Master-Trainers.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Information Security Awareness for Master Trainers CONTENTS Chapter 1: .......................................................................................... 6 1. INTERNET FUNDAMENTALS ............................................................ 7 1.0 INTRODUCTION ............................................................................................................................. 7 1.1 THE HISTORY ................................................................................................................................. 8 1.2 HOW INTERNET IS MANAGED ....................................................................................................... 8 1.3 ARCHITECTURE OF THE INTERNET ................................................................................................. 9 1.4. BASICS ON NETWORKING .......................................................................................................... 10 1.5. HOW INTERNET WORKS ............................................................................................................. 11 1.6. FEATURES OF INTERNET ............................................................................................................. 17 1.7. LIMITATIONS OF INTERNET ........................................................................................................ 18 1.8. CONCLUSION .............................................................................................................................. 21 Chapter2: ......................................................................................... 22 2. INFORMATION SECURITY AWARENESS ......................................... 23 2.0. NEED FOR INFORMATION SECURITY ......................................................................................... 23 2.1. INFORMATION SECURITY: ....................................................................................................... 23 2.2. IT SECURITY: ............................................................................................................................... 24 2.3. SECURITY THREATS ................................................................................................................... 24 2.4. PEOPLE, POLICY, PROCEDURES AND PRODUCTS: ....................................................................... 25 2.5. BASIC PRINCIPLES OF INFORMATION SECURITY: ........................................................................ 25 2.6. SECURITY MECHANISMS: ........................................................................................................... 27 2.7. SECURITY SERVICES PROVIDED BY CRYPTOGRAPHY: .................................................................. 28 2.8. GOALS OF INFORMATION SECURITY: ......................................................................................... 30 Chapter 3: ........................................................................................ 32 3. COMPUTER ETHICS ....................................................................... 33 3.0. COMPUTER ETHICS: .................................................................................................................... 33 3.1. What is the Ethical behavior of students/teachers?................................................................... 33 3.2. INTERNET ETHICS: ...................................................................................................................... 34 Centre for Development of Advanced Computing (C-DAC) Page 1 Information Security Awareness for Master Trainers 3.3. CYBER BULLYING: ....................................................................................................................... 34 3.4. CYBER ETHICS: ............................................................................................................................ 35 3.5. CYBER SAFETY ............................................................................................................................ 36 3.6. CYBER SECURITY: ........................................................................................................................ 36 3.7. SAFETY MEASURES FOR ETHICS:................................................................................................. 36 3.8. THE TEN RULES OF COMPUTER ETHICS: ..................................................................................... 37 Chapter 4: ........................................................................................ 41 4. CYBER CRIME ............................................................................... 42 4.0. CYBER CRIMES: ........................................................................................................................... 42 4.1. IT ACT 2000: ............................................................................................................................... 42 4.2. CYBER CRIMES AND SECTIONS: .................................................................................................. 43 4.3. CYBER CRIME SECTIONS AND DESCRIPTIONS: ............................................................................ 44 Chapter 5: ........................................................................................ 50 5. BROWSER SECURITY ..................................................................... 51 5.0. WHAT IS WEB BROWSER? .......................................................................................................... 51 5.1. TYPES OF WEB BROWSERS ......................................................................................................... 52 5.2. WEB BROWSER RISKS AND CASE STUDIES .................................................................................. 53 5.3. HOW TO SECURE YOUR WEB BROWSER ..................................................................................... 55 Chapter 6: ........................................................................................ 62 6. EMAIL SECURITY ........................................................................... 63 6.0. INTRODUCTION: ......................................................................................................................... 63 6.1. HOW AN E-MAIL WORKS? .......................................................................................................... 63 6.2. POSSIBLE THREATS THROUGH E-MAIL ....................................................................................... 65 6.3. HOW TO PREVENT AND GUIDELINES FOR HANDLING E-MAILS SAFELY ...................................... 67 6.4. WHY YOU SHOULD ENCRYPT YOUR MAIL .................................................................................. 67 6.5. HOW EMAIL ENCRYPTION WORKS ............................................................................................. 68 6.6. WHERE TO GET AN EMAIL CERTIFICATE ..................................................................................... 68 6.8. INSTANT MESSAGING ................................................................................................................. 75 Centre for Development of Advanced Computing (C-DAC) Page 2 Information Security Awareness for Master Trainers 6.9. HOW DOES IM WORK ................................................................................................................. 75 6.10. RISKS INVOLVED IN INSTANT MESSAGING ............................................................................... 75 6.11. RISKS INVOLVED IN EMAIL SECURITY AND CASE STUDIES ........................................................ 76 13. REFERENCE .................................................................................................................................. 90 Chapter 6: ........................................................................................ 91 6. SOCIAL NETWORKING .................................................................. 92 6.0. INTRODUCTION .......................................................................................................................... 92 6.1. WHAT IS SOCAIL NETWORKING.................................................................................................. 92 6.2. SOCIAL NETWORKING RISKS ...................................................................................................... 93 6.3. SOCIAL NETWORKING SITES CASE STUDIES: ............................................................................... 94 6.5. GUIDELINES TO AVOID RISKS BY SOCIAL NETWORKING ........................................................... 110 Chapter 7: ...................................................................................... 112 7. SOCIAL ENIGNEERING SECURITY ................................................. 113 7.0. INTRODUCTION ........................................................................................................................ 113 7.1. WHAT IS SOCIAL ENGINEERING? .............................................................................................. 113 7.2. WHY SOCIAL ENGINEERING? .................................................................................................... 114 7.3. HOW DO THEY DO THIS? .......................................................................................................... 114 7.4. SOCIAL ENGINEERING CAN BE DONE IN MANY WAYS: ............................................................. 114 7.5 OTHER TECHNIQUES: ................................................................................................................