Joke Collection Website - Public benefit messages - 100 network security tips (selected and practical)
100 network security tips (selected and practical)
100 network security tips (selected and practical) account password security
1. If there is an initial password, it should be modified as soon as possible.
2. The password is not less than 8 characters long.
3. Don't use a single character type, such as only lowercase letters or only numbers.
4. Don't use the same characters as the user name and password.
5. Try to avoid setting common weak passwords as passwords.
6. Avoid setting the names of yourself, family, friends, relatives and pets as passwords.
7. Avoid setting personal information such as birthdays, wedding anniversaries and telephone numbers as passwords.
8. Avoid setting professional terms and features used in work as passwords.
9. The password dictionary should not contain words or insert other characters into words.
10. All systems should use different passwords as far as possible.
1 1. Prevents web pages from automatically remembering user names and passwords.
12. When registering an account online, the user name and password shall not be the same as or related to the internal user name and password of the school.
13. Password management software should be equipped with high-intensity security measures while keeping passwords well.
14. The password should be changed regularly.
Virus prevention risk
15. Install virus protection program and update virus signature database in time.
16. Pay attention to the suffix of the file name when downloading the email attachment, and don't open the attachment sent by a strange sender.
17. Files downloaded from the network need to verify the validity of the digital signature of the file and manually scan the file with anti-virus software.
18. When using removable storage media, kill virus and open it.
19. When installing software from unknown sources, manually kill virus.
20. When browsing the web, if you find that the computer is working abnormally, it is recommended to disconnect the network and carry out overall antivirus.
Pay attention to Internet security.
2 1. Use a well-known secure browser.
22. Collect frequently visited websites, and don't easily click on websites sent to you by others.
23. Beware of temptations such as ultra-low prices, ultra-low discounts and winning prizes.
24. Avoid visiting pornographic, gambling, reactionary and other illegal websites.
25. Important documents will be encrypted when transmitted through the network, e-mail, etc.
26. Hide unnecessary sensitive information through the security and privacy settings of social networking sites.
27. Avoid uploading work information and files to Internet storage spaces such as network disks and cloud folders.
28. Carefully post personal information on social networking sites.
Register according to your own needs for the website, and don't blindly fill in the information.
30. Internet DNS should be set to the IP address specified by the operator or internal DNS service to avoid the hijacking risk caused by using unsafe DNS.
Online secure transaction
3 1. Compare the visited websites with the official addresses to confirm the accuracy.
32. Avoid using online trading systems through public computers.
33. Don't do financial business operations on computers used by many people, such as Internet cafes.
34. Don't enter the transaction through the URL on the search engine or the link of unknown website.
35. Before online trading, fully understand the qualifications of trading websites and counterparties.
36. The authenticity of website qualification can be verified by querying the filing information of the website.
37. Pay attention to check whether the trading website is HTTPS protocol to ensure that data transmission is not tampered with by monitoring.
38. When visiting websites involving fund transactions, try to use the virtual keyboard provided by official website to enter login and transaction passwords.
39. You can get a coupon by filling in your personal information, and you should fill it out carefully.
40. Pay attention to protecting personal privacy, and be cautious when using sensitive information such as personal bank accounts, passwords and ID numbers.
4 1. Before using the mobile payment service, the security program of the payment environment should be installed as required.
42. For whatever reason, it is a crime of fraud to ask you to transfer money to a stranger's account or a safe account. Don't be deceived
43. Be vigilant when receiving emails related to personal information and money (such as winning prizes and raising funds).
Email security
44. Don't open or reply to suspicious emails, junk emails and emails of unknown origin.
45. When sending and receiving the company's business mail, it should be handled by the company's corporate mailbox, and private mail should be handled by the personal mailbox.
46. Employees shall be responsible for the security of their email user names and passwords, and shall not lend them to others.
47. If the mailbox is found to have security holes, it shall promptly notify the company's mail system management personnel.
48. Be wary of email content, website links and pictures.
49. It is recommended to use the self-built mailbox of the government for the work mail of the office staff, and it is strictly forbidden to use the overseas mailbox.
50. Set a strong password for e-mail and set that you must log in with a username and password every time you log in.
5 1. Turn on anti-virus software for real-time monitoring, and check whether the emails sent and received contain viruses.
52. Regularly check whether the automatic mail forwarding function is turned off.
53. Don't forward emails and attachments of unknown origin.
54. When you receive an email that involves sensitive information, you should repeatedly confirm the content of the email and the sender, and try to communicate offline.
Host security
55. The operating system should update the latest security patches in time.
56. It is forbidden to open unauthorized files to enjoy services, and enjoy files in a safer way.
57. Upgrade security patches for middleware, databases, platform components and other programs.
58. Turn off remote access to office computers.
59. Back up important data regularly.
60. Shut down unnecessary services in the system.
6 1. When changing the computer system operator, change the system password when handing over important information.
62. Clean up the recycle bin in time.
63. When employees leave their seats, they should set the computer to exit or lock the screen. It is recommended to set automatic screen locking.
Office environmental safety
64. It is forbidden to place or discard paper documents containing sensitive information at will, and the discarded documents need to be chopped with a shredder.
65. Abandoned or degaussed media shall be degaussed by the management department when handed over to others.
66. When you leave your seat, you should lock valuables and materials containing sensitive information into the cabinet.
67. Copied or printed materials should be taken away in time.
68. Discarded CDs, USB flash drives and computers should be degaussed or completely destroyed.
69. It is forbidden to leave user name, password and other information on post-it notes.
At the age of 70.70. UKey is not in use, so it should be pulled out in time and properly kept.
7 1. Find a safe and quiet place to answer important calls in the office to avoid information leakage.
72.u disk and mobile hard disk should be stored in a safe place at any time, and should not be borrowed or placed at will.
Mobile phone security
73. The mobile phone is equipped with automatic screen locking function. It is recommended that the screen lock time be set to 1-5 minutes to avoid malicious use of the mobile phone by others.
74. The upgrade of mobile phone system should be updated through the built-in version checking function, so as to avoid the information leakage caused by downloading the tampered system update package through the third-party website.
75. Download mobile applications through the application market that comes with the mobile phone as much as possible.
76. Install antivirus software for mobile phones.
77. Always make synchronous data backup for mobile phones.
78. You should be vigilant when you visit websites with your mobile phone.
79. Setting the access password for the mobile phone is the first line of defense to protect the security of the mobile phone and prevent information leakage caused by the loss of the mobile phone.
80. When not in use, turn off the Bluetooth function.
8 1. Before scrapping the mobile phone, the data should be fully backed up, factory settings should be restored, and residual information should be removed.
82. Always check the running programs of the mobile phone, check whether there are malicious programs running in the background, and regularly use the mobile phone security management software to scan the mobile phone system.
83. Restrict program execution authority, and non-essential programs prohibit reading sensitive data such as address book.
84. Don't try to crack the phone to ensure the security of the application.
Wireless network security
85. It is forbidden to open Wi-Fi hotspots through the office network without permission in the office environment.
86. Don't visit any open Wi-Fi that doesn't belong to the company. If you find any password and open Wi-Fi near the company, notify the it department.
87. When a department needs to set up a separate Wi-Fi network, IT should report to the IT department, and it is forbidden to open hot spots by itself.
88. It is forbidden to use Wi-Fi*** to enjoy the APP, so as not to reveal the user name and password of the wireless network.
89. Wireless network equipment is updated to the latest firmware in time.
90. Be alert to the fishing traps set by free wireless signals in public places for criminals.
9 1. Set high-intensity wireless password, and the authentication mechanism of each unit suggests using real name.
Sensitive information security
92. Sensitive computers and intranet computers are not allowed to connect to the Internet or other public networks.
93. Computers, fax machines, photocopiers and other equipment dealing with sensitive information should be maintained within the unit and supervised by special personnel on site.
94. Maintenance personnel are prohibited from reading or copying sensitive information. If it is determined that the repair needs to be sent out, the sensitive information storage parts should be removed.
95. When sensitive information equipment is converted into ordinary equipment for use or elimination, sensitive information storage components should be removed.
96. Sensitive and intranet computers shall not use wireless keyboards, wireless mice and wireless network cards.
97. Sensitive documents are not allowed to be processed on ordinary computers.
98. The data exchange between internal and external networks requires the use of a special encrypted USB flash drive or burning a CD.
99. Avoid revealing the contents of work outside the working environment.
100. Important files should be encrypted first.
Six Common Network Security Risks
1, system vulnerability
The threat of computer system vulnerabilities mainly comes from network attacks. Criminals will take advantage of loopholes and security risks in computer systems to attack computer hardware and software, so as to obtain important data or create damage.
2. Malicious programs
Malicious programs usually refer to malicious computer programs, mainly including computer viruses, spyware, ransomware, malicious advertising software and so on. Once a computer system is implanted with malicious programs, it either fails to run or loses data.
3. Phishing websites
Phishing websites are one of the most common forms of phishing fraud, which are usually spread through spam, instant chat, short messages or false advertisements. After users visit phishing websites, they may disclose personal information such as account numbers and passwords.
4, cottage software
Shanzhai software often attracts users to download and install by imitating some well-known software. Once successful, it will secretly collect sensitive information such as the user's location information, call records and telephone numbers. By opening background permissions and uploading them to the server.
5. Malicious QR code
Malicious QR code is generated by malicious urls through network technology. Once the user uses the mobile phone to scan, he will enter the malicious website behind the QR code through the link, or be lured to input personal information, or be secretly opened by the background permission of the mobile phone.
6. False free WiFi
In order to save traffic, some users will choose to connect to the surrounding free WiFi when they go out, which leaves an opportunity for criminals. Under the guise of providing free WiFi service, they will invade users' mobile phones through the background, spy on privacy and collect data.
Remember four points.
In the "Internet" era, in order to effectively prevent potential risks, we must remember the following four points.
1, computer protection is indispensable.
Install protection software for the computer and open the firewall.
Update the computer system and software version in time.
Download software must go through formal channels.
Back up important data in your computer regularly to prevent it from being lost.
2. Protection of important equipment.
Don't throw away or sell old mobile phones, tablets, smart watches and other electronic devices at will.
Update the equipment system and software version in time.
When installing the software, carefully open sensitive permissions (such as positioning, audio and video recording, etc.). ).
Check the operation of electronic equipment regularly to prevent data from being "stolen".
3. Some situations are traps.
Don't click on emails and website links of unknown origin at will.
Don't provide the verification code received by your mobile phone at will.
Don't take online quizzes and surveys at will.
Don't use free WiFi of unknown origin at will.
4. Remember good habits.
Computers, mobile phones, tablets, etc. You should use a relatively complex and independent strong password.
Don't share sensitive information such as family members and addresses on the Internet.
Try not to leave important information such as ID number and mobile phone number on the Internet.
Find out the leakage of personal information and report it to the relevant departments in time.
Ten Problems about Network Security in Life
1
How to avoid installing Trojan horse program on computer?
Install anti-virus software and personal firewall, and upgrade in time; Consider using more secure browsers and mail client tools; Do not execute any software of unknown origin; Download the attachment in the email after the unfamiliar email needs antivirus; Frequently upgrade the system and update the virus database; Do not install unnecessary website plug-ins; Regularly use anti-virus software to kill computer viruses.
2
How to protect personal information in daily life?
Don't post train tickets, plane tickets, passports, photos, schedules, whereabouts, etc. Social networking software; Don't choose to automatically save passwords in public places such as libraries and print shops, or use other people's mobile phones to log in accounts. Remember to close your account when you leave. Download apps from popular app stores, not from unfamiliar and unknown app stores or website pages; Fill in the questionnaire, scan the QR code to register, and try not to use real personal information.
three
What should I pay attention to in preventing personal information from leaking?
Need to enhance personal information security awareness, do not easily provide personal information to irrelevant personnel; Properly handle documents containing personal information such as express orders, tickets and shopping receipts; Personal email, online payment and bank card passwords should be different.
four
How to avoid personal information disclosure by receiving express delivery?
Because personal information is on the courier, whether the courier box is directly put into the trash can or the courier box is removed and put into dry garbage sorting, personal information may be leaked. Therefore, when you receive the courier, tear off the face sheet on the courier box.
five
Can I use personal information (name, date of birth, etc.)? ) as the email or user name when registering?
Try not to use personal information (name, date of birth, etc.) when registering. ) as a mailbox address or user name, it is easy to be cracked by database conflicts.
six
What should I pay attention to when registering users online and setting user passwords?
Continuous numbers or letters, one's own or parents' birthdays are easily guessed or obtained information, so it is very risky to use birthdays as passwords. And if all accounts use a password, once the password is lost, it is easy to cause greater losses. Therefore, passwords involving property and payment accounts should use high-strength passwords.
seven
How to prevent browsing behavior from being tracked?
You can prevent browsing behavior from being tracked by clearing browser cookies or rejecting cookies.
eight
When installing a new APP, what should I pay attention to after the privacy policy pops up?
Information on the website of net safe; Download the attachment in the email after the unfamiliar email needs antivirus; When downloading resources, give priority to green websites with high security.
nine
Now the game has set up an anti-addiction mechanism for minors, which usually requires users to carry out real-name authentication and fill in real-name information. What should I pay attention to?
Some games will over-collect personal information, such as home address, ID photo, mobile phone number, etc. Read the real-name information carefully, only fill in the necessary real-name information, and you can't ignore personal information for the game experience.
10
Why is it difficult to withdraw money from the money-making welfare activities involved in APP?
Many "money-making" apps often attract users to download and register by brushing news, watching videos, playing games and taking multiple steps. The reason behind this is that the traffic cost is getting more and more expensive, and it is difficult to form a concentrated reading volume and explosive growth products. By increasing the difficulty of withdrawing cash, users are forced to contribute traffic and reading.
- Previous article:Student financial assistance work plan
- Next article:Why doesnĄ¯t the flash light flash behind the incoming call on 6splus?
- Related articles
- How to check last month's bill by texting?
- How to make a ps iconps How to make a PS IconPS
- Short sentences about the mood of going home
- How to block calls and text messages outside the address book! What software can I use? How to operate thank you!
- Kindergarten teachers' teachers' greetings are short and beautiful.
- Christmas cards for teachers
- How to bypass the cooling-off period of divorce and divorce quickly?
- Concern about epidemic warning language
- Why can I still receive text messages when my mobile phone is in arrears?
- Take the mobile phone number or the pick-up code for express delivery?