TUCoPS :: General Information :: intitfaq.txt

Interpol document: Frequently Asked Questions about Information Security and Crime Prevention

Frequently asked questions
about Information Security and Crime Prevention

1. What is the biggest threat to Information Security for
   companies?
2. What can we do, to secure our permanent Internet connection
   and local network against hacking, data spying, data
   altering etc.?
3. What shall I do, if I recognise that a hacker is attacking
   my computer system now?
4. How can I secure my stand-alone PC and data against
   unauthorised access?
5. How can I protect a computer system from computer viruses?
6. How can I transmit confidential electronic information to a
   receiver?
7. How can I bring awareness to the employees and management
   in my organisation?
8. What should we do if external persons service our system?
9. How can I protect a telecommunication system from misuse
   such as unauthorised access?
10.Where can I get information about IT Security?



1. What is the biggest threat to Information Security for
companies?                                                [Top]
----------------------------------------------------------------

One big threat occurs if your staff are unaware of the
importance of Information Security and the difference between
'nice to know' and 'need to know'. Employees should only have
access to the information that they need in order to do their
job (to prevent information leakage).

Your staff must be informed about IT security and trained
regularly. A key threat for companies is hacking. Hackers can
not only destroy data, they may also destroy the image and the
reputation of the company, too.

2. What can we do, to secure our permanent Internet
connection and local network against hacking, data spying,
data altering etc.?                                       [Top]
----------------------------------------------------------------

The solution is called firewall! A firewall is able to defend
hacking attempts in a computer system, but it is necessary to
administrate the system every time. Normally, a Firewall will
only protect against unauthorised access from outside. It should
be complemented by an Intrusion Detection System (IDS) system.
An IDS will protect the system from internal attacks and failure
of the Firewall.

Introduce an Incident Handling System (IHS). Being well prepared
is the best condition in order to minimise the damage and losses
after an incident.

To keep out unauthorised persons it is further recommended to
use access codes as passwords etc. Passwords should not be too
short or too easy to find out and they should be changed
frequently.

3. What shall I do, if I recognise that a hacker is
attacking my computer system now?                         [Top]
----------------------------------------------------------------

With an IHS you will be prepared to handle the incident. If you
do not have an IHS and you recognise that a hacker has attacked
a computer system, the best thing to do is disconnect the system
from the net. Further, it is usually necessary to make a seizure
of the attacked system and of the log protocols. It is important
to make a full back-up so that evidence (i.e. IP-address,
login-time) can be collected. If there is a serious threat or
damage it is recommended that it should be reported to the
police.

4. How can I secure my stand-alone PC and data against
unauthorised access?                                      [Top]
----------------------------------------------------------------

To secure a stand-alone PC it is recommended to set up a
BIOS-password and a screensaver-password ('do not write the
passwords under the keyboard'). It is necessary to change
passwords frequently. Encryption can be used to protect
important/confidential information.

There are different methods of protecting a PC physically such
as alarm systems, floppy locks, etc.

5. How can I protect a computer system from computer
viruses?                                                  [Top]
----------------------------------------------------------------

A very simple and useful method against computer viruses is to
use a anti-virus-program (like Norton Anti-Virus or McAffee). A
problem is that new viruses are created very fast and so it is
necessary to update the anti-virus program very frequently. It
is also dangerous to download data from unknown sources and open
e-mails from unknown persons. Special attention should be given
to 'attachments' to mail. Use a stand-alone PC to check
diskettes for viruses before they are loaded into the network.

It is important to have a company policy that explains that
uncontrolled downloading can have undesirable consequences,
because of the risk of viruses etc.

6. How can I transmit confidential electronic information
to a receiver?                                            [Top]
----------------------------------------------------------------

If it is really necessary to transmit confidential information
via e-mail it is recommended that you should use an
encryption-program like Pretty Good Privacy (PGP).

7. How can I bring awareness to the employees and
management in my organisation?                            [Top]
----------------------------------------------------------------

Tell your management what can happen in the case of uncontrolled
internal access to information or lack of protection from
external attacks. If a hacker successfully attacks your company
network, inform the management about possible material damages
and the loss of reliability and image. Educate employees and
management to never give their PIN numbers, password, and
calling card numbers to anyone who asks them. Legitimate persons
never ask for passwords etc. via telephone or e-mail.

8. What should we do if external persons service our
system?                                                   [Top]
----------------------------------------------------------------

The best way is to save the confidential information on other
media before servicing. Furthermore, it is recommended to
observe the persons during the servicing, if they have not been
security checked before. Never let external service staff take
computer media or computers with classified information from
your site.

9. How can I protect a telecommunication system from
misuse such as unauthorised access?                       [Top]
----------------------------------------------------------------

Normally a mobile phone or a fixed-phone can be protected
against misuse with a Personal Identification Number (PIN). In a
large telecommunication system (like those in companies) it is
recommended to block special telephone numbers (like
audiotex-lines), which produces higher charges.

10. Where can I get information about IT Security?        [Top]
----------------------------------------------------------------

There are a lot of publications, books, training courses etc.,
covering these topics. Information can also be obtained from the
Internet as well as from IT Security companies. Some basic
information can be obtained from your local police organisation
and there are many Web-sites on the topic.


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH