The basics of information security: what you need to know in order not to become a victim of modern scammers in the information world

Perhaps, there is no more relevant topic in our century. The basics of information security is not only a section of informatics, but also important information needed by every citizen of Russia: a PC and Internet user, even a beginner, owners of mobile phones, plastic bank cards.

Legal support of information security

At the beginning of the 21st century, all this knowledge was gathered together on the basis of known cases of offenses in the field of information security. And they began to reflect a very definite state policy regarding this issue. The legal foundations of information security are reflected mainly in the Doctrine and in a number of legal acts (on the protection of state secrets, commercial, on the protection of personal data; copyright law).

The measures to protect information did not stop there. Special units were created in the Ministry of Internal Affairs to combat information security offenders . In parallel, security technologies developed: electronic signature, data encryption, password systems. At the same time, the main task, in which not only government agencies, but also commercial organizations are interested, remains the awareness of the population about basic precautions in the information environment. They should be considered in more detail in the topic "Fundamentals of Information Security".

Card Precautions

First of all, caution is important when dealing with a bank card, since many citizens receive the main income on their bank account, and withdraw money at the terminals installed in each city of the country. The safety of your funds is up to you. Careless handling of the card will sooner or later lead to the loss of money in the account. Never give or show your PIN code, do not store it in your wallet with the card, do not give the card into the wrong hands. Although it is useless without a pin code, where is the guarantee that it was not spied when you dialed the code on the terminal. In case of loss - immediately notify the bank. It is worth going to the official website of your bank, dialing a consultation number and using it to report a lost or stolen card. The operator will immediately inform the bank security service of this and your card will be canceled.

Telephone scam

The basics of information security also apply to the use of mobile communications and, of course, must be observed when using a PC and the Internet.

The phone is the second means of fraud for the purpose of profit. Using mobile communications, attackers can get a considerable amount by resorting to various schemes of fraud. About which the department of the Ministry of Internal Affairs of Russia on combating crimes in the information environment has repeatedly reported in order to warn citizens. The most common way is SMS messages with strange or frightening content, as well as with a promise of winning, a prize. In the case of the latter, it’s easy to calculate fraudsters - if you win a prize, you don’t have to pay for it, which means you don’t need to call (unless it’s known numbers of well-known brands, radio stations registered in the directory) and send messages, after which your account on a mobile "evaporate" a large amount of money. Alarm messages, for example, with the following text: “Mom, I’m in trouble, put me money on the phone, then I’ll explain everything”, they play on the most powerful human feelings (otherwise the deception scheme would not work). Of course, many will first call their children on their numbers, and check if everything is in order. Those who have no children will laugh at such an SMS. But there are other cases when attackers are lucky. For example, the mother could not get through to her son (the subscriber does not answer) and in a panic put money on an unfamiliar number. But in this situation, one could have acted differently: first try to contact friends, relatives, colleagues of your child.

The trouble of computers and the Internet

The biggest nightmare for users of PCs and the World Wide Web, which can shake the foundations of information security, no matter how perfect they are, is viruses and hackers that crack mail, instant messaging programs, a page on a social network and, even worse, a virtual wallet. How do they succeed - even detectives of the special department of the Ministry of Internal Affairs can not always answer this question. But caution - beware of clone sites. When you go to a similar site using the link allegedly sent by your friend, you will be taken to a familiar site and without suspecting a dirty trick, enter your login and password to enter the system. So scammers get your data, then using it to crack mail (few people come up with different passwords and logins for mail and other portals). Therefore, remember, even if the site is similar to the one you know, you should pay attention to its address. The slightest mistake in it (another sign, another letter) means that you are not on the site on which you think, but on the clone site.

A lot of similar deception schemes were invented, and how many more will be invented ... And the information security system is far from perfect: the technologies are developing faster than the implementation of data protection measures. Therefore, security in the modern information world depends on the foresight and awareness of every citizen.


All Articles