In his TED talk, military
analyst P.W. Singer addresses cyber security and cyber war.
According to Mark
Burnett, a security consultant, the main problem of cyber security, or security
in general, are not the government or the industry, but the many individuals
making use of technical devices connected to the internet. The government provides
standards and enforces regulations and the industry adapts their products to
these standards and regulations. The functionality of security systems depends,
however, on how the consumers use these products. Apparently most of them do
not care about their own security. At least this is what a study named “Perfect
Passwords” suggested, which shows that the most common password was “password”.
It is therefore of great
importance that the average user changes his attitude towards security. Though
the internet might not be completely bad, there is a lot of criminality
happening in this virtual world. This leads us to the realization that what we
need is proper cyber education. We need to know how to properly use electronic
devices without downloading viruses every few minutes.
Here is some of the
advice given to internet users (by P.W Singer)
1. Access and Passwords
A good password should be regularly updated, long and consist of a mix of numbers, signs and letters. Using very easy passwords is as useful as not using any password at all, as several free software tools (Cain and Abel, John the Ripper) provide automated password-cracking. Also, the same password should not be used on various websites.
What is most important of all, however, is the fact that your e-mail password should be particularly strong, as you will receive e-mails when you reset all other passwords.
A good password should be regularly updated, long and consist of a mix of numbers, signs and letters. Using very easy passwords is as useful as not using any password at all, as several free software tools (Cain and Abel, John the Ripper) provide automated password-cracking. Also, the same password should not be used on various websites.
What is most important of all, however, is the fact that your e-mail password should be particularly strong, as you will receive e-mails when you reset all other passwords.
Of course passwords can
only protect information up to a certain point, and there is still a high
chance of them being cracked at some point, if somebody really attempts to
crack them. Certain institutions, such as banks for example, therefore use
multi-factor authentication. In multi-factor authentication more than one object
or piece of knowledge is required. To access your bank account, for instance,
you need to use your card AND type in your password. This of course, is not a
100% secure system…but it is more secure than only using a single password.
2. Systems and Equipment
Many security breaches in equipment are widely known and therefore patches for them are often available online, sometimes even free. By regularly updating browsers and in installing security updates countless cyberthreats can be avoided. Another task that could help protect users from cyberattacks is to secure wireless networks, as those are one of the main targets of cyberattacks. Given all these threats and the limited amount of methods to secure data, all data should be saved on an external hard drive.
Many security breaches in equipment are widely known and therefore patches for them are often available online, sometimes even free. By regularly updating browsers and in installing security updates countless cyberthreats can be avoided. Another task that could help protect users from cyberattacks is to secure wireless networks, as those are one of the main targets of cyberattacks. Given all these threats and the limited amount of methods to secure data, all data should be saved on an external hard drive.
3. Behaviour
Most threats to our computer systems enter through carelessness of its users. To avoid vulnerabilities of our systems, it is important to never open or download data from sources we don’t know or can’t verify. Of course it is also recommended to use the highest privacy and security settings available.
Most threats to our computer systems enter through carelessness of its users. To avoid vulnerabilities of our systems, it is important to never open or download data from sources we don’t know or can’t verify. Of course it is also recommended to use the highest privacy and security settings available.
How you should behave on
the internet?
According to P.W Singer it’s best to not be afraid, but to be wary
Keine Kommentare:
Kommentar veröffentlichen