Page 59 - PlusGPT_V2.1_C8_Flipbook
P. 59

·   Avoid using something about yourself that is publicly known to others.
                 ·   Avoid keeping names of loved ones, relatives, friends etc. as passwords.
                 Examples of strong password: aniKR@87@18, Esd{@37

                 Having a strong password is important to safeguard oneself from the following negative impacts:
                 ·   Downloading and stealing of personal files and documents by others
                 ·   Transmitting of messages without our knowledge from our e-mail or social media account to
                     others
                 ·   Modification of personal details by someone with an intention to slander our image

                 ·   Purchase of things in our name
                 ·   Transfer or appropriation of fund from our bank account without our knowledge

                 We should keep changing passwords frequently. Using long passwords can lower the risk of a security
                 breach. Most websites rate the effectiveness of password with a password meter that displays the
                 strength of a password.


                      Use Two-Factor or Multi-Factor Authentication

                 Two-factor or multi-factor authentication is a service that inserts additional layers of security such as
                 OTP, fingerprint, etc. other than the standard username & password method of online identification.





                            Let’s BaCk-uP


                    ·   Cyber threat is a possibility of a malicious attempt or an offensive action to steal, damage
                       or disrupt a computer information systems, infrastructures, computer networks or personal
                       computer devices, using various computer programs.
                    ·   ‘Identity Protection’ refers to safety practices to prevent the theft of personal information
                       such as social media profiles, bank details, address, credit card, passports, driving licenses,
                       etc. by other person.
                    ·    Spam refers to an unwanted and unsolicited message which is received in the inbox of a
                       person’s e-mail account or in newsgroups.
                    ·    Spoofing is the act of disguising communication from an unknown source as being from a
                       known and trusted source.
                    ·    Phishing attacks are the social-engineering practice of sending fraudulent communications
                       that appear to come from an authentic source.
                    ·    A password can be termed as a key of codes that protects our valuable contents, documents
                       or files.













                                                                                                   Cyber Security  57
   54   55   56   57   58   59   60   61   62   63   64