“Digital security refers to ensuring the ability to use digital information and information systems without interference, disruption, unauthorised access or data collection”
Digital Fraud and Crime
Digital Fraud and Crime includes crimes such as scams, child pornography, identity theft, social media re-engineering, cyber bullying, cyber stalking and cyber harassment. Although to a large extent the Internet is required for many of these crimes to take place, it is also telecommunication devices and tablets that are involved.
Fraud and Theft Scams
Financial and personal information theft is most commonly the purpose of this type of crime. Some of the more notable scams used to gain this information include the following:
Free Samples – Companies offering free samples if the victim pays by credit card. They then find that their card is being used for unauthorised purchases
Mystery Shopper Positions – Companies are asking for extensive background checks, then give the victims a ‘cheque’ to go and buy things at a specific retail store outlet over an extended period. The balance left of the ‘cheque’ is their commission. After the victim does the shopping and deposits the ‘cheque’ the bank advises them that the ‘cheque’ is counterfeit and that they are liable for the products purchased. Other instances are when the victims are asked during the background check phase for personal details such as financial information.
Disaster Fraud – Victims get emails from ‘organisations’ that work with areas affected by some disaster (e.g. Haiti). They are requested to donate toward the funding of the organisation, which in fact does not exist. Another aspect is when a computer malware has been installed and the hacker gets hold of your email contact list. They then email your contacts claiming to be you and request that money is sent to assist “you”
Security Tools, Methods, and Technology
Given that the security risks are multi-dimensional and from multiple sources and devices, to follow is a breakdown of the various things you can do to protect yourself, your data and your devices. Please note that this is by no means a comprehensive list, but should guide you in practices.
1. Protection for devices from malware and hackers Use antivirus software and ensure that your software updates are up to date. There are many free tools available such as Avast, Spybot and Comodo Firewall that will help you protect your devices.
2. Protect your information Anything can happen, despite your best efforts to protect your information. Key is to ensure that you back up your information both on physical devices and secure cloud services. Moreover you should maintain a healthy computer environment. There is a reason computer labs dictate no food and drinks being permissible nearby…this is to prevent human error where a drink spills on the device or food condiments drip into the device
3. Creating and maintaining secure passwords Use a secure password database tool, such as KeePass, will greatly support your method of maintaining secure passwords. Using alphas, numeric and symbols are a great way to make your password ‘unhackable’.
4. Protecting sensitive files on your computer Having a multi-layer defence is the best you can do to protect your data and device. Make sure you practice point 1 and 2, but also encrypt those files that contain sensitive data.
5. Keeping your Internet communication private The suggestion of keeping your communication private is not for illegal purposes, but to protect your communication from being stolen. There are various guidelines and software available to help you protect your digital communication. One such option is having a Virtual Private Network (VPN). Other options include RiseUp, an email service, Off The Record, a plugin for instant messaging, as well as other browser plugins that protect your online communications. 6. How to remain anonymous and bypass censorship on the Internet The purpose for deploying protective measures in this instance may be due to the scenario you face within the country that you live in or come from. In many countries the Internet is controlled and monitored and therefore limiting the citizens in their education, their ability in being informed consumers, as well as their freedom of speech and expression. Although this may not apply to you in the country you currently reside in, you may find yourself moving to a country where this is the norm. Some of the Middle Eastern countries do this, and South Africans are flocking to these countries to enjoy employment that is often tax-free. There are two methods that will enable you to bypass installed software that prevents certain websites being accessed: Censorship Circumvention and Circumvention Proxies.
7. Protecting yourself and your data on social media platforms Practice some Best Practice guidelines, such as: Always ask questions like who can access the information you put online, who controls and owns the information, what of my information is being passed on, etc. Use secure passwords Check the default privacy settings and see if you can enhance these
Use separate accounts or identities, preferably pseudonyms, for different activities Delete password and browsing history when using public internet spaces Access sites using HTTPS protocols rather than HTTP Be careful about the information that you use in your status updates Be careful about integrating information from other social media platforms Be careful how you save your content. Never rely on a social network site to be the primary host for you content.
8. How to use mobile phones as securely as possible Be aware that mobile phones are inherently insecure and that information sent, and stored, from a phone is vulnerable. Phones are designed to give out information about their location. Keep your phone with you at all times, and don’t leave it unattended. Use lock codes and PINs and keep these safe Make a mark on the phone and SIM that is unique and not easily identifiable (avoiding replication of your property and easy ID) Know the information stored on your phone Protect your SIM and memory card Dispose of the phone by ensuring no data/ information is left on it Use only trusted dealers and repair shops Back your information up regularly
9. How to use smart phones as securely as possible All of the points mentioned previously apply to this section, but there are additional points to note. We need to note that smart phones have additional functionalities and built in features, such as GPS and transmitting functionalities about your browsing behaviour, email and VoIP. Make sure to switch off your notifications, limit ad tracking, only allow those apps that you need and use to have access to locations. These are just some of the functions that you need to address and adjust (Security In A Box, n.d.). It is strongly recommended that you visit the Security in a box site to learn more about the various security mechanisms that you can employ and deploy.
Digital Fraud and Crime
Digital Fraud and Crime includes crimes such as scams, child pornography, identity theft, social media re-engineering, cyber bullying, cyber stalking and cyber harassment. Although to a large extent the Internet is required for many of these crimes to take place, it is also telecommunication devices and tablets that are involved.
Fraud and Theft Scams
Financial and personal information theft is most commonly the purpose of this type of crime. Some of the more notable scams used to gain this information include the following:
Free Samples – Companies offering free samples if the victim pays by credit card. They then find that their card is being used for unauthorised purchases
Mystery Shopper Positions – Companies are asking for extensive background checks, then give the victims a ‘cheque’ to go and buy things at a specific retail store outlet over an extended period. The balance left of the ‘cheque’ is their commission. After the victim does the shopping and deposits the ‘cheque’ the bank advises them that the ‘cheque’ is counterfeit and that they are liable for the products purchased. Other instances are when the victims are asked during the background check phase for personal details such as financial information.
Disaster Fraud – Victims get emails from ‘organisations’ that work with areas affected by some disaster (e.g. Haiti). They are requested to donate toward the funding of the organisation, which in fact does not exist. Another aspect is when a computer malware has been installed and the hacker gets hold of your email contact list. They then email your contacts claiming to be you and request that money is sent to assist “you”
Security Tools, Methods, and Technology
Given that the security risks are multi-dimensional and from multiple sources and devices, to follow is a breakdown of the various things you can do to protect yourself, your data and your devices. Please note that this is by no means a comprehensive list, but should guide you in practices.
1. Protection for devices from malware and hackers Use antivirus software and ensure that your software updates are up to date. There are many free tools available such as Avast, Spybot and Comodo Firewall that will help you protect your devices.
2. Protect your information Anything can happen, despite your best efforts to protect your information. Key is to ensure that you back up your information both on physical devices and secure cloud services. Moreover you should maintain a healthy computer environment. There is a reason computer labs dictate no food and drinks being permissible nearby…this is to prevent human error where a drink spills on the device or food condiments drip into the device
3. Creating and maintaining secure passwords Use a secure password database tool, such as KeePass, will greatly support your method of maintaining secure passwords. Using alphas, numeric and symbols are a great way to make your password ‘unhackable’.
4. Protecting sensitive files on your computer Having a multi-layer defence is the best you can do to protect your data and device. Make sure you practice point 1 and 2, but also encrypt those files that contain sensitive data.
5. Keeping your Internet communication private The suggestion of keeping your communication private is not for illegal purposes, but to protect your communication from being stolen. There are various guidelines and software available to help you protect your digital communication. One such option is having a Virtual Private Network (VPN). Other options include RiseUp, an email service, Off The Record, a plugin for instant messaging, as well as other browser plugins that protect your online communications. 6. How to remain anonymous and bypass censorship on the Internet The purpose for deploying protective measures in this instance may be due to the scenario you face within the country that you live in or come from. In many countries the Internet is controlled and monitored and therefore limiting the citizens in their education, their ability in being informed consumers, as well as their freedom of speech and expression. Although this may not apply to you in the country you currently reside in, you may find yourself moving to a country where this is the norm. Some of the Middle Eastern countries do this, and South Africans are flocking to these countries to enjoy employment that is often tax-free. There are two methods that will enable you to bypass installed software that prevents certain websites being accessed: Censorship Circumvention and Circumvention Proxies.
7. Protecting yourself and your data on social media platforms Practice some Best Practice guidelines, such as: Always ask questions like who can access the information you put online, who controls and owns the information, what of my information is being passed on, etc. Use secure passwords Check the default privacy settings and see if you can enhance these
Use separate accounts or identities, preferably pseudonyms, for different activities Delete password and browsing history when using public internet spaces Access sites using HTTPS protocols rather than HTTP Be careful about the information that you use in your status updates Be careful about integrating information from other social media platforms Be careful how you save your content. Never rely on a social network site to be the primary host for you content.
8. How to use mobile phones as securely as possible Be aware that mobile phones are inherently insecure and that information sent, and stored, from a phone is vulnerable. Phones are designed to give out information about their location. Keep your phone with you at all times, and don’t leave it unattended. Use lock codes and PINs and keep these safe Make a mark on the phone and SIM that is unique and not easily identifiable (avoiding replication of your property and easy ID) Know the information stored on your phone Protect your SIM and memory card Dispose of the phone by ensuring no data/ information is left on it Use only trusted dealers and repair shops Back your information up regularly
9. How to use smart phones as securely as possible All of the points mentioned previously apply to this section, but there are additional points to note. We need to note that smart phones have additional functionalities and built in features, such as GPS and transmitting functionalities about your browsing behaviour, email and VoIP. Make sure to switch off your notifications, limit ad tracking, only allow those apps that you need and use to have access to locations. These are just some of the functions that you need to address and adjust (Security In A Box, n.d.). It is strongly recommended that you visit the Security in a box site to learn more about the various security mechanisms that you can employ and deploy.