About the content of cyber security knowledge, about the knowledge of cyber security

Updated on technology 2024-03-09
2 answers
  1. Anonymous users2024-02-06

    So what are the contents of cyber security knowledge in the first place?

    How can I prevent my computer from being installed with Trojans?

    Install anti-virus software and personal firewalls, and upgrade them in a timely manner; Consider using a browser and email client tool with good security; Do not execute any software from unknown sources; After the unfamiliar email is disinfected, the attachment in the email is **; Frequently upgrade the system and update the virus database; Do not install non-essential plugins; Use anti-virus software regularly to detect and kill computer viruses.

    How do you protect your personal information in your daily life?

    Do not post train tickets, plane tickets, passports, schedules, whereabouts, etc. on social software; In public places such as libraries and print shops, or using other people's mobile phones to log in, do not choose to automatically save passwords, and remember to log out when leaving; From the commonly used app store, not from the unfamiliar, unknown app store, page; Fill out the questionnaire and scan *** to register, and do not use real personal information as much as possible.

    What should I pay attention to to prevent personal information leakage?

    It is necessary to enhance the awareness of personal information security, and do not easily provide personal information to irrelevant persons; Properly dispose of courier bills, tickets, shopping receipts and other documents containing personal information; There should be differences in personal email address, online payment and bank card passwords.

    How to avoid the leakage of personal information when receiving couriers?

    Because the personal information is on the courier list, whether the courier box is directly put into the trash can or the courier bill is torn off and put into the dry garbage classification, personal information may be leaked, so the face sheet on the courier box should be torn up when receiving the courier.

    Can I use my personal information (name, date of birth, etc.) as my e-mail address or username when registering?

    When registering, try not to use personal information (name, date of birth, etc.) as an email address or username, which is easy to be cracked by credential stuffing.

    What should I pay attention to when registering a user online and setting a user password?

    Consecutive numbers or letters, one's own or parents' birthdays are all pieces of information that can be easily guessed or obtained, so it is risky to use a birthday as a password. And if you use one password for all, it is easy to lose more if you lose the password. Therefore, strong passwords should be used for passwords involving property and payment accounts.

    How can I prevent my browsing behavior from being tracked?

    You can prevent your browsing behavior from being tracked, for example, by clearing browser cookies or by rejecting cookies.

    Now that the game has set up an anti-addiction mechanism for minors, users are usually required to carry out real-name authentication and fill in the real-name information process, what should I pay attention to?

    Some games will collect excessive personal information, such as: home address, ID card**, mobile phone number, etc., read the real-name information carefully, only fill in the necessary real-name information, and cannot be content with personal information for the sake of the game experience.

    That's it for some of the profit summaries that I'm talking about cybersecurity knowledge.

  2. Anonymous users2024-02-05

    Here's what you need to know about cybersecurity:1.If you have an initial password, you should change it as soon as possible.

    2.The password must be at least 8 characters long.

    3.Don't use a single character type, such as just lowercase letters, or just numbers.

    4.Do not use the same characters as your username and password.

    5.Avoid setting common weak passwords as passwords as possible.

    6.Avoid setting the names of yourself, family, friends, relatives, and pets as passwords.

    7.Personal information such as birthdays, wedding anniversaries, and ** numbers should not be set as passwords.

    8.Avoid setting the technical terms and professional characteristics used in the work as passwords.

    9.The password dictionary should not contain words, or insert additional characters into words.

    10.All systems use different passwords whenever possible.

    11.Prevent web pages from automatically remembering usernames and passwords.

    12.When registering an account online, the username and password should not be the same or related to the internal username and password of the school.

    13.While keeping your passwords safe through a password manager, the password manager should have strong security measures in place.

    14.Passwords should be changed regularly.

    Virus protection risk:

    15.Install a virus protection program and update the virus signature database in a timely manner.

    18.When using removable storage media, turn it on after virus killing.

    19.When installing unspecified software, manually check and kill the virus.

    20.If you find that your computer is working abnormally when browsing the web, it is recommended to disconnect from the network and perform a full anti-virus operation.

Related questions
4 answers2024-03-09

Learn what you need to know about cybersecurity:

1) Familiar with the basic knowledge of computer systems; >>>More

5 answers2024-03-09

1. Standardized managementEnterprises formulate a network security management standard system, and employees must abide by it, assign different management permissions and role requirements to different management personnel of the first platform, and strictly divide management personnel to avoid management authority being in charge by the same person, causing potential security risks. >>>More

10 answers2024-03-09

A security certificate is a security setting, generally for online banking. >>>More

3 answers2024-03-09

Network security means that the hardware, software and data in the network system are protected from damage, alteration and leakage due to accidental or malicious reasons, and the system runs continuously, reliably and normally, and the network service is not interrupted. >>>More

7 answers2024-03-09

The Internet routine is so deep that even adults can't prevent it. Therefore, during the National Cyber Security Week, we will talk about what college students should pay attention to in cyber security.