Cyber Crime Chap 3
Cyber Crime Chap 3
3
IPNRTOPEL EECRTYTUAL
LAW
DIGITAL DEVICES
SECURITY, TOOLS&
TECHNOLOGIES FOR
CYBER SECURITY
3.1 DIGITAL DEVICES SECURITY
Digital devices security is the practice of protecting digital devices from unauthorized
access, use, disclosure, disruption, modification, or destruction. It is a critical aspect of
cybersecurity, as digital devices store and transmit a vast amount of sensitive data.
Page | 3.2
Digital Devices Security, Tools &Technologies for Cyber S
There are a number of tools and technologies that can be used to secure digital
Security
including: devices,
Firewalls: Firewalls are barriers that control and monitor incoming and
network traffic. They can be used to block unauthorized access to a outgoing
device
network, and to prevent the spread of malware.
Antivirus Software: Antivirus software is designed to detect and
remove
such as viruses, worms, and Trojan horses. It can also be used to protect againe malwware,
phishing attacks, which are attempts to trick users into revealing personal
information or downloading malware.
Password Management: Password management tools help users to create and store
strong, unique passwords for all of their online accounts. They can also help users to
change their passwords regularly and to avoid using the same password for multiple
accounts.
In addition to using these tools and technologies, there are a number of other things that
users can do to protect their digital devices, including:
Keeping software up to date: Software updates often include security patches thal
fix vulnerabilities that could be exploited by attackers.
Being cautious about what information you share online: Avoid sharing persona
information, such as your address, phone number, or Social Security number, on
social media or other websites.
Devices Security, Tools & Technologies for Cyber Security Page | 3.3
Digital
Being careful about what links you click on: Only click on links from trusted
SOurces.
Tastalling apps from trusted sources: Only download apps from official app stores.
Being aware of scams: Scammers often try to trick users into revealing personal
information or downloading malware. Be wary of any emails or text messages that
you receive from unknown senders.
Ry following these tips and using the appropriate tools and technologies, you can help
protect your digital devices from cyberattacks.
3. Set BIOS Password: Enable the BIOS password feature and set a strong,
memorable password.
Pge |3.4 Digital Devices Security. Tools & Technologies for Cyber Secus
4. Save and Exit: Save the
hanges and exit BIOS. Your computer will restart, and y
willbe prompted to enter the BIOS password.
2 Enable Complex Password Requirements: Follow the same steps as for the
Administrator account to enable complex password requirements for standard
users.
ent
Additional Tips for Password Management:
It is important to manage your passwords carefully to prevent unauthorized access to
tor
your computer.
your phone via SMS, a code generated by an authenticator app, or a physical security key
Here's a general guide on how to set up and configure 2FA on your mobile phone:
1. Choose a 2FA method: Decide which 2FA method you prefer to use: SMG
Authenticator app, or Security key. Each method has its own advantages an
disadvantages.
each onlin
2. Enable 2FA for your online accounts: Go to the security settings of
to enable 2REA
account you want to protect with 2FA and look for the option
Follow the instructions provided by the specific service to set up your chosen 2F
method.
numbe
3. Set up SMS 2FA: If you choose SMS 2FA, provide your mobile phone
in to
when prompted. You will receive a code via SMS whenever you try to log
your account on a new device or after a certain period of inactivity.
2FA, downloac
4. Set up Authenticator App 2FA: If you choose authenticator app
and install an authenticator app on your mobile phone. Popular options include
Google Authenticator, Microsoft Authenticator, and Authy. Scan the QR code om
enter the secret key provided by the online service into the authenticator app. The
app willgenerate a code every time you log in to your account.
5. Set up Security key 2FA: If you choose security key 2FA, purchase a security key
and register it with your online accounts. You will need to physically insert the
Security, Tools &Technologies for Cyber Security Page | 3.7
Digital.Devices
ty security key into your mobile device or computer when prompted to complete the
login process.
Testyour 2FA setup: Once you have set up 2FA for your online accounts, test it by
krving to log in to your accounts on a new device or after a period of inactivity.
Make sure you can successtully receive and enter the verification code or use the
security key to complete the login process.
7 Save Backup codes: Many online services provide backup codes that you can use
bn log in if you lose access to your phone or authenticator app. Keep these backup
codes in a safe place and make sure they are only accessible to you.
8. Keep your mobile phone secure: Protect your mobile phone with a strong
password, PIN, or fingerprint authentication. This ensures that even if your phone
te lost or stolen, unauthorized individuals will not be able to access your 2FA codes
or authenticator app.
Update your 2FA settings regularly: Review your 2FA settings periodically and
make sure they are still up-to-date and reflect your current security needs.
Consider updating your backup codes if you have lost access to your previous
ones.
e
By following these steps and implementing strong security practices, you can
significantly enhance the security of your online accounts and protect them from
unauthorized access.
Steal your personal information, such as your name, address, and credit av
number.
Install malware on your device that can steal your dataor damage your files.
Take control of your device and use it for malicious purposes.
vulnerabilities i
"Security patches are pieces of software that are designed to fix
software or operating systems."
There are a number of reasons why security patch management is important:
It reduces the risk of data breaches. Vulnerabilities can be exploited to stea
sensitive data, such as customer information, financial records, or intellectua
property. Regularly applying security patches can significantly reduce the risk o
data breaches.
" It protects against malware. Malware is software that is designed to harm you
computer system. Malware can steal data, instalother malware, or even hold you
data hostage for ransom. By applying patches promptly,you can help to preven
malware from infecting your system.
It improves system stability. Unpatched vulnerabilities can sometimes cause system
instability and crashes. By applying patches promptly, you can help to keep youm
system running smoothly.
Security. Tools &Technologies for Cyber Security Page | 3.9
DigitalDDevices
t reduces the risk of legal penalties and non-compliance fines. Many industries
have regulations that require organizations to implement effective patch
management procedures. Failure to comply with these regulations can result in
fines, penalties, or reputational damage.
reduces costs. Cyberattacks can be costly, both in terms of direct financial losses
and indirect costs such as damage to reputation, productivity losses, and legal
expenses. Regularly applying security patchescan help to reduce these costs.
There are a number of things you can do to ensure that your computers and mobiles are
up-to-date with the latest security patches:
Enable automatic updates: Most software will automatically download and install
patches. Make sure that automatic updates are enabled for all of your software.
Check for updates regularly: Even if automatic updates are enabled, it is a good
idea to check for updates regularly. This is especially important for critical software,
such as your operating system and web browser.
Install updates promptly: When you are notified that an update is available, install
it as soon as possible. Do not wait until you have time, as this could leave your
system vulnerable to attack.
In addition to the steps above, you should also make sure to:
Keep your software up to date: Software vendors often release security patches to
fix vulnerabilities in their software. Make sure that you are always running the latest
version of your software to minimize the risk of being attacked.
Use strong passwords: Strong passwords are important for protecting your accounts
from unauthorized access. Make sure that your passwords are at least 8 characters
long and include amix of upper and lowercase letters, numbers, and symbols.
Be careful about what you click on: Phishing e-mails and websites are a common
way for attackers to trick people into revealing their personal information or
installing malware on their computers. Be careful about what you click on and only
open e-mails and attachments from people you trust.
By following these steps, you can help to protect your computers and mobiles from
cyberattacks.
Devlces Security,, Tools &Technologies for Cyber Security Page | 3.11
plgital
Mobile apps request various permissions to function properly, such as accessing your
contacts, location, camera, or storage. While some permissions are essential for the app's
Corefunctionality, others may raise privacy concerns.
Some of the common APP permissions include:
Location Access: Allows apps to track your location data, which can be used for
navigation services, weather updates, or location-based advertising.
Camera Access: Grants apps the ability to capture photos and videos, which is
necessary for camera apps, social media sharing, or augmented reality experiences.
Microphone Access: Enables apps to record audio, essential for voice calls, voice
assistants, or audio recording apps.
Storage Access: Allows apps to read, write, or modify data stored on your device,
often required for storing app data, downloading files, or managing media.
" Contacts Access: Grants apps permission to access your contact list, which can be
used for social networking, messaging apps, or caller ID identification.
Phone Access: Allows apps to make and manage phone calls,send SMS messages,
or access call logs, often required for communication apps or call management tools.
Sensors Access: Enables apps to access various sensors on your device, such as the
accelerometer, or proximity sensor, which can be used for fitness tracking, gaming,
or motion-based features.
Page | 3.12
Digital Devices Security, Tools &Technologies for Cyber
3.5.2 Managing APP
Permissions
Security
To manageapp permissions on your mobile phone:
Open Settings: Access the Settings app on your mobile device.
" Locate Apps: Find the "Apps" or "Applications" section in the Settings menu.
Choose App: Select the app you want to manage permissions for.
Review Permissions: Tap on "Permissions" to view the list of
to the app. permissions granted
Grant or Deny ermissions: Toggle the permission switches to enable or disak.
access for each permission.
Keep Operating System Updated: Ensure your mobile phone's operating system
is up-to-date, as updates often incdude security enhancements and improved
permission managemernt capabilities.
Educate Yourself:Stay informed about the potential risks associated with granting
certain permissions to apps.
&
Devices
Security, Tools Technologies for Cyber Security
Digital
AND ANTIVIRUS Poge|3.13
VIRUS
B61
resources under
(Vitalinformation seize)
is a
Virus
t o harm your computer. It is
loaded
onto your malicious software program that is
computer without your
,
designed wishes. Once a
against your virus is on your knowledge
and even steal computer, it can
runs
And other files, damage your data, replicate itself and
to your personal infected websites, or
canspreadromone computer to another through e-mail attachments,
spread
drives.
information. Viruses
emovable mediasuch as USB
program that is
Antivirus: software is a designed to protect your computer
software works by scanning your computer for from viruses.
Antivirus
e offers real-time protection,
viruses and removing them. Most
software
antivirus
threats. Some
antivirus continuously
software includes monitoring your system for new
malware
parentalI controls, and phishing protection.
additional security features like-
irewalls,
Someofthe most popular antivirus programs are:
MCAfee Antivirus Plus
Bitdefender Antivirus Plus
ESET NOD32 Antivirus
2. Check for updates regularly to ensure you have the latest protection. Some
programs may notiy you when updates are available.
3. Install updates promptdy to maintain optimal security.
Unauthorized Access: Hackers can gain access to your network, potentially stealing
sensitive data or installing malware on your devices.
Data Interception: Your personal information, such as browsing history, emails, and
financial data, can be intercepted and compromised.
Malware Distribution: Malicious software can be spread through your network,
infecting other connected devices.
Network Disruptions: Hackers can disrupt your network connectivity, causing
inconvenience and productivity loss.
Change your Wi-Fi password regularly, every 3 to 6 months, to minimize the risl.
unauthorized access.
> WPA2 or WPA3 Encryption
Ensure your Wi-Fi network is using WPA2 or WPA3 encryption, which are the me
secure encryption protocols available for Wi-Fi networks.
Avoid using outdated encryption protocols like WEP, which are vulnerable +
security breaches.
A VPN (Virtual Private Network) encrypts your internet traffic, making it mor
difficult for attackers to intercept and steal your data. Consider using a VPN wher
connecting to public Wi-Fi or when accessing sensitive information online.
Install and maintain antivirus and anti-malware software on your computer and
mobile devices.
Digital Devices Security, Tools &Technologies for Cyber Security Page | 3.17
y
These tools can detect and remove malware that could compromise your security
when connecting to Wi-Fi networks.
n Keep your antivirus and anti-malware software up-to-date to ensure it is
effective
against the latest threats.