RNIOA Article 15 [17/05/2020] characteristics linked to their IP address to enable ‘tracking.’ Where internet-based criminality is Digital Safety & Security involved, the acquisition of banking and credit card Lt Cdr Mike Rose RN © data is often the main objective. Introduction The aim of this article is to help people understand Prior to the introduction of the internet, personal the risks they face and how to attempt to mitigate computers for home use were self-contained in that them. So, whether you’re accessing the internet the operating system was bought and installed by with your mobile phone, PC, tablet or laptop, you’re the supplier/user, and external communications potentially exposed to every hacker, digital thief and using the PC were not yet technically developed. spammer across the globe. Not to mention that The most likely risk therefore was the possibility of viruses, trojan horses, spyware and adware are someone switching on unattended, non-password- always just one click away. You wouldn’t drive protected computers and copying sensitive without insurance, a seat belt and a GPS device, information onto an external memory device. so, similarly, when you “surf the net”, you need to Essentially, users were in control of their computing make sure that you are well “buckled up” and well- equipment and paid real money for the services informed. This article is written as a guide to “safe and software they used to a known vendor. surfing” and is just as important for personal users as it is for large tech companies. Malicious websites Spyware, which is software that steals your sensitive data without consent, lurks in many corners of the internet; often in places where you'd least expect it. All it takes is to be in the wrong place at the wrong time to compromise your digital safety. Let’s set the scene: You open your web browser and start surfing; Curiosity takes you to a new, interesting site With the introduction of the internet, however, the and then one of the following may happen: issues of ‘payment for services’ and external software connections (often hundreds and to 1. A pop-up appears, and you click on it - even ‘unknown’ destinations) to our PCs and other just to close it; devices have introduced numerous risks, as well as 2. You click on a link which falsely claims to benefits, that can overwhelm the average user, take you to a site you are wishing to access; including those who have high levels of IT skill and competence. The rapid expansion of so-called ‘free 3. You click on a graphic to enlarge it; services’ also challenges the economics principle of You may have unknowingly fallen into a spyware Adam Smith that ‘there is no such thing as a free trap. Software is downloaded onto your device and lunch.’ The ‘mirage’ of free services provided is a digital “spy” is installed. Your personal information therefore the ‘elephant in the room,’ with economic is now at risk. benefits being accrued by providers by means of targeted advertising, which requires the known or Sometimes, simply opening a web page can initiate unknown acquisition of users’ personal an undesired installation. 1 Malicious E-mails/Messages 3) Update your operating system regularly (often Let’s set another scene: done automatically by the principal providers). There are still many companies around the world You open an e-mail that seems innocuous (if it is using older versions of operating systems and are an HTML email, you already could be in trouble) therefore extremely vulnerable to hacker attacks and then you click on a link or document or and viruses. image within the email; 4) Increase your browser security settings, for The HTML email starts an installation – a virus example: block “tracking”, automatically delete or spyware is downloaded to your device without cookies and cache data after each session, avoid a your knowledge; “master password”, block pop-ups, prevent sites Your device is infected and your personal adding “add-ons” to your browser without your information may well be at risk without approval, prevent accessibility services from safeguards. accessing your browser, don’t automatically send usage data, block dangerous content, block camera How do I know if I have been affected? access, block certificate requests, etc. The effects or symptoms of viruses or spyware 5) When you visit a company's website, it’s always include: stealing sensitive information such as better to type it into the address bar of your credit card numbers, usernames and passwords, browser, or use a bookmark (more efficient), directing your browser to suspect sites, changing or instead of clicking on a link which you find in an deleting your files, pestering you with endless pop- email or text message. ups, and slowing down your device. 6) Make sure that you have reputable and reliable Internet safety can be deceiving. Seemingly security products installed on all your devices: reputable sites may contain spyware traps, or the sites themselves may be counterfeit - “phishing” Antivirus protection (and scan your device sites posing as the real thing. The path away from regularly). You don’t need to pay a lot for internet safety often begins innocently enough; protection, in fact many are free for personal however, certain sites are more prone to be use, such as AVG, but it’s important always to sources of spyware, including: read the terms and conditions. Adult sites Firewall (Windows includes one, so you can simply enable it). File sharing sites Antispyware/adware software (and scan your Social networking sites device regularly). Not all antivirus software scans for spyware or adware. You don’t need to Recommendations pay a lot for protection; in fact, many are free for 1) Avoid questionable websites, and avoid websites personal use, such as ADW Cleaner. that contain “flash” elements, since this (old) software can be a source of malware. Your browser VPN (Virtual Private Network). This is should either warn you if a site contains flash, or particularly important if you regularly use free block you altogether. WiFi in restaurants, airports and other establishments. It's invaluable as free WiFi 2) Only download software from sites you trust and networks are notoriously risky (others can carefully evaluate free software and file-sharing “observe” what you are doing). Another applications before downloading them. 2 advantage is the freedom of web surfing away device unless you trust them, since it would be from the prying eyes of big companies and feasible for them to install malicious software or governments - a VPN service doesn’t allow steal your personal information. There have also advertising entities to know where you are or been many cases of customers being charged what you’re doing – you, with some degree of exhorbitant fees for services provided remotely confidence, have absolute privacy. However, which weren’t even necessary. some VPN providers, theoretically, can trace your true location and pass on data about you Open source software and what you do on the internet, but all There is an ever-growing international community providers claim that they do none of these of open source software programmers, designers, things. So, before you pay for such a service, advocates and supporters. Consequently, there is make sure you trust the provider. The Opera already an immense library of such software browser comes with a free (limited) VPN service available, so much so, that it is easily possible to built-in, so research similar deals. You may also have a fully-functional personal electronic device wish to install an “ad blocker” to your browser. with no paid software at all. Open source alternatives are usually as robust and secure as 7) Always use strong passwords (maybe consider expensive programs. Here are some examples: using a password generator) and avoid a single (master) password. If you need to store your a) Operating systems: Unix, Linux. There are passwords somewhere, store them off-line, many versions of Linux available, and several of preferably not on your device and change them them are nearly identical to MS Windows in their regularly. If you want to keep them on your device usability. Currently, there are virtually no viruses in a single document password-protect and/or which can attack Unix or Linux, so simply switching encrypt the document. your device to one of these operating systems would already be an enormous step in the “safe” 8) Always password-protect your device access, as direction (although a little programming knowledge you never know who could use it in your absence. is needed to migrate to this potentially safer option). 9) Never pass on or tell anyone your password(s). If you ever forget a password to a website, it is b) Browsers: Tor, Firefox. usually possible to set a new one by clicking on a c) Search engines: Duck Duck Go (which states it link such as “Forgot/Reset my password”. has no tracking, no cookies, no history). 10) When you install software, always read every d) VPN: OpenVPN, Libreswan VPN, SoftEther step of the installation carefully. Sometimes VPN, Openswan VPN, Freelan VPN, ProtonVPN spyware or adware comes piggy-backed on the downloaded software. Select “No” or “Skip” on the e) Office software: Open Office, Libre Office (both options to install secondary applications. of these provide near-identical functionality to the 11) When you make an on-line purchase, it is little MS Office suite of applications, and work largely effort to type in your credit card details, so consider seamlessly with MS Office documents). carfefully whether you need to store those details f) Image editing software: GIMP, Krita, Pinta (these on the company’s website/database.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages4 Page
-
File Size-