Information security - user tips
Information security - user tips
Cyber Security It is a wide world. Essentially, its purpose is one: protecting computer systems from risks that threaten them. In general, it includes physical security of the building where the computing systems are located, the security of the computing equipment (hardware) as well as the security of the software and the information stored therein. In various computer systems, whether they are public, in large organizations or even with private and home users, a lot of personal information is stored, sometimes sensitive and sometimes even secret and classified. This information, the violation of which could lead to serious damage - personal, economic or security - needs protection against the intrusion of unauthorized parties, the theft of parts of it or the introduction of harmful factors into it.
The main dangers arise from connecting the computer systems to the Internet (although even without the Internet, there are considerable dangers). Since today, the Internet has become the basis of the use of many computer systems, it is important to understand what to pay attention to and which parts to emphasize when preparing to protect the computer system:
antivirus - Anti-virus software is the basis for protecting the computer against viruses and external pests. It is worthwhile and correct to use legal, paid (!!) and up-to-date antivirus software. In this way your computer will be protected at the most basic and essential level.
"fire wall" - Fire Wall - is a name for a protection method that surrounds the computer network with a wall that filters out various programs and occasional applications that "try" to penetrate into the computer and settle in it. These programs may be a potential cause
to serious damage, without you intending it.
Updated operating system - The computer's operating systems (such as Microsoft or Linux) produce renewed versions and are updated every so often. They are not immune to loopholes and it is important to update the new versions, beyond the convenience and innovations they offer, also for reasons of security.
Emails from an unknown source - Just as you don't open a door to a stranger, so do emails from an unknown source - you should not open them. Many scams use the e-mails of unsuspecting users and inject malicious material into your computer that can cause your computer to be hacked.
"gifts" from strangers - You shouldn't accept them either. Tempting offers via e-mail to get a free iPad?! In many cases it is not a gift but the potential for the introduction of a harmful factor. The same is true in social networks - you should not be tempted by "gifts".
File sharing - File sharing programs may be hacked and make your computer, if you use them, hackable and permeable. Therefore, it is always recommended to avoid these programs or at least take into account that any information you have shared will reach the network and become public against your will.
Passwords - Many cases of fraud occur as a result of hackers who did not break into the network at all but, simply, discovered your passwords as users of the bank's website, the National Insurance, etc. Therefore, you should create non-trivial user passwords (not the date of your birthday, for example). You should create "strong" passwords that combine letters and numbers randomly.
Innocent toolbars - Do not be tempted to install any toolbar on your computer. Check carefully who is behind it. It is very possible that this is a factor that produces a loophole that takes personal information out of your computer.
Understanding the dynamics - It is important to understand a basic idea: any information you upload to the net - will remain there forever!!. Many upload information to the net in order to save space on their personal computer, enjoy availability and convenience, and make it easier to share it with friends. You should carefully check the privacy settings of any service you use to upload your personal information to the public network. This information is no longer in your hands and under your sole control. He will be there forever and in front of everyone who wants him.
if not i have – In the end, with all the firewalls and antivirus programs of all kinds, exercise discretion!! Make a fun but intelligent use of the Internet and always be aware of the dangers inherent in it.