Header
Spacer
 
Victoria University | Melbourne Australia

 

2012 Student User Guide Home

Welcome
VU iPhone app

Sections
 1. Open access computer labs
 2. Quick reference guide
 3. Active directory login
 4. Student internet quota
 5. Student email
 6. Library information
 7. MYVU Portal
 8. ASKVU
 9. Blackboard
 10. Wireless network
 11. Virus Scanning
 12. PC security & my privacy
 13. Spyware
 14. Copy and print services
 15. Policies
 16. Learning Support Services
 17. VPN client

Resources
   - Software for students
   - Current students site
   - Microsoft Security tips
   - ITS Services for students

Student User Guide heading

12. MY ONLINE PRIVACY & PC SECURITY

On this page
Download this section Download the PDF

12.1 IDENTITY FRAUD

Identity fraud involves pretending to be someone else in order to steal money or other benefits. The person whose identity is used may suffer various consequences when held responsible for the perpetrator's actions. Australia has laws in place at both federal and state level to prevent the misuse of personal information and data.

Identity fraudsters will use various methods to gain this information: via the use of phishing (see Section 12.2), the use of Spyware (see Section 13) and the interception of un-encrypted internet communications (see Section 12.3).

Caution should be taken with revealing sensitive information over unsecured networks or on computers without an appropriate level of protection (public computers should be treated with extreme caution).

12.2 EMAIL SECURITY

Please note: Software list is Subject to change, refer to the ITS Open Access Labs intranet site for updates

Some things to be aware of with your e-mail:

  • Phishing: the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication - never click on a link in an unsolicited email that takes you to a site that then asks you to enter sensitive information
  • E-mails containing suspect attachments which may contain spyware or malware like Trojan horses
  • E-mail messages transit through unsecured servers and intermediate computers where it is possible for unencrypted messages to be intercepted and read
  • Many Internet Server Providers (ISPs) store copies of messages for back-up purposes

In general terms, e-mail is about as secure as a postcard through the mail.

Top of page

12.3 SECURITY CERTIFICATES/SSL/TLS

Transport Layer Security (TLS) Protocol and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide security and data integrity for communications over networks such as the Internet. Several versions of the protocols are in wide-spread use for web browsing, e-mail, instant messaging and voice-over-IP (VoIP).

Part of this process involves buying a security certificate for the web site (used in identity verification and data protection) from a third party Certification Authority. Certificates are only valid for a finite period of time and then must be renewed. A site with an expired security certificate should be treated with caution by users, but may still be browsed, as long as the user exercises appropriate care with the level of sensitive information revealed (as the communication may no longer be secure).

A secure/encrypted network connection may be detected by the presence of a padlock in the browser taskbar (not on the actual web page). This will be positioned at either the top or the bottom of the browser.

Top of page

12.4 PASSWORD & PIN SECURITY

Some standard precautions to take with your PINs and passwords:

  • Password complexity - use a combination of letters and numbers - don't use the names of family or pets!
  • Regularly change your password - even if you just change the number/s in your password
  • Never reveal your password/PIN to anyone and don't keep a written record in your wallet or purse
  • Do not use the same password/PIN for everything. If you want to limit the number of passwords/PINs you use, then create a small group that you use for specific purposes
Top of page

12.5 SOCIAL NETWORKING

While sites like Facebook, MySpace and the various blogging sites offer exciting social networking opportunities, some care should be taken to ensure that the user doesn't unnecessarily expose themselves to the risk of security or privacy violations.

Prior to setting up a profile (which usually requires the user to enter a certain degree of personal information), users should familiarise themselves with the privacy settings offered by the site, and ensure that their profiles are set up in such a way that suits their personal privacy needs.

Be aware that many sites retain the personal information you enter even if you deactivate or delete your profile. While this information can generally be withheld from general public access (as with Facebook), the data is online and is potentially vulnerable.

The level of personal information revealed can be used for identity fraud purposes (see Section 12.1). Users should be wary of revealing information that might help identify PINs or passwords, or making information like your date-of-birth and full address visible.

There is also the matter of personal privacy. Unrestricted sites can be searched by users (maybe even prospective employers) looking for background information on an individual. If you value your privacy, then you should be careful about the type of information you make available in these circumstances.

Top of page

12.6 COOKIES

Cookies are used for authenticating, session tracking and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts. Cookies have been an internet privacy concern because they can be used for tracking browsing behaviour.

Cookies are not computer programs. They are parcels of text sent by a server to a browser and then sent back unchanged by the client each time it accesses that server, and are unable to perform any operation by themselves. In particular, they are neither spyware nor viruses, although cookies from certain sites are described as spyware by many anti-spyware products because they allow users to be tracked when they visit various sites

Most browsers allow users to decide whether to accept cookies, but rejection makes some websites unusable. For example, shopping carts implemented using cookies do not work if cookies are rejected.

Top of page

12.7 R.U.N.S.A.F.E. (PC SECURITY)

R.U.N.S.A.F.E documents key information regarding the safe and secure operation of desktop computers. The R.U.N.S.A.F.E concept and documentation has been adapted to suit the Victoria University environment. The R.U.N.S.A.F.E acronym is made up of the following:

  • R - Refuse to run unsafe programs
  • U - Update software regularly
  • N - Nullify unneeded risks
  • S - Safeguard our identity and passwords
  • A - Assure sufficient resources for proper system care
  • F - Face insecurity
  • E - Everybody needs to do their part

The goal of R.U.N.S.A.F.E is to help you attain the knowledge and skills necessary to more safely operate a network connected computer.

For more information see the Awareness Intranet site.

Top of page

Blue Line

Policies | Disclaimer | Privacy | Contact Us | Print Friendly | Feedback