10. Securing the System
10. Securing the System
Notes
10
SECURING THE COMPUTER SYSTEM
Today we live in the technological era where Internet has become indispensable
part of our lives. Internet and its services help us perform multiple tasks. Using
Internet, we can search any type of information, do online shopping and banking,
book movie, railway and flight tickets, undertake online courses and many more.
Unfortunately, there is other side of the coin as well. If not used, with caution,
Internet is a dangerous tool in the hands of malicious people. Internet and its
related services have brought lot of security threats. The most effective way to
protect yourself from the cyber threats is to be aware of them and take appropriate
measures to protect yourself, your device and your data. In this lesson, we will be
talking about cyber security, cyber law and e-waste management.
Objectives
After reading this lesson, you will be able to:
z define cyber security;
z secure the computer system;
z describe cyber law;
z explain about e-waste and its harmful effects.
z Availability of Data for All: Today anyone can get any information, may it
be personal, professional or organizational; all data is accessible to any person
in the world. It is therefore very important to know the means to protect data
from unauthorized access, copying and distribution.
z National Security: ‘Cyber Attacks and Digital Spying’ are one of the most
dangerous threats to national security. The anti-nationals and terrorists are
always trying to steal sensitive data related to a particular country and use it
to for anti-national activities. So, it is very important to be cautious and take
adequate precautions to save our data.
threats and take adequate measures to protect our system. Following are the steps
that should be taken to protect and secure your system from potential cyber crimes.
Notes
z Always Password Protect Your System: It is always advised to password
protect your system and also certain applications or files containing sensitive
data. One should keep the following points in mind while setting passwords:
o Do not share your passwords with anyone.
o Do not use the same password for all applications.
o A password should be strong having a combination of alphabets, digits
and special characters.
o It is not good to have your initials, date of birth, pet’s name etc. as your
passwords.
o Preferably your password should be 8-10 characters long and should
have special characters too..
You may use password manager application that will help you to remember
multiple passwords.
z Always Update Your System: You should always update the operating
system, antivirus or any other software installed in your computer. Although
the updates add on some extra features but they also cover the cyber security
loopholes. Generally, one gets message pop ups when the system or any
software is due for updates. Many OS and other applications have the facility
to automatically update which makes things easier.
z Always Pay Attention to Security Warnings: If the system is giving
security warning, one should not ignore it. Immediate action nees to be taken
as directed by the application or the system.
z Always Install Original Antivirus: It is very well known that any machine
connected to the Internet is prone to viruses, worms, Trajans, or any other
form of malware. An antivirus software helps in protecting the system from
potential virus attack. Although it does not give 100% assurance to keep the
system safe, yet it gives quite a considerable amount of protection. One
should always use original antivirus software and keep on updating the
antivirus regularly.
z Never Open Unsolicited Mails: Most of the cyber attacks are through
emails. So avoid opening the mails that are sent from unknown persons. And
more importantly you should not click on any links provided in these mails,
unless you are sure that they are safe.
You can make settings to block cookies, to block the advertisements, to block
your location access and so on. It must be noticed that many of the options
Notes are disabled by default so, you have to enable them by selecting your
‘Browser Settings’ options. In Google Chrome, the Settings option is
available in the pop up menu that is displayed when we click on ‘Customize
and Control Google Chrome’ button present on the top right of the browser
(Fig. 10.1).
z Use Anti Spy Software: A spyware is a malware that is designed to gather
information secretly from a system or a database and send it to any third party.
Sensitive information such as banking and credit card details can lead to
identity theft and fraudulent transactions. Nowadays, latest antivirus programs
have anti spyware built in them. They also give protection against adware and
Trojans.
z Back up Your Data: It is always a good practice to back up your data on any
secondary storage device or on the cloud. This comes to rescue when your
system gets hacked or even when your hard drive crashes.
z Uninstall the Programs That are no Longer in Use: One should always
uninstall the programs that are not being used. This helps keep your system
secure and also increases the processing speed of your computer.
Cyber Law deals with legal issues related to cyber space and it covers a variety of
areas such as online privacy, intellectual property, freedom of expression, usage of
Internet, online transaction frauds etc. It gives protection to the victims of cyber Notes
crime by providing provisions to take action against the people committing such
crimes.
According to Cyber Law, the definition of cyber crime includes any unlawful act
done using digital devices that are connected to Internet. Following are some of
the acts that come under the purview of cyber crime:
z Online Fraud: The cyber law protects the internet users from online frauds
such as credit card thefts, identity thefts etc. A person who commits such
offence is liable to be prosecuted under this law.
z Identity Theft: The people with malicious intentions steal personal data such
as credit card details from the Internet and use it for transacting money or
extortion purposes. Even social media accounts of people can be hacked and
the information can be used for committing different types of fraud. All these
acts are punishable according to various provisions of cyber law.
To take cognizance of these acts, Indian Penal Code has some up with IT Act 2000.
It is based on The Indian Penal Code, 1860, The Indian Evidence Act, 1872, The
Bankers’ Books Evidence Act, 1891, The Reserve Bank of India Act, 1934, etc.
This is the primary law as far as the cyber crimes and e-commerce in India are
concerned. The salient features of this Act are:
Notes
z The IT Act 2000 provides legal recognition to the transactions done via
electronic medium.
z It gives legal recognition to digital signatures for authentication of any
information.
z It facilitates and regulates online correspondence with the government
agencies and departments. For example, we can file online return, pay taxes,
apply for passports and Aadhar cards etc., and give online payments for these
services as well.
z It allows and facilitates electronic storage of data. Even government banks
such as RBI is given permission to store records in electronic form.
z It gives legal permissions for online transfer of money between customers,
banks and other financial institutions.
z It elaborates the offences, penalties and breeches related to cyber crime.
z It also lays down the trial procedure and justice dispensation system for cyber
crimes and its accused.
z It enacts penalties for offences such as damaging computer systems, committing
cyber terrorism etc.
z The section 66A of the Act makes the offensive messages illegal and owners
of the servers are responsible for its content. If any offensive image is
uploaded and forwarded on social media, its server owner will be held liable.
A cyber crime of any nature should always be reported to cyber cell in local police
station. The Government of India has laid down various initiatives to facilitate
victims of cyber crime so that they can file complaints online.
The complaint of cyber crime can be reported online through cyber crime
portal. (https://cyber crime.gov.in/cybercitizen/home.htm). Through this portal,
the victim can report an anonymous complaint where the victims or the
complainants may not disclose their identity.
z The companies and organizations are able to carry out their business
processes according to the legal provisions stated in the IT Act 2000. This
Notes
encourages healthy trade practices.
z Digital Signatures have been given validity making exchange for authenticated
documents easier between companies and government organizations.
z It has increased the utility of e-governance as well. The Government can now
issue notifications and circulars on the web for the general public. Similarly,
people can transact with government through various online portals. For
example, nowadays we can apply online for passports or even file online IT
returns.
Notes
gloves and masks during the recycling process. Nowadays there are many e-waste
recycling companies coming up with the pickup facilities for collecting old
Notes electrical or electronic items from your homes.
Refurbishing is the process in which the electronics are sold again at lower prices.
This benefits both society and the environment. The word ‘refurbish’ means to
renovate.
Re-use: In this process of e-waste management, the electric or electronic device
is reused after making a slight modification. Devices such as mobile phones,
computers, laptops etc., can be re-used.
The government needs to take a few stringent steps in order to promote e-waste
management. Some of these steps are as follows:
z Various recyclable units should be set up and promoted so that people can
easily send their devices and appliances for recycling.
z There should be proper arrangements for safe storage of e-waste or its
recycled products.
z Research for efficient utilization of e waste should be encouraged.
z There should be strict rules and laws pertaining to e-waste management. The
rudimentary methods of waste disposal and recycling should be stopped.
People openly burn the waste, heat circuit boards, expose them to acid baths,
dump waste into landfills, and so on. Anyone who is caught doing such acts
should be punished.
z Cyber crime includes any unlawful act done using digital devices that are
connected to Internet. Online Fraud, Copyright Infringement, Defamation,
Notes Cyber Stalking and Cyber bullying, Business ethics and Identity Theft are
some of the acts that come under the purview of cyber crime.
z IT Act 2000 of Indian Penal Code takes cognizance of cyber crimes.
z E-Waste or electronic waste is constituted by the old electric and/or electronic
devices that are no longer in use.
z E-waste contains hazardous chemicals and metals such as lead, beryllium,
cadmium, plastics etc., that are difficult to recycle. Hence, it should disposed
in a proper manner.
z Some of the most feasible methods of e-waste management are recycling,
refurbishing and re-use.
z Recycling is the method in which e-waste is converted to something that can
be used again in some or the other manner.
z Refurbishing is the process in which the electronics are sold again at lower
prices.
z ReUse: In this process of e-waste management, the electric or electronic
device is reused after making a slight modification.
Terminal Exercise
1. Fill in the blanks:
2. State whether the following are True or False:
(a) The purpose of cyber security is only to prevent cyber attacks.
(b) We can ignore the security warning being given by our system.
(c) We should download the software from the website that looks most
beautiful.
(d) Downloading an image that has copyright restrictions is a cyber crime.
(e) We should burn e-waste to get rid of it.
3. Define the following
(a) Cyber Security (b) Cyber Crime
(c) Cyber Law (d) E-waste
10.2
1. (a) IT Law (b) IT Law 2000 (c) Cyber cell
2. It has made exchange for authenticated documents easier between companies
and government organizations.
10.3
1. (a) Electronic (b) Refurbishing
(c) Beryllium
2. Lead, mercury 5. Firewall
6. Authenticity 7. IT Act 2000
8. Spyware 9. E-Waste Management