Motivation |
|
Cybersecurity attacks originate from many sources including:
- Cybercriminals: They commit malicious attacks on computers (e.g., servers, desktops, laptops, tablets, smartphones), Internet of Things, or digital networks (e.g., Internet, wireless networks, cellular networks) for the purpose of stealing confidential information to make a profit.
- Cyber Terrorists: They attack to compromise, disable or destruct national critical infrastructures and cause fear and disruption nationwide.
- Employees: (a) Disgruntled current or previous employees may conduct attacks for revenge, profit or ideology; (b) Improperly trained or insufficiently vigilant current employees unintentionally make mistakes, which create security and privacy breaches.
- Hacktivists: Politically or socially motivated people conduct attacks to promote a political agenda, a social change, or for freedom of information movements (e.g., WikiLeaks).
- National Governments: A national government launching cyberattacks against another country for the purpose of their interests.
|
Purpose |
|
People are the weakest link in cybersecurity. It is known that 95% of all successful cyber attacks are caused by human error. The purpose of this course is to educate the user to prevent errors that cause security and privacy breaches. The course presents critically important security and privacy tips and guidelines that every handdheld, laptop, or desktop computer user should know. |
Scope and Applicability |
|
The security and privacy tips and guidelines presented in this course are applicable for use of smartphones, tablets, laptops, desktops, online systems, and social media. The tips and guidelines are listed in no particular order. We use the term “Tip” to imply a helpful hint, warning, or a piece of useful information. We use the term “Guideline” to imply a principle put forward to identify a best practice or a recommended course of action.
The course uses the Apple mobile devices and Apple Watch as the example platform. The tips and guidelines given for the Apple platform are also applicable for the Android platform. |
Background |
|
It is well to remember that
- iPhone or any smartphone is not a phone; it is a handheld computer.
- iPad or any tablet is not a tablet; it is a handheld computer.
- Apple Watch or any smartwatch is not a watch; it is a wrist computer.
Recognizing that you are using a computer connected to the Internet in your hand or you are wearing a computer on your wrist must make you realize that security and privacy are critically important especially when using these computers during domestic and international travel. |
Remarks |
|
Your handheld computer (smartphone, tablet), your wrist computer (smartwatch), and your laptop computer are always on the move with you wherever you go. This mobility creates added responsibilities for you in using them on the move in a secure manner and by protecting your privacy.
The handheld and wrist computers and laptops are engineered with security at its core. However, your choices and actions as a user affect security and privacy. You can create serious security and privacy breaches if you do not follow the tips and guidelines provided herein and misuse your computers.
It is your responsibility to prevent theft. The handheld and wrist computers and laptops are vulnerable to theft for their monetary value, especially while traveling in foreign countries. Do not leave your computers unattended in public places such as airports, restaurants, conference meeting rooms, and hotels. Safeguard your computers in a secure location. Hotel locks or hotel room locks cannot be trusted, especially in foreign countries. |