Get smart with 5 minutes tutorials/IT-Security/Part 5: Not Only Internet-Safety/ALSO IT-Security!

Authors

Hi,

I start a new series of blogs with educational vocation who will be easy to follow as they take only +/- 5 minutes and by following them and by applying my advice you will become a champion in IT-Security ;)

.Learning IT-Security

.


.

sid2014-anim-banner

.

 

What we already learned in Part1 + Part2 + Part3 + Part4:

.

The browser, such as: Internet Explorer [IE], Mozilla FirefoxGoogle ChromeSafari + … is the entrance portal for malware. You use your browser to navigate Internet and if your browser and add-ons are not updated they might lead you to a “drive-by-download“; thus meaning you infect your computer by only visiting a web site!!!

.

.

Very important and what most of people don’t know and don’t realize: 

  • Any installed software on your computer must be updated as older versions might have a vulnerability who could get exploited by the bad guys to take control over your computer!
  • Not every web site you are visiting and/or who you find in the search results of search Engines are trustworthy and/or secure!
  • ===> You can ALSO infect your computer without being connected to Internet! Any connected USB and other storage device (CD, DVD, Flash-Cards, Floppy Disk…) who is infected will also infect your computer if not protected!!! <===
  • Not ONLY the reflexes to stay secure as told worldwide by organisations and Education do help for a secure Internet, Internet-Safety tips are a NEED, for sure but there is more: the NEED to secure the computers!

.


Let’s go for part 5: Not Only Internet-Safety/ALSO IT-Security!

.

A bit of theory. If you don’t like, switch to first screenshot shown below to start straight of for practice. But it might be good (important) to know that theory, take your time, please ;)

.

And don’t forget this reminder, please! 

.

 What you MUST KNOW!

      • Automatic Windows Update must be enabled
      • Third Party Programs are responsible for 78% of vulnerabilities!!! What are Third Party Applications (Programs)? Knowing that third party programs are vulnerable also, we must update them also! Use SECUNIA PSI to update automatically third party programs https://secunia.com/
      • Browsers (ALL) need to get updated!
  • The weakest link in the Security Chain is the human! If you don’t respect certain advice you will get tricked by the Cyber-Criminals!

===> NOBODY is perfect! A security by 100% doesn’t exist! <===

.


Not any tutorial should be technological but also based on life experience… The practice lived…

Today, in this 5 minutes tutorial we will ONLY talk a bit, no technical advice for change. This is necessary sometimes

The author Gust MEES is online since 1998 and was given courses to adult people, seniors and youth, helping women to find a job again and preparing them to have necessary ICT knowledge to get a job in an officeprimary school classes as also to teachers in primary school more than 8 years long and this on an 8 hours a day and this alone…

..

Normal classes were 10 people with different ages from 16-79 (10 computers) and with primary schools and teachers it was 20 people (2 persons per computer), where he gave the learners also the opportunity to bring their computers and Laptops to the learning place.

.

People who wished so could also have checked their computers and Laptops for security issues and I cleaned those devices from malware and I installed FREE security programs on those computers. After a few days people came back and I taught them about the security issues (screenshots provided with a report in their language [FR, DE, EN]) and showed them how to use the FREE programs

.

From 100 computers and Laptops checked there was “ONLY 1” computer, and this from a male person aged 69 who followed my IT-Security courses carefully, the Windows computer was “clean” and not infected!!!

.

Other lived example: women (young and elder) which I gave courses and/or help about ICT for Office work had to write their CV’s and brought me their passport photo from a professional Photo Service in the North of my country, where the photo was stored on a Flash-Card from a photo machine. By scanning first that Flash-Card on my computer with my installed antivirus suite  (Norton Internet Security) and also with an anti-malware I found malicious trojans on the Flash-Card! This happens 5 times in 2 years, even after I gave a phone call to that so called professional Photo Service to tell them that their computer is infected!

So, thus meaning, e.g. above, this Photo Service infected probably hundred of customers with trojans (Trojan Horses malware) and their customers (as their Flash-Cards were infected) infected also any other computer where those Flash-cards were connected to. This could result to a mass infection of computers, even by being not connected to Internet!!!

.

This shows the impact of not having the right knowledge about the need to install security programs on a computer, even today also on a Mac!

Check about Mac malware here: Nobody is perfect!

.

Today (May 2012) we are are talking and reading about Cyber-Security, attacks on Government web sites, Cyber-Crime, National Security, Cyber-War, Cyber-Warfare and much more… Check links below to learn more:

.

..

MUST KNOW: once a computer is infected with malware it can infect also thousands of different other computers through Internet! So we all have a certain responsibility to the “Internet Community”, making sure not to infect others by applying best protection on our computers!

.

So, this was a bit life experience which I think is necessary for learners to understand the context of IT-Security! In next 5 minutes tutorial we will talk about “Visual IT-Security” where I will try to make IT-Security visual to you with real life examples. Stay tuned, coming soon ;)

.

We can have best “Internet-Safety” knowledge, but when our computer is not protected we will face serious problems and the most important; once our computer infected we infect also our contacts and the Internet-Community! We need to protect our Community!!! Don’t let Cyber-crime take over Internet, otherwise we will have a “MadMax-Scenario” in a couple of years, no need for that! But we have to protect ourselves and to share the acquired knowledge over Social Medias (Hashtag is #SoMe), that’s our role in Education, follow it please, thx!


.===> Internet-Safety is similar to the traffic rules in real world and IT-Security is the security of the vehicle! Bad breaks on a vehicle = similar to bad security on a computer! You will hurt Community one day, think on that please ;) <===

.

.

.


Don’t want to read all the above text and start the practice?

.

gears icon Download Links:

      • SECUNIA PSI ===> Automatic check and download of Third Party Applications
      • WOT ===> Web Of Trust helps you identifying suspect web sites
      • McAfee Site Advisor ===> helps you identifying suspect web sites

Free Online Checks:

===> Reminder: NOBODY is perfect! A security by 100% doesn’t exist! <===

.

.

Good to know:

.

.

Lots of new technical words, isn’t it? I will try to prepare also a technical dictionary about ALL these strange used words and review my tutorials by publishing inside them the signification of these words, coming soon, stay tuned… Step by step we go further ;)

.

.

Gust MEES.Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure)...


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.

.
.

6 Comments

Comments RSS

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 85 other followers

%d bloggers like this: