How To Protect Information

Table of contents:

How To Protect Information
How To Protect Information

Video: How To Protect Information

Video: How To Protect Information
Video: Former NSA Hacker Reveals 5 Ways To Protect Yourself Online 2024, May
Anonim

Unfortunately, the modern information society is not ideal. The more information becomes in the world, the more people want to get access to it, including illegally. Data protection technologies are studied in higher education institutions, but even basic security measures are enough.

How to protect information
How to protect information

Instructions

Step 1

Globalization and computerization are increasingly leading to the fact that the bulk of information is stored in electronic form, much more convenient for processing and transmission than traditional options. However, in addition to convenience, the security of data from unauthorized access is of great importance, and here computers provide cybercriminals with a lot of opportunities, since, in theory, any computer connected to the Internet can be accessed. You can prevent this with encryption, strong passwords, a complex authorization system, network protection and the use of high-quality antiviruses.

Step 2

Encryption is the process of encrypting all or part of the data stored on a hard drive using special programs. Even if an attacker gains physical access to your hard drive or flash drive, he will not be able to use the information stored there without knowing the password.

Step 3

Choosing strong passwords is one of the main ways to stay safe. Never use meaningful data as a password, such as a phone number or date of birth, as a good cracker will have no difficulty in finding out this data. You should also not use one password in all cases, as there is a high probability that one day it will be stolen or hacked, and you will lose access to everything. Change passwords periodically, as many Trojans capture all text entered from the keyboard and periodically send data via the Internet, while attackers extract meaningful information from this.

Step 4

A sophisticated authentication system provides protection against theft of a password. As a rule, this is solved with the help of one-time SMS codes, which must be entered along with the password at each authorization. Cards with one-time codes or other methods can also be used. The bottom line is that even knowing your password, an attacker will not be able to access your data without a one-time code. This method is considered one of the most reliable today.

Step 5

When it comes to network security, it is mainly about unsecured wireless networks. In fact, any unsecured Internet connection is a sure step towards losing personal data, so if you use a wireless network, take care of data encryption, filtering devices that can connect to it, and a good password to access the connection.

Step 6

Naturally, any computer must be protected by an anti-virus program. Choosing an antivirus manufacturer is based on several characteristics: price, reputation, system requirements, regularity of database updates. Free antivirus is quite enough for many computers, but if you work with financial documents, electronic invoices, important projects that can become objects of industrial espionage, then it is better not to skimp on antivirus programs. Remember to check your computer regularly.

Recommended: