Visual IT-Security

Authors

.

Learning IT-Security.

.


MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUET...

MAUSI, the smart computer mouse. Gust MEES’s creation, realized by Chantal MAQUET

.

.For most people it is very difficult to understand IT-Security and also the need to apply it…. To me it looks sometimes like that people see a computer as a modern typewriter and/or a game console, but that’s not the case, I will try to explain to you a computer in a visual manner so that you might able to understand better why there is a need to protect your computer and also why a computer is in danger to get a virus, trojan, and other malware infections. But let us start first with a funny video…

.

.

.

.

.


Introduction of Visual IT-Security

.

Try every time to see a computer as a technical machine, which it is, and when connected to Internet it is your vehicle who navigates you trough the Data Highway (Internet). So, vehicles as you know need sometimes maintenance and may also represent (even new ones) technical problems which may effect the security for you and also for the community.

.

===> Nobody is perfect! <===

.


Explaining Updates, vulnerabilities (security holes) and Security Updates visually

Mostly are this parts who represent manufacturing errors and the cars need then as quick as possible to go to the garage for that such parts will get replaced for free.

So, for a computer this is similar. The “Operating System” called also “OS” (Windows, Mac, Linux…) is developed (programmed) by different teams of developers (programmers), for Microsoft’s “Windows 7” e.g. there are estimated around a thousand of developers and it could contain millions of code lines. Some sources (ZDNET) are talking about more than 50 million lines of code for “Windows Vista“. You can imagine that by such mass of code it is inevitable that errors (bugs) occur. By over 50 million lines of code you can imagine that not all bugs are discovered and some bugs even after years!

See also

Update on May 13, 2012: As I mentioned already “Nobody is perfect” find here the explication from the professionals:
 .
.
and we need ALSO to talk about the myth of that a Mac doesn’t get infected, sorry guys, be realistic!
.

.

Programmer man iconWhen now a bug is discovered, developing teams are working hard on it to resolve it as quick as possible and then they release an “update“. Thus meaning visually: you need to navigate with your computer over the Data High Way (Internet) to that “Software Garage” which exchanges the bad parts (bugs) against new ones (update) for FREE and so fixes the problem (mostly of time). If the bugs are related to security one talks about a “security hole” (vulnerability).

Thus meaning visually: it’s like if the alarm system of a car doesn’t work properly and someone can break into your car and hijack it! Through so called “security holes” (vulnerabilities) the bad guys may break into your computer and hijacking it, taking control over your computer without your knowledge… Once your computer under control of the bad guys they will make illegal actions with your computer (without your knowledge), illegal actions for which you could get made responsible by law!

Once your computer hijacked (it’s called thenPC Zombie“) :

  • the bad guys are earning money with your computer. Visually: they are then comparable to stowaways in your home who would rent your flat for the time you are absent! They will also sell illegal stuff through your hijacked computer, thus meaning you will also become a receiver of stolen goods!
  • your computer will be also part then of a so called “botnet“, a ring of hijacked computers, this could be even millions of infected and hijacked computers, who will get used to “attackGovernment sites and to “deface” these sites and/or to break into the database of their servers and steal the present data, or even to force the server to go offline as there are too many visits and the server breaks down! The data present there might be your own also!!!

..

..

.


Problems with all those technical words? Please check out this Glossary:

.

.


Questions to ask yourselves:

Questions icon

        • Would you drive a car with security problems which would bring yourself and community in danger?
        • Would you like to have stowaways in your home who would rent your flat for the time you are absent and that they will earn money with it? Other people earning money with MY computer?
  • Would you want to be made responsible for an attack against your own Government? Cyber-Security!!!
  • Would you like to see your data stolen from servers where you had to stock them? ===> Your own computer might have helped to steal them!!!

.

 Virtual world (Internet) Action to take Real world  Action to take
Virus Antivirus Flu, virus Vaccine
New virus Antivirus update New virus New serum
Spam Filter + antispam or HowTo Fight Spam Efficiently Publicity flyers Smash it in the bin
Hacker, trojans, trojan horse Firewall + antitrojan Burglars Alarm system
 .
.

.
MAUSI, the smart computer mouse. Gust MEES's creation, realized by Chantal MAQUETBTW: Try every time to see a computer as a technical machine, which it is, thus meaning also that a computer needs normal maintenance! Time wise (better to plan it on a schedule…) the computer needs to get cleaned for (temporary files, Internet temporary files, index.dat-files, needs to get defragmented and…). We will talk over that in a next tutorial, stay tuned ;)
.
.
PS: MAUSI, my smart computer mouse was used in my courses which are used now by the Ministry of Education in Luxembourg and can be downloaded for FREE here Fiches de sécurité informatique (FR)
.
.
.
..
.

Update on May 13, 2012: You should also read the news about IT-Security to be informed about what happens of attacks against Government web sites, get informed about updates on Software programs, find newest FREE tutorials who will help you to understand better IT-Security:
.
 .
By reading these news you will get more knowledge and you will understand the necessity of protecting your computer.
.

.
Gust MEESGust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and SecurityEnhancement Structure)…..


The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

3 Comments

Comments RSS

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 82 other followers

%d bloggers like this: