Leah GiarritanoMarch 20, 2012LIS451LEConcept Paper #4: SecurityIt’s easy to be lulled into a false sense of security when ...
computer. Many of these programs have an option to monitor      your computer in real time. In others cases, you may have ...
Narrative/InsightsI would recommend the following top three security tips for thisaudience of typical users in a shared co...
issues. While doing research for this paper, I found this tip to be animportant reminder of the potential danger found whe...
Be Smart. Be Safe. Don’t Click.Avoid clicking on hyperlinks in emails,        they may be infected!!  Type the URL into yo...
zoeD9o=$!l      Phonetic Pronunciation(zulu - oscar - echo - DELTA - Nine - oscar -   Equals - Dollar - Exclamation - lima...
Prevent your computer and personal   information from getting infected!      Engage in smart Internet behaviors…        Do...
Upcoming SlideShare
Loading in...5
×

Giarritano concept paper 4

155

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
155
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Giarritano concept paper 4"

  1. 1. Leah GiarritanoMarch 20, 2012LIS451LEConcept Paper #4: SecurityIt’s easy to be lulled into a false sense of security when using yourcomputer. However, potential dangers lurk just around the corner andyou must be prepared. There are hardware, software and user securityissues to be aware of when using your computer. The following are mytop ten suggestions to follow in order to keep your computer andnetwork safe and have some peace of mind. 1. Protect your home network from “crackers” by using firewalls (hardware and software options exist and you can use both forms) to monitor data traffic. Select the desired level of security for your firewall.Anytime an application without an established firewall rule attempts to access the Internet, the firewall will allow the user to allow or deny Internet access. Most commonly, you want to be sure that access to the Internet be allowed for email, web surfing, and chatting. (Hardware/Software Issue) 2. If you use a wireless router, set a password and enable encryption. Most routers have either Wireless Encryption (WEP) or Wi-Fi Protected Access (WPA). Selecting the encryption option and a secure router administrator password are two very important steps to keep your network secure.A broadband router with a built in firewall provides the first line of defense at the perimeter of the LAN (where the LAN meets the Internet). (Hardware Issue) 3. Installing anti-virus software (to protect against worms, viruses and Trojans) is a critical step in protecting your system. It has the ability to prevent malware from infecting your computer. Be sure to keep your anti-virus software up-to-date by using the auto- update feature on a weekly basis. You may also need to regularly check for patches and updates for the operating system and other important software packages. (Software Issue) 4. Additional applications to investigate are anti-spyware and anti- adware programs. Like anti-virus software, these programs monitor your online activities and send information to another
  2. 2. computer. Many of these programs have an option to monitor your computer in real time. In others cases, you may have to set up a regular, manual monitoring schedule.(Software Issue) 5. Be cautious about email that you receive from unknown senders. To be safe, avoid clicking on hyperlinks in email that can potentially lead you to a site hosting malware or initiate a malware download. To be extra cautious, don’t click on hyperlinks at all, type the URL into your browser’s address bar yourself.(User Issue) 6. Be very protective of your passwords. Select passwords that include a string of letters, numbers and other characters. Don’t use the same password for all of your accounts. Change your passwords every 30-60 days. Create an encrypted list of passwords for yourself so you can keep track of them.(User Issue) 7. As an Internet user, recognize the threat that exists to your personal identity and the information housed on your computer. Change your Internet behavior by first understanding the personal consequences of getting hacked or getting a virus. This realization should alter your behavior and make you think twice before engaging is unsafe Internet practices like downloading unknown documents, following links from unknown senders and generally putting blind trust in the things that are sent to you.(User Issue) 8. Be wary of social engineering schemes in which a hacker makes a call to you, pretending to be an ISP professional. They will ask you for your password to do a systems check. However, a real support person would never ask for your password. Do not give identification information out over the phone.(User Issue) 9. Data protection is critical and therefore, you should back up your regularly to protect it from hackers, viruses, natural disasters and user error. The frequency of backups should be determined by your own personal use, daily, weekly and monthly options are all viable depending on your usage patterns. Consider storing your backup data in a water and fireproof location.(User Issue)10. For added security, disconnect your computer from its Ethernet interface when not in use. A hacker cannot attack your computer system if it is powered off and disconnected from the network.(Hardware Issue)
  3. 3. Narrative/InsightsI would recommend the following top three security tips for thisaudience of typical users in a shared computer lab environment. Theseare user security issues that would be relevant to computer users in ashared space. The hardware and software issues in this circumstancewould be left up to the IT people in charge of the computer lab and notappropriate for use during the users’ time in the lab. 1. Be cautious about email that you receive from unknown senders. To be safe, avoid clicking on hyperlinks in email that can potentially lead you to a site hosting malware or initiate a malware download. To be extra cautious, don’t click on hyperlinks at all, type the URL into your browser’s address bar yourself. (User Issue) 2. Be very protective of your passwords. Select passwords that include a string of letters, numbers and other characters. Don’t use the same password for all of your accounts. Change your passwords every 30-60 days. Create an encrypted list of passwords for yourself so you can keep track of them. (User Issue) 3. As an Internet user, recognize the threat that exists to your personal identity and the information housed on your computer. Change your Internet behavior by first understanding the personal consequences of getting hacked or getting a virus. This realization should alter your behavior and make you think twice before engaging is unsafe Internet practices like downloading unknown documents, visiting and inputting private information on unknown websites,following links from unknown senders and generally putting blind trust in the things that are sent to you. (User Issue)Regarding the first suggestion, I feel this is important because theseusers will likely be checking their email while at the computer lab. Theflier with this suggestion will remind them about the potential danger inemails that contain links. With so many users in and out of the lab, thepersonnel will want to be sure that the users have some basic securityknowledge so that the computers in the lab are safe from malware
  4. 4. issues. While doing research for this paper, I found this tip to be animportant reminder of the potential danger found when following links.It isn’t always a given that links sent in emails from friends are safe, theycould have been corrupted as well and sent out without your friend’sknowledge (like in the case of our Bill Gates example during on-campus). Typing the URL into the browser’s address bar is a practice Iwill personally adopt in the future.The issue of passwords is critical because so many people conductbusiness online, including banking and shopping. If passwords arereused from account to account or not updated regularly, users run ahuge risk of being exploited, having their identity stolen, and running uphuge credit card debt. This is an issue that can be easily controlled bythe user and a flier to remind them while they are using the computerlab to login to one of many sites is very timely and pertinent. Ipersonally feel overwhelmed trying to keep track of all of my ownunique passwords so I can image that this is an issue for most people. Asa suggestion, there are tools available to help you create strong andsecure passwords and then to manage and house them securely(http://www.iobit.com/passwordgenerator.html).General awareness about the dangers of getting too comfortable whileusing the Internet is an important security message for all users. It is soeasy to feel safe and secure. A reminder that there are serious personaland hardware implications when you carelessly provide secureinformation on unknown websites, download documents that may bedangerous or link to a website that contains malware will go a long wayin protecting computer users. I personally have become lessdiscriminatory when shopping online now that it is such a commonpractice. This serves as an important reminder to me that I shouldinvestigate a little more before blinding shopping on any old website.
  5. 5. Be Smart. Be Safe. Don’t Click.Avoid clicking on hyperlinks in emails, they may be infected!! Type the URL into your browser’s address bar!
  6. 6. zoeD9o=$!l Phonetic Pronunciation(zulu - oscar - echo - DELTA - Nine - oscar - Equals - Dollar - Exclamation - lima) Secure your passwords Include a string of upper and lower case letters, numbers and characters Make them 10-12 characters in length Use phonetics to help you remember your password Don’t use the same password for all of your accounts Change your passwords every 30-60 days
  7. 7. Prevent your computer and personal information from getting infected! Engage in smart Internet behaviors… Do not download unknown documents Be cautious about entering private information on unknown websitesDon’t blindly trust emails and links that are sent to you

×