-
The Internet routine is so deep that even adults can't prevent it. Therefore, during the National Cyber Security Week, we will talk about what college students should pay attention to in cyber security.
-
Do you know about cybersecurity? Let's find out, don't ignore it.
-
CybersecurityThe knowledge content is as follows:
1. Avoid Trojan horses being installed on the computer.
Install anti-virus software.
and personal firewalls, and timely upgrades; Consider using a secure browser and email.
client-side tools; Do not execute any software from unknown sources; After the unfamiliar email is disinfected, the attachment in the email is **; Frequently upgrade the system and update the virus database; Do not install non-essential plugins; Use anti-virus software regularly to detect and kill computer viruses.
2. Protect personal information in daily life.
Don't socialize**.
Class software on the release of train tickets, plane tickets.
Passport, **, schedule, whereabouts, etc.; In public places such as libraries and print shops, or using other people's mobile phones to log in, do not choose to automatically save passwords, and remember to log out when leaving; From the commonly used app store, not from the unfamiliar, unknown app store, page; Fill out the questionnaire and scan *** to register, and do not use real personal information as much as possible.
3. Prevent the leakage of personal information.
It is necessary to enhance the awareness of personal information security, and do not easily provide personal information to irrelevant persons; Properly dispose of courier bills, tickets, shopping receipts and other documents containing personal information; There should be differences in personal email address, online payment and bank card passwords.
4. Avoid the leakage of personal information when receiving express delivery.
Because the personal information is on the courier list, whether the courier box is directly put into the trash can or the courier bill is torn off and put into the dry garbage classification, personal information may be leaked, so the face sheet on the courier box should be torn up when receiving the courier.
5. Use of personal information when registering.
When registering, try not to use personal information (name, date of birth, etc.) as an email address or username, which is easy to be cracked by credential stuffing.
6. Set password prevention.
Consecutive numbers or letters, one's own or parents' birthdays are all pieces of information that can be easily guessed or obtained, so it is risky to use a birthday as a password. And if you use one password for all, it is easy to lose more if you lose the password. Therefore, strong passwords should be used for passwords involving property and payment accounts.
-
IP security: The main attack methods include passive network eavesdropping, active IP spoofing (packet forgery and tampering), and routing attack (man-in-the-middle attack).
3.DoS attack: A denial-of-service attack launched by a single attack source, which mainly occupies network resources and forces the target to crash.
Computer Basics", "Principles of Computer Composition", and "Computer Networks" are three books on computer basics, which are highly recommended for you, and you can have a preliminary understanding of computer things after reading them.
-
Hello, cybersecurity basics have these:
1. What can I do to ensure Internet safety before going online?
-
<> "Network security refers to the use of various technical and management measures to ensure the availability, integrity and confidentiality of network data. The specific meaning of cybersecurity changes depending on the "perspective". For example:
From the perspective of users (individuals, businesses, etc.), they want information involving personal privacy or business interests to be protected by confidentiality, integrity, and authenticity when transmitted over the network. From the perspective of enterprises, the most important thing is the security encryption and protection of internal information.
Cybersecurity should be characterized by the following four aspects:
Confidentiality: The nature of information not to be disclosed to or exploited by unauthorized users, entities, or processes.
Integrity: The nature of the data that cannot be altered without authorization. That is, the information remains unmodified, undamaged, and unlost during storage or transmission.
Availability: Features that can be accessed by authorized entities and used on demand are available early. i.e. the ability to access the information you need, when you need it. For example, denial of service in the network environment, disruption of the normal operation of the network and related systems, etc., are all attacks on availability;
Controllability: the ability to control the dissemination and content of information.
The main measures to protect the network are as follows:
1) Comprehensively plan the security strategy of the network platform.
2) Develop management measures for network security.
3) Use a firewall.
4) Record all activity on the network as much as possible.
5) Pay attention to the physical protection of network equipment.
6) Examine the vulnerability of the network platform system.
7) Establish a reliable identification and identification mechanism.
8) For malicious programs that can be removed, checked and killed regularly.
-
What to know about cybersecurity:1. If there is an initial password, it should be changed as soon as possible.
2. The length of the password should not be less than 8 characters.
3. Don't use a single character type, such as just lowercase letters, or just numbers.
4. Do not use the same characters for username and password.
5. Try to avoid setting common weak passwords as passwords.
6. Avoid setting the names of yourself, your family, friends, relatives, and pets as passwords.
7. Personal information such as birthdays, wedding anniversaries, and ** numbers should not be set as passwords.
8. Avoid setting the professional terms and professional characteristics used in the work as passwords.
9. The password dictionary should not contain words, or insert other characters into words.
10. All systems use different passwords as much as possible.
11. Prevent the webpage from automatically remembering the username and password.
12. When registering an account online, the username and password should not be the same or related to the internal username and password of the school.
13. While keeping the password through the password management software, the password management software should set up high-strength security measures.
14. The password should be changed regularly.
Serious. Clean up the chicken, don't forget to remove the bitter gall, put it in a pot and bring it to a boil over high heat, turn to medium heat, and skim off the foam (new foam will grow while skimming, and it will take about ten minutes to skim it off). Put it in the pot. >>>More
Eligibility criteria for a Master of Business in the United States >>>More