网络安全小常识100条的英语Word格式.docx

上传人:b****4 文档编号:17687910 上传时间:2022-12-08 格式:DOCX 页数:5 大小:17.97KB
下载 相关 举报
网络安全小常识100条的英语Word格式.docx_第1页
第1页 / 共5页
网络安全小常识100条的英语Word格式.docx_第2页
第2页 / 共5页
网络安全小常识100条的英语Word格式.docx_第3页
第3页 / 共5页
网络安全小常识100条的英语Word格式.docx_第4页
第4页 / 共5页
网络安全小常识100条的英语Word格式.docx_第5页
第5页 / 共5页
亲,该文档总共5页,全部预览完了,如果喜欢就下载吧!
下载资源
资源描述

网络安全小常识100条的英语Word格式.docx

《网络安全小常识100条的英语Word格式.docx》由会员分享,可在线阅读,更多相关《网络安全小常识100条的英语Word格式.docx(5页珍藏版)》请在冰豆网上搜索。

网络安全小常识100条的英语Word格式.docx

10.Allsystemsusedifferentpasswordswheneverpossible

11.Preventwebpagesfromautomaticallyrememberingaccountpasswords

12.Whenregisteringanaccountonline,ensurethattheusernameandpasswordaredifferentfromtheinternalusernameandpassword

13.Whenusingpasswordmanagementsoftwaretoprotectpasswords,thepasswordmanagementsoftwareshouldbeequippedwithstrongsecuritymeasures

14.Passwordsshouldbechangedregularly

VirusRiskPrevention

15.Installvirusprotectionandkeepthevirussignaturedatabaseuptodate

16.PayattentiontothesuffixofthefilenamewhendownloadingE-mailattachments.Donotopenstrangesenderattachments

17.Verifythevalidityofthedigitalsignatureofthedownloadedfileandmanuallyscanthefile

18.Ifmobilestoragemediaisused,checkforvirusesandenablethem

19.Manuallycheckandremoveviruseswheninstallingsoftwarefromunknownsources

20.Whenbrowsingthewebpage,anyabnormalityisfoundinthecourseofusingthecomputer

InternetSecurityPrecautions

21.Useawell-knownsecurebrowser

22.Bookmarkfrequently-visitedwebsitesanddon'

tclickontheurlsthatotherssendtoyou

23.Bealerttothetemptationofultra-lowprice,ultra-lowdiscountandwinningprizes

24.Avoidpornography,gambling,reactionaryandotherillegalwebsites

25.Importantfilesareencryptedwhentheyaretransmittedthroughthenetworkoremail

26.Protectsensitiveinformationbyusingsocialnetworkingsites'

securityandprivacySettings

27.DonotuploadworkinformationandfilestoonlinestorageSpaces,suchaswebdisksandcloudsharedfolders

28.Postpersonalinformationcarefullyonsocialnetworkingsites

29.Registeraccordingtoyourownneedsforthesite,donotblindlyfillininformation

30.SettheDNStotheIPaddressspecifiedbythecarrierortheinternalDNSservicetoavoidtheriskofhijackingcausedbyinsecureDNS

OnlineTransactionSecurity

31.Thewebsitevisitediscomparedwiththeofficialaddresstoconfirmitsaccuracy

32.Avoidusingonlinetradingsystemsfrompubliccomputers

33.DonotconductfinancialbusinessoncomputerssharedbymanypeoplesuchasInternetcafes

34.Donotentertransactionsthroughawebaddressonasearchengineoralinktoanunknownsite

35.Fullyunderstandthequalificationsofthetradingsiteandthecounterpartybeforetradingonline

36.Thewebsitequalificationcanbeverifiedbyqueryingthewebsiterecordinformationandotherways

37.YoushouldpayattentiontocheckwhetherthetransactionwebsiteusesHTTPSprotocoltoensurethatdatatransmissionwillnotbemonitoredandtamperedwith

38.Whenaccessingwebsitesrelatedtocapitaltransactions,trytousethevirtualkeyboardprovidedbytheofficialwebsitetoentertheloginandtransactionpassword

39.Fillinyourpersonaldetailstoreceivecoupons.Usecaution

40.Payattentiontotheprotectionofpersonalprivacy,theuseofpersonalbankaccountnumber,password,idnumberandothersensitiveinformationshouldbecautious

41.Beforeusingamobilepaymentservice,installaspecialsecurityplug-inonthephoneasrequired

42.Nomatterforwhatreasontoaskyoutoputmoneyintoastranger'

saccount,securityaccountisacrimeoffraud,donotbedeceived

43.Bevigilantwhenreceivingemailsrelatedtopersonalinformationandmoney(winningprizes,fundraising,etc.)

Emailsecurity

44.Donotopen,replytosuspiciousmail,junkmail,unknownsourcemail

45.Whensendingandreceivingcompanybusinessdata,youmustusethecompany'

sinternalemailaddress,andseparateofficialandprivateemailaddresses

46.Theemployeeshallberesponsibleforthesecurityofhis/heremailaccountandpasswordandshallnotlendhis/heremailaccounttoothers

47.Ifyoufindanysecurityvulnerabilitiesinthemailbox,youshouldinformthecompany'

semailsystemmanagementpersonnelintime

48.Bewareofthecontent,weblinks,pictures,etc

49.Itisrecommendedtousegovernment-builtmailboxesforworkingemails,andforeignmailboxesarestrictlyprohibited

50.Setupastrongpasswordforemail,andsetuptheaccountpasswordverificationeverytimeyoulogin

51.Enabletheantivirussoftwaretomonitoremailsinrealtimeandcheckforviruses

52.Checkwhetherthemailforwardingfunctionisdisabled

53.Donotforwardmailandattachmentsfromunknownsources

54.Whenreceivinganemailwithsensitiveinformation,confirmtheemailcontentandsenderrepeatedly,andtrytocommunicateoffline

Hostcomputersecurity

55.Theoperatingsystemmustbeupdatedwiththelatestsecuritypatches

56.Donotenablefilesharingserviceswithoutpermissionandusemoresecurefilesharingmethods

57.Upgradesecuritypatchesformiddleware,database,andplatformcomponents

58.Turnoffremoteaccesstoyourofficecomputer

59.Backupimportantdataregularly

60.Stopunnecessaryservicesinthesystem

61.Whenthecomputersystemchangestheoperator,thepasswordofthesystemshouldbechangedwhiletheimportantinformationishandedover

62.Cleanupyourtrash

63.Whenleavingtheseat,employeesshouldsetthecomputertoexitorlockthescreen.Itisrecommendedtosetautomaticlockscreen

SafetyofOfficeEnvironment

64.Donotplaceordiscardpaperdocumentscontainingsensitiveinformationatwill.Useashreddertocrushdiscardeddocuments

65.Thewasteordegaussingmediumtobetransferredtoothersshallbedegaussedbythemanagementdepartment

66.Whenleavingyourseat,lockyourvaluablesandmaterialscontainingconfidentialinformationinthelocker

67.Copiesorprint-outsshouldbepickeduppromptly

68.Discardeddiscs,USBdrives,computers,etc.,shouldbedemagnetizedordestroyedcompletely

69.Donotwriteinformationsuchasaccountnumberandpasswordonthenotes

70.WhentheUKeyisnotinuse,itshouldberemovedandproperlykept

71.Findasafeandquietplacetoanswerimportantphonecallsintheofficetoavoidinformationleakage

72.Udisk,mobileharddisk,atanytimeinasafeplace,donotborrow,place

Mobilephonesecurity

73.Settheautomaticscreenlockfunctiononthemobilephone.Itisrecommendedtosetthescreenlockfunctionfor1-5minutestoavoidmalicioususebyothersafterleavingthemobilephone

74.Upgradeyourmobilephonethroughitsownupdatefunctioninsteadofdownloadingupdatesfromwebsites

75.Ifpossible,downloadmobileappsfromyourphone'

sownappmarket

76.Installanti-virussoftwareonyourphone

77.Doregulardatasynchronizationbackupsforyourphone

78.BewaryofaccessingWebsitesfrommobilephones

79.Settinganaccesspasswordforyourmobilephoneisthefirstlineofdefensetoprotectthesecurityofyourmobilephoneandpreventtheleakageoflostinformation

80.Bluetoothshouldbeturnedoffwhenitisnotinuse

81.Beforethemobilephoneisabandoned,thedatashouldbefullybackedup,restoretheappearanceSettingstoremoveresidualinformation

82.Checkyourphone'

staskmanagerregularlyformaliciousprogramsrunninginthebackground,andregularlyscanyourphone'

ssystemwithyourphone'

ssecuritysoftware

83.Restrictionsontheprogramexecutionauthority,non-essentialprogramsprohibitreadingsensitivedatasuchasaddressbook

84.Don'

ttrytohackyourownphonetokeeptheappsecure

WirelessNetworksecurity

85.Inanofficeenvironment,donotopenWi-Fihotspotsthroughtheofficenetwork

86.DonotaccessanyopenWi-Fithatisnotyourownunit.IfyoufindanopenWi-Fiwithoutpasswordnearyourunit,youshouldnotifytheITdepartment

87.Exceptfortesting,security,andmobileterminals,otherdepartmentsneedtoreportwi-fitotheITdepartmentanddonotopenhotspotsbythemselves

88.DonotuseWi-Fisharingappstoavoidwirelessnetworkaccountandpasswordleakage

89.Wirelessnetworkequipmentuptodatewiththelatestfirmware

90.Watchoutforfreewirelesssignalsinpublicplacestosetupfishingtrapsforcriminals

91.Setahigh-strengthwirelesspassword.Youareadvisedtousethereal-nameauthenticationmechanismforeachunit

SecurityofsensitiveInformation

92.SensitiveandIntranetcomputersarenotallowedtoconnecttotheInternetorotherpublicnetworks

93.Thecomputers,faxmachines,photocopiersandotherequipmentusedforprocessingsensitiveinformationshallbemaintainedinsidetheunitsandsupervisedbyspecialpersonnelonthespot

94.Maintenancepersonnelareforbiddentoreadorcopyconfidentialinformation.Ifitisdeterminedthatconfidentialinformationneedstobesentoutformaintenance,thestoragecomponentofconfidentialinformationshallberemoved

95.Whenasensitiveinformationdeviceisconvertedtoanon-confidentialinformationdeviceforuseorelimination,thestoragecomponentsofconfidentialinformationshallberemoved

96.SensitiveandIntranetcomputersshouldnotusewirelesskeyboard,wirelessmouse,wirelessnetworkcard

97.Sensitivefilesarenotallowedtobeprocessedonunclassifiedcomputers

98.Internalandexternalnetworkdataexchangeneedstousespecia

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 教学研究 > 教学计划

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1