Introduction to Cyber Security (Part 3)
Methods used in Improving Information Security:
There is no single way through which information security can be attained, it is continuous. A method
previously used yesterday may become out-of-date today.
As a user: It is important that you ensure that you do not share a user account with another person. As much as you can, avoid making connections to untrusted WI-FI networks. Ensure that you use passwords that are strong and uneasy for someone else to guess. Use passcodes, patterns, pins, voice recognition modes, etc. to protect devices from unauthorized
access. It is important you use up-to-date operating system and application softwares by downloading updates/patches on your devices.
It is necessary that you have an antivirus software installed on your devices and ensure it is
updated frequently. For softwares that require you switching OFF your computer system’s firewall, it is
recommended that you use softwares you are sure of, and after running such programs, you
should switch ON the firewall. Just as the name implies, the firewall is meant for the protection
of your personal computer. When doing transfers using external storage media, you need to know if such a drive(s) is safe or
corrupt. This can be known if you have an up-to-date antivirus software installed on your device. Visiting unsecure websites puts you and your device at risk. By checking the left side of the web
address (on most browsers) the security status could be checked. Websites having “HTTP” are
termed unsecure, while those with “HTTPS” are termed secure. HTTP means Hyper Text Transfer
Protocol; and HTTPS refers to Hyper Text Transfer Protocol Secure. Amidst all these methods, protecting your hardware (your device) from theft is very essential.
For individuals who have been attacked one way or another:
It is recommended you reinstall the operating system software of your device.
Ensure you install a recent antivirus software package, and keep it up-to-date.
Run antivirus scans on files you are bringing into the device.
Data that may have been lost by deleting (from the recycle bin) may be recovered.