Manual Cs
Manual Cs
for
Students, Faculty, and Staff
STRONG
PASSWORD
ANTIVIRUS AVOID USER
SOFTWARE ERRORS
FIREWALL BROWSER
SECURITY
COMPUTER
SECURITY
SOFTWARE EMAIL
UPDATES ATTACHMENT
SCAN
FILE DATA /
ENCRIPTION SOFTWARE
BACKUP
(Ravi K. Walia)
Assistant Professor & Incharge
Computer & Instrumentation Centre
Dr. Y. S. Parmar University of Horticulture & Forestry,
Nauni Solan INDIA (HP)
Preface
This document has been prepared for students, faculty, and staff at Dr. Y. S. Parmar
University of Horticulture & Forestry, Nauni, Solan (HP) India. Specific instructions in
this document apply to licensed versions of Windows Operating System, although
many suggestions can apply to other operating systems and computing platforms. The
retired versions of Windows are no longer updated with security patches, so they
cannot be secured against hackers and malware and represent a threat to other
computers on the campus wide local area network. If your computer runs one of these
outdated operating systems, you must upgrade immediately to supported version of
window and install the latest Service Pack to ensure the security of your data as well
as campus network.
Personal Computer has no inherent security for users with confidential data hence
they are the biggest threat to computer security. The data stored in PC is vulnerable
because anyone can walk up and turn the switch ON and access information. Security
issue became more important, when your computer is connected to the Internet,
because hacker can hack your computer. When a computer is compromised, an
individual who controls it may use it for organized attack on the other computers,
websites or entire network.
In a large network such as campus wide network where large numbers of users are
using the system and hence more the entry points which can make attacking the
system easier and thus more potential for fraud and abuse. Wireless access, use of
laptops, smart phones and malicious software make security issue even more difficult.
Topic Page
Introduction to Security.……..……………………..…………………………....... 1
Breaches of security………………………….…..…………………….……….. 1
Security Threats ……………………………….……..………………………….. 3
Secure Your Computer …................................................................................ 3
Passwords …................................................................................................ 4
Software Update ..…..................................................................................... 5
Secure Your Browser …............................................................................... 5
Security for Wireless Networking …….......................................................... 6
Responsibility for Security..……………………………………..………………. 7
Secure Your Data …........................................................................................ 8
Data Storage Guidelines............................................................................... 8
Data Encryption…......................................................................................... 8
Updating Microsoft Software…........................................................................ 9
Microsoft Update…....................................................................................... 9
Automating Microsoft Update….................................................................... 9
When Antimalware Software Detects Malware ……........................................ 10
Malware Types….......................................................................................... 10
How to Avoid Malware Problems……........................................................... 12
Indications When Computer is Compromised…………………………..………. 13
When computer is Compromised?...…………………………….…………….. 13
Computer Crime …………………………………………………………………… 14
Identity Theft ……………………………………………………………………….. 15
System Maintenance for the PC ..................................................................... 16
Check Disk ................................................................................................... 16
Disk Defragmenter ....................................................................................... 16
Disk Cleanup…….….…………………………………………….……………… 16
Quick Reference ..…………………………………………………………………. 17
Computer Security Manual
INTRODUCTION
Security: Data or information security is the protection of data against accidental or intentional
destruction, discloser or modification. Computer security refers to the technological safeguard
and managerial procedure which can be applied to computer hardware, software and data to
ensure that organizational and individual privacy are protected.
If your computer is not secured, it will get compromised—and when it gets compromised, it must
be formatted and reloaded before you can trust its security again. It is time consuming and
inconvenient to reload a computer from scratch. So keep your computer secure so that it does
not need to be reloaded.
Breached of Security: Some of the ways/ manners in which data loss or manipulation can
occur are:
• Media Theft of PC and: A smart person with a false calling card can take away the PC
for repairs and of course never show his face again. However electronic media like CD-
ROMs, DVD-ROMs and Pen Drives are slightly safe as it is far easier to lock up in safe
place.
• Damage Due to Breakage: It is hard to visualize dropping PC’s but can happen if they
are shifted from one place to another. More likely is that something may get dropped on
the PC resulting in damage. Damage can also occur due to natural causes such as
storms or flood or due to electrical and other fires.
• Environmental Damage: The manufacturer recommends some environmental conditions
like temperature and humidity ranges, voltage limits, dust microns limits etc. If the
conditions in your office remain outside these limits the PC and media are likely to get
damaged.
• Inadvertent Corruption/ Loss: This can occur due to
o Usage of inferior media: if sub-standard media is used as it would be generally
cheaper but after using it for some time it may develop faults and data stored in it
may become unusable.
o Erasure of File: Files may get erased from the media due to incorrect action by
the operator. Corruption may occur due to the PC being subjected to frequent
power failure, wrong programming technique or defective software
1
CIC‐UHF
Computer Security Manual
2
CIC‐UHF
Computer Security Manual
traffic on the circuit by tapping in to the cable at some convenient point. A person can
listen to the traffic on a line even without physically connecting in to it. Thus data
following over communication lines is ever susceptible to “eavesdropping”.
• Hackers, who try to break into your computer without your knowledge or permission.
They may also steal your data or use your computer to commit a crime by controlling
your computer from remote location.. In any case, hackers are unethical people who
should not be trusted.
• Malware (malicious software), which comes in many forms: viruses, worms, Trojan
horses, scripts, rootkits, adware, and spyware. Malware can take control of your
computer without your knowledge or permission, delete your data, send your data to an
unauthorized recipient, or cause your computer to attack other computers.
• User error, which includes ignorance, laziness, and wrong command/instruction. Users
must keep their computers up to date, use passwords whenever available, and ensure
the passwords are not guessable.
SECURE YOUR COMPUTER
You must perform the following tasks to ensure the proper security and operation of
computer:
• If computer runs Windows, follow the directions in this document to secure your
computer. If your computer runs any older version of Windows which is not supported by
Microsoft, upgrade immediately as old versions cannot be secured against modern
security threats.
• Protect your computer with strong passwords. Leaving password fields blank or using
default passwords will get your computer compromised very quickly.
• Use system password on your computer.
3
CIC‐UHF
Computer Security Manual
• Microsoft Update must be run daily to ensure that all Critical Updates have been applied
to your computer. You can configure this utility to update your computer automatically.
• Use antimalware software, never turn off or disable antimalware software. Update
antimalware definitions daily and scan all your files at least weekly to protect against
malware that can destroy your data and render your computer useless.
• Firewalls should be used on any computer that connects to a network/Internet. Windows
operating system contain a built-in firewall.
• Whenever you leave your computer, lock it. Press the CTRL, ALT, and DEL keys
simultaneously, then release them and choose “Lock Computer.” All current processes
and active programs will continue to run, but unauthorized individuals can’t use your
computer until you login again.
• Use a password-protected screen saver & configure it to blank your screen after 10
minutes of inactivity. Use only screen savers included in your Windows operating
system.
• Turn off your computer if it will be idle for more than a few hours, especially if it will be
idle overnight. A computer can’t get compromised while it’s turned off—and it doesn’t
waste electricity!
Passwords
• Use passwords whenever possible.
o Never use a blank password.
o Change all default passwords immediately.
o Use strong passwords
• Create strong passwords by following these guidelines
o at least 8 character long and combination of numbers and letters
o mix of upper case, lower-case letters and special characters
o Don’t use dictionary words, your account name, proper names.
• Keep passwords secret.
4
CIC‐UHF
Computer Security Manual
o If someone else uses your userID and password, you will be held
accountable for their actions.
o Don’t write down your password
o Never reveal your password to anyone
o When using a computer or accessing a website, never use any option that
offers to “save my password for the next time,”“automate my login”.
• Change passwords at least every 90 days.
o Don’t re-use old passwords.
o Don’t use the same password for multiple systems.
Software Update
• Patch your software (operating system and applications). Hackers will use newly-
discovered security flaws. Automate the checking for updates of operating system
and applications on a daily basis. Apply security patches as soon as they become
available.
• Never open any e-mail attachment, regardless of its source. Save the file to your
computer’s hard drive and scan it for malware.
• Avoid software you don’t need. If you don’t need it, don’t install it. If you’ve installed
it and you don’t use it, uninstall it, such software are Add-on browser toolbars,
Remote control and remote access software, Instant messaging software, chat
software, Web server software and Password-caching software etc.
CIC‐UHF
Computer Security Manual
browser is closed.”
Deselect the box in front of “Use SSL 2.0” The boxes to use SSL 3.0 and
TLS 1.0 should be checked.
o In Firefox go to Tools, Options, privacy
In the History section select “use custom setting for history” and deselect
all options.
In the Cookies section, use the drop-down box to keep until “I close
Firefox.”
In the Passwords section, deselect all choices
Security for Wireless Networking
Wireless networks should never be considered secure. You need to take extra security
precautions when using a wireless network, especially if it’s a public “hot spot” located in a
hostel, hotel and cafeteria or cyber café.
• Disable Wi-Fi ad-hoc mode. Wi-Fi runs in two modes: infrastructure mode (when you
connect to a network) and ad hoc mode (when you connect directly to another PC). If
you’ve enabled ad hoc mode, someone near you could establish a connection to your
computer without your knowledge, and they’ll have free reign on your PC. To turn off ad
hoc mode:
o Right-click the wireless icon in the System Tray.
o Choose Status.
o Click Properties.
o Select the Wireless Networks tab.
o Select your current network connection.
o Click Properties, then click the “Association” tab.
o Uncheck the box next to “This is a computer-to-computer (ad-hoc) network.”
o Click OK until the dialog boxes disappear.
• Encrypt your sensitive data using Winzip software on a computer that will be
connected to a wireless network. If your data is encrypted and somebody gets into
your PC, they won't be able to read or alter any of your data.
• Use a personal firewall. Windows Operating System contains a firewall
• Turn off file sharing by Right-click on the drive or folders you normally share, Choose
“Sharing and Security,” and uncheck the box next to “Share this folder on the network.”
6
CIC‐UHF
Computer Security Manual
7
CIC‐UHF
Computer Security Manual
Users are responsible for data stored in the computer and any consequences arising from its
misuse. Computers can store vast amounts of information and if it crash you may lose all the
data. If you backed up data you can reload the data on the computer otherwise you have to
recreate the entire data from scratch. Some time before crash the computer got hacked and
someone take control of your computer and access all your files and important information store
in these files such as bank accounts, credit cards number personnel information and then it
crashed, hence follow these guideline:
• Backup your data daily or frequently
• Store your backed-up data securely
• Deleted data may be recovered but the process is complex, expensive, and rarely
recovers all deleted data.
• Sensitive data should be encrypted.
• Store data on secure server or external disk
• Don not store data on laptop or workstation
• Physically secure any data storage device that can be easily moved.
• Email is not secure, so you should not send sensitive data via email. If you must
email sensitive data, it should be encrypted.
• Ensure that all data is wiped (not just deleted) from your computer before it is
transferred to someone.
Data Encryption
Encryption is a method of scrambling data so that only someone who possesses the appropriate
password or “key” can access the information. WinZip application compress the size of data
files. The licensed version, named WinZip Pro, can encrypt files using 256-bit AES encryption.
If you have sensitive data stored on PC or laptop, you should encrypt the sensitive data to
protect it from unauthorized access or theft.
• Sensitive data stored on flash drives/ pen drives should be encrypted.
• Email is not considered a secure method of communication. However, if you must
send sensitive information via email: encrypt the data and send as an attachment
and send password to decrypt by separate mail.
8
CIC‐UHF
Computer Security Manual
Older versions of Microsoft Windows are no longer supported by Microsoft and cannot be
secured against modern security threats. If your computer runs any of these older versions of
the operating systems, you need to upgrade to the supported versions of the Windows
immediately. The following guidelines apply to computers running Windows vista & Windows 7.
CIC‐UHF
Computer Security Manual
You must ensure that the latest version of your antimalware program is installed on your
computer. Antimalware programs are normally updated as soon as security vulnerabilities are
discovered. The newest version of the program is the most secure. The antimalware program
on your computer will communicate with you—pay attention to these messages. Ignoring this
vital information can result in loss of all your data
Malware Types
• Virus: A self-replicating program, often written to cause damage or mischief, which inserts
itself into a software application without leaving any obvious sign of its presence. Your
computer can pick up a virus when you copy an apparently normal file from a diskette,
CD, DVD, or memory stick, when you open an infected email attachment, or when you
download an infected file from the Internet.
• Worm: Like a virus, a worm is a self-replicating program, often written to cause damage
10
CIC‐UHF
Computer Security Manual
or mischief. Unlike a virus, a worm is self-contained and does not need to become part
of another program to propagate itself. Instead a worm infects the operating system,
acts like a program in its own right, and spreads via the network.
• Trojan horse: A malicious program that appears to be innocuous or even beneficial, but
conceals other malware that can compromise the security, data, and proper functioning
of your computer. Trojan horses spread via the network and are sometimes referred to
as “network viruses.”
• Spyware: Programs that scan systems or monitor activity and relay information to other
computers or locations in cyberspace. The information that may be actively or passively
gathered and disseminated by spyware may include passwords, log-in details, account
numbers, personal information, individual files, or other personal documents. Not all
spyware is damaging to a computer system. It is a popular method for some
websites to monitor how users navigate through a site, providing critical
information that the web designers and developers can use to improve the site.
• Adware enables delivery of advertising content to you through its own or another
program’s interface. Adware may gather information from your computer, including
information related to Internet browser usage or other computing habits, and relay this
information back to a remote computer or other locations in cyberspace. Adware can
be downloaded from web sites (often in shareware or freeware), email messages, and
instant messenger programs.
• Backdoor: Software that bypasses normal authentication methods, such as a username
and a password, and allows unauthorized people to access and control your computer
without your knowledge.
• Blended threat: An attack on your computer from the network specially crafted to
maximize the severity of damage and speed of infection by combining several kinds of
malware.
• Keylogger: Spyware that records your keystrokes and sends the information to someone
else without your knowledge. Keyloggers are often used to gather email and online
banking usernames and passwords as a prelude to identity theft.
• Rootkit: Hides files or processes running on a computer, rendering them difficult to
detect and remove.
11
CIC‐UHF
Computer Security Manual
The most important component of malware protection is you. Use safe computing
practices to protect your computer and its contents.
• Keep all software up-to-date, especially your operating system, browsers, and
antimalware applications.
• Turn off your computer if you are not using it. If your computer is turned of It can’t get
infected by malware or hacked.
• Backup your data every day or weekly.
• Use the latest version of antimalware software with the latest version of the virus
definitions.
• Never open any e-mail attachment, regardless of its source. Save the file to your
computer’s hard drive and scan it for viruses.
• Scan all files downloaded from the Internet for malware before you use them.
• Don’t use peer-to-peer (P2P) file sharing software, which is inherently insecure and can
share the entire contents of your hard drive.
• Don’t click on anything inside a pop-up window to close it. Click on the “X” in the upper-
right-hand corner to close the pop-up window.
• Adjust your browser to block pop-up windows.
• Don’t click on links within pop-up windows—they may install spyware on your computer.
• Beware of “free” downloads that may install software on your computer without your
knowledge or permission.
• Don’t use add-on menu bars in your Internet browser.
• Don’t use third-party search engines for your hard drive.
• Don’t use shopping programs.
• Don’t use any program that offers to save your userids or passwords.
12
CIC‐UHF
Computer Security Manual
Running certain types of software such as peer-to-peer file sharing software, Chat or Instant
Messaging software, Search assistant software, Internet-based games greatly increases the
probability your computer will get compromised.
13
CIC‐UHF
Computer Security Manual
COMPUTER CRIME
Computer crime is a growing national and international threat to the continued development of
e-business and e-commerce. The following are the best known computer crimes
It is very difficult for our society and our government to keep up with the rapid change in the type
of computer crime being committed. Many laws have to be rewritten and many new laws must
be implemented to accommodate the changes.
14
CIC‐UHF
Computer Security Manual
IDENTITY THEFT
The fastest growing crime on the Internet is identity theft. Guard your personal information as if
it’s your most important asset. Even though identity theft is most likely to occur in an offline
environment, once your personal information has been stolen it’s easy to use it in an online
environment. If someone steals your personal information they can gain access to your assets
within no time. They can buy cars or any other valuable item in your name and you have to
prove that you did not do it.. The biggest risk of identity fraud is from people who know you,
people who are close to you. There are many precautions people can take to help prevent
identity theft.
• One way is to scrutinize emails or phone calls that ask for your personal information
or financial account information. No legitimate financial institution will ever send an e-
mail requesting you to supply your account information. You should ignore and
delete these e-mails immediately.
• Use strong passwords. If someone guess your weak password and breaks into your
account (email, bank, credit card), you have nobody to blame except yourself.
• When using computer or accessing website, never use an option to “Remember my
password the next time”. This option will store password in a standard location on the
computer, which is the same as writing it down just as bad. If your password is
stored, it can be found and used against you.
• Expect someone to read any document you discard. Shred all discarded document
using paper shredder.
• Beware of Shoulder surfers – people who look over your shoulder at your computer
keyboard or monitor. They can note down your id and password If they have camera
or camera equipped cell phone they can record the keystrokes of your ID and
password and your personal information displayed on the monitor.
• Make a photocopy of your important documents such as credit card, license and all
the account numbers and phone numbers to call and cancel. Keep the photocopies
in a safe place.
• Do not use public computer for e-commerce, to check your emails or access your
bank account.
15
CIC‐UHF
Computer Security Manual
Check Disk
Run Check Disk weekly to check your hard disk for damaged files that degrade performance. It
must be run separately on each partition on your hard drive, as follows:
• Double-click the My Computer icon
• Right click the appropriate Drive icon, select Properties, select the Tools tab.
• Click the Error Checking button.
• Click the Check Now button.
• In the Check Disk Options, select both options
• Click the Start button to begin checking the hard drive.
You may need to reboot your computer for the disk to be checked.
Disk Defragmenter
Run Disk Defragmenter weekly to increase system speed. It must be run separately on each
partition on your hard drive. To start the utility:
• Double-click the My Computer icon.
• Right click the appropriate Drive icon, select Properties, select the Tools tab.
• Click the Defragment Now button.
This utility will require several minutes to defragment each partition on your hard drive.
Disk Cleanup
Run Disk Cleanup utility monthly to increase system speed. Disk cleanup removes number of
unnecessary files from hard disk to free up disk space and help your computer run faster. It
removes temporary files, empties the Recycle Bin, and removes a variety of system files and
other items that you no longer need.
It must be run separately on each partition on your hard drive. To start the utility:
• Double-click the My Computer icon.
• Right click the appropriate Drive icon, select Properties, select the General tab.
• Click the Disk Cleanup button.
This utility will calculate the total disk space that can made free. Select using check box the
types of unnecessary files you want to remove and click ok.
16
CIC‐UHF
Computer Security Manual
QUICK REFERENCE
• Always update your antivirus software with latest patches from the vendor services
• Scan the system with anti-virus software regularly to avoid virus
• Take backup of your important data periodically
• Also use anti-spyware, anti-malware and anti-adware tools
• Always update the operating system with latest patches.
17
CIC‐UHF