Master-Trainers.Pdf

Master-Trainers.Pdf

Information Security Awareness for Master Trainers CONTENTS Chapter 1: .......................................................................................... 6 1. INTERNET FUNDAMENTALS ............................................................ 7 1.0 INTRODUCTION ............................................................................................................................. 7 1.1 THE HISTORY ................................................................................................................................. 8 1.2 HOW INTERNET IS MANAGED ....................................................................................................... 8 1.3 ARCHITECTURE OF THE INTERNET ................................................................................................. 9 1.4. BASICS ON NETWORKING .......................................................................................................... 10 1.5. HOW INTERNET WORKS ............................................................................................................. 11 1.6. FEATURES OF INTERNET ............................................................................................................. 17 1.7. LIMITATIONS OF INTERNET ........................................................................................................ 18 1.8. CONCLUSION .............................................................................................................................. 21 Chapter2: ......................................................................................... 22 2. INFORMATION SECURITY AWARENESS ......................................... 23 2.0. NEED FOR INFORMATION SECURITY ......................................................................................... 23 2.1. INFORMATION SECURITY: ....................................................................................................... 23 2.2. IT SECURITY: ............................................................................................................................... 24 2.3. SECURITY THREATS ................................................................................................................... 24 2.4. PEOPLE, POLICY, PROCEDURES AND PRODUCTS: ....................................................................... 25 2.5. BASIC PRINCIPLES OF INFORMATION SECURITY: ........................................................................ 25 2.6. SECURITY MECHANISMS: ........................................................................................................... 27 2.7. SECURITY SERVICES PROVIDED BY CRYPTOGRAPHY: .................................................................. 28 2.8. GOALS OF INFORMATION SECURITY: ......................................................................................... 30 Chapter 3: ........................................................................................ 32 3. COMPUTER ETHICS ....................................................................... 33 3.0. COMPUTER ETHICS: .................................................................................................................... 33 3.1. What is the Ethical behavior of students/teachers?................................................................... 33 3.2. INTERNET ETHICS: ...................................................................................................................... 34 Centre for Development of Advanced Computing (C-DAC) Page 1 Information Security Awareness for Master Trainers 3.3. CYBER BULLYING: ....................................................................................................................... 34 3.4. CYBER ETHICS: ............................................................................................................................ 35 3.5. CYBER SAFETY ............................................................................................................................ 36 3.6. CYBER SECURITY: ........................................................................................................................ 36 3.7. SAFETY MEASURES FOR ETHICS:................................................................................................. 36 3.8. THE TEN RULES OF COMPUTER ETHICS: ..................................................................................... 37 Chapter 4: ........................................................................................ 41 4. CYBER CRIME ............................................................................... 42 4.0. CYBER CRIMES: ........................................................................................................................... 42 4.1. IT ACT 2000: ............................................................................................................................... 42 4.2. CYBER CRIMES AND SECTIONS: .................................................................................................. 43 4.3. CYBER CRIME SECTIONS AND DESCRIPTIONS: ............................................................................ 44 Chapter 5: ........................................................................................ 50 5. BROWSER SECURITY ..................................................................... 51 5.0. WHAT IS WEB BROWSER? .......................................................................................................... 51 5.1. TYPES OF WEB BROWSERS ......................................................................................................... 52 5.2. WEB BROWSER RISKS AND CASE STUDIES .................................................................................. 53 5.3. HOW TO SECURE YOUR WEB BROWSER ..................................................................................... 55 Chapter 6: ........................................................................................ 62 6. EMAIL SECURITY ........................................................................... 63 6.0. INTRODUCTION: ......................................................................................................................... 63 6.1. HOW AN E-MAIL WORKS? .......................................................................................................... 63 6.2. POSSIBLE THREATS THROUGH E-MAIL ....................................................................................... 65 6.3. HOW TO PREVENT AND GUIDELINES FOR HANDLING E-MAILS SAFELY ...................................... 67 6.4. WHY YOU SHOULD ENCRYPT YOUR MAIL .................................................................................. 67 6.5. HOW EMAIL ENCRYPTION WORKS ............................................................................................. 68 6.6. WHERE TO GET AN EMAIL CERTIFICATE ..................................................................................... 68 6.8. INSTANT MESSAGING ................................................................................................................. 75 Centre for Development of Advanced Computing (C-DAC) Page 2 Information Security Awareness for Master Trainers 6.9. HOW DOES IM WORK ................................................................................................................. 75 6.10. RISKS INVOLVED IN INSTANT MESSAGING ............................................................................... 75 6.11. RISKS INVOLVED IN EMAIL SECURITY AND CASE STUDIES ........................................................ 76 13. REFERENCE .................................................................................................................................. 90 Chapter 6: ........................................................................................ 91 6. SOCIAL NETWORKING .................................................................. 92 6.0. INTRODUCTION .......................................................................................................................... 92 6.1. WHAT IS SOCAIL NETWORKING.................................................................................................. 92 6.2. SOCIAL NETWORKING RISKS ...................................................................................................... 93 6.3. SOCIAL NETWORKING SITES CASE STUDIES: ............................................................................... 94 6.5. GUIDELINES TO AVOID RISKS BY SOCIAL NETWORKING ........................................................... 110 Chapter 7: ...................................................................................... 112 7. SOCIAL ENIGNEERING SECURITY ................................................. 113 7.0. INTRODUCTION ........................................................................................................................ 113 7.1. WHAT IS SOCIAL ENGINEERING? .............................................................................................. 113 7.2. WHY SOCIAL ENGINEERING? .................................................................................................... 114 7.3. HOW DO THEY DO THIS? .......................................................................................................... 114 7.4. SOCIAL ENGINEERING CAN BE DONE IN MANY WAYS: ............................................................. 114 7.5 OTHER TECHNIQUES: ................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    185 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us