6.3 Summarize behavioral security concepts.
📘CompTIA ITF+ (FC0-U61)
1. Internet Use
When using the Internet, your privacy is not always guaranteed. Companies, websites, and service providers may track, monitor, or store your activity. Let’s look at different Internet activities:
a. Social Networking Sites (e.g., Facebook, LinkedIn)
- Expect limited privacy:
- Posts, messages, and profile information may be visible to others, even beyond your friends or contacts.
- Sites may track your behavior to show personalized ads.
- Security tip: Adjust privacy settings and think before posting sensitive information.
b. Email
- Email is not always private:
- Employers can monitor work emails.
- Internet service providers may scan emails for spam or security threats.
- Security tip: Avoid sending confidential passwords or sensitive data via unencrypted email.
c. File Sharing (e.g., Dropbox, Google Drive)
- Files you upload may be accessible if permissions are set incorrectly.
- Shared links can be forwarded to others, compromising privacy.
- Security tip: Use access controls and encryption when sharing sensitive files.
d. Instant Messaging (e.g., Teams, Slack)
- Conversations may be stored on servers and could be accessed by system administrators or under legal requests.
- Security tip: Use secure messaging apps and be aware that deleting a message does not always remove it from servers.
2. Mobile Applications
- Mobile apps often request access to your data (contacts, location, photos).
- Privacy expectations:
- Your data may be collected for analytics or advertising.
- Some apps may share your data with third parties.
- Security tip: Check app permissions and download apps only from trusted sources, like official app stores.
3. Desktop Software
- Programs installed on your computer can access your data and track activity.
- Privacy expectations:
- Some software collects usage statistics to improve performance.
- Malicious software can steal data without your knowledge.
- Security tip: Use reputable software and update it regularly to fix security issues.
4. Business Software
- Enterprise applications (like ERP or CRM systems) are used to manage company data.
- Privacy expectations:
- Employees generally have limited privacy on company systems.
- Activities may be monitored for security, compliance, or productivity.
- Security tip: Follow company policies, avoid storing personal data on business systems.
5. Corporate Network
- When connected to a corporate network:
- All traffic can be monitored by IT departments.
- Using network resources for personal activity may be logged or restricted.
- Privacy expectations:
- Limited privacy; IT admins can see which websites you visit and which files you access.
- Security tip: Assume corporate networks are not private and avoid sensitive personal activity on them.
Key Takeaways for the Exam
- No system is 100% private. Your activity can often be monitored.
- Internet and cloud services often collect and store data for functionality or analytics.
- Mobile and desktop apps may request data access; only grant necessary permissions.
- Business and corporate systems are typically monitored; personal privacy is limited.
- Always follow security best practices and organizational policies to protect data.
✅ Tip for remembering for the exam:
Think of it as “expect limited privacy, especially on work systems”.
- Personal devices = some privacy
- Company devices or networks = low privacy
