LawHealth and Safety

The Basics of Information Security: What You Should Know to Avoid Being a Victim of Modern Information Information Scammers

More relevant topic in our century, perhaps, does not exist. The basics of information security are not only a section of informatics, but also important information that every citizen of Russia needs: a PC user and the Internet, even a beginner, mobile phone owners, plastic bank cards.

Legal support of information security

As early as the beginning of the 21st century, all this knowledge was gathered together on the basis of known cases of infringements in the field of information security. And they began to reflect a very definite policy of the state with regard to this issue. The legal basis for information security is reflected mainly in the Doctrine and in a number of legal acts (on the protection of state secrets, commercial, on the protection of personal data, the law on copyright).

On this, measures to protect information have not stopped. Special units were set up in the Ministry of Internal Affairs to combat infringers of information security. At the same time, security technologies developed: electronic signature, data encryption, password systems. At the same time, the main task, in the achievement of which not only state structures, but also commercial organizations are interested, is the awareness of the population about the basic precautions in the information environment. They should be considered in detail in the topic "Fundamentals of Information Security".

Precautions for handling the card

First and foremost, precaution is important when dealing with a bank card, since many citizens receive the main income on the account in the bank, and withdraw money in terminals installed in each city of the country. The safety of your funds depends only on you. The careless handling of the card will sooner or later lead to the loss of money on the account. Never tell or show your pin code, do not store it in your wallet with the card, do not give it to someone else's hands. Although it is useless without a pin code, where is the guarantee that it was not peeked when you dialed the code on the terminal. If you lose, immediately report it to the bank. It is worth to go to your bank's official website, dial a number for consultations and report on it on the lost or stolen card. The operator immediately report this to the bank's security service and your card will be canceled.

Phone fraud

Basics of information security also apply to the treatment of mobile communications and, of course, must be observed when using a PC and the Internet.

The phone is the second means of fraud for profit. With the help of mobile communication, attackers can get a considerable amount by resorting to various schemes of deception. About which the department of the Ministry of Internal Affairs of Russia to combat crime in the information environment has repeatedly reported with a view to warning citizens. The most common way - SMS-messages with strange or frightening content, as well as with the promise of a prize, a prize. In the case of the latter, it's easy to figure out scammers - if you win a prize, you do not have to pay for it, which means you do not need to call the phones (unless it's known numbers of well-known brands, radio stations registered in the directory) and send messages after which Your account on the mobile "evaporate" a large amount of money. Alarming messages, for example, with this text: "Mom, I got in trouble, put money on my phone, then I'll explain everything", play on the strongest human feelings (otherwise the scheme of deception did not work). Of course, many will first call their children on their numbers, and check if everything is in order. Those who do not have children will laugh at such a sms. But there are other cases when the attackers are lucky. For example, my mother could not reach her son (the subscriber does not answer) and in a panic put money on an unfamiliar number. But in this situation it would be possible to act differently: first try to contact friends, relatives, colleagues of your child.

The misfortune of computers and the Internet

The biggest nightmare for PC users and the world's network, capable of shaking the basics of information security, no matter how perfect they are, are viruses and hackers hacking mail, quick messaging programs, a social networking page and, worse, a virtual wallet. How they manage to do it - even detectives of the special department of the Ministry of Internal Affairs can not always answer this question. But admonish - be afraid of sites-clones. When you go to a similar site from a link sent by your supposedly friend, you find yourself on a site familiar to you and without suspecting a dirty trick, enter your login and password to log into the system. So scammers get your data, using them then to hack mail (few people come up with different passwords and logins for mail and other portals). So remember, even if the site is similar to the one you know, you should pay attention to its address. The slightest mistake in it (another sign, another letter) means that you are not on the site on which you think, but on the site-clone.

Such schemes of deception have been invented a lot, and how much will be invented ... And the information security system is far from perfect: technologies are developing faster than the implementation of data protection measures. Therefore, security in the modern information world depends on the foresight and awareness of each citizen.

Similar articles

 

 

 

 

Trending Now

 

 

 

 

Newest

Copyright © 2018 en.unansea.com. Theme powered by WordPress.