网络安全小常识100条的英语.docx
- 文档编号:4747305
- 上传时间:2022-12-08
- 格式:DOCX
- 页数:5
- 大小:17.97KB
网络安全小常识100条的英语.docx
《网络安全小常识100条的英语.docx》由会员分享,可在线阅读,更多相关《网络安全小常识100条的英语.docx(5页珍藏版)》请在冰豆网上搜索。
网络安全小常识100条的英语
网络安全小常识100条的英语
Accountpasswordsecurity
1.Ifthereisaninitialpassword,itshouldbechangedassoonaspossible
2.Thepasswordcontainsatleast8characters
3.Donotusesinglecharactertypes,suchaslowercaselettersonly,ornumbersonly
4.Donotusethesameusernameandpassword
5.Commonweakpasswordsshouldbeavoidedaspasswords
6.Avoidusingthenamesofyourself,family,friends,relatives,andpetsaspasswords
7.Donotsetpersonalinformationsuchasbirthdays,weddinganniversariesandphonenumbersaspasswords
8.Avoidusingpasswordsforprofessionaltermsandprofessionalcharacteristics
9.Thepassworddictionaryshouldnotcontainwordsorinsertothercharactersintowords
10.Allsystemsusedifferentpasswordswheneverpossible
11.Preventwebpagesfromautomaticallyrememberingaccountpasswords
12.Whenregisteringanaccountonline,ensurethattheusernameandpasswordaredifferentfromtheinternalusernameandpassword
13.Whenusingpasswordmanagementsoftwaretoprotectpasswords,thepasswordmanagementsoftwareshouldbeequippedwithstrongsecuritymeasures
14.Passwordsshouldbechangedregularly
VirusRiskPrevention
15.Installvirusprotectionandkeepthevirussignaturedatabaseuptodate
16.PayattentiontothesuffixofthefilenamewhendownloadingE-mailattachments.Donotopenstrangesenderattachments
17.Verifythevalidityofthedigitalsignatureofthedownloadedfileandmanuallyscanthefile
18.Ifmobilestoragemediaisused,checkforvirusesandenablethem
19.Manuallycheckandremoveviruseswheninstallingsoftwarefromunknownsources
20.Whenbrowsingthewebpage,anyabnormalityisfoundinthecourseofusingthecomputer
InternetSecurityPrecautions
21.Useawell-knownsecurebrowser
22.Bookmarkfrequently-visitedwebsitesanddon'tclickontheurlsthatotherssendtoyou
23.Bealerttothetemptationofultra-lowprice,ultra-lowdiscountandwinningprizes
24.Avoidpornography,gambling,reactionaryandotherillegalwebsites
25.Importantfilesareencryptedwhentheyaretransmittedthroughthenetworkoremail
26.Protectsensitiveinformationbyusingsocialnetworkingsites'securityandprivacySettings
27.DonotuploadworkinformationandfilestoonlinestorageSpaces,suchaswebdisksandcloudsharedfolders
28.Postpersonalinformationcarefullyonsocialnetworkingsites
29.Registeraccordingtoyourownneedsforthesite,donotblindlyfillininformation
30.SettheDNStotheIPaddressspecifiedbythecarrierortheinternalDNSservicetoavoidtheriskofhijackingcausedbyinsecureDNS
OnlineTransactionSecurity
31.Thewebsitevisitediscomparedwiththeofficialaddresstoconfirmitsaccuracy
32.Avoidusingonlinetradingsystemsfrompubliccomputers
33.DonotconductfinancialbusinessoncomputerssharedbymanypeoplesuchasInternetcafes
34.Donotentertransactionsthroughawebaddressonasearchengineoralinktoanunknownsite
35.Fullyunderstandthequalificationsofthetradingsiteandthecounterpartybeforetradingonline
36.Thewebsitequalificationcanbeverifiedbyqueryingthewebsiterecordinformationandotherways
37.YoushouldpayattentiontocheckwhetherthetransactionwebsiteusesHTTPSprotocoltoensurethatdatatransmissionwillnotbemonitoredandtamperedwith
38.Whenaccessingwebsitesrelatedtocapitaltransactions,trytousethevirtualkeyboardprovidedbytheofficialwebsitetoentertheloginandtransactionpassword
39.Fillinyourpersonaldetailstoreceivecoupons.Usecaution
40.Payattentiontotheprotectionofpersonalprivacy,theuseofpersonalbankaccountnumber,password,idnumberandothersensitiveinformationshouldbecautious
41.Beforeusingamobilepaymentservice,installaspecialsecurityplug-inonthephoneasrequired
42.Nomatterforwhatreasontoaskyoutoputmoneyintoastranger'saccount,securityaccountisacrimeoffraud,donotbedeceived
43.Bevigilantwhenreceivingemailsrelatedtopersonalinformationandmoney(winningprizes,fundraising,etc.)
Emailsecurity
44.Donotopen,replytosuspiciousmail,junkmail,unknownsourcemail
45.Whensendingandreceivingcompanybusinessdata,youmustusethecompany'sinternalemailaddress,andseparateofficialandprivateemailaddresses
46.Theemployeeshallberesponsibleforthesecurityofhis/heremailaccountandpasswordandshallnotlendhis/heremailaccounttoothers
47.Ifyoufindanysecurityvulnerabilitiesinthemailbox,youshouldinformthecompany'semailsystemmanagementpersonnelintime
48.Bewareofthecontent,weblinks,pictures,etc
49.Itisrecommendedtousegovernment-builtmailboxesforworkingemails,andforeignmailboxesarestrictlyprohibited
50.Setupastrongpasswordforemail,andsetuptheaccountpasswordverificationeverytimeyoulogin
51.Enabletheantivirussoftwaretomonitoremailsinrealtimeandcheckforviruses
52.Checkwhetherthemailforwardingfunctionisdisabled
53.Donotforwardmailandattachmentsfromunknownsources
54.Whenreceivinganemailwithsensitiveinformation,confirmtheemailcontentandsenderrepeatedly,andtrytocommunicateoffline
Hostcomputersecurity
55.Theoperatingsystemmustbeupdatedwiththelatestsecuritypatches
56.Donotenablefilesharingserviceswithoutpermissionandusemoresecurefilesharingmethods
57.Upgradesecuritypatchesformiddleware,database,andplatformcomponents
58.Turnoffremoteaccesstoyourofficecomputer
59.Backupimportantdataregularly
60.Stopunnecessaryservicesinthesystem
61.Whenthecomputersystemchangestheoperator,thepasswordofthesystemshouldbechangedwhiletheimportantinformationishandedover
62.Cleanupyourtrash
63.Whenleavingtheseat,employeesshouldsetthecomputertoexitorlockthescreen.Itisrecommendedtosetautomaticlockscreen
SafetyofOfficeEnvironment
64.Donotplaceordiscardpaperdocumentscontainingsensitiveinformationatwill.Useashreddertocrushdiscardeddocuments
65.Thewasteordegaussingmediumtobetransferredtoothersshallbedegaussedbythemanagementdepartment
66.Whenleavingyourseat,lockyourvaluablesandmaterialscontainingconfidentialinformationinthelocker
67.Copiesorprint-outsshouldbepickeduppromptly
68.Discardeddiscs,USBdrives,computers,etc.,shouldbedemagnetizedordestroyedcompletely
69.Donotwriteinformationsuchasaccountnumberandpasswordonthenotes
70.WhentheUKeyisnotinuse,itshouldberemovedandproperlykept
71.Findasafeandquietplacetoanswerimportantphonecallsintheofficetoavoidinformationleakage
72.Udisk,mobileharddisk,atanytimeinasafeplace,donotborrow,place
Mobilephonesecurity
73.Settheautomaticscreenlockfunctiononthemobilephone.Itisrecommendedtosetthescreenlockfunctionfor1-5minutestoavoidmalicioususebyothersafterleavingthemobilephone
74.Upgradeyourmobilephonethroughitsownupdatefunctioninsteadofdownloadingupdatesfromwebsites
75.Ifpossible,downloadmobileappsfromyourphone'sownappmarket
76.Installanti-virussoftwareonyourphone
77.Doregulardatasynchronizationbackupsforyourphone
78.BewaryofaccessingWebsitesfrommobilephones
79.Settinganaccesspasswordforyourmobilephoneisthefirstlineofdefensetoprotectthesecurityofyourmobilephoneandpreventtheleakageoflostinformation
80.Bluetoothshouldbeturnedoffwhenitisnotinuse
81.Beforethemobilephoneisabandoned,thedatashouldbefullybackedup,restoretheappearanceSettingstoremoveresidualinformation
82.Checkyourphone'staskmanagerregularlyformaliciousprogramsrunninginthebackground,andregularlyscanyourphone'ssystemwithyourphone'ssecuritysoftware
83.Restrictionsontheprogramexecutionauthority,non-essentialprogramsprohibitreadingsensitivedatasuchasaddressbook
84.Don'ttrytohackyourownphonetokeeptheappsecure
WirelessNetworksecurity
85.Inanofficeenvironment,donotopenWi-Fihotspotsthroughtheofficenetwork
86.DonotaccessanyopenWi-Fithatisnotyourownunit.IfyoufindanopenWi-Fiwithoutpasswordnearyourunit,youshouldnotifytheITdepartment
87.Exceptfortesting,security,andmobileterminals,otherdepartmentsneedtoreportwi-fitotheITdepartmentanddonotopenhotspotsbythemselves
88.DonotuseWi-Fisharingappstoavoidwirelessnetworkaccountandpasswordleakage
89.Wirelessnetworkequipmentuptodatewiththelatestfirmware
90.Watchoutforfreewirelesssignalsinpublicplacestosetupfishingtrapsforcriminals
91.Setahigh-strengthwirelesspassword.Youareadvisedtousethereal-nameauthenticationmechanismforeachunit
SecurityofsensitiveInformation
92.SensitiveandIntranetcomputersarenotallowedtoconnecttotheInternetorotherpublicnetworks
93.Thecomputers,faxmachines,photocopiersandotherequipmentusedforprocessingsensitiveinformationshallbemaintainedinsidetheunitsandsupervisedbyspecialpersonnelonthespot
94.Maintenancepersonnelareforbiddentoreadorcopyconfidentialinformation.Ifitisdeterminedthatconfidentialinformationneedstobesentoutformaintenance,thestoragecomponentofconfidentialinformationshallberemoved
95.Whenasensitiveinformationdeviceisconvertedtoanon-confidentialinformationdeviceforuseorelimination,thestoragecomponentsofconfidentialinformationshallberemoved
96.SensitiveandIntranetcomputersshouldnotusewirelesskeyboard,wirelessmouse,wirelessnetworkcard
97.Sensitivefilesarenotallowedtobeprocessedonunclassifiedcomputers
98.Internalandexternalnetworkdataexchangeneedstousespecia
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 网络安全 常识 100 英语
![提示](https://static.bdocx.com/images/bang_tan.gif)