/ / Fundamentals of Information Security: What you should know in order not to become a victim of modern information scams of the information world

Basics of information security: what you should know in order not to become a victim of modern information scams of the information world

More relevant topic in our century, perhaps notexist. Fundamentals of information security is not only a section of informatics, but also important information that every citizen of Russia needs: a PC user and the Internet, even a beginner, owners of mobile phones, plastic bank cards.

Legal support of information security

As early as the beginning of the 21st century, all this knowledge was collectedtogether on the basis of known cases of offenses in the field of information security. And they began to reflect a very definite policy of the state with regard to this issue. The legal basis for information security is reflected mainly in the Doctrine and in a number of legal acts (on the protection of state secrets, commercial, on the protection of personal data, the law on copyright).

On this, measures to protect information have not ceased. Special units were set up in the Ministry of Internal Affairs to combat infringers of information security. At the same time, security technologies were developing: electronic signature, data encryption, password systems. At the same time, the main task, in the achievement of which not only state structures, but also commercial organizations are interested, is the awareness of the population about the basic precautions in the information environment. They should be considered in detail in the topic "Fundamentals of Information Security".

Precautions for handling the card

First of all, precaution is important whenhandling of a bank card, since many citizens receive the basic income exactly on the bank account, and withdraw money in terminals established in each city of the country. The safety of your funds depends only on you. The careless handling of the card sooner or later will lead to loss of money in the account. Never tell or show your PIN code, do not store it in your wallet with the card, do not give it to someone else's hands. Although it is useless without a pin code, where is the guarantee that it was not peeped when you dialed the code on the terminal. If you lose, immediately inform the bank about it. It is worth to go to your bank's official website, dial a number for consultations and report on it on the lost or stolen card. The operator immediately report this to the bank's security service and your card will be canceled.

Phone fraud

Basics of information security also apply to the treatment of mobile communications and, of course, must be observed when using a PC and the Internet.

The phone is the second means of fraud withpurpose of profit. With the help of mobile communications, intruders can get a considerable amount by resorting to various schemes of deception. About which the department of the Ministry of Internal Affairs of Russia to combat crimes in the information environment has repeatedly reported in order to warn citizens. The most common way - SMS-messages with strange or frightening content, as well as with the promise of winning, a prize. In the case of the latter, it's easy to figure out scammers - if you win a prize, you do not have to pay for it, which means you do not need to call the phones (unless it's known numbers of well-known brands, radio stations registered in the directory) and send messages after which your account on the mobile "evaporate" a large amount of money. Alarming messages, for example, with this text: "Mom, I got in trouble, put money on my phone, then I'll explain everything," play on the strongest human feelings (otherwise the scheme of deception would not work). Of course, many will first call their children on their numbers, and they will check if everything is in order. Those who do not have children will laugh at such a sms. But there are other cases when the attackers are lucky. For example, my mother could not reach her son (the subscriber does not answer) and in a panic put money on an unfamiliar number. But in this situation it would be possible to do otherwise: first try to contact friends, relatives, colleagues of your child.

The misfortune of computers and the Internet

The biggest nightmare for PC users anda worldwide network that can shake the foundations of information security, no matter how perfect they are: viruses and hackers, hacking mail, quick messaging programs, a social networking page and, worse, a virtual wallet. How they manage to do it - even detectives of the special department of the Ministry of Internal Affairs can not always answer this question. But warn - be afraid of sites-clones. When you go to a similar site on a link sent by your alleged friend, you find yourself on a site familiar to you and without suspecting a trick, enter your login and password to log into the system. So scammers get your data, using them then for hacking mail (few people come up with different passwords and logins for mail and other portals). So remember, even if the site is similar to the one you know, you should pay attention to its address. The slightest mistake in it (another sign, another letter) means that you are not on the site on which you think, but on the site-clone.

Such schemes of deception were invented by many, andhow much more will be invented ... And the information security system is far from perfect: technologies are developing faster than the implementation of measures to protect data. Therefore, security in the modern information world depends on the foresight and awareness of each citizen.

Read more: