
Computer Related Legal Regulations in Sri Lanka
As a person who uses the computer and the internet, it is worth to get a considerable
knowledge in the legal aspects related to the computer using to be aware and prevent any illegal
actions. The
following sessions will brief you about the premier organizations/projects developed in Sri
Lanka on this regard, the copyright law, and the data protection laws in the context of Sri Lankan
law.
Questions:
1. What is meant by Information Security?
2. Explain the possible attacks that may arise with your computer and how to prevent them.
3. What is a computer virus?
4. Give two types of computer viruses with two examples for each type.
5. What is meant by malware?
6. Briefly explain the ways to find out that a computer virus or malware program is present
in your computer.
7. Discuss the examples for possible hardware threats to your computer along with
solutions.
References
1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition -
Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge,
MA, COPYRIGHT © 2014.
2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of
Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.
3. Craig Van Slyke Information Communication Technologies: Concepts, Methodologies,
Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288
4. Utelbaeva A.K.,Utelbaeva A.K. Study guide for lectures on discipline “Computer
science”, Shimkent 2008, 84 pages.