What is Cyber Attack ?
A cyber attack is a malicious act by persons, groups or organizations against a computer system that is intended to destroy or damage it, fool it or take control of it in order to carry out illegitimate operations or steal data. A cyber attack can be against a computer, a server, peripherals (printers, external hard drives) or mobile communication devices (smartphones, digital tablets). Such an act is usually committed through a local network or an Internet connection.
Safety Instructions From Attack:-
Within organizations, network administrators are asked to limit the number of authorized applications, install patches for the various applications and operating systems used, and closely correlate administrative privileges with user duties. As a staff member, you must follow established safety rules and procedures carefully. Here are a few basic instructions:
- Do not disclose your passwords to anyone.
- Avoid using a personal USB key or external drive for purposes of work.
- Always lock your work station when you leave, even for a short time.
- Report any suspicious incident to the person in charge of computer-related security.
At home, the following steps can prevent or reduce the impact of a computer-related security incident:
- Make sure you have up-to-date software, anti-virus software and a firewall.
- Check whether your computer and network are securely configured. If needed, request the help of a specialist.
- Create long and difficult-to-guess passwords that include numbers, upper and lower case letters, and special characters.
- Do not disclose your passwords to anyone.
- Do not use the same password twice and change it regularly.
- When registering with a website or for Web service, make sure you choose security questions the answers to which only you know should you forget a password.
- Avoid clicking on hypertext links in unsolicited emails.
- Before opening email attachments, make sure you know what they are.
- If you decide to answer emails from persons or organizations unknown to you, avoid providing personal information.
- Consult only reliable sites, i.e. sites of known organizations. To help you identify counterfeit sites, pay special attention to the spelling and overall visual appearance of the sites.
- Carry out your transactions only on secure sites. Secure websites have an Internet address that starts with “https” or have a padlock or lock icon on the page.
- Be careful when providing personal information.
0 comments:
Post a Comment