About Over 50 Articles Library
Content: Services - Computer
Computer Security No 2: AP (access point)
Personal Computer Security
Dictionary: (Source: Forbes.com)
AP is a device that allows wireless devices to connect to a wired network using Wi-Fi or related standards.
In a computer system, a method of bypassing normal authentication (most often a login ID and password), securing unauthorized remote access to a computer.
Brute Force Attack
This type of attack aims at being the simplest kind of method to gain access to a site: it tries usernames and passwords, over and over again, until it gets in.
The portion of world wide web content not indexed by standard search engines that is generally attributed to hacking and illegal cyber activities.
A computer hacker who’s activity is aimed at promoting a social or political cause.
This is software or hardware that tracks keystrokes and keyboard events, usually secretly, to monitor actions of an information system.
A digital form of social engineering to deceive individuals into providing sensitive information.
A strain of malware that restricts access to a computer system that it infects, and the hacker demands a ransom to be paid to the originator of the malware (the hacker) in order for the restriction to be removed.
A standalone computer program that has the ability to replicate itself and spread to other computers. A worm is spread through a computer network, but it does not need to attach itself to another computer program, as a virus does.
Personal cybersecurity checklist
(source: adapted from Shane Peden)
1. Account authentication and password best practice
1.1 Strong passwords – are the first line of defence
Example: Use passwords that are a sentence: "I like to eat strawberries and cream"
1.2 Use different passwords for each website
1.3 Avoid giving your real name & business email if possible when you go to download whitepapers, etc. Most of the time they will spam you after you download a paper.
1.4 Use two-Step authentication on websites and services that offer it (example gmail)
This is similar to the way banks will send you an SMS code to confirm account transfers in addition to requiring your password.
For gmail see: GOOGLE ACCOUNTS
Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au
© About Over 50s 2017 website by aml websites online