网络安全小常识100条的英语.docx
《网络安全小常识100条的英语.docx》由会员分享,可在线阅读,更多相关《网络安全小常识100条的英语.docx(5页珍藏版)》请在冰豆网上搜索。
![网络安全小常识100条的英语.docx](https://file1.bdocx.com/fileroot1/2022-12/8/ea4a5f5f-7fed-46de-ab0b-946ed504f5ca/ea4a5f5f-7fed-46de-ab0b-946ed504f5ca1.gif)
网络安全小常识100条的英语
网络安全小常识100条的英语
Accountpasswordsecurity
1.Ifthereisaninitialpassword,itshouldbechangedassoonaspossible
2.Thepasswordcontainsatleast8characters
3.Donotusesinglecharactertypes,suchaslowercaselettersonly,ornumbersonly
4.Donotusethesameusernameandpassword
5.Commonweakpasswordsshouldbeavoidedaspasswords
6.Avoidusingthenamesofyourself,family,friends,relatives,andpetsaspasswords
7.Donotsetpersonalinformationsuchasbirthdays,weddinganniversariesandphonenumbersaspasswords
8.Avoidusingpasswordsforprofessionaltermsandprofessionalcharacteristics
9.Thepassworddictionaryshouldnotcontainwordsorinsertothercharactersintowords
10.Allsystemsusedifferentpasswordswheneverpossible
11.Preventwebpagesfromautomaticallyrememberingaccountpasswords
12.Whenregisteringanaccountonline,ensurethattheusernameandpasswordaredifferentfromtheinternalusernameandpassword
13.Whenusingpasswordmanagementsoftwaretoprotectpasswords,thepasswordmanagementsoftwareshouldbeequippedwithstrongsecuritymeasures
14.Passwordsshouldbechangedregularly
VirusRiskPrevention
15.Installvirusprotectionandkeepthevirussignaturedatabaseuptodate
16.PayattentiontothesuffixofthefilenamewhendownloadingE-mailattachments.Donotopenstrangesenderattachments
17.Verifythevalidityofthedigitalsignatureofthedownloadedfileandmanuallyscanthefile
18.Ifmobilestoragemediaisused,checkforvirusesandenablethem
19.Manuallycheckandremoveviruseswheninstallingsoftwarefromunknownsources
20.Whenbrowsingthewebpage,anyabnormalityisfoundinthecourseofusingthecomputer
InternetSecurityPrecautions
21.Useawell-knownsecurebrowser
22.Bookmarkfrequently-visitedwebsitesanddon'tclickontheurlsthatotherssendtoyou
23.Bealerttothetemptationofultra-lowprice,ultra-lowdiscountandwinningprizes
24.Avoidpornography,gambling,reactionaryandotherillegalwebsites
25.Importantfilesareencryptedwhentheyaretransmittedthroughthenetworkoremail
26.Protectsensitiveinformationbyusingsocialnetworkingsites'securityandprivacySettings
27.DonotuploadworkinformationandfilestoonlinestorageSpaces,suchaswebdisksandcloudsharedfolders
28.Postpersonalinformationcarefullyonsocialnetworkingsites
29.Registeraccordingtoyourownneedsforthesite,donotblindlyfillininformation
30.SettheDNStotheIPaddressspecifiedbythecarrierortheinternalDNSservicetoavoidtheriskofhijackingcausedbyinsecureDNS
OnlineTransactionSecurity
31.Thewebsitevisitediscomparedwiththeofficialaddresstoconfirmitsaccuracy
32.Avoidusingonlinetradingsystemsfrompubliccomputers
33.DonotconductfinancialbusinessoncomputerssharedbymanypeoplesuchasInternetcafes
34.Donotentertransactionsthroughawebaddressonasearchengineoralinktoanunknownsite
35.Fullyunderstandthequalificationsofthetradingsiteandthecounterpartybeforetradingonline
36.Thewebsitequalificationcanbeverifiedbyqueryingthewebsiterecordinformationandotherways
37.YoushouldpayattentiontocheckwhetherthetransactionwebsiteusesHTTPSprotocoltoensurethatdatatransmissionwillnotbemonitoredandtamperedwith
38.Whenaccessingwebsitesrelatedtocapitaltransactions,trytousethevirtualkeyboardprovidedbytheofficialwebsitetoentertheloginandtransactionpassword
39.Fillinyourpersonaldetailstoreceivecoupons.Usecaution
40.Payattentiontotheprotectionofpersonalprivacy,theuseofpersonalbankaccountnumber,password,idnumberandothersensitiveinformationshouldbecautious
41.Beforeusingamobilepaymentservice,installaspecialsecurityplug-inonthephoneasrequired
42.Nomatterforwhatreasontoaskyoutoputmoneyintoastranger'saccount,securityaccountisacrimeoffraud,donotbedeceived
43.Bevigilantwhenreceivingemailsrelatedtopersonalinformationandmoney(winningprizes,fundraising,etc.)
Emailsecurity
44.Donotopen,replytosuspiciousmail,junkmail,unknownsourcemail
45.Whensendingandreceivingcompanybusinessdata,youmustusethecompany'sinternalemailaddress,andseparateofficialandprivateemailaddresses
46.Theemployeeshallberesponsibleforthesecurityofhis/heremailaccountandpasswordandshallnotlendhis/heremailaccounttoothers
47.Ifyoufindanysecurityvulnerabilitiesinthemailbox,youshouldinformthecompany'semailsystemmanagementpersonnelintime
48.Bewareofthecontent,weblinks,pictures,etc
49.Itisrecommendedtousegovernment-builtmailboxesforworkingemails,andforeignmailboxesarestrictlyprohibited
50.Setupastrongpasswordforemail,andsetuptheaccountpasswordverificationeverytimeyoulogin
51.Enabletheantivirussoftwaretomonitoremailsinrealtimeandcheckforviruses
52.Checkwhetherthemailforwardingfunctionisdisabled
53.Donotforwardmailandattachmentsfromunknownsources
54.Whenreceivinganemailwithsensitiveinformation,confirmtheemailcontentandsenderrepeatedly,andtrytocommunicateoffline
Hostcomputersecurity
55.Theoperatingsystemmustbeupdatedwiththelatestsecuritypatches
56.Donotenablefilesharingserviceswithoutpermissionandusemoresecurefilesharingmethods
57.Upgradesecuritypatchesformiddleware,database,andplatformcomponents
58.Turnoffremoteaccesstoyourofficecomputer
59.Backupimportantdataregularly
60.Stopunnecessaryservicesinthesystem
61.Whenthecomputersystemchangestheoperator,thepasswordofthesystemshouldbechangedwhiletheimportantinformationishandedover
62.Cleanupyourtrash
63.Whenleavingtheseat,employeesshouldsetthecomputertoexitorlockthescreen.Itisrecommendedtosetautomaticlockscreen
SafetyofOfficeEnvironment
64.Donotplaceordiscardpaperdocumentscontainingsensitiveinformationatwill.Useashreddertocrushdiscardeddocuments
65.Thewasteordegaussingmediumtobetransferredtoothersshallbedegaussedbythemanagementdepartment
66.Whenleavingyourseat,lockyourvaluablesandmaterialscontainingconfidentialinformationinthelocker
67.Copiesorprint-outsshouldbepickeduppromptly
68.Discardeddiscs,USBdrives,computers,etc.,shouldbedemagnetizedordestroyedcompletely
69.Donotwriteinformationsuchasaccountnumberandpasswordonthenotes
70.WhentheUKeyisnotinuse,itshouldberemovedandproperlykept
71.Findasafeandquietplacetoanswerimportantphonecallsintheofficetoavoidinformationleakage
72.Udisk,mobileharddisk,atanytimeinasafeplace,donotborrow,place
Mobilephonesecurity
73.Settheautomaticscreenlockfunctiononthemobilephone.Itisrecommendedtosetthescreenlockfunctionfor1-5minutestoavoidmalicioususebyothersafterleavingthemobilephone
74.Upgradeyourmobilephonethroughitsownupdatefunctioninsteadofdownloadingupdatesfromwebsites
75.Ifpossible,downloadmobileappsfromyourphone'sownappmarket
76.Installanti-virussoftwareonyourphone
77.Doregulardatasynchronizationbackupsforyourphone
78.BewaryofaccessingWebsitesfrommobilephones
79.Settinganaccesspasswordforyourmobilephoneisthefirstlineofdefensetoprotectthesecurityofyourmobilephoneandpreventtheleakageoflostinformation
80.Bluetoothshouldbeturnedoffwhenitisnotinuse
81.Beforethemobilephoneisabandoned,thedatashouldbefullybackedup,restoretheappearanceSettingstoremoveresidualinformation
82.Checkyourphone'staskmanagerregularlyformaliciousprogramsrunninginthebackground,andregularlyscanyourphone'ssystemwithyourphone'ssecuritysoftware
83.Restrictionsontheprogramexecutionauthority,non-essentialprogramsprohibitreadingsensitivedatasuchasaddressbook
84.Don'ttrytohackyourownphonetokeeptheappsecure
WirelessNetworksecurity
85.Inanofficeenvironment,donotopenWi-Fihotspotsthroughtheofficenetwork
86.DonotaccessanyopenWi-Fithatisnotyourownunit.IfyoufindanopenWi-Fiwithoutpasswordnearyourunit,youshouldnotifytheITdepartment
87.Exceptfortesting,security,andmobileterminals,otherdepartmentsneedtoreportwi-fitotheITdepartmentanddonotopenhotspotsbythemselves
88.DonotuseWi-Fisharingappstoavoidwirelessnetworkaccountandpasswordleakage
89.Wirelessnetworkequipmentuptodatewiththelatestfirmware
90.Watchoutforfreewirelesssignalsinpublicplacestosetupfishingtrapsforcriminals
91.Setahigh-strengthwirelesspassword.Youareadvisedtousethereal-nameauthenticationmechanismforeachunit
SecurityofsensitiveInformation
92.SensitiveandIntranetcomputersarenotallowedtoconnecttotheInternetorotherpublicnetworks
93.Thecomputers,faxmachines,photocopiersandotherequipmentusedforprocessingsensitiveinformationshallbemaintainedinsidetheunitsandsupervisedbyspecialpersonnelonthespot
94.Maintenancepersonnelareforbiddentoreadorcopyconfidentialinformation.Ifitisdeterminedthatconfidentialinformationneedstobesentoutformaintenance,thestoragecomponentofconfidentialinformationshallberemoved
95.Whenasensitiveinformationdeviceisconvertedtoanon-confidentialinformationdeviceforuseorelimination,thestoragecomponentsofconfidentialinformationshallberemoved
96.SensitiveandIntranetcomputersshouldnotusewirelesskeyboard,wirelessmouse,wirelessnetworkcard
97.Sensitivefilesarenotallowedtobeprocessedonunclassifiedcomputers
98.Internalandexternalnetworkdataexchangeneedstousespecia