Welcome to Rajasthan Polytechnic!
Hello and welcome to Rajasthan Polytechnic, a dedicated space for 2nd-semester Polytechnic students. Managed by Garima Kanwar, this blog provides essential notes, study materials, and video lectures for the subject Introduction to IT Systems. Our goal is to make learning easier and more accessible, helping you understand key concepts and excel in your studies.
Download Your Notes
Additionally, you can join our WhatsApp and Telegram groups for easy access to PDF and Handwritten Notes as well as updates on new materials.
We hope this blog helps you in your academic journey.
📢 🔔 Important:
👉 Full PDF available in our WhatsApp Group | Telegram Channel
👉 Watch the full lecture on YouTube: BTER Polytechnic Classes
5. INFORMATION SECURITY BEST PRACTICES
Information security is crucial in protecting your data and privacy across devices, networks, and digital services. Below are essential best practices for maintaining security on your devices and networks.
5.1 Desktop & Smartphone Security:
Ensuring the security of your desktop computer and smartphone is vital to protect against unauthorized access and threats like viruses and hackers. Several methods are available to secure your devices:
5.1.1 Password, Pattern Lock, Two-Step Authentication (OTP), Biometric Authentication
Password:
- What it is: A password is a secret string of characters used to authenticate a user's identity.
- Best Practice: Use a strong password that combines upper and lowercase letters, numbers, and special characters (e.g.,
J3l#5v!p
). - Why it’s important: Weak passwords can be easily guessed by attackers.
Pattern Lock (Smartphones):
- What it is: A pattern lock is a security feature on smartphones where you unlock your device by drawing a pattern on a grid of dots.
- Best Practice: Choose a pattern that is complex (not a simple shape like a square or line) to prevent unauthorized access.
Two-Step Authentication (OTP):
- What it is: Two-step authentication requires a second layer of security after you enter your password. Typically, you’ll receive a One-Time Password (OTP) via SMS or email.
- Best Practice: Enable Two-Factor Authentication (2FA) for all accounts that support it, especially email, banking, and social media accounts.
- Why it’s important: Even if your password is compromised, an OTP sent to your phone or email adds another layer of protection.
Biometric Authentication:
- What it is: Biometric authentication uses unique physical characteristics, such as fingerprints, facial recognition, or iris scanning, to verify identity.
- Best Practice: Enable fingerprint or face recognition on smartphones for easy and secure access. However, always keep a secondary method (like a PIN or password) as a backup in case the biometric system fails.
- Why it’s important: Biometrics are generally more secure than traditional passwords, as they rely on unique physical features.
5.2 Computer Viruses: Scanning & Removing
A computer virus is a type of malicious software (malware) that can damage or steal your data. Viruses often spread through infected email attachments, websites, or software downloads.
What to Do:
- Use Antivirus Software: Install a trusted antivirus program (e.g., Avast, McAfee, Bitdefender) and make sure it's updated regularly to detect the latest threats.
- Perform Regular Scans: Run full system scans to check for malware and viruses on your computer. Most antivirus software offers scheduled scans.
- Keep Software Updated: Ensure your operating system and software are up-to-date with the latest security patches to prevent viruses from exploiting vulnerabilities.
Removing a Virus:
- Run an Antivirus Scan: If you suspect your computer is infected, run a full scan with your antivirus software. It will detect and remove any known viruses or malware.
- Use a Malware Removal Tool: Tools like Malwarebytes or Windows Defender (for Windows) can help clean your system if the antivirus fails to detect certain threats.
- Manual Removal: In extreme cases, where antivirus software cannot remove the virus, you may need to perform a manual cleanup, including deleting suspicious files and resetting browser settings.
Best Practices:
- Avoid Downloading from Untrusted Sources: Download software only from trusted websites and avoid clicking on suspicious links or attachments in emails.
- Enable Real-Time Protection: Most antivirus programs have real-time scanning features that detect and block viruses as they attempt to access your computer.
5.3 Guidelines for:
5.3.1 Setting up a Secure Password
Use Long, Complex Passwords: A password should be at least 12-16 characters long. The longer and more complex the password, the harder it is to guess or crack.
- Combine uppercase and lowercase letters, numbers, and special characters (e.g.,
@
,#
,$
,!
).
- Combine uppercase and lowercase letters, numbers, and special characters (e.g.,
Avoid Personal Information: Do not use easily guessed information, such as your name, birthdate, or simple patterns like
123456
orpassword
.Use a Password Manager: A password manager can generate and store strong passwords for you. It helps you manage multiple passwords securely without needing to remember them all.
Enable Two-Factor Authentication (2FA): For additional security, enable 2FA whenever possible. Even if someone guesses your password, they will not be able to access your account without the second factor.
Regularly Change Passwords: Change passwords periodically and especially after any security breach or suspected compromise.
Avoid Reusing Passwords: Don't reuse passwords across different accounts. If one account gets compromised, it can lead to other accounts being hacked as well.
5.3.2 Wi-Fi Security
Wi-Fi networks are commonly targeted by hackers, so securing your home or business Wi-Fi is essential.
Use Strong Wi-Fi Encryption:
- WPA3 is the most secure encryption standard for Wi-Fi. If WPA3 is not available, use WPA2 as the next best option.
- Avoid using WEP or WPA encryption, as they are outdated and easily compromised.
Change the Default Router Password:
- Many routers come with a default username and password (e.g.,
admin
/admin
), which are easily accessible online. Change the default password immediately. - Set a strong, unique password for accessing your router’s settings.
- Many routers come with a default username and password (e.g.,
Disable WPS (Wi-Fi Protected Setup):
- WPS is a feature that allows for easier connection to your Wi-Fi, but it’s also vulnerable to brute-force attacks. Disable it in your router settings.
Create a Guest Network:
- If you have visitors who need Wi-Fi access, create a separate guest network with a unique password. This ensures that guests do not have access to your primary network and devices.
Hide Your SSID (Network Name):
- By default, most routers broadcast their SSID (network name). You can hide your SSID so that others cannot easily see your network. However, keep in mind this is not a foolproof measure.
Use a VPN on Public Wi-Fi:
- When connecting to public Wi-Fi networks (e.g., in cafes or airports), use a Virtual Private Network (VPN) to encrypt your internet traffic and protect your data from being intercepted.
Update Your Router Firmware:
- Regularly check for firmware updates from your router manufacturer. Updates often include security patches to protect against vulnerabilities.
Summary of Best Practices:
- Desktop & Smartphone Security: Always use strong, unique passwords, enable two-step authentication, and consider biometric security for added protection.
- Virus Protection: Regularly scan your system with updated antivirus software and remove any detected threats promptly.
- Password Security: Use long, complex passwords, enable 2FA, and never reuse passwords across multiple accounts.
- Wi-Fi Security: Ensure your router is using WPA3 encryption, change default passwords, and use guest networks for visitors.
Thanks for Visiting!
We hope the resources on Rajasthan Polytechnic assist you in your 2nd-semester journey. Stay tuned for regular updates, and feel free to reach out for any questions or suggestions. Best of luck, and happy learning!
Stay Connected & Get More Notes!
I hope these notes help you prepare and perform well in your exams. If you have any questions, feel free to reach out!
Join Our Group for More Updates and Notes:
Telegram: Join Now
WhatsApp: Join Now
Good luck with your studies! 📚
0 Comments