Cyber Security Publicity丨Please keep in mind these cyber security knowledge!

Mondo Technology Updated on 2024-01-30

With the in-depth development of social informatization.

The Internet will play a greater role in promoting the progress of human civilization.

But at the same time, the problems in the Internet field are becoming more and more prominent.

Cybercrime, cyber eavesdropping, cyber attacks, etc. occur from time to time.

Cybersecurity is everyone's business.

Below. Let's learn about cyber security.

What is cybersecurity?

Network security refers to the ability to prevent attacks, intrusions, interference, sabotage, illegal use and accidents on the network by taking necessary measures to ensure the stable and reliable operation of the network, as well as the integrity, confidentiality and availability of network data. In fact, to put it simply, network security is how to ensure that one's information or property is not illegally infringed in the virtual Internet.

Why is cybersecurity important?

In today's era, network security and informatization affect many fields of a country, and network security has become an important part of the country. Without network security, there will be no stable operation of the economy and society, and it will be difficult to protect the interests of the broad masses of the people. From a global perspective, cyber security threats and risks are becoming increasingly prominent, and they are spreading to the political, economic, cultural, social, ecological, national defense and other fields. Cyber security has become one of the most complex, realistic and severe non-traditional security issues facing China.

How to establish a correct concept of network security?

To correctly establish the concept of network security, we must clearly recognize the main characteristics of network security:

First, cybersecurity is holistic rather than fragmented. In the information age, network security has a close relationship with the security of many other aspects.

Second, network security is dynamic rather than static. Networks are becoming highly interconnected and interdependent, and cybersecurity threats** and attack vectors are constantly changing, requiring a dynamic, integrated protection concept.

Third, cybersecurity is open rather than closed. Only by basing ourselves on an open environment, strengthening foreign exchanges, cooperation, interaction, and games, and absorbing advanced technologies, will the level of network security continue to improve.

Fourth, network security is relative rather than absolute. There is no such thing as absolute security, and it is necessary to ensure security based on the basic national conditions and avoid pursuing absolute security regardless of the cost.

Fifth, cyber security is common rather than isolated. Cyber security is for the people, cyber security depends on the people, and maintaining cyber security is the common responsibility of the whole society, which requires the joint participation of enterprises, social organizations, and the majority of netizens to build a cyber security line of defense.

Popularize cyber security knowledge

Cyber security risks are everywhere, and we have sorted out 100 cyber security-related tips, hoping to further enhance everyone's security awareness and jointly build a safer cyber environment.

The account and password are secure

1.If the system has an initial password, you should change it as soon as possible.

2.The password must be at least 8 characters long.

3.Don't use a single character type, such as just lowercase letters, or just numbers.

4.Do not use the same characters as your username and password.

5.Avoid setting common weak passwords as passwords as possible.

6.Avoid setting the names of yourself, family, friends, relatives, and pets as passwords.

7.Personal information such as birthdays, wedding anniversaries, and ** numbers should not be set as passwords.

8.Avoid setting the technical terms and professional characteristics used in the work as passwords.

9.The password dictionary should not contain words, or insert other characters into words.

10.All systems use different passwords whenever possible.

11.Prevent web pages from automatically remembering account passwords.

12.When registering an account online, the username and password should not be the same or associated with the internal username and password of the organization.

13.While keeping your passwords safe with a password manager, the password manager should have strong security measures in place.

14.Passwords should be changed regularly.

Virus risk prevention

15.Install a virus protection program and update the virus signature database in a timely manner.

16.* Pay attention to the suffix of the file name when attaching e-mails, and do not open attachments from unfamiliar senders.

17.Files on the network** need to verify the validity of the file's digital signature and manually scan the file.

18.When using removable storage media, open it after virus scanning.

19.When installing unspecified software, manually check and kill viruses.

20.When browsing the web, if you find an abnormality in the process of using the computer, disconnect the network and eliminate the virus.

Be safe online

21.Use well-known secure browsers (e.g. Edge, Chrome, Firefox, WebKit, 360 Secure Browser, 360 Extreme Browser).

22.Bookmark frequently visited**, don't easily click on what others pass to you**.

23.Be vigilant against ultra-low prices, ultra-low discounts, winning lotteries, etc.

24.Avoid visiting pornography, gambling, reactionary, and other illegal**.

25.Encrypt important documents when they are transmitted through the Internet, email, etc.

26.Protect sensitive information with social** security and privacy settings.

27.Avoid uploading work information and files to online storage spaces, such as network disks and cloud shared folders.

28.Be cautious about posting personal information on social media.

29.Register according to your own needs, and don't blindly fill in the information.

30.The DNS of the Internet should be set to the IP address specified by the operator or the internal DNS service to avoid the risk of hijacking due to the use of insecure DNS.

Online transactions are secure

31.The ** visited is compared with the official address to confirm the accuracy.

32.Avoid using online trading systems via public computers.

33.Do not conduct financial business operations on computers shared by multiple people, such as Internet cafes.

34.Do not enter the transaction through ** or unknown links on search engines.

35.Before trading online, have a thorough understanding of the transaction** and the qualifications of the counterparty.

36.The authenticity of the qualification can be verified by querying the filing information.

37.Check whether the transaction is HTTP to ensure that the data transmission is not tampered with.

38.When accessing funds and transactions, try to use the virtual keyboard provided by the official ** to enter the login and transaction passwords.

39.Fill in your personal details to get a coupon and be careful about filling it out.

40.Pay attention to protect personal privacy, and be cautious when using sensitive information such as personal bank account numbers, passwords, and ID numbers.

41.Before using the mobile payment service, install a plug-in on your mobile phone that is specifically designed for security precautions as required.

42.No matter what the reason, asking you to transfer funds into a stranger's account or a safe account is a fraud crime, so don't be deceived.

43.Be vigilant when receiving emails related to personal information and money (e.g., winning a lottery, raising funds, etc.).

Email security

44.Do not open or reply to suspicious emails, spam emails, or unknown emails.

45.When sending and receiving company business data, you must use the company's internal mailbox, and separate the official and private mailboxes.

46.Employees shall be responsible for the security of their email accounts and passwords, and shall not lend their email accounts to others.

47.If you find any security vulnerabilities in your mailbox, you should notify the company's email system management personnel in a timely manner.

48.Be wary of the content of the email, links, etc.

49.It is recommended to use **self-built mailbox for work emails of government staff, and it is strictly forbidden to use overseas mailboxes.

50.Set a strong password for your email address and make it mandatory to verify your account and password every time you log in.

51.Enable real-time monitoring by antivirus software to detect whether the sent and received emails contain viruses.

52.Check that the Mail feature is turned off.

53.Do not ** e-mails and attachments from unknown sources.

54.When receiving an email involving sensitive information, you should repeatedly confirm the content of the email and the sender, and try to communicate offline.

Host computer security

55.You need to set a login password to log in to the operating system account, and it is not a weak password.

56.The operating system should be updated with the latest security patches.

57.Do not enable file sharing services without permission, and use more secure file sharing methods.

58.Upgrade security patches for middleware, databases, platform components, and other programs.

59.Turn off remote access to office computers.

60.Back up important data regularly.

61.Turn off services that are not needed in the system.

62.When the computer system changes the operator, the password of the system is changed at the same time as handing over important information.

63.Clean up your junk mailbox in a timely manner.

64.When employees leave their seats, they should set the computer to log out or lock the screen, and it is recommended to set the automatic lock screen.

The office environment is safe

65.It is forbidden to place or discard paper documents containing sensitive information, and discarded documents need to be shredded with a paper shredder.

66.When the discarded or degaussing medium is handed over to others, it should be degaussed by the management department.

67.When leaving your seat, you should lock valuables and materials containing confidential information in the locker.

68.The materials of the copy or printer should be taken away in a timely manner.

69.Discarded CDs, USB flash drives, computers, etc. should be degaussed or completely destroyed.

70.It is forbidden to write information such as account numbers and passwords on sticky notes.

71.When the ukey is not in use, it should be pulled out in time and kept properly.

72.Important content in the office**Find a safe and quiet place to answer and avoid information leakage.

73.U disks and mobile hard disks should be stored in a safe place at any time, and should not be borrowed or placed at will.

Mobile phone security

74.It is recommended to set the automatic screen lock function on the mobile phone for 1-5 minutes to avoid being maliciously used by others after leaving the phone.

75.The mobile phone upgrade should be through the built-in update function, avoid through *** update.

76.Whenever possible, through the phone's own app market** mobile app.

77.Install antivirus software on your phone.

78.Do frequent data synchronization backups for your phone.

79.Mobile phones should be vigilant when visiting web sites.

80.Setting an access password for your phone is the first line of defense to protect your phone's security and prevent the leakage of lost information on your phone.

81.When the Bluetooth function is not in use, it should be turned off.

82.Before discarding the phone, you should make a full backup of the data, restore the exit settings, and erase the residual information.

83.Check your phone's task manager frequently to see if there are any malicious programs running in the background, and regularly scan your phone's system with your phone's security software.

84.Restrict program execution permissions, and prohibit non-essential programs from reading sensitive data such as address books.

85.Don't try to hack your phone to keep the app safe.

Wi-Fi security

86.In the office environment, it is forbidden to develop WiFi hotspots through the office network without permission.

87.Do not access any open wifi that is not your unit.

88.Except for testing, security, and mobile terminals, it is not allowed to open hotspots by yourself.

89.It is forbidden to use WiFi sharing apps to avoid leakage of wireless network accounts and passwords.

90.Wireless network devices are updated to the latest firmware.

91.Be wary of phishing traps set by free wireless signals in public places for criminals.

92.Set a strong wireless password, and it is recommended to adopt the real-name method for the authentication mechanism of each unit.

Sensitive Information Security

93.Sensitive and intranet computers are not allowed to connect to the Internet or other public networks.

94.Computers, fax machines, photocopiers, and other equipment that handle sensitive information shall be repaired within the unit, and there shall be on-site staff to supervise them.

95.It is strictly forbidden for maintenance personnel to read or copy leaked information, and if it is determined that it needs to be sent out for maintenance, the storage parts of the classified information shall be removed.

96.When sensitive information equipment is changed to non-classified information equipment or phased out, the classified information storage components shall be dismantled.

97.Sensitive and intranet computers are not allowed to use wireless keyboards, wireless mice, and wireless network cards.

98.Sensitive files are not allowed to be processed on non-classified computers.

99.Intranet and intranet data exchange requires the use of a dedicated confidential USB flash drive or a burning CD.

100.Do not easily disclose your sensitive information to others, such as ID card number, bank card number, mobile phone number, home address, etc.

There is no cybersecurity.

There is no ***

Let's do it together.

Enhance cybersecurity awareness.

Improve basic preparedness skills.

Establish a correct concept of network security.

Jointly maintain national cyber security!

*: Shanxi Local Finance.

If you feel that you have gained something, please like and follow.

Related Pages