Hi Everybody, I hope this guide will help home computer users to secure themselves on cyber world, i will update this guide time-to-time. I have tried to upload the whole guide as an attachment but as i was having some problem in uploading it as attachment so I have uploaded it on mediafire server for easy downloading, mediafire also has resume capability so anyone can download it while resuming,please check the below mentioned link for downloading the whole guide.
Happy Learning
Regards
Ajay Singh Negi.
Download Basic to Indepth Home Computer Security Guide:
http://www.mediafire.com/?3neta32etektd79
Introduction
The Basic to In-depth Home Computer Security Guide is intended to prescribe basic countermeasures to the home computer users working with computer systems running Windows Operating System. The basic purpose of this document is to create awareness about Computer Security issues among home computer users and suggest them the tasks to be performed to secure their computer systems to protect their information assets.
Information security needs have to be addressed at all levels, from the individual user to an organization and beyond that to the government and the nation. Information Security is becoming synonymous with National Security as Computer Networking, which is vulnerable to Cyber attacks, forms the backbone of critical infrastructure of the country banking, power, communication network etc. It is, therefore, important to have secured Computer Systems and Networks.
Also, increased focus on outsourcing of IT and other services from developed countries is bringing the issue of data security to the fore. Furthermore, owing to the massive Internet boom, a lot of home users with little or no prior knowledge with the threats and their countermeasures are exposed to the Internet. This, the attacker, can exploit to expand their base of malicious activity and use innocent people for their schemes. Our aim to spread the education to school children, teachers, parents, senior citizens & every Individual to equip them with the knowledge needed to mitigate the threat.
Why Home Computers?
Home computers are typically not very secure and are easy to break-in. When combined with high-speed Internet connections that are always turned on, intruders can quickly find and then attack home computers. While intruders also attack home computers connected to the Internet through dial-in connections, high-speed connections (cable modems and DSL modems) are a favorite target. There may not be important data stored on the home computers but they are targeted by the intruders for launching attack against other computer systems.
How attackers do it?
In general, attack vectors which attackers use are :
• Through E-mail
• Through Un-trusted Websites
• Through Internet Shares
In some cases, they send email with a virus. Reading that email activates the virus, creating an opening that intruders use to enter or access the computer. In other cases, they take advantage of a flaw or weakness in one of the computer program’s vulnerability – to gain access. Once they’re on the computer, they often install new programs that let them continue to use the computer – even after user plug the holes they used to get onto user’s computer in the first place. These are known as “backdoors” and are usually cleverly disguised so that they blend in with the other programs running on user’s computer.
In general, they steal the information saved by the user on his system or use the system to launch attack on other computer systems.
What is Information Security?
Information security can be explained by the help of following example. If company sells bottled water purified using the process of reverse osmosis, the process is well known, and therefore it does not make good business sense for management to protect that information. However, if that company has a revolutionary process that cuts the cost and time for water purification in half, it would make sense to secure that information. There is a limit to the value of implementing protection so user must combine his knowledge of value, threats, vulnerabilities, and risks to put together a feasible plan.
Information security involves the measures and controls that ensure confidentiality, integrity, and availability of the information processed by and stored in a computer or system.
Confidentiality: Ensures that information is accessed only by authorized personnel.
Integrity: Ensures that information is modified only by authorized personnel.
Availability: Ensures that information and systems can be accessed when needed by authorized personnel.
This practice include policies, procedures, hardware and software tools necessary to protect the computer systems and the information processed, stored, and transmitted by the systems.
When the user combines efforts to provide data confidentiality, data integrity, and data availability with physical security, then he can provide a very effective security solution.