Page 59 - PlusGPT_V2.1_C8_Flipbook
P. 59
· Avoid using something about yourself that is publicly known to others.
· Avoid keeping names of loved ones, relatives, friends etc. as passwords.
Examples of strong password: aniKR@87@18, Esd{@37
Having a strong password is important to safeguard oneself from the following negative impacts:
· Downloading and stealing of personal files and documents by others
· Transmitting of messages without our knowledge from our e-mail or social media account to
others
· Modification of personal details by someone with an intention to slander our image
· Purchase of things in our name
· Transfer or appropriation of fund from our bank account without our knowledge
We should keep changing passwords frequently. Using long passwords can lower the risk of a security
breach. Most websites rate the effectiveness of password with a password meter that displays the
strength of a password.
Use Two-Factor or Multi-Factor Authentication
Two-factor or multi-factor authentication is a service that inserts additional layers of security such as
OTP, fingerprint, etc. other than the standard username & password method of online identification.
Let’s BaCk-uP
· Cyber threat is a possibility of a malicious attempt or an offensive action to steal, damage
or disrupt a computer information systems, infrastructures, computer networks or personal
computer devices, using various computer programs.
· ‘Identity Protection’ refers to safety practices to prevent the theft of personal information
such as social media profiles, bank details, address, credit card, passports, driving licenses,
etc. by other person.
· Spam refers to an unwanted and unsolicited message which is received in the inbox of a
person’s e-mail account or in newsgroups.
· Spoofing is the act of disguising communication from an unknown source as being from a
known and trusted source.
· Phishing attacks are the social-engineering practice of sending fraudulent communications
that appear to come from an authentic source.
· A password can be termed as a key of codes that protects our valuable contents, documents
or files.
Cyber Security 57

