24
1 Felix. O. Olu, Felix. O. Olu, MNIEEE, MNIEEE, MNSE, MNCS MNSE, MNCS e-Asset Security: Beginning with your Mobile Computer* * Paper presented the June 2010 OGM of the Nigerian Institution of Electrical & Electronics Engineers (NIEEE), Abuja Chapter, on Monday 21 st June 2010

Felix. O. Olu, MNIEEE, MNSE, MNCS

  • Upload
    alessa

  • View
    60

  • Download
    0

Embed Size (px)

DESCRIPTION

e-Asset Security: Beginning with your Mobile Computer *. Felix. O. Olu, MNIEEE, MNSE, MNCS. * Paper presented the June 2010 OGM of the Nigerian Institution of Electrical & Electronics Engineers (NIEEE), Abuja Chapter, on Monday 21 st June 2010. Outline. Introduction - PowerPoint PPT Presentation

Citation preview

Page 1: Felix. O. Olu, MNIEEE, MNSE, MNCS

11

Felix. O. Olu,Felix. O. Olu, MNIEEE, MNSE, MNCSMNIEEE, MNSE, MNCS

e-Asset Security: Beginning with your Mobile

Computer*

* Paper presented the June 2010 OGM of the Nigerian Institution of Electrical & Electronics Engineers (NIEEE), Abuja Chapter, on Monday 21st June 2010

Page 2: Felix. O. Olu, MNIEEE, MNSE, MNCS

22

Outline1. Introduction

2. A Brief about Mobile Computers

3. Acquiring the Right Mobile Computer

4. Longevity of Laptops

5. Security Strategies

6. Conclusion

7. References

Page 3: Felix. O. Olu, MNIEEE, MNSE, MNCS

33

1. Introduction

Small size, light weight, reduced radiations, easy safe-keeping, adequate computing power as well as mobile power supply have made Mobile Computers very versatile and have increased its popularity;

MCs are gradually becoming more popular than desktop computers; many people are investing on them;

However, a Fox News report in 2008, said a laptop is stolen every 53 seconds. When an MC is lost, it inflicts pain of acquisition cost, unquantifiable asset loss in terms of the data content, and any prospective business that it can bring may be lost. Your productivity enhancement may also be lost until the MC is replaced.

Page 4: Felix. O. Olu, MNIEEE, MNSE, MNCS

44

1. Introduction cont’d

A Mobile Computer

Page 5: Felix. O. Olu, MNIEEE, MNSE, MNCS

55

1. Introduction cont’d

Amazingly, in 2007 well over 12,000 laptops went missing at U.S. airports every week, and 70% of those returned to “lost and found” stand were never recovered;

They are either stolen, left in hotels, in cabs, or the most common (in US), forgotten in the airports. The latter has

proven to be the most vulnerable location;In 2007 the regularly used hard drive was estimated to contain between $1 million and $8 million worth of commercially sensitive data;

Page 6: Felix. O. Olu, MNIEEE, MNSE, MNCS

66

1. Introduction cont’d

Your job on your computer is more important than the computer; your job (labor) is your e-asset;

Cyber security (which seeks to protect e-assets) is all about making your MC and e-assets available perpetually;

Sudden power failure without remedy, hardware failure, file loss, hardware theft and temporary access denial are all security threats to your e-asset;

The security thus begins with you being able to preserve your MC – and the information stored in it.

Page 7: Felix. O. Olu, MNIEEE, MNSE, MNCS

77

2. A Brief on Mobile Computers 2. A Brief on Mobile Computers

 Mobile Computers, can be grouped into:

netbook,

notebook,

tablet,

nettop and

smartbook.

•Each of these is produced for different levels of mobility on one side and for divergent individual reasons on the other.

Page 8: Felix. O. Olu, MNIEEE, MNSE, MNCS

88

2. A Brief … 2. A Brief … cont’dcont’d

i. NETBOOK (InterNET + noteBOOK)

Netbook. Comparing Desktop & Netbook

Netbooks do not have a CD or DVD drive, and most use solid-state disks (SSD) for storage as compared to magnetic disks

Page 9: Felix. O. Olu, MNIEEE, MNSE, MNCS

99

2. A Brief … 2. A Brief … cont’dcont’d

ii. NOTEBOOK

Page 10: Felix. O. Olu, MNIEEE, MNSE, MNCS

1010

2. A Brief … 2. A Brief … cont’dcont’d iii. TABLET

iv. NETTOP (interNET + deskTOP)

This uses Intel Atom processors

Page 11: Felix. O. Olu, MNIEEE, MNSE, MNCS

1111

2. A Brief … 2. A Brief … cont’dcont’d

v. SMARTBOOK

The Smartphone family. They feature all- day battery life, 3G, GPS etc

vi. Others include i-Pad etc

Page 12: Felix. O. Olu, MNIEEE, MNSE, MNCS

1212

3. ACQUIRING THE RIGHT MOBILE COMPUTER

In securing valued investment (mobile computers), it is a primary responsibility of the owner to buy the right computer from the onset.

Determine your need and your want. Product name Specifications that will meet your purpose Appropriate pricing Available support Market share (implies availability of spares and accessories) of the

manufacturer Warranty package with purchase Models/Product Pre-customization (some products are for specific

destinations/countries. Some countries’ products are preferred to others.

Importantly, a buyer needs to know if the computer is pre-installed or it carries OEM software packages that will need to be configured before use (license issues).

Page 13: Felix. O. Olu, MNIEEE, MNSE, MNCS

1313

4. Longevity of LaptopsThe longer your MC is available in good condition,the more you save cost and the more you are likely to beprofitable. You will have asset security

Determinants of longevity include:

1. Battery: The slower the motive parts & the smaller the display, the less power needed to run the machine. The power settings of laptops should also be adjusted to find a comfort zone where the computer is using as little power as possible with no interference in computer tasks; auto-switch off your screen within reasonable time and let the computer sleep if inactive within a good time. Adjust backlight brightness so it will not consume unnecessary battery power.

Disconnect USB devices, Wi-Fi and CD/DVD when you are on battery (unless you are using them) as well as unused programs. Set battery critical discharge level to min. 7% and the system should auto-shut at that level.

Page 14: Felix. O. Olu, MNIEEE, MNSE, MNCS

1414

4. Longevity of Laptops cont’dcont’d

New battery should charge up to 1hr before it begins to be used. Use adequate voltage and current always. You could buy extra battery to replace a running down battery for continuity. Disconnect batteries and store at 50% charged, if traveling for long.

Disconnect charging battery if hot, so it can cool. It should fully charge in less than 5hrs if in good condition. An idle system charges faster. Disconnect the battery if fully charged and use till it requires charging again

Page 15: Felix. O. Olu, MNIEEE, MNSE, MNCS

1515

4. Longevity of Laptops cont’dcont’d2. Intensive Use and Misapplication:

Each of desktop and laptop has its appropriate applications; none can completely replace the other. An attempt to replace one with the other could amount to misuse.

For longevity, a laptop should be applied for mobility (lightness – logical and physical, low power consumption, communication etc).

A laptop – (gap between your leisure or your “on-the-move” and office).

Take care to protect the display screen, the keyboard and the power pack against damage, especially on a floor or across an aisle.

Page 16: Felix. O. Olu, MNIEEE, MNSE, MNCS

1616

4. Longevity of Laptops cont’dcont’dSimilarly, the computer should always be used and stored in cool dry places.

When a mobile computer is to be used for an extended period, it is advisable to use chillers for cooling.

You must regulate or condition the ambient temperature, air quality, physical well being, the physical support when working as well as the storage condition after use.

The greatest enemy of the laptop (any electronics) is heat. Though all computers have some cooling system. Blockage of the cooling vents, fans etc could be a serious problem. An unused laptop should be shut down.

The carry case needs to be of leather or similar fabrics.

Page 17: Felix. O. Olu, MNIEEE, MNSE, MNCS

1717

4. Longevity of Laptops cont’dcont’d When in use, it is best to keep laptops on hard

rather than soft (cushion) surfaces. In August 2009, a man lost his life in a laptop

induced fire. It was found to have been because the man placed the laptop running, on a couch for almost an hour.

You can prevent a lap burn by placing the laptop on a chiller or a hard surface.

Page 18: Felix. O. Olu, MNIEEE, MNSE, MNCS

1818

5. Security StrategiesSecurity in this case ranges from data content, to the physical computer (theft, fire, dangerous falls, misplacement etc).

The cost of the stolen personal or business data and of the resulting problems (identity theft, credit card fraud, breach of privacy etc) can be many times the value of the stolen MC itself. Therefore, both physical protection of laptops and the safeguarding of data contained on them are of the highest importance.

Page 19: Felix. O. Olu, MNIEEE, MNSE, MNCS

1919

5. Security Strategies cont’dcont’d

PhysicalMCs are mobile and handy; they are prime targets for theft.

It is more secure when it is carried in a strong bag.

Information of the make/model and serial number should be written down in a safe place.

Most laptops have a Kensington security slot used to tie the computer to a desk or other heavy/immovable objects with a security cable and lock.

Some laptops now have security elements added by the consumer, including eye recognition hardware/software and fingerprint scanning components.

Page 20: Felix. O. Olu, MNIEEE, MNSE, MNCS

2020

5. Security Strategies cont’dcont’d

Logical

Consider never planning (to) or actually storing any data on your MC!

Always use strong passwords – one that comprises mixture of alphanumerics (keyboard characters), up to eight characters in length, does not easily make sense, kept personal and changed upon divulgence.

Do not be the default administrator on your MC.

Wireless and Bluetooth should remain off if not used.

MC should have a well installed, licensed and regularly updated Antivirus package. The OS also needs to be regularly updated

Use screen savers if the computer is to be left unused for a while.

Page 21: Felix. O. Olu, MNIEEE, MNSE, MNCS

2121

5. Security Strategies Logical cont’dcont’d

Regularly back-up user files (jobs). It will afford the computer enough hard disk space to run application programmes faster, among other advantages.

Effectively plan files and folders stored on your MC. Use subfolders. Do not choke up the desktop.

Some OEMs of computers offer security functionalities. Likewise modern operating systems and third-party software offer disk encryption functionality that renders the data on the hard drive unreadable without a key or a passphrase.

Page 22: Felix. O. Olu, MNIEEE, MNSE, MNCS

2222

5. Security Strategies Logical cont’dcont’d

Other options include data encryption (whole hard drive), biometric access techniques, tracking and recovery offered by Dell, as well as remote data delete also offered by Dell.

Avoid installing “cracked” software packages; they are entry-holes for virus attacks, bugs and incessant crashes. Your computer may not recover from the first crash or attack.

Page 23: Felix. O. Olu, MNIEEE, MNSE, MNCS

2323

6. Conclusion

E-Asset security is not limited to virus or hacker’s attacks. The security of our

most utilized and emerging most popular computer- mobile computer- is the

first step to checkmating a cyber threat. A user secures his computer better if

he can prevent the loss of the computer and its very essential accessories as

well as the soft content. It truly begins with the acquisition of the right product

based on the right motives. This may eventually bring out the true but hidden

value of the mobile computer in whatever business the owner is involved. A

mobile computer is probably worth more than the value usually place on

it. This fact reveals itself only after such a computer is lost. It is better

unknown than revealed.

Page 24: Felix. O. Olu, MNIEEE, MNSE, MNCS

2424

7. 7. References1. Reported by Fox News, January 22, 2008,

http://www.foxnews.com/story/0,2933,324465,00.html

2. McAfee and Datamonitor’s Data Loss Survey, 2007

3. Ponemon Institute, U.S. Costs of a Data Breach, November 2007

4. Ontario Power Generation Notice No. 00-0073 Records #0890.2424 T5, Dated 10/09/09

5. Dell.com

6. Intel.com

7. Wikipedia.com

8. CNET.com

9. Webopedia.com

10. Internet blogs.

11. topbits.com