-
Learn what you need to know about cybersecurity:
1) Familiar with the basic knowledge of computer systems;
2) Familiar with the basic knowledge of network operating system;
3) Understand the design and development methods of computer application systems;
4) Familiar with the basic knowledge of data communication;
5) Familiar with the basic knowledge of system security and data security;
6) Master the basic technology of network security and the main security protocols and security systems;
7) Master the basic principles of computer network architecture and network protocols;
8) Master the standardization knowledge related to computer networks.
-
CybersecurityThe knowledge content is as follows:
1. Avoid Trojan horses being installed on the computer.
Install anti-virus software.
and personal firewalls, and timely upgrades; Consider using a secure browser and email.
client-side tools; Do not execute any software from unknown sources; After the unfamiliar email is disinfected, the attachment in the email is **; Frequently upgrade the system and update the virus database; Do not install non-essential plugins; Use anti-virus software regularly to detect and kill computer viruses.
2. Protect personal information in daily life.
Don't socialize**.
Class software on the release of train tickets, plane tickets.
Passport, **, schedule, whereabouts, etc.; In public places such as libraries and print shops, or using other people's mobile phones to log in, do not choose to automatically save passwords, and remember to log out when leaving; From the commonly used app store, not from the unfamiliar, unknown app store, page; Fill out the questionnaire and scan *** to register, and do not use real personal information as much as possible.
3. Prevent the leakage of personal information.
It is necessary to enhance the awareness of personal information security, and do not easily provide personal information to irrelevant persons; Properly dispose of courier bills, tickets, shopping receipts and other documents containing personal information; There should be differences in personal email address, online payment and bank card passwords.
4. Avoid the leakage of personal information when receiving express delivery.
Because the personal information is on the courier list, whether the courier box is directly put into the trash can or the courier bill is torn off and put into the dry garbage classification, personal information may be leaked, so the face sheet on the courier box should be torn up when receiving the courier.
5. Use of personal information when registering.
When registering, try not to use personal information (name, date of birth, etc.) as an email address or username, which is easy to be cracked by credential stuffing.
6. Set password prevention.
Consecutive numbers or letters, one's own or parents' birthdays are all pieces of information that can be easily guessed or obtained, so it is risky to use a birthday as a password. And if you use one password for all, it is easy to lose more if you lose the password. Therefore, strong passwords should be used for passwords involving property and payment accounts.
-
<> "Network security refers to the use of various technical and management measures to ensure the availability, integrity and confidentiality of network data. The specific meaning of cybersecurity changes depending on the "perspective". For example:
From the perspective of users (individuals, businesses, etc.), they want information involving personal privacy or business interests to be protected by confidentiality, integrity, and authenticity when transmitted over the network. From the perspective of enterprises, the most important thing is the security encryption and protection of internal information.
Cybersecurity should be characterized by the following four aspects:
Confidentiality: The nature of information not to be disclosed to or exploited by unauthorized users, entities, or processes.
Integrity: The nature of the data that cannot be altered without authorization. That is, the information remains unmodified, undamaged, and unlost during storage or transmission.
Availability: Features that can be accessed by authorized entities and used on demand are available early. i.e. the ability to access the information you need, when you need it. For example, denial of service in the network environment, disruption of the normal operation of the network and related systems, etc., are all attacks on availability;
Controllability: the ability to control the dissemination and content of information.
The main measures to protect the network are as follows:
1) Comprehensively plan the security strategy of the network platform.
2) Develop management measures for network security.
3) Use a firewall.
4) Record all activity on the network as much as possible.
5) Pay attention to the physical protection of network equipment.
6) Examine the vulnerability of the network platform system.
7) Establish a reliable identification and identification mechanism.
8) For malicious programs that can be removed, checked and killed regularly.
-
Here's what you need to know about cybersecurity:1.If you have an initial password, you should change it as soon as possible.
2.The password must be at least 8 characters long.
3.Don't use a single character type, such as just lowercase letters, or just numbers.
4.Do not use the same characters as your username and password.
5.Avoid setting common weak passwords as passwords as possible.
6.Avoid setting the names of yourself, family, friends, relatives, and pets as passwords.
7.Personal information such as birthdays, wedding anniversaries, and ** numbers should not be set as passwords.
8.Avoid setting the technical terms and professional characteristics used in the work as passwords.
9.The password dictionary should not contain words, or insert additional characters into words.
10.All systems use different passwords whenever possible.
11.Prevent web pages from automatically remembering VOC usernames and passwords.
12.When registering an account online, the username and password should not be the same or related to the internal username and password of the school.
13.While keeping your passwords safe through a password manager, the password manager should have strong security measures in place.
14.Passwords should be changed regularly.
Virus protection risk:1.Install a virus protection program and update the virus signature database in a timely manner.
4.When using removable storage media, turn it on after virus killing.
5.When installing unspecified software, manually check and kill the virus.
6.If you find that your computer is working abnormally when browsing the web, it is recommended to disconnect from the network and perform a full anti-virus operation.
The Internet routine is so deep that even adults can't prevent it. Therefore, during the National Cyber Security Week, we will talk about what college students should pay attention to in cyber security.
1.First of all, the definition of hackers refers to those who use superb technology to help others, and the name hacker is to be recognized by other hackers, not self-appointed, let alone use gadgets to sabotage everywhere, 2Its advantage is that the network can be temporarily secured, 3 >>>More