Page 29 - 2619_PlusGPT V2.1_C-8
P. 29

In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part
                 of operating system, thus keeping a computer secure but in some cases, a user needs to configure
                 firewall in the network for additional security.


                      Never Install Software From Unknown Sources

                 Before  downloading  and installing  a software, verify the source  of supplier  to  find, whether it  is
                 legitimate or not by searching the Internet or referring to review of the other users. A user should
                 understand the nature, the purpose and given terms of the software before attempting to download
                 and install it.


                      Data Stored in Web Browsers

                 Web  browsers  have built-in  password management  system  that  helps to store  passwords while
                 browsing or opening an e-mail. It often prompt to save user names and passwords when users attempt
                 to login. This facility is offered to the users, so that they can login to their frequently used websites or
                 e-mail accounts without having to type the usernames or passwords time and again. However, it is
                 not advisable to store such data on public or on shared computers, else any other user can open the
                 website or e-mail.


                      Password

                 A password can be termed as a key of codes that protects our valuable contents, documents or
                 files. It helps us to keep many of our belongings or documents secure or secret. We can safeguard
                 our belongings by restricting their access to others through locks that can be opened only through
                 password. For example, if we are traveling with luggage in a public transport like a bus, train or
                 aeroplane, we can ensure that our luggage is not opened by any other person by securing the luggage

                 with the lock that can open only with a secret code or password.
                 We keep our important documents in a safe cupboard and lock it up with a key so that they do not get
                 accessed by people whom we do not trust. Similarly, in a computer we set a password as key so that
                 our documents or files that are stored remain safe or secret.

                 Passwords authenticate  or  enable  a person to  access  or operate  a computer,  network resource,
                 Internet, e-mail, bank account, etc. Whether it is banking, online shopping, checking of e-mails or use
                 of social media, people have to make use of passwords.
                 Ideally, a password is a combination of alphabets, numbers and special characters that are not easily
                 guessable by others.

                 Tips for keeping non-guessable passwords:
                 ·  Keep the length of the password of at least 8 characters, including a combination of numbers and
                 symbols.
                 ·  Avoid keeping passwords based on repetition, letters or number sequences.

                 ·  Use a combination of uppercase and lowercase.
                 ·  Avoid using the same password for multiple purposes.



                                                                                                   Cyber Security  27
   24   25   26   27   28   29   30   31   32   33   34