Explain the basics of being safe online, including what cybersecurity is and its potential impact.
Explain the most common cyber threats, attacks and vulnerabilities.
Explain how organizations can protect their operations against these attacks.
Access various information and resources to explore the different career options in cybersecurity.
Module 3 - Protecting your Data and Privacy
Welcome to this module, which looks at how to protect yourself online and maintain your privacy.
Remember, your online data is valuable to cybercriminals. So what can you do to stay safe?
There are some simple strategies that you can use to protect your personal devices and maintain your
data securely. Let’s take a look at what these are.
Chapter 3.1 - Protecting Your Devices and Network
You’ve probably heard of the term ‘online security.’ It’s all about taking the necessary steps to
prevent your personal information from falling into the wrong hands.
Let’s start by seeing what you already know…
3.1.1 What Do You Think?
You’ve just been issued with a new laptop at @Apollo and are getting ready to set it up. What steps
would you take to secure it before use?
What did you come up with?
To make your device safe and secure, you should:
turn the firewall on
install antivirus and antispyware
manage your operating system and browser
set up password protection.
3.1.2 Protecting Your Computing Devices
Your computing devices are the portal to your online life, storing a lot of your personal data.
Therefore, it’s important to protect the security of your devices.
Turn the firewall on
You should use at least one type of firewall (either a software firewall or a hardware firewall
on a router) to protect your device from unauthorized access. The firewall should be turned on
and constantly updated to prevent hackers from accessing your personal or organization data.
You can click
here
to learn how to turn on the firewall in Windows 10, or click
here
for Mac OS X devices.
Install antivirus and antispyware
Malicious software, such as viruses and spyware, are designed to gain unauthorized access to
your computer and your data. Once installed, viruses can destroy your data and slow down your
computer. They can even take over your computer and broadcast spam emails using your account.
Spyware can monitor your online activities, collect your personal information or produce
unwanted pop-up ads on your web browser while you are online.
To prevent this, you should only ever download software from trusted websites. However, you
should always use antivirus software to provide another layer of protection. This software,
which often includes antispyware, is designed to scan your computer and incoming email for
viruses and delete them. Keeping your software up to date will protect your computer from any
new malicious software that emerges.
Manage your operations system and browser
Hackers are always trying to take advantage of vulnerabilities that may exist in your operating
system (such as Microsoft Windows or macOS) or web browser (such as Google Chrome or Apple
Safari).
Therefore, to protect your computer and your data, you should set the security settings on your
computer and browser to medium level or higher. You should also regularly update your computer’s
operating system, including your web browser, and download and install the latest software
patches and security updates from the vendors.
Set up password protection
All of your computing devices, including PCs, laptops, tablets and smartphones, should be
password protected to prevent unauthorized access. Any stored information, especially sensitive
or confidential data, should be encrypted. You should only store necessary information on your
mobile device, in case it is stolen or lost.
Remember, if any one of your devices is compromised, the criminals may be able to access all of
your data through your cloud storage service provider, such as iCloud or Google Drive.
IoT devices pose an even greater risk than your other computing devices. While desktop, laptop and
mobile platforms receive frequent software updates, most IoT devices have their original software. If
vulnerabilities are found in the software, the IoT device is likely to be vulnerable. And to make the
problem worse, IoT devices require Internet access, most often relying on your local network. The result
is that when IoT devices are compromised, they allow hackers access to your local network and data. The
best way to protect yourself from this scenario is to set up any IoT devices on an isolated network.
Check out
Shodan
, a web-based IoT device scanner that helps you identify any vulnerable devices on the Internet.
3.1.3 Wireless Network Security at Home
Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the
network by way of a preset network identifier, known as the service set identifier (SSID). Although
a wireless router can be configured so that it doesn’t broadcast the SSID, this should not be
considered adequate security for a wireless network.
Hackers will be aware of the preset SSID and default password. Therefore, these details should be
changed to prevent intruders from entering your home wireless network. Furthermore, you should
encrypt wireless communication by enabling wireless security and the WPA2 encryption feature on your
wireless router. But be aware, even with WPA2 encryption enabled, a wireless network can still be
vulnerable.
3.1.4 Public Wi-Fi Risks
When you are away from home, you can access your online information and surf the Internet via public
wireless networks or Wi-Fi hotspots. However, there are some risks involved, which mean that it is
best not to access or send any personal information when using public Wi-Fi.
Don’t forget that the Bluetooth wireless protocol, found on many smartphones and tablets, can also be
exploited by hackers to eavesdrop, establish remote access controls, distribute malware and drain
batteries!
Therefore, my top tip is to keep Bluetooth turned off when you aren’t using it.
3.1.5 Password Security
You’ve logged into your new laptop and it has prompted you to change your network password. You
already struggle to remember the few passwords you use for your personal accounts online.
You ask one of your colleagues for their advice. They tell you to use one of the passwords you use
for your personal accounts — that’s what they do! They keep their personal passwords written down at
the back of their diary, just in case they forget them.
How would you rate your colleague’s attitude to password security on a scale of 1 (bad
practice) to 5 (good practice)?
Your colleague is advocating bad password practice and improved your privacy settings.
It’s important that all of your online accounts have a unique password. Using the same passwords
leaves you and your data vulnerable to cybercriminals.
And if it becomes too much to remember all of these passwords, you should use a password manager.
This tool stores and encrypts all of your passwords and helps you log into your accounts
automatically.
3.1.6 A Strong Password
Here are a few simple tips to help you when choosing a strong password.
3.1.7 Using a Passphrase
In order to prevent unauthorized access to your devices, you should consider using passphrases
instead of passwords. A passphrase generally takes the form of a sentence (‘Acat th@tlov3sd0gs.’),
making it easier for you to remember. And because it’s longer than a typical password, it’s less
vulnerable to dictionary or brute-force attacks.
Here are a few tips for creating a good passphrase.
3.1.8 Password Guidelines
The United States National Institute of Standards and Technology (NIST) has published improved
password requirements. NIST standards are intended for government applications but can serve as a
standard for other sectors as well.
Click
here
to find out more about these NIST password requirements.
3.1.9 Password Check
Based on all this information, you’re ready to update your network password. You are considering
several potential options.
Take a look at each of the passwords and decide if you think it’s a strong or weak option. Get this
right and you’ll improve your privacy settings.
Don’t forget that passwords are widely used to prevent unauthorized access to your data and
resources. So, to protect yourself and stay ahead of the attackers, make sure to always follow the
guidance provided in this topic and create strong, unique passwords for all of your online accounts.