Invitation to Cybersecurity

9. The Application of Cybersecurity: Principles and Practices 243 apply an update, he should do so as soon as possible. Applying patches can be inconvenient because it may require a system restart, but it is essential that time be taken to do so. Other types of computers, like routers and smart devices, should also be patched. Patching these systems may not always happen automatically, and in some cases, it may not even be possible. Many devices have an admin page that is accessible at their IP address on the local area network through a web browser. Users should login to this page periodically to check for updates and apply them when identified. The admin page typically also enables the user to change the device’s default password which is another best practice. It is also recommended to occasionally restart computers, smartphones, and devices. Many computing devices run continuously for days on end. The normal restart procedure may trigger updates to be installed. Plus, the longer a computer runs and the more processing that it does, the more inefficient it can become. Restarting a computer creates a fresh, clean slate for the memory, and this may result in better performance. Also, some malware is resident only in memory and can be eliminated by a system restart. After a restart, as long as the user does not take the same action that resulted in the malware being installed in the first place, then his computer or smartphone will be secure again. 9.2.3.2 Be a Minimalist In cybersecurity, neatness counts. In pursuit of neatness and simplicity, users should keep app installs and the number of running processes to a minimum. Programs should only be open when they are being used. Once a user is finished, the program should be terminated. If an app is no longer needed, it should be uninstalled. Bloatware is a pejorative term for applications that come pre-installed on devices. If possible, users should delete bloatware from their computers and smartphones. Users should also scrutinize which applications are launched at system startup, and deactivate all applications that are not necessary (see Figure 9.11). It is also helpful to minimize the number of running background services and processes, but this takes a higher level of expertise (see Figure 9.3 above). Users should also keep active browser tabs to a minimum to reduce the complexity of their computing environment. In addition, browsers should be closed and reopened periodically to create a fresh slate in memory. Users should also limit the number of users on their systems. If a user account is no longer needed, it should be deleted. Users should be cautious about sharing their computer or smartphone with others and when using peripheral devices such as removable media. Portable storage devices should only be used if they come from trusted sources. If a Bluetooth or wireless network connection is no longer needed, the connection should be forgotten. Only the bare minimum number of permissions should be given to apps. Permissions to access photos and contacts should be allowed only when absolutely necessary. Many apps

RkJQdWJsaXNoZXIy MTM4ODY=