词条 | Digital self-defense |
释义 |
Digital self-defense requires Internet users to take an active part in guarding their own personal information. Four key strategies are frequently suggested to assist that protection. Computer securityComputer security in this context is referring to Internet security software. The ongoing security of private information requires frequent updating of virus and spyware definitions so that ongoing developments in malicious software cannot interfere with, or copy, private information.[3] Email Accounts and UsernamesChoice of Appropriate Email AccountThe practice of utilising more than one email account to separate personal and business usage from recreational usage is a strategy commonly used to manage personal privacy. The free and ready availability of email accounts from sites such as Yahoo, Google or Hotmail allows the protection of personal identity through the use of different names to identify each email account. These throw-away accounts can be discarded or replaced at will, providing another level of protection. Choice of UsernameA username is required to set up email accounts and to open accounts for various official, commercial, recreational and social networking sites. In many cases, an email address may also be utilised as a username. Usernames that correlate with personal information such as names or nicknames are more at risk than ones that are cryptic or anonymous, particularly on social and recreational sites. Password StrengthA password is a mandatory security measure that accompanies usernames. The use of personal data to construct passwords i.e. family members’ names, pet’s names or birth dates increases the risk to confidential information and are easier to crack than long complicated passwords so password strength is a key strategy for protecting personal information. A password can be weak or strong:a weak password is cutekittens, a strong password is ?lACpAs56IKMs. According to Microsoft an ideal password should be at least 14 characters in length and have letters, punctuation, symbols, and numbers, where complexity is added by the inclusion of uppercase letters.[4] Managing Personal Information Using Privacy OptionsSocial networking sites offer greater security risks to personal electronic information because sensitive, private or confidential information such as personal identifiers are routinely used to create public profiles.[5] Many websites give options to suppress the amount of personal information revealed through the customisation of privacy settings. However privacy settings can reset if changes to the website occur.[6]References1. ^“Components of Security”, http://nms.csail.mit.edu/~snoeren/stp307/ppt/sld002.htm 2. ^“Protect yourself in the online, social network community”, Creston News Advertiser, 11 Feb 2011. http://www.crestonnewsadvertiser.com/articles/ara/2011/02/11/8044960708/index.xml 3. ^"Secure your computer", © Commonwealth of Australia 2010 and © Stay Smart Online. http://www.staysmartonline.gov.au/home_internet_users/secure_your_computer 4. ^"Create Strong Passwords", Microsoft Safety and Security Center. {{cite web |url=http://www.microsoft.com/security/online-privacy/passwords-create.aspx |title=Archived copy |accessdate=2011-02-13 |deadurl=yes |archiveurl=https://web.archive.org/web/20110214012154/http://www.microsoft.com/security/online-privacy/passwords-create.aspx |archivedate=2011-02-14 |df= }} 5. ^"Safer Social Networking". © Commonwealth of Australia 2010.http://www.cybersmart.gov.au/Parents/Brochures%20and%20posters%20and%20contacts/Cybersmart%20contacts.aspx#Information 6. ^“Protect yourself in the online, social network community”, Creston News Advertiser, 11 Feb 2011. http://www.crestonnewsadvertiser.com/articles/ara/2011/02/11/8044960708/index.xml See also
3 : Computer security|Privacy|Self-defense |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。