Browse Category

Information Security

Personal, Private, Public, PII, and PSI

Cybersecurity Tips for Travelers

©  2019 by cybersecurity1hub.com

Cybersecurity risks during travel are usually higher than while your are at home or at your work. This post provides a number of cybersecurity tips for travelers. If you are traveling  international, you need to be extra careful and prepare accordingly. Three steps you ought to take are: Security measures before, during and after your trip. Also, you must protect the device physically; you must connect to the Internet carefully; and you must have software protection.  First, let us consider what cybersecurity measures you should take before you start your trip.

cybersecurity tips for travelers
Secure your device, protect your data, avoid public WiFi and networks for cybersecurity while you are traveling.

Keep Reading

11 Cybersafety Tips for Online Safety

© 2019 by cybersecurity1hub.com

Our life is integrated with cyberspace. Cyberspace use becoming as normal as breathing air. But there is a BIG difference between the air we breathe and cyberspace we use. When we breathe foul air, we know from its smell that something is not right. Unfortunately, danger signs in the cyberspace are not as obvious to us as the foul smell of air. Hence, we need to stay alert to avoid safety hazards larking in the cyberspace. Cybersafety rules must be observed to stay safe in the cyberspace, because predators are relentlessly trying to find ways to steal our money and our personally sensitive information. Below are 11 top tips for online safety.

Cybesapce is infested with hazards and to protect from attacts one must follow rules for cybersafety aks online safety.
Alice has strong cybersafety; she is staying guarded against attracts coming from the Internet. She has strong online safety.

Keep Reading

Teen Online-Safety Tips for Cybersafety

©  2019 by cybersecurity1hub.com

For cybersecurity, teen online-safety rules ought to match with their Internet use profiles. The rules presented below are in addition to 11 tips I have in another post. Keeping an adult in the loop is a very important item in the list of online-safety tips for cybersafety. This not because teens cannot be trusted, but it is for their guidance.  Supervising adults should make it clear  to the teens they are supervising that they are not a gatekeeper, but a mature friend for to help teir development. For examples, some personal information posted online may have longterm implication, but it may not be obvious to a teen.

Cybersafety Rules for Teen Online-Safety
Teen Online-Safety Tips for Cybersafety

Keep Reading

Beware of IRS/Tax Scams, Phishing and Malware

©  2019 by cybersecurity1hub.com

Every New year starts with joys and hope. We hope to get new things. And think about money we will need for them. One source of money is tax refund. Most of us get some EXTRA cash from refund! With that hope of getting refund, we gather all necessary documents for filing tax return.  These documents come from  employer, banks, mutual funds, and so on. They have our PII (personally identifiable information) and PSI (sensitive financial information). Those who are there for IRS/Tax scams, they want them too.

IRS/Tax Scam artists are active in the cyberspace

Guess, in the New Year, who are more active  than us! Malicious cyber-criminals, who are creating tax scams with phishing  methods that have sophisticated and intricate social engineering techniques. They want to steal PII and PSI for getting money from us. They will use phishing, malwares, spyware, keylogger and many other creative tools. The big question to ask: Is my cybersecurity fences are up-to-date for protecting me from phishing, malwares, spyware, and  keylogger so that malicious actors cannot get my PII and PSI?

 

Image result for tax fraud
IRS/Tax scams are common in cyberspace.

Keep Reading

CIA triad quiz

Three information security attributes  — Confidentiality, Integrity, and availability — are known as CIA triad. Take this simple10 question quiz to evaluate your understanding  of CIA triad.

 

Question #1: Integrity: I had a report on information security in the text file format. I converted the report from text format to pdf format, and deleted the text file. Has integrity of information been preserved? Select the best answer.

Integrity of information has been maintained.

Question #2: Availability: From my phone I transferred photos in my laptop. And, then I deleted them from my cell phone. Select the best answer.

Availability of information has not changed.

Question #3: Confidentiality: Suppose you are making an online purchase and want to pay for it with your credit card. What is the best way to preserve confidentiality of your credit card information?

Question #4: Availability and integrity: Information availability policy dictates from where who can access information in which format. An entity wants to increase availability without compromising integrity of information. Select the best method.

Question #5: CIA: Confidentiality, integrity, and accessibility of information are three attributes for information security. Each of these three requirements can be improved without affecting others. True or false.

Sorry, when you increase confidentiality of information,  its accessibility  will be lower, and  it may not  increase or decrease protection for integrity. Similarly, when you increase accessibility of information,  its   confidentiality will be lower, and  it may not  increase or decrease protection for integrity.

Question #6: Confidentiality: To maintain information confidentiality, access to information is made as needed basis. Suppose, a doctor’s office wants to allow his patients to view their EMRs (electronic medical records) remotely from their home computers, laptops, and smart phones. His EMR server can be set to one of the following three modes. Select the mode that provides the best confidentiality.

Question #7: Confidentiality: Information confidentiality and information privacy are same. True or false?

Question #8: Availability and Confidentiality: Your health care provider was keeping ‘electronic medical record’ (EMR), but they were not remotely available to his patients. Recently, he changed his policy and allowed his patients to remotely view their EMRs. New policy will increase availability of information.

Question #9: Integrity and confidentiality: Students records in a university can be grouped into three categories. Prospective students who have been admitted, but have not enrolled yet. Students who are currently enrolled. And those who enrolled in the past, but they are not currently enrolled. Managing information integrity and confidentiality the best option is to,

? text document.Question #10: Integrity: Select the best answer. You prepared a report and sending it to your supervisor for her feedback. Select from the list below the file format that has the highest potential for preserving integrity.

next

Information Type Quiz

A short quiz on information types.

This 10-question short quiz will test your knowledge about personal, private, public information types. Also, about PII and PSI.

 

Question #1: Is academic records private information, public information, PII (personally identifiable information) or PSI (personally sensitive information) or neither? Select the best answer.

? Think. If age changes with time, it is a dynamic infromation; otherwise an static infromation.Question #2: Is your age a dynamic or static information?

Age is changing continuously.

Question #3: Is information on Social Security Card PII (personally identifiable information) or PSI (personally sensitive information) or neither? Select the best answer.

? Information that you do not share with others.Question #4: Is credit card infroamtion PII (personally identifiable information) or PSI (personally sensitive information) or neither? Select the best answer.

Yes! Credit card information is PSI.

Question #5: Select the best answer.

? Ask, can I use it for purchasing or identify?Question #6: Is email address PII (personally identifiable information) or PSI (personally sensitive information) or neither? Select the best answer.

Yes, email address is unique personal information, but neither PII or PSI.

Question #7: CIA: Confidentiality, integrity, and accessibility of information are three attributes for information security. Each of these three requirements can be improved without affecting others. True or false.

Sorry, when you increase confidentiality of information,  its accessibility  will be lower, and  it may not  increase or decrease protection for integrity. Similarly, when you increase accessibility of information,  its   confidentiality will be lower, and  it may not  increase or decrease protection for integrity.

? If it changes with time, then it is dynamic; otherwise, static.Question #8: Is date of birth of a person dynamic or static information?

Sorry. Date of birth cannot change with time, and it is a static information.

? If you can use a document for identification anywhere in your country, then it is a PII.Question #9: Is information on a passport personally identifiable information (PII) ?

Good you can identify a PII.

? Any attribute that is associate with a person and that can be used to identify the person is personal information.Question #10: Is your name a personal information?

Although many people may have your name, but it is personal. Personal does not mean that the attribute is unique to you.

next

Information Security: An Overview

On September 8th 2017 FTC (Federal Trade Commission) reported that the Equifax data breach exposed sensitive personal information. This is just another BIG data breach that has affected information security of hundreds of millions of people. Before we move forward, a good question is: security of which information? Of course, security concerns are for information that are somewhere in the cyberspace and that may be exploited by cyber-criminals to jeopardize our life, living, and assets.

Information Security is for Protecting Sensitive Information

Not all personal information are equally valuable to cyber-criminals. Security of PII (Personally Indefinable Information) and PSI (Personally Sensitive Information) are of critical importance in the context of information security, because of their potential value to cybercriminals. Thus,  cybersecurity professionals are concerned about protection of PII and PSI. But it should be of concern to you and me, because if my PII or PSI is compromised, it may be used now or anytime in the future.

So what are PII and PSI? How are they created? We will address those issues in this section.

Keep Reading

Personal Information and Cybersecurity Q&A

Information security is a primary concern of information technology department of all organizations and entities. Similarly, common people are also now becoming familiar with information security. In this post types of information, especially types of personal information are introduced in a question-and-answer format.

What is personal information?

Any attribute that is associated with you the person and that identifies you is your personal information. For examples, your given name and you family name are personal information.

Many people have my given name. How can it be personal?

Personal does not mean unique. Your given name is just one of the many personal information attributes to identify you. For example, many people have given name Mike and driver’s licenses of all Mikes bear their names, but deriver’s license has more information. When all those information attributes are linked together, each Mike’s identity on the driver’s license will be unique. Moreover, assigned number is unique.

Okay, what if Mike change his name to Tom?

Good question. Personal information can be divided into two categories, static and dynamic. Given name falls into the dynamic category of personal information. So, given name may change dynamically with time and intention.

What is static personal information?

Personal information that cannot change with time fall into the static category of personal information. For example, date of birth, parents, and place of birth, etc.

Is my family or last name static personal information?

Yes and no. The family name or last name is usually inherited. But, when a girl get married her family name may be changed to her husbands family name. Also, if a child is adopted, her/his family name may be changed to the adopted family’s family name. Keep Reading