UNIT 5 Information Security Best Practices - 20250214 - 084913 - 0000
UNIT 5 Information Security Best Practices - 20250214 - 084913 - 0000
Practices
5.1 Introduction to Information Security
1. Confidentiality:
Confidentiality refers to the protection of information from being accessed by
unauthorized individuals or entities. This ensures that sensitive data, such as
personal details, financial information, and intellectual property, remains private.
Methods to ensure confidentiality include:
Encryption of data to make it unreadable without the proper key.
Access control mechanisms (e.g., usernames, passwords, biometric
identification) to restrict who can view or modify information.
Data classification to categorize information based on its sensitivity level.
2. Integrity:
Integrity ensures that the information is accurate, complete, and free from
unauthorized changes. This goal is particularly important to prevent errors, fraud,
or malicious tampering.
Methods to ensure integrity include:
Checksums and hash functions to verify that data has not been altered.
Version control systems to track and manage changes to documents and files.
Audit trails to maintain records of actions performed on data, which can be
used to detect tampering.
3. Availability:
Availability ensures that information and systems are accessible when needed by
authorized users. If critical information is not available at the right time, it could
lead to disruptions in business operations, financial loss, or security incidents.
Methods to ensure availability include:
Backup systems to store copies of data in case the primary system fails.
Redundant hardware and network systems to avoid single points of failure.
Disaster recovery plans that outline procedures to restore systems in the event
of a catastrophic incident.
5.2.1 Malware
Malware (short for malicious software) refers to any software intentionally designed to
cause damage to a computer system, network, or data.
Types of malwareinclude:
Viruses: Self-replicating programs that spread by attaching themselves to other files.
Worms: Programs that replicate themselves and spread across networks without the
need for a host file.
Trojan horses: Malicious software disguised as legitimate software that allows
attackers to gain unauthorized access.
Ransomware: Malware that locks or encrypts a user’s data, demanding payment for its
release.
Spyware: Software that secretly monitors user activity and collects personal
information without consent.
Prevention: Regular software updates, antivirus programs, firewalls, and user awareness
about suspicious downloads and attachments.
5.3.1 Firewall
A Firewall is a network security system designed to monitor and control incoming and
outgoing network traffic based on predetermined security rules.
It acts as a barrier between a trusted internal network and untrusted external networks,
such as the internet.
Firewalls can be:
Hardware-based: Physical devices that protect the network perimeter.
Software-based: Installed on computers or servers to protect individual systems.
Function: Firewalls block malicious traffic, filter data, and enforce security policies to
prevent unauthorized access to a network or system.
Data Backup refers to the process of creating copies of important data and storing them
in a separate location.
This ensures that data can be recovered in case of accidental deletion, hardware failure,
or a security incident like ransomware attacks.
Types of Backupinclude:
Full Backup: A complete copy of all data.
Incremental Backup: Copies only the data that has changed since the last backup.
Differential Backup: Copies all data that has changed since the last full backup.
Best Practices: Store backups in multiple locations, such as cloud services or external
drives, and test backup systems regularly to ensure their effectiveness.
A VPN is a service that creates a secure and private connection over the internet,
protecting data from being intercepted by third parties.
Function: It encrypts internet traffic and routes it through a remote server, masking the
user's IP address and securing the communication.
VPNs are commonly used to protect data while browsing public networks (e.g., public Wi-
Fi) and to maintain privacy and anonymity online.
Advantages: VPNs help prevent man-in-the-middle attacks, enhance privacy, and
provide secure remote access to corporate resources.
5.3.4 Encryption
An IDS is a security system that monitors network traffic and system activity for signs of
suspicious activity or potential security breaches.
Types of IDS:
Network IDS (NIDS): Monitors network traffic for abnormal behavior.
Host-based IDS (HIDS): Monitors activity on a specific device or system.
Function: IDS detects potential threats, logs suspicious activity, and sends alerts to
security administrators to investigate further.
An IPS is similar to an IDS, but it takes the next step by actively blocking potential threats
in real-time.
Function: It not only detects malicious activity but also automatically responds to
prevent an attack from succeeding (e.g., by blocking IP addresses or shutting down
vulnerable services).
Difference from IDS: While IDS only monitors and alerts, IPS actively prevents attacks by
blocking malicious traffic or unauthorized access.
Update Regularly: Ensure that operating systems, software, and security patches are
updated to protect against vulnerabilities.
Install Antivirus: Use reliable antivirus software and perform regular scans to detect and
remove malware.
Use User Accounts with Limited Privileges: Avoid using administrator accounts for daily
tasks to reduce the risk of malware gaining system control.
Lock the Computer When Not in Use: Always lock your computer when stepping away,
even for a short time, to prevent unauthorized access.
Use Secure Websites (HTTPS): Always browse websites that use HTTPS to ensure that
data transmitted between your browser and the site is encrypted.
Beware of Suspicious Links: Avoid clicking on suspicious links or pop-ups that may lead
to phishing websites or install malware.
Clear Browsing Data Regularly: Clear your browser history, cookies, and cache to protect
your privacy.
Enable Browser Security Features: Use browser features like pop-up blockers, do-not-
track options, and security extensions to enhance protection.
5.4.3 Password Management
Use Strong Passwords: A strong password includes a mix of upper and lower case letters,
numbers, and special characters, and is at least 12 characters long.
Enable Multi-Factor Authentication (MFA): Whenever possible, enable MFA to add an
extra layer of security, such as SMS codes or authentication apps.
Avoid Reusing Passwords: Don’t use the same password for multiple accounts. Use a
password manager to securely store and manage passwords.
Change Passwords Regularly: Periodically update passwords, especially for critical
accounts like banking and email.
Encrypt Data on USB Drives: Use encryption tools to secure sensitive data stored on USB
drives and other removable media.
Avoid Public or Unknown USB Ports: Do not plug your USB drive into public or unknown
computers, as they may be infected with malware.
Eject Devices Properly: Always safely eject external drives to avoid data corruption or
loss.
Verify Email Senders: Be cautious of emails from unknown senders, especially those
asking for personal information or prompting you to click on links.
Avoid Opening Suspicious Attachments: Do not open attachments from untrusted or
unexpected sources, as they may contain malware.
Use Email Encryption: For sensitive information, use email encryption tools to ensure the
contents are protected.
Beware of Phishing Attempts: Always verify the authenticity of emails asking for personal
or financial information.
Change Default Router Settings: Change the default username and password for your Wi-
Fi router to make it harder for attackers to gain access.
Use WPA3 Encryption: Set your Wi-Fi to use WPA3 encryption, which is the most secure
option for protecting your network.
Disable WPS: Wi-Fi Protected Setup (WPS) can be vulnerable to attacks, so it is better to
disable it.
Set up a Guest Network: If you have visitors who need to use your Wi-Fi, create a
separate guest network to keep your main network secure.
Keep Firmware Updated: Regularly check for firmware updates from your router
manufacturer to patch any security vulnerabilities.
Verify Requests for Sensitive Information: If you receive unsolicited requests for
personal information (via phone, email, or social media), always verify the legitimacy of
the request before responding.
Don’t Trust Caller IDs: Attackers can spoof phone numbers to make it appear as though
they are calling from a trusted organization.
Be Wary of Too-Good-to-Be-True Offers: Be cautious of unsolicited offers, especially
those that require immediate action or sensitive information.
Educate Yourself and Others: Regularly educate yourself and your family or colleagues
about common social engineering tactics like phishing, pretexting, and baiting.
Use Strong Screen Lock: Set up a strong PIN, password, or biometric lock (e.g., fingerprint
or face recognition) for your device.
Install Security Updates: Regularly update your device’s operating system and apps to fix
security vulnerabilities.
Limit App Permissions: Review the permissions of apps and disable any that are
unnecessary for the app’s functionality.
Avoid Public Wi-Fi for Sensitive Transactions: Avoid conducting sensitive activities, such
as online banking, on public Wi-Fi networks unless using a VPN.
Enable Remote Wipe/Find My Device: Set up the option to remotely lock or erase your
device if it is lost or stolen.
Social Networking
Registering an Account on Social Networks
When registering an account on social networking platforms, it's important to follow best
practices for security and privacy:
1. Information Security:
Information Security protects data from unauthorized access and threats, aiming to
ensure Confidentiality, Integrity, and Availability (CIA triad). Confidentiality ensures
that data is only accessible to authorized users, Integrity ensures data accuracy, and
Availability ensures data is accessible when needed.
2. Threats to Information Security:
Malware: Harmful software designed to disrupt or damage systems and steal data.
Social Engineering: Deceptive techniques that manipulate individuals into revealing
sensitive information.
Network Threats: Risks like hacking and unauthorized access to network
infrastructure.
3. Combating Information Security Threats:
Firewalls: Control network traffic to block unauthorized access.
Data Backup: Regularly store copies of data to prevent loss.
VPN (Virtual Private Network): Secures internet connections and ensures privacy by
masking your IP address.
Encryption: Converts data into an unreadable format to prevent unauthorized access.
Anti-Virus Software: Detects and removes malware.
IDS/IPS: Intrusion Detection and Prevention Systems monitor for potential threats
and block attacks in real-time.
4. Information Security Best Practices:
General Computer Usage: Always use strong passwords and lock devices when not in
use. Avoid downloading untrusted software.
Internet Browsing: Use secure websites (HTTPS), avoid suspicious links, and regularly
clear browsing history.
Password Management: Use unique and strong passwords for each account and
enable Two-Factor Authentication (2FA) for added security.
Email Communication: Be cautious of unsolicited messages and avoid sharing
sensitive information over email.
Home Wi-Fi Network: Set strong passwords and enable encryption to secure your
home network.
Avoiding Social Engineering: Be skeptical of unsolicited requests for personal details.
Smart Devices: Keep devices secure with passwords and regularly update software.
Social Networking: Adjust privacy settings and avoid oversharing personal details.
Instant Messaging: Use encrypted messaging services and avoid sharing sensitive
data.
Online Transactions: Ensure websites are secure (HTTPS) and monitor financial
accounts regularly.
Public Computers: Avoid logging into sensitive accounts, clear browsing data, and
always log out after use.