Vous êtes sur la page 1sur 17

Information Security Newsletter Series

List of Subjects

1. Information Security for the Home—An Introduction


2. You May be at Risk
3. Threats to Security
4. Responsibilities in a Nutshell
5. Passwords: Your 1st Line of Defense
6. Broadband vs. Dialup
7. Cyber Ethics
8. Cyber Crimes and Your Children
9. Safe Online Shopping
10. Email Attachments
11. Spam Email
12. Computer Viruses
13. Computer Backups
14. Firewalls
15. Identity Theft
16. Group Presentation (Advertisement)
Information Security Newsletter Series: Information Security for the Home –
An Introduction

Information security is a term used to security system. Obviously, we do these


describe the process of protecting information things for several reasons, but primarily to
and services from misuse or destruction. keep our families and our possessions safe. It
When we use the term in the context of the is the same with information security. An
home, we use it to describe the steps we take unsecured computer is an invitation to browse
to make sure that our computers, the through your and your family’s life. To keep
information we have stored on it, and the this from happening and to achieve the above
people who use it are kept safe from harm. goals, we use three strategies:
Unfortunately, information security in the
home is often overlooked. But by taking a • Prevention: This strategy represents the
few moments to learn a few key concepts and need to install the proper software and/or
concerns, you can make sure that you are hardware and take the proper precautions
keeping your family and your information in order to stop an attack before it occurs.
safe. • Detection: This strategy represents the
need to keep your system up to date on
Goals of Information Security the latest types of attacks in order to
Let’s start by investigating the purpose of understand when your PC has been
information security. We want to achieve damage or is at a high risk.
three main goals by practicing good • Recovery: This strategy represents the
information security. Other goals, such as the need to form a plan of action in order to
safety of your children and the privacy of your reverse, if possible, damage done to your
personal information, depend upon these computer and/or personal information
goals: after an attack has occurred.

• Confidentiality: Information is available This following collection of newsletters will


only to those who rightfully have access help to educate you on the possible risks of
to it. not keeping up-to-date on information
• Integrity: Information should be security measures, how different attacks can
modified only by those who are affect you, and how to prevent damage to
authorized to do so. your computer and/or personal information.
• Availability: Information should be Focusing on the above goals and strategies
accessible to those who need it when they while reading this collection of newsletters
need it. will not only help you to better understand
the specifics of information security, but it
Information Security Strategies will also help you to learn how to better
Most homeowners take steps to protect their implement these practices into your home.
homes by installing locks on their doors,
smoke detectors in the hallway, or even a
Information Security Newsletter Series: You May be at Risk

In our first article on information security, we may still be a target. Being online for even a
learned that information security involves the short time gives intruders the chance to take
prevention and detection of unauthorized use enough information to steal your identity or
of a computer or information system. We also cause damage to your or someone else’s
learned about the three main goals of computer.
information security: confidentiality, integrity,
and availability. Today, we will investigate How easy is it for a hacker to break into your
risks to information security and ways to computer? Unfortunately, intruders are
prevent these risks. discovering new ways to gain access to your
information every day. When holes in the
If you’re like many people, you’re probably system are discovered, however, computer
wondering who, exactly, would really want to vendors will often develop patches to address
break into your computer, and why. After all, the problem. Even though they do this, it is
your home computer is much less enticing up to you to obtain and install the patches, or
than, say, a bank’s computer, right? This may correctly configure the software to operate
be partially true, but unfortunately, hackers more securely. Most incidents can be
don’t care about who you are. They want to prevented if users would keep their computers
gain access to your computer to use it to up to date with patches and security fixes.
attack other computers or take your personal Some software even has default settings that
information to use against you or use to steal allow others to access your computer unless
your identity. you change the settings, such as chat
programs or web browsers.
Here’s how a typical hacker operates: A
hacker scans the Internet for an “open” The only way to make any information system
computer, a computer with little to no more secure is to learn about the ways to
protection on it (we refer to this as the make it so. Although this article only touches
“lowest hanging fruit”). He then breaks into the surface of even the basic risks to
the computer, and then uses it to attack other information security, you will learn more
computers. Why? This way he can keep his about making your time online and your own
whereabouts a secret. Sometimes a hacker information system safer and more secure in
actually breaks into several computers, and the articles that follow. Although no system is
uses them all to attack one computer at the ever impossible to break into or free of risk,
same time. learning the ways to make your own
information system more secure will help
Even if your computer is connected to the reduce the chances of anything harmful
Internet for only a short time, your computer happening to your information.
Information Security Newsletter Series: Threats to Security

Threats to computers and information above threats. The two main vulnerabilities to
systems are quite real. In previous newsletters, home users are to your operating system (OS)
we’ve discussed hacking risks to your and to your Internet connection.
information systems, but this is just as mall
element of the big picture of threats and An OS is the program that essentially “runs”
vulnerabilities to information security. your computer. Although Microsoft Windows
Identifying threats are only part of the picture; and Apple Mac O/S are the most well known
once threats are identified, it is up to you to operating systems, others that you may have
find the vulnerabilities in your information heard of include Linux and UNIX. If
system and find ways to keep these threats someone knows what OS you’re running on
from occurring. your computer, the more likely he’ll be able to
access your system and exploit weaknesses
Although threats to information systems are within it. Making sure that you frequently
evolving and abundant, they can all be broken check for security patches and updates will
down into three categories: help keep your system more secure.

Natural Threats: These can best be thought Internet connections are also susceptible to
of as threats caused by Mother Nature— threats. Broadband connections are more
floods, quakes, tornadoes, temperature susceptible than dialups because these services
extremes, hurricanes, and storms are all are always connected to the Internet, making
examples. it easier for people to find you and take your
Intentional Threats: Computer crimes are information or send you a virus. Purchasing a
the best examples of intentional threats, or firewall and an anti-virus program will help
when someone purposely damages property keep your information safe from attack when
or information. Computer crimes include connected to the Internet for long periods of
espionage, identity theft, child pornography, time.
and credit card crime.
Unintentional Threats: These threats Being aware of threats and vulnerabilities is
basically include the unauthorized or the first step in making your information
accidental modification of software. Have you system more safe and secure. Although no
ever accidentally deleted an important file, or system is truly safe from all threats, knowing
tripped over a power cord? ahead of time just what could compromise
your information and becoming educated in
Finding the Vulnerable Spots ways of preventing these threats will make
Now we need to be able to determine how you more prepared for any attack and give
your information system is vulnerable to the you the chance to protect yourself from it.
Information Security Newsletter Series: Responsibilities in a Nutshell

Just as if your home were a business, you are Technical: Technical countermeasures mean
the Information Technology (IT) Specialist of using software to protect your system,
your home computer. As that IT Specialist, it including installing firewalls and anti-virus
is your responsibility to protect your software, as well as taking steps like changing
computer—and any data stored in it. You are the security settings of your Web browser.
in charge of the security of your home system,
meaning you have the responsibility of Procedural: Procedural countermeasures are
identifying any unusual activity on your activities that you establish in order to prevent
system and responding to that activity in an the exploitation of your computer. This
effective and timely manner. This could entail includes scheduling scans and updates for an
fixing security weaknesses in your Internet anti-virus program, password protecting
service through the use of firewalls and virus accounts and screen savers, and backing up
detection software, repairing operating system important data on disks.
difficulties through patches and updates, and
simply staying abreast of these problems in Contracts: A set of easily-accessible, written
general. and signed contracts will ensure that your
children are following the rules you have set
Earlier, we discussed the four major security out for them in regards to using the computer
threats: environmental natural, environmental and the Internet.
manmade, human intentional and human
unintentional, as well as the two major Summary
vulnerabilities associated with computers, Remember that, although no system can ever
which are through Internet connections and be 100% tamper proof, having some simple
operating systems. countermeasures in place will help keep many
intruders at bay and your computer safe. As
In order to effectively prevent vulnerabilities your home’s IT Specialist, it’s up to you to
and threats from occurring, it is up to you as make sure that these countermeasures are
the IT Specialist to create countermeasures used and followed. It’s also important to have
for them. Although no system can be 100% consequences for not following policies and
secure, having countermeasures in place can procedures. Grounding a child from using the
certainly lessen the likelihood of risks or computer for a week for not running the anti-
vulnerabilities from being exploited on your virus software on a downloaded attachment
computer. might make him think twice before not doing
it again.
There are three common countermeasures
that you can easily implement on your home
computer:
Information Security Newsletter Series: Passwords: Your 1st Line of Defense

Protecting your computer with a password is • Are not used over and over again for
a common method of ensuring that only different programs and websites
those with permission can access it. However, • Are typed quickly, making it harder for
passwords are effective only as long as you someone to steal by eavesdropping
use ones that are easy to remember and
difficult to “break,” and that are changed on a Weak Passwords:
regular basis. Did you know that anyone with • Contain your login, your name, your
a little bit of technical know-how can maiden name, your spouse's name, your
download a program off the Internet and use children's names or your pets’ names in
it to break weak passwords? These programs any form as your password
use “brute force” and “dictionary attacks” to
• Contain publicly accessible information
try every possible combination of words and
about yourself, such as social security
letters to break into your account. The best
number, license numbers, phone
way to combat this very real threat is to write
numbers, address, birthdays, etc.
strong passwords. The following simple rules
for writing and using strong passwords will • Contain a word found in a dictionary of
keep your computer more secure, decreasing any language
the chance of compromise. • Are made of all numbers or all the same
letter
Your Password: Strong or Weak? • Are saved in the “Remember Password”
function on mail or website browsers
Strong Passwords: • Are written down
• Are 8 or more characters long Are shared with others
• Contain combination of upper and
lowercase letters, numbers, and symbols Summary
($ch00LrU135 = school rules)
• Are passphrases: Choose a line or two Passwords make it as difficult as possible for
from a song or poem and use the first someone else to access your information. If
letter of each word. For example, “It is you follow the strong password practices
the East, and Juliet is the Sun'' becomes outlined above by writing strong passwords or
“IstE,@J1tS” passphrases, changing them frequently (every
3-6 months), and keeping them safe from
• Are changed on a regular basis
others by not sharing them or writing them
• Are easy to remember and are not written down, you will be able to keep your computer
down and your personal information—such as your
banking and credit card information—safe.
Information Security Newsletter Series: Broadband vs. Dialup
Parents across the nation have already been to make a setup call to your ISP each time you
introduced to broadband Internet connections wish to access the Internet; this means that once
such as cable or DSL (Digital Subscriber Lines) by you are assigned an IP address, you keep it until
their children, who want to have a faster, higher- you request it to be changed. We’ll learn how to
quality connection. Whatever your reason for do this in a later newsletter.
considering purchasing a broadband connection, it
is very useful—and important—to know the Connection speed and price are two important
differences between broadband and dialup considerations when choosing between dialup and
Internet connections and the advantages and broadband. Dialup connection speeds make it
disadvantages between each of them before more difficult to view certain types of media, such
making a decision to go high-speed. as video, and it can take much longer to download
and open email attachments, play online games,
The fundamental difference between dialup and and so on. Although the slower connection speed
broadband Internet connections is the manner in is a disadvantage for dialup users, there are also a
which the connection is made from your PC to the few advantages to using this type of connection,
Internet. A dialup service connects to the Internet which include lower monthly charges and a higher
through your phone line. The modem in your PC level of security. The cost difference is obvious
“calls” an Internet Service Provider (ISP) and when comparing the $20-30 per month
connects with a maximum speed of 56,000 bytes subscription fee for dialup and the $50-60 per
per second, better known as a 56K speed month subscription fee for most broadband
connection. Each time your PC dials into the ISP, services. In terms of security, because the
it is assigned an Internet Protocol (IP) address, connection is not “always on” and because you are
which you can think of as an “Internet address.” assigned a different IP address each time, it is
A different, unique IP address is assigned at the slightly more difficult to be attacked over the
beginning of each visit so that the ISP can Internet, although nothing is ever fool proof and
recognize your PC and make sure you can send risks still do exist.
and receive email, surf the Internet, and so on;
basically, this address lets your ISP know where to The advantages of a broadband connection can
send the information you are requesting through sometimes outweigh some of the disadvantages.
your modem. In terms of hackers, in order for The increased connection speed allows for ease in
someone to gain access to your computer, it would initial connection, duration of connection, no
be necessary for them to know your IP to additional phone charges that may apply in dialing
successfully do so. The fact that your IP address into an ISP, and variability of Internet use, such as
constantly changes essentially makes your Internet an increase in allowable file viewing size.
connection more secure. However, if you do choose a broadband
connection, you’ll need to purchase a firewall—
In contrast, when you connect to the Internet via a which we’ll learn more about later—to keep your
broadband Internet connection, the process is computer “invisible” to the outside world.
slightly different. Once your PC is connected to
the ISP through a cable or DSL connection, it In the ongoing debate of which is better there isn’t
remains connected until the cable box or DSL line is really a clearly correct answer. If you use the
disconnected or physically unplugged. A DSL Internet to check email, stock quotes, and visit the
connection runs through unused wires in your occasional website, dialup will be sufficient. But if
existing phone line without disruption and can you frequently download large media files, play
translate data at 5 million bytes per second, or games over the Internet, and view sites that are
5Mbps. Broadband services are often referred to high in image content then you may be more
as “always on” services because it is not necessary satisfied with broadband service.
Information Security Newsletter Series: Cyber Ethics

Is there a difference between ethics in the real the Internet still have the same repercussions
world and ethics online? While the answer to as actions in the real world.
this question might seem obvious to parents,
for many children, there is a very real—and Promoting Ethical Behavior Online
potentially dangerous—disconnect between Now that we know a little bit about why
ethics in the real world and cyberspace. A children don’t transfer ethical behavior to the
recent poll found that nearly half of the online environment, we can examine a few
elementary and middle school students who strategies for promoting ethical behavior:
responded said they don’t believe hacking is a • Communication: The most obvious
crime. Why is there this divide between real- strategy involves taking the time to talk
world and cyber ethics, and what can parents with our children about acceptable and
do to make sure that their children practice unacceptable online behavior. Children
ethical behavior when online? need to understand that their actions can
impact others, and that they should
The Ethical Divide practice the same etiquette online as they
Is the Internet that much different than the would in the real world. Make
real world? After all, a crime is a crime. comparisons between online and real-
There are two characteristics of the Internet world ethics and point out that they are,
that make it difficult for children to transfer in reality, the same.
ethical behavior to the online environment: • Modeling: When online, model ethical
behavior and point out areas where
The first characteristic is the feeling of ethical behavior makes a difference.
anonymity. The New Yorker once published a • Contracts: Sign a “contract” with your
cartoon with the punch line, “On the Internet, children that outlines the type of behavior
nobody knows you’re a dog”; the cartoon was you expect, as well as the consequences
making the point that it is easy to feel invisible for breaching the contract. What should
on the Internet. Children often believe that be in this contract? A good source of
they are “invisible” online because they information to draw from is the
cannot be identified and can get away with Computer Ethics Institute’s “10
more (this actually isn’t true—modern Commandments of Computer Ethics,”
computer forensics makes it very easy to track which you can find online at
a user online). Many young children also feel <www.brook.edu/dybdocroot/its/cei/de
that regular rules don’t apply to the Internet. fault.htm>.
The second characteristic is distance. On the Summary
Internet, many people do and say things to Children need to know that using the Internet
others that they would never consider doing is a privilege, not a right, and that improper
to someone face-to-face. Because children use has consequences. Sitting down with your
cannot see the direct consequences of their child and discussing these issues is the best
actions, they often think that what they are way to make sure he does not use the Internet
doing won’t harm anyone else. Of course, in a harmful or malicious way.
parents know that this is not true. Actions on
Information Security Newsletter Series: Cyber Crimes and Your Children

ISPs, parents, software companies, and programs is harassment; children are saying
schools have been doing their best to protect things to other children—both at school and
children from risks online, but there is still a in other communities—that they would never
need to protect the Internet from children say face-to face. Parents need to teach their
who may wish to find ways to abuse and children about appropriate communication
exploit it. To prevent children from through email and chat programs.
participating in these cyber crimes, it is
important to define cyber crime and examine The computer as an accessory (using a
the losses from cyber crime, as well as the computer to store illegal files or information):
ways to keep your children from becoming The Internet is a useful tool for finding
perpetrators in these crimes. information in a quick and convenient way.
Even though much of this information is
The US Department of Justice categorizes available for everyone to use, many products
cyber crime in three ways: and services found online are not permissible
to be reproduced or downloaded, especially
The Computer as a Target (using a music and purchasable programs. Popular
computer to attack other computers): peer-to-peer software programs make is easy
Did you know that the majority of to share copyrighted material and actually
cybercrimes in this category are committed by encourage downloading, but it is a violation of
children? As recently as September, 2003, a copyright law to take music or software from
teenager was arrested for creating a the Internet without the permission of the
devastating computer virus. How did he learn owner. It is easy for children understand why
to do this? A simple Internet search will the theft in the real world is wrong, but it is
reveal all the tools necessary to create viruses difficult for them to understand theft of
and hack into others’ computers. Hacking intellectual property. Teach your children not
can take a variety of forms, ranging from to download pirated or counterfeit material.
stealing passwords and classified information
to vandalizing Web sites. Unauthorized entry Summary
into an information system through hacking
or viruses has serious legal consequences. Although it may not seem real, cyber crime
Talk with your child about the ethical and has actual victims and very concrete
legal implications of hacking. consequences. Whether it’s loss of money,
time, pride, or life, someone or something is
The computer as a weapon (using a always a victim. The best way to prevent cyber
computer to commit real world crimes) crime is to educate children about the types of
Take, for instance, email. Children believe cyber crimes, the cost of cyber crime to the
email is harmless because they don’t see the victims, and the consequences for committing
impact on the person who receives it. A such crimes.
growing trend with the use of email and chat
Information Security Newsletter Series: Safe Online Shopping

Online shopping may be one of the most useful information on a web site, check to see that the
services that the Internet age has brought us; web address begins with https:// instead of http://.
online shopping is convenient and often presents If you are uncomfortable giving out financial and
us with more choices and better deals than we can personal information online, many reputable sites
find locally. There are, of course, a few potential also have a phone in option. Browse the seller’s
dangers to online shopping, including fraud, online catalog, then order via phone.
identity theft, and privacy invasion. Fortunately,
by staying informed and being aware of a few key Privacy: Online shopping means that the seller
factors, you can ensure that your online shopping will be collecting your personal information. Make
experience is safe and successful. sure you know how the seller intends to use your
information before you give it to them. Reputable
So what should you watch out for when shopping sites will post an easy to understand privacy policy
online? The following key items are important to on their site. A good privacy policy should tell you
consider: what information is collected (note that a website
should never ask for your social security number),
The Seller: Just as in the physical world, you how it will be used, and whether or not you can
should always ask yourself if you trust the seller “opt out.” Make sure you agree to a site’s terms
before you buy anything from them. Use your gut before you order; otherwise, you may find yourself
instincts when purchasing online; if a website flooded with spam and telemarketing calls.
looks unprofessional—if it doesn’t contain any
contact information, looks shoddy, or contains Email Confirmations: Related to both privacy
typographical errors—you probably don’t want to and security are the email confirmations that many
purchase from it. Judging a seller is more difficult sellers send after you have made a purchase.
in online auctions. In this case, look to see if the Often these emails will contain confidential
seller has any reviews by other customers. If the information, such as your name, address,
deal seems too good to be true, it probably is; telephone number, and credit card information.
modern con artists create fake websites and send Email communications are not considered secure;
out phony emails to lure unsuspecting shoppers if this information falls into the wrong hands, you
into giving away their hard-earned money. could become the victim of identity theft. So
when given the option, choose not to receive email
The Product & Terms: Again, if a deal seems confirmations.
too good to be true, it probably is. Make sure that
you are going to get what you think you’re buying. Online shopping is a liberating experience, but like
Also, while it is convenient to shop online, it is not many things on the Internet, it is not without its
always as convenient to return an item or resolve a potential pitfalls. Take the time to evaluate the
dispute. Make sure you know the shipping policy, security and privacy of the website, the product
check the return policy, and before you confirm and shipping information, the return policy, and
your purchase online, double check the price and the seller’s reputation before you buy, and you will
quantity. have a safe and successful online shopping
experience. If you would like to learn more about
Security: Credit card transactions are a mainstay safe online shopping, visit www.safeshopping.org
of online shopping. To ensure that your credit card for more tips or www.ftc.gov/bcp/menu-
and personal information stays out of the wrong internet.htm for information about online
hands, check to see that the website uses SSL shopping hoaxes and scams.
encryption. Before entering any personal
Information Security Newsletter Series: Email Attachments

Even if you consider yourself to be a impersonate another person’s email address,


knowledgeable user of the Internet and email also known as “spoofing.” Email spoofing
programs like Microsoft Outlook, Outlook occurs when an email message looks as if it is
Express, Eudora, or Netscape, you might not from one person, usually someone you know,
always be aware of the ways that email can be when it actually was sent from another source.
used to affect your computer and how to Spoofing is often an attempt to trick you into
prevent email attacks. Let’s take a look at a opening an email attachment that contains a
few different attacks and the countermeasures virus; remember that if you weren’t expecting
that will keep you safe: an attachment from someone, it is a good idea
not to open it.
Viruses: Viruses and other types of malicious
code are often spread as attachments to email Social Engineering: Remember that while
messages. Before opening attachments, be service providers like America Online may
sure you know where the attachment came occasionally request that you change your
from and what type of file it is. Many email password, they will not specify what you
viruses are known to exploit hidden file should change it to. Also, most legitimate
extensions. The files attached to these service providers would never ask you to send
messages may appear to be harmless text, any password information or file via email. If
MPEG, AVI or other file types, but the file is you suspect that you may have received a
actually malicious script or executable virus spoofed email from someone with malicious
programs—.vbs, .exe, or .bat files, for intent, you should contact your service
example. Always read the entire file name provider's support personnel immediately.
before opening attachments. Also, remember that a company will never
actually send you a patch for a program via
Viruses and malicious code might be email.
distributed in amusing or enticing programs,
particularly around the holidays. It’s always Summary
best to never run a program unless you know
it to be made by a person or company that The safest thing to do when you receive an
you trust. Also, don't send programs of attachment or file from someone that you’re
unknown origin to your friends or family not expecting is to email back that person and
simply because they’re funny -- they might ask him if he sent you a file. If he didn’t, then
contain a virus. delete it. If you receive an attachment from
someone you don’t recognize at all, don’t
Spoofing: Advances in technology have even think twice and delete the file.
allowed spammers and malcontents to actually
Information Security Newsletter Series: Spam Email

If you're like most people, you've already but be aware that many websites use this
encountered problems with Spam email, the information to send out advertising.
common term for the Internet version of junk Many websites actually sell your email
mail. A Spam email is an unsolicited mailing, address to professional spammers.
usually sent to many different people, and it • Never Respond to Spam Email. For a
comes in many different forms. The most Spammer, one "hit" among thousands of
common is unsolicited advertising, but spam mailings is enough to justify the practice.
email also includes chain letters (“pass this • Never Respond to a “Remove” Reply.
email on or you will be jinxed”), hoaxes (“Bill This is just a trick to get you to react to
Gates will give you $500 dollars if you the email -- it alerts the sender that a
forward this email”), scams (“free gutter human is at your address, which greatly
installation”), and even forwarded jokes. increases its value. If you reply, your
While Spam seems harmless enough, there are address is placed on more lists and you
actually several reasons why you should be receive more Spam email.
concerned about it. • Never Use Sites that Promise to
Remove your Name from Spam Email
The first reason is that Spam email costs Lists. These sites are of two kinds: (1)
money. The recipient of the advertising is sincere, and (2) Spam address collectors.
forced to pay the cost of the message. You The first kind of site is ignored (or
pay for email for various reasons, but not to exploited) by the Spammers, and they
receive unsolicited advertising. Spam email often own the second.
also wastes valuable time, because you have to
• Don't Spam. Sometimes, the best thing
spend extra time to download the unwanted
you can do to fight Spam email is to make
messages, and then wade through the junk
sure you don't do it yourself. Before
email in order to get to the email you actually
forwarding on a joke, ask yourself if it is
want. Have you ever kept track of how much
the right thing to do. We all appreciate a
time you spend wading through Spam email?
good joke, but receiving twenty a week
The final reason to be concerned about Spam
from the same person can get old quickly.
email is that, if it continues to grow, the costs
will continue to rise. ISPs and other • Buy a Spam-Blocking Tool. Recently,
businesses spend incredible amounts of several different software packages have
money fighting Spam email. If the costs surfaced that claim to eliminate Spam
continue to increase, it will most certainly be email from your inbox. You might try
transferred to the consumer. one of these packages, although many of
them accidentally get rid of authentic
So what can you do to help eliminate Spam emails from your friends and family.
email? Here are a few tips that you and your
family can follow: Unfortunately, Spam email will be around for
some time. However, if you and your family
follow the tips listed above, you can minimize
• Don’t Give Your Email Address to
the number of Spam emails in your inbox.
Websites. There are many legitimate
reasons for giving out your email address,
Information Security Newsletter Series: Computer Viruses

Even though new computer viruses are reasonable in price. It is much cheaper to buy
created almost daily, there are practical steps virus prevention software than it is to fix a
you can take to prevent these viruses. This computer once it’s infected. Of course, you
article will define a computer virus, identify also need to update your virus definitions
the most common virus sources, highlight the frequently; new viruses are created every day,
three virus protection steps, and finally and it’s up to you to make sure that your
explain your role in virus protection. software is up to date by checking with your
anti-virus software’s website or running
A computer virus is a software program updating software, which will automate the
written to damage other computer programs; task for you. A final and important step in
some viruses will actually erase everything on prevention is to delete email attachments
your computer, and others will randomly pick without opening them and to refrain from
a document in your computer and email it to downloading files from the Internet.
everyone in your address book. Viruses self-
replicate and attach themselves to files such as Detection—Installing the program is not
documents, presentations, and system files enough to prevent viruses. It’s up to you to
and can be spread by email, CDs, and floppy make sure the program is run on a regular
disks. Viruses may also infect hardware such basis—twice weekly is usually enough. It’s
as system memory and hard drives. also a good idea to run the program manually
on occasion to make sure it is doing its job.
There are several warning signs associated
with viruses. Files that increase in size Eradication—When a warning is given about
randomly, the appearance of unknown files, a virus being detected on your computer, you
lost files, the inability to save files, corrupted must act quickly and quarantine the virus,
files, sudden lack of hard drive space, the delete it, and repair the compromised
inability to access programs, your system not program; most virus protection programs do
starting or closing correctly, or strange this for you.
messages appearing on your screen are all
telltale signs that you might have a virus. Following these three simple rules is the best
way to prevent your information system from
being attacked by viruses. Virus protection
Protecting Your Information: There are three software can handle most threats from viruses
basic steps to virus protection: prevention, as long as the software is regularly updated.
detection, and eradication. Anti-virus software relies on people like you
to provide information on new viruses so
Prevention—You must install virus antidotes can be created quickly, and with new
protection software in order to detect, viruses being generated daily, it is essential
eradicate, and report viruses. There are several that your virus definitions are up to date.
programs out on the market, and all are very
Information Security Newsletter Series: Computer Backups

Has it ever happened to you? One minute, Either way there are a few important things to
you are working on a file on your home keep in mind to ensure the best backup
computer, and the next minute, you get a blue possible:
“error” screen—your hard drive has ƒ Backups should be tested for correctness.
“crashed.” We all hope that computer A test of the backup method should be
failure—hard drive and system crashes, blue done with files that are considered
screens, lost data, and computers that just disposable. After you perform a backup,
won’t start up—don’t happen to us. you should delete those files from your
Unfortunately, they can—and do—happen. hard drive and then try to replace them
Computer failure can be as small an issue as using your backup.
that irritating message that a program is not ƒ Backup your computer in several different
responding during your shutdown process to media forms and make copies of each:
losing valuable and often irreplaceable Common backup media include:
information. Because computer failure is Diskettes, tape, portable storage (i.e. zip
inevitable, you should take measures to disk), CD-R and hard drives. It is always
prevent the loss of data and files and restore a good idea to make multiple copies in 2
you computer to its original condition. What separate locations.
is this measure? Backup. Backing up your ƒ Backup at least once or twice a month to
computer involves either copying everything keep it current and keep your files safe.
on your computer to another disk or taking a (If you use your computer for business
“snapshot” of your computer’s data so that it purposes, you may want to backup at least
can be rebuilt. While it sounds complicated, it once every week.
is actually quite easy. ƒ Run a virus scan on your computer
before you backup, and run a virus scan
There are two basic back up methods. The on a backup before restoring it to your
first is to use a removable storage device, such computer. Failure to do so will only
as a CD-R drive, an external hard drive, or perpetuate the problem.
even floppy disk drive, to manually save the ƒ Only backup what is necessary: It is not
data that is important to you. If you choose necessary to backup an entire hard drive.
this method, you must make sure that you Most computers come with restoration
remember to do it often. The second method CDs that will help you get your computer
is to use a software package that will guide back up and running.
you through the back up process to ensure a
quality backup. The advantage of this latter It is easy to forget to backup your computer,
method is that, not only will you save all your especially when nothing seems wrong with
important files, but you will also have an your computer. However, as many people
“image” of your computer that will make it can tell you, it only takes one hard drive crash
easier for you to get your computer up and with no backups to make you wish you
running smoothly. followed this simple practice. Follow the
strategies suggested above or look into a
software package that automates backups for
you to keep your data safe.
Information Security Newsletter Series: Firewalls
Computer attacks are on the rise, and it makes system, it is important to regularly check for
sense to be concerned about your family’s software and hardware (also know as
safety while surfing the internet. “firmware”) updates; most firewalls will have
Unfortunately, many of us have a false sense a built-in mechanism to do this.
of security because of the “it won’t happen to
me” mentality; the truth is that it does happen So, what is the best firewall on the market?
to ordinary people everyday. Hackers steal There are actually many good firewalls out
identities and wreak havoc on people’s private there. It will be well worth your time to use
lives. The good news is that there are ways an Internet search engine to do a little bit of
to prevent these attacks. consumer research before you make a
purchasing decision; take some time to read
A first step in protecting your computer and product reviews from reputable sources.
the information stored on it should be to Look for a firewall that monitors incoming
invest in a firewall. A firewall is a piece of and outgoing traffic, and make sure the
software or hardware that works by blocking firewall is user-friendly. Some firewalls come
intruders from gaining access to your PC. with wizards and helpful configuration
screens that will help you make sound
Although a firewall can cost anywhere from decisions about what type of configuration
$50 - $250 dollars, the benefits of having one you would like to have, while others are more
greatly outweighs the purchasing cost. This is sophisticated and require more knowledge on
especially true when the cost of a security your part. A recent trend in firewalls to
breach is factored into the equation. When consider is the bundling of other security
connected to the Internet, a computer can features: several firewalls now come with
potentially have 65,535 open “doors,” or spam filters, pop-up blockers, parental
ports, that are exposed to everyone on the controls, cookie filters, and intrusion
Internet. A firewall will “close” these ports detection systems. While these added features
for you and make sure that other computer may slightly increase the price, you might find
systems can’t “see” your computer. What this them worth the trouble.
boils down to is that it is a lot harder for an
unauthorized user, such as a hacker, to access With more people falling victim to the
a computer, especially from the outside world. increased amount of internet crimes and other
This is especially important for people who malicious activity, it is very important to keep
use a broadband Internet connection. information security a top priority at work and
at home. Installing and using a firewall is a
While there are benefits of using a firewall, good step towards peace of mind and should
there are also some limitations. Firewalls be part of an overall information security
cannot protect against viruses or worms, so it strategy. We’ll learn about more steps you can
is important to also install, use, and regularly take to protect yourself and your family from
update anti-virus software. Also, firewalls are online threats in upcoming newsletters.
like any other piece of computer equipment;
they must be maintained. Once you have
installed a firewall on your home computer
Information Security Newsletter Series: Identity Theft
Identity theft, the fastest growing non-violent 6. Carry your Social Security, credit, and
crime in America, occurs when someone bank cards only when necessary.
steals another person’s personal Otherwise, leave them in a secured place.
information—name, social security number, 7. Check your billing statements to look for
credit card numbers, and so on—and uses it purchases that you have not made.
to commit fraud. Identity thieves use this
information to open credit card accounts in 8. Periodically check your credit report and
your name, take out loans, buy cars, establish rating to look for any malicious activity.
wireless service, and more—all at no expense Some signs to look for include:
to the thief. A person has his or her identity • Inquiries of your credit report: This
stolen about once every 60 seconds. The will often include requests for credit
information needed to steal a person’s identity from employers, collection agencies,
is acquired by stealing a wallet or mail, or someone else with a legal right to
rummaging through trash to acquire old credit check your credit report.
card or bank statements, or even posing as a • Incorrect address: Thieves will often
landlord or employer to obtain a credit report. change billing addresses of accounts
you may have and forgotten about.
Now that we understand what identity theft is All unused accounts should be closed
and how it can occur, we can start to think as soon as possible in all cases.
about prevention. There are concrete • Unexpected public record: This
measures you can take to greatly reduce the shows court judgments, liens,
risk of becoming one of the 900,000 new foreclosures, and other public
victims of identity theft: records. Look for occurrences that
you are unaware of or are not yours.
1. Use strong passwords for your credit
• Unexpected derogatory information:
card, bank and phone accounts: Avoid
Look for unexpected past-due items.
easily guessed passwords such as you
Mother’s maiden name, a birthday, your
If you suspect that you have become a victim
address, etc. You can view the Passwords
of identity theft, you should contact the fraud
Newsletter for more suggestions.
departments of each of the three major credit
2. Secure personal information in your
bureaus (www. Equifax.com,
home, especially if you live with a
www.Experian.com, and
roommate.
www.transunion.com), file a police report
3. Stay up to date on information security
both with your local police or the police in the
procedures within your workplace.
community where the identity theft occurred,
4. Never give out personal information over
and close the accounts that you know or
the phone, mail, or Internet unless you
believe have been tampered with or opened
have initiated contact with that person.
fraudulently. Your personal information is
5. Protect information in your mail and
irreplaceable. By taking the steps mentioned
trash by shredding credit card
you will have better peace of mind about who
applications, bank statements, and
is spending your money and using your good
anything else that could be used to steal
name.
your identity.
Group Presentation: Teaching Your Children to Use the Internet Safely
and Responsibly

Internet usage continues to escalate, perpetrator—of cyber crime. This


particularly among children. This powerful presentation familiarizes parents with
tool offers many opportunities for information security issues and introduces
recreation, growth, and learning. On the the idea of creating a contract with their
Internet, children can get help with their children to help manage their family’s use
homework, research topics of interest, of the Internet. This contract can help
take virtual field trips, and communicate protect families against Internet dangers
easily with pen pals that live thousands of by helping parents communicate with
miles away. their children about cyber-ethics, cyber-
safety, and cyber-security issues. Creation
However, the internet also presents many of the contract can also reduce family
security threats to children and to their conflict concerning Internet use by setting
families. Some of the main threats can be clear guidelines for use and establishing
categorized into two groups: privacy and consequences for lack of observance of
safety issues and inappropriate online guidelines. Utilizing the defenses of
behavior. prevention and collaboration, the Internet
Use Contract can enable families to use
Privacy and Safety Issues: identity the Internet safely and responsibly.
theft, child predation, child harassment,
loss of personal files Delivered by CERIAS personnel
experienced in information security issues
Inappropriate Online Behavior: and K-12 education, this presentation can
unfiltered searches that lead children to be modified to fit any specified time frame
offensive material (pornography, hate from 30 minutes to 2 hours. In addition,
groups, hacking tools), spam, viruses, this presentation is also available in the
theft of copyrighted material form of a self-instructional document.
For more information, or to schedule a
While these threats will always exist, presentation, please contact Matt Rose at
parents can work with their children to mrose@cerias.purdue.edu or 496-7710.
reduce the risks of becoming victims—or

Vous aimerez peut-être aussi