About Over 50 Articles Library

RETURN TO LIBRARY INDEX

Content: Services - Computer

Computer Security No 2: AP (access point)

Personal Computer Security

Dictionary: (Source: Forbes.com)

AP is a device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.

Backdoor

In a computer system, a method of bypassing normal authentication (most often a login ID and password), securing unauthorized remote access to a computer.

Brute Force Attack

This type of attack aims at being the simplest kind of method to gain access to a site: it tries usernames and passwords, over and over again, until it gets in.

Dark Web

The portion of world wide web content not indexed by standard search engines that is generally attributed to hacking and illegal cyber activities.

Hacktivist

A computer hacker who’s activity is aimed at promoting a social or political cause.

Keylogger

This is software or hardware that tracks keystrokes and keyboard events, usually secretly, to monitor actions of an information system.

Phishing

A digital form of social engineering to deceive individuals into providing sensitive information.

Ransomware

A strain of malware that restricts access to a computer system that it infects, and the hacker demands a ransom to be paid to the originator of the malware (the hacker) in order for the restriction to be removed.

Worm

A standalone computer program that has the ability to replicate itself and spread to other computers. A worm is spread through a computer network, but it does not need to attach itself to another computer program, as a virus does.

Personal cybersecurity checklist

(source: adapted from Shane Peden)

1. Account authentication and password best practice

1.1 Strong passwords – are the first line of defence

Example: Use passwords that are a sentence: "I like to eat strawberries and cream"

1.2 Use different passwords for each website

1.3 Avoid giving your real name & business email if possible when you go to download whitepapers, etc. Most of the time they will spam you after you download a paper.

1.4 Use two-Step authentication on websites and services that offer it (example gmail)

This is similar to the way banks will send you an SMS code to confirm account transfers in addition to requiring your password.

For gmail see: GOOGLE ACCOUNTS

Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au

RETURN TO LIBRARY INDEX

 

© About Over 50s 2017             website by aml websites online