240 likes | 380 Views
e-Asset Security: Beginning with your Mobile Computer *. Felix. O. Olu, MNIEEE, MNSE, MNCS. * Paper presented the June 2010 OGM of the Nigerian Institution of Electrical & Electronics Engineers (NIEEE), Abuja Chapter, on Monday 21 st June 2010. Outline. Introduction
E N D
e-Asset Security: Beginning with your Mobile Computer* Felix. O. Olu,MNIEEE, MNSE, MNCS * Paper presented the June 2010 OGM of the Nigerian Institution of Electrical & Electronics Engineers (NIEEE), Abuja Chapter, on Monday 21st June 2010
Outline Introduction A Brief about Mobile Computers Acquiring the Right Mobile Computer Longevity of Laptops Security Strategies Conclusion References
1. Introduction • Small size, light weight, reduced radiations, easy safe-keeping, adequate computing power as well as mobile power supply have made Mobile Computers very versatile and have increased its popularity; • MCs are gradually becoming more popular than desktop computers; many people are investing on them; • However, a Fox News report in 2008, said a laptop is stolen every 53 seconds. When an MC is lost, it inflicts pain of acquisition cost, unquantifiable asset loss in terms of the data content, and any prospective business that it can bring may be lost. Your productivity enhancement may also be lost until the MC is replaced.
1. Introductioncont’d A Mobile Computer
1. Introductioncont’d • Amazingly, in 2007 well over 12,000 laptops went missing at U.S. airports every week, and 70% of those returned to “lost and found” stand were never recovered; • They are either stolen, left in hotels, in cabs, or the most common (in US), forgotten in the airports. The latter has proven to be the most vulnerable location; • In 2007 the regularly used hard drive was estimated to contain between $1 million and $8 million worth of commercially sensitive data;
1. Introductioncont’d • Your job on your computer is more important than the computer; your job (labor) is your e-asset; • Cyber security (which seeks to protect e-assets) is all about making your MC and e-assets available perpetually; • Sudden power failure without remedy, hardware failure, file loss, hardware theft and temporary access denial are all security threats to your e-asset; • The security thus begins with you being able to preserve your MC – and the information stored in it.
2. A Brief on Mobile Computers • Mobile Computers, can be grouped into: • netbook, • notebook, • tablet, • nettop and • smartbook. • Each of these is produced for different levels of • mobility on one side and for divergent individual • reasons on the other.
2. A Brief … cont’d • NETBOOK (InterNET + noteBOOK) Netbook. Comparing Desktop & Netbook Netbooks do not have a CD or DVD drive, and most use solid-state disks (SSD) for storage as compared to magnetic disks
2. A Brief … cont’d • NOTEBOOK
2. A Brief … cont’d • TABLET • NETTOP (interNET + deskTOP) This uses Intel Atom processors
2. A Brief … cont’d • SMARTBOOK The Smartphone family. They feature all- day battery life, 3G, GPS etc vi. Others include i-Pad etc
3. ACQUIRING THE RIGHT MOBILE COMPUTER • In securing valued investment (mobile computers), it is a primary responsibility of the owner to buy the right computer from the onset. • Determine your need and your want. • Product name • Specifications that will meet your purpose • Appropriate pricing • Available support • Market share (implies availability of spares and accessories) of the manufacturer • Warranty package with purchase • Models/Product Pre-customization (some products are for specific destinations/countries. Some countries’ products are preferred to others. • Importantly, a buyer needs to know if the computer is pre-installed or it carries OEM software packages that will need to be configured before use (license issues).
4. Longevity of Laptops The longer your MC is available in good condition, the more you save cost and the more you are likely to be profitable. You will have asset security Determinants of longevity include: • Battery: The slower the motive parts & the smaller the display, the less power needed to run the machine. The power settings of laptops should also be adjusted to find a comfortzone wherethe computer is using as little poweras possible with no interferencein computer tasks; auto-switch off your screen withinreasonable time and let the computersleepif inactive within a good time. Adjust backlightbrightness so itwillnotconsumeunnecessarybattery power. Disconnect USB devices, Wi-Fi and CD/DVD when you are on battery (unless you are using them) as well as unused programs. Set battery critical discharge level to min. 7% and the system should auto-shut at that level.
4. Longevity of Laptops cont’d • New battery should charge up to 1hr before it begins to be used. Use adequate voltage and current always. You could buy extra battery to replace a running down battery for continuity. Disconnect batteries and store at 50% charged, if traveling for long. • Disconnect charging battery if hot, so it can cool. It should fully charge in less than 5hrs if in good condition. An idle system charges faster. Disconnect the battery if fully charged and use till it requires charging again
4. Longevity of Laptops cont’d • Intensive Use and Misapplication: • Each of desktop and laptop has its appropriate applications; none can completely replace the other. An attempt to replace one with the other could amount to misuse. • For longevity, a laptop should be applied for mobility (lightness – logical and physical, low power consumption, communication etc). • A laptop – (gap between your leisure or your “on-the-move” and office). • Take care to protect the display screen, the keyboard and the power pack against damage, especially on a floor or across an aisle.
4. Longevity of Laptops cont’d • Similarly, the computer should always be used and stored in cool dry places. • When a mobile computer is to be used for an extended period, it is advisable to use chillers for cooling. • You must regulate or condition the ambient temperature, air quality, physical well being, the physical support when working as well as the storage condition after use. • The greatest enemy of the laptop (any electronics) is heat. Though all computers have some cooling system. Blockage of the cooling vents, fans etc could be a serious problem. An unused laptop should be shut down. • The carry case needs to be of leather or similar fabrics.
4. Longevity of Laptops cont’d • When in use, it is best to keep laptops on hard rather than soft (cushion) surfaces. • In August 2009, a man lost his life in a laptop induced fire. It was found to have been because the man placed the laptop running, on a couch for almost an hour. • You can prevent a lap burn by placing the laptop on a chiller or a hard surface.
5. Security Strategies • Security in this case ranges from data content, to the physical computer (theft, fire, dangerous falls, misplacement etc). • The cost of the stolen personal or business data and of the resulting problems (identity theft, credit card fraud, breach of privacy etc) can be many times the value of the stolen MC itself. Therefore, both physical protection of laptops and the safeguarding of data contained on them are of the highest importance.
5. Security Strategies cont’d Physical • MCs are mobile and handy; they are prime targets for theft. • It is more secure when it is carried in a strong bag. • Information of the make/model and serial number should be written down in a safe place. • Most laptops have a Kensington security slot used to tie the computer to a desk or other heavy/immovable objects with a security cable and lock. • Some laptops now have security elements added by the consumer, including eye recognition hardware/software and fingerprint scanning components.
5. Security Strategies cont’d Logical • Consider never planning (to) or actually storing any data on your MC! • Always use strong passwords – one that comprises mixture of alphanumerics (keyboard characters), up to eight characters in length, does not easily make sense, kept personal and changed upon divulgence. • Do not be the default administrator on your MC. • Wireless and Bluetooth should remain off if not used. • MC should have a well installed, licensed and regularly updated Antivirus package. The OS also needs to be regularly updated • Use screen savers if the computer is to be left unused for a while.
Security Strategies Logicalcont’d • Regularly back-up user files (jobs). It will afford the computer enough hard disk space to run application programmes faster, among other advantages. • Effectively plan files and folders stored on your MC. Use subfolders. Do not choke up the desktop. • Some OEMs of computers offer security functionalities. Likewise modern operating systems and third-party software offer disk encryption functionality that renders the data on the hard drive unreadable without a key or a passphrase.
Security Strategies Logicalcont’d • Other options include data encryption (whole hard drive), biometric access techniques, tracking and recovery offered by Dell, as well as remote data delete also offered by Dell. • Avoid installing “cracked” software packages; they are entry-holes for virus attacks, bugs and incessant crashes. Your computer may not recover from the first crash or attack.
6. Conclusion E-Asset security is not limited to virus or hacker’s attacks. The security of our most utilized and emerging most popular computer- mobile computer- is the first step to checkmating a cyber threat. A user secures his computer better if he can prevent the loss of the computer and its very essential accessories as well as the soft content. It truly begins with the acquisition of the right product based on the right motives. This may eventually bring out the true but hidden value of the mobile computer in whatever business the owner is involved. A mobile computer is probably worth more than the value usually place on it. This fact reveals itself only after such a computer is lost. It is better unknown than revealed.
7. References • Reported by Fox News, January 22, 2008, http://www.foxnews.com/story/0,2933,324465,00.html • McAfee and Datamonitor’s Data Loss Survey, 2007 • Ponemon Institute, U.S. Costs of a Data Breach, November 2007 • Ontario Power Generation Notice No. 00-0073 Records #0890.2424 T5, Dated 10/09/09 • Dell.com • Intel.com • Wikipedia.com • CNET.com • Webopedia.com • Internet blogs. • topbits.com