2022 Encyclopedia of Network Security Knowledge (Selected) Account Password Security
1. If there is an initial password, it should be modified as soon as possible.
2. The password is not less than 8 characters long.
3. Don't use a single character type, such as only lowercase letters or only numbers.
4. Don't use the same characters as the user name and password.
5. Try to avoid setting common weak passwords as passwords.
6. Avoid setting the names of yourself, family, friends, relatives and pets as passwords.
7. Avoid setting personal information such as birthdays, wedding anniversaries and telephone numbers as passwords.
8. Avoid setting professional terms and features used in work as passwords.
9. The password dictionary should not contain words or insert other characters into words.
10. All systems should use different passwords as far as possible.
1 1. Prevents web pages from automatically remembering user names and passwords.
12. When registering an account online, the user name and password shall not be the same as or related to the internal user name and password of the school.
13. Password management software should be equipped with high-intensity security measures while keeping passwords well.
14. The password should be changed regularly.
Virus prevention risk
15. Install virus protection program and update virus signature database in time.
16. Pay attention to the suffix of the file name when downloading the email attachment, and don't open the attachment sent by a strange sender.
17. Files downloaded from the network need to verify the validity of the digital signature of the file and manually scan the file with anti-virus software.
18. When using removable storage media, kill virus and open it.
19. When installing software from unknown sources, manually kill virus.
20. When browsing the web, if you find that the computer is working abnormally, it is recommended to disconnect the network and carry out overall antivirus.
Pay attention to Internet security.
2 1. Use a well-known secure browser.
22. Collect frequently visited websites, and don't easily click on websites sent to you by others.
23. Beware of temptations such as ultra-low prices, ultra-low discounts and winning prizes.
24. Avoid visiting pornographic, gambling, reactionary and other illegal websites.
25. Important documents will be encrypted when transmitted through the network, e-mail, etc.
26. Hide unnecessary sensitive information through the security and privacy settings of social networking sites.
27. Avoid uploading work information and files to Internet storage spaces such as network disks and cloud folders.
28. Carefully post personal information on social networking sites.
Register according to your own needs for the website, and don't blindly fill in the information.
30. Internet DNS should be set to the IP address specified by the operator or internal DNS service to avoid the hijacking risk caused by using unsafe DNS.
Online secure transaction
3 1. Compare the visited websites with the official addresses to confirm the accuracy.
32. Avoid using online trading systems through public computers.
33. Don't do financial business operations on computers used by many people, such as Internet cafes.
34. Don't enter the transaction through the URL on the search engine or the link of unknown website.
35. Before online trading, fully understand the qualifications of trading websites and counterparties.
36. The authenticity of website qualification can be verified by querying the filing information of the website.
37. Pay attention to check whether the trading website is HTTPS protocol to ensure that data transmission is not tampered with by monitoring.
38. When visiting websites involving fund transactions, try to use the virtual keyboard provided by official website to enter login and transaction passwords.
39. You can get a coupon by filling in your personal information, and you should fill it out carefully.
40. Pay attention to protecting personal privacy, and be cautious when using sensitive information such as personal bank accounts, passwords and ID numbers.
4 1. Before using the mobile payment service, the security program of the payment environment should be installed as required.
42. For whatever reason, it is a crime of fraud to ask you to transfer money to a stranger's account or a safe account. Don't be deceived
43. Be vigilant when receiving emails related to personal information and money (such as winning prizes and raising funds).
Email security
44. Don't open or reply to suspicious emails, junk emails and emails of unknown origin.
45. When sending and receiving the company's business mail, it should be handled by the company's corporate mailbox, and private mail should be handled by the personal mailbox.
46. Employees shall be responsible for the security of their email user names and passwords, and shall not lend them to others.
47. If the mailbox is found to have security holes, it shall promptly notify the company's mail system management personnel.
48. Be wary of email content, website links and pictures.
49. It is recommended to use the self-built mailbox of the government for the work mail of the office staff, and it is strictly forbidden to use the overseas mailbox.
50. Set a strong password for e-mail and set that you must log in with a username and password every time you log in.
5 1. Open the anti-virus software for real-time monitoring, and check whether the emails sent and received contain viruses.
52. Regularly check whether the automatic mail forwarding function is turned off.
53. Don't forward emails and attachments of unknown origin.
54. When you receive an email that involves sensitive information, you should repeatedly confirm the content of the email and the sender, and try to communicate offline.
Six Common Network Security Risks
1, system vulnerability
The threat of computer system vulnerabilities mainly comes from network attacks. Criminals will take advantage of loopholes and security risks in computer systems to attack computer hardware and software, so as to obtain important data or create damage.
2. Malicious programs
Malicious programs usually refer to malicious computer programs, mainly including computer viruses, spyware, ransomware, malicious advertising software and so on. Once a computer system is implanted with malicious programs, it either fails to run or loses data.
3. Phishing websites
Phishing websites are one of the most common forms of phishing fraud, which are usually spread through spam, instant chat, short messages or false advertisements. After users visit phishing websites, they may disclose personal information such as account numbers and passwords.
4, cottage software
Shanzhai software often attracts users to download and install by imitating some well-known software. Once successful, it will secretly collect sensitive information such as the user's location information, call records and telephone numbers. By opening background permissions and uploading them to the server.
5. Malicious QR code
Malicious QR code is generated by malicious urls through network technology. Once the user uses the mobile phone to scan, he will enter the malicious website behind the QR code through the link, or be lured to input personal information, or be secretly opened by the background permission of the mobile phone.
6. False free WiFi
In order to save traffic, some users will choose to connect to the surrounding free WiFi when they go out, which leaves an opportunity for criminals. Under the guise of providing free WiFi service, they will invade users' mobile phones through the background, spy on privacy and collect data.
Remember four points.
In the "Internet" era, in order to effectively prevent potential risks, we must remember the following four points.
1, computer protection is indispensable.
Install protection software for the computer and open the firewall.
Update the computer system and software version in time.
Download software must go through formal channels.
Back up important data in your computer regularly to prevent it from being lost.
2. Protection of important equipment.
Don't throw away or sell old mobile phones, tablets, smart watches and other electronic devices at will.
Update the equipment system and software version in time.
When installing the software, carefully open sensitive permissions (such as positioning, audio and video recording, etc.). ).
Check the operation of electronic equipment regularly to prevent data from being "stolen".
3. Some situations are traps.
Don't click on emails and website links of unknown origin at will.
Don't provide the verification code received by your mobile phone at will.
Don't take online quizzes and surveys at will.
Don't use free WiFi of unknown origin at will.
4. Remember good habits.
Computers, mobile phones, tablets, etc. You should use a relatively complex and independent strong password.
Don't share sensitive information such as family members and addresses on the Internet.
Try not to leave important information such as ID number and mobile phone number on the Internet.
Find out the leakage of personal information and report it to the relevant departments in time.
Ten Problems about Network Security in Life
1
How to avoid installing Trojan horse program on computer?
Install anti-virus software and personal firewall, and upgrade in time; Consider using more secure browsers and mail client tools; Do not execute any software of unknown origin; Download the attachment in the email after the unfamiliar email needs antivirus; Frequently upgrade the system and update the virus database; Do not install unnecessary website plug-ins; Regularly use anti-virus software to kill computer viruses.
2
How to protect personal information in daily life?
Don't post train tickets, plane tickets, passports, photos, schedules, whereabouts, etc. Social networking software; Don't choose to automatically save passwords in public places such as libraries and print shops, or use other people's mobile phones to log in accounts. Remember to close your account when you leave. Download apps from popular app stores, not from unfamiliar and unknown app stores or website pages; Fill in the questionnaire, scan the QR code to register, and try not to use real personal information.
three
What should I pay attention to in preventing personal information from leaking?
Need to enhance personal information security awareness, do not easily provide personal information to irrelevant personnel; Properly handle documents containing personal information such as express orders, tickets and shopping receipts; Personal email, online payment and bank card passwords should be different.
four
How to avoid personal information disclosure by receiving express delivery?
Because personal information is on the courier, whether the courier box is directly put into the trash can or the courier box is removed and put into dry garbage sorting, personal information may be leaked. Therefore, when you receive the courier, tear off the face sheet on the courier box.
five
Can I use personal information (name, date of birth, etc.)? ) as the email or user name when registering?
Try not to use personal information (name, date of birth, etc.) when registering. ) as a mailbox address or user name, it is easy to be cracked by database conflicts.
six
What should I pay attention to when registering users online and setting user passwords?
Continuous numbers or letters, one's own or parents' birthdays are easily guessed or obtained information, so it is very risky to use birthdays as passwords. And if all accounts use a password, once the password is lost, it is easy to cause greater losses. Therefore, passwords involving property and payment accounts should use high-strength passwords.
seven
How to prevent browsing behavior from being tracked?
You can prevent browsing behavior from being tracked by clearing browser cookies or rejecting cookies.
eight
When installing a new APP, what should I pay attention to after the privacy policy pops up?
Information on the website of net safe; Download the attachment in the email after the unfamiliar email needs antivirus; When downloading resources, give priority to green websites with high security.
nine
Now the game has set up an anti-addiction mechanism for minors, which usually requires users to carry out real-name authentication and fill in real-name information. What should I pay attention to?
Some games will over-collect personal information, such as home address, ID photo, mobile phone number, etc. Read the real-name information carefully, only fill in the necessary real-name information, and you can't ignore personal information for the game experience.
10
Why is it difficult to withdraw money from the money-making welfare activities involved in APP?
Many "money-making" apps often attract users to download and register by brushing news, watching videos, playing games and taking multiple steps. The reason behind this is that the traffic cost is getting more and more expensive, and it is difficult to form a concentrated reading volume and explosive growth products. By increasing the difficulty of withdrawing cash, users are forced to contribute traffic and reading.