14 234
editací
(založena nová stránka s textem „== Safe password == Safe password should have a minimum lenght of eight characters, which should include at least three of following elements: at least one upper case letter, at least one lower case letter, at least one number and a special sign. Every user should change their password after 100 days to ensure safety of their account. Furthermore, network administrators of UP do not send any notification e-mails regarding password expiration. Report a…“) značky: editace z mobilu editace z mobilního webu |
(založena nová stránka s textem „7. Do not use the same password for multiple systems.“) |
||
| (Nejsou zobrazeny 2 mezilehlé verze od stejného uživatele.) | |||
| Řádek 54: | Řádek 54: | ||
Phishing emails are usually sent from an address that does not match the sender's name. The email message usually has poor grammar, contains many typos, errors in word inflection, and punctuation is often incorrect. The links contained in the email have a suspicious domain (the domain is what is behind the @ sign - e.g. @upol.cz is the UP domain). The message encourages you to enter sensitive data, trying to scare the recipient into an immediate reaction. | Phishing emails are usually sent from an address that does not match the sender's name. The email message usually has poor grammar, contains many typos, errors in word inflection, and punctuation is often incorrect. The links contained in the email have a suspicious domain (the domain is what is behind the @ sign - e.g. @upol.cz is the UP domain). The message encourages you to enter sensitive data, trying to scare the recipient into an immediate reaction. | ||
===== Spearphishing ===== | ===== Spearphishing ===== | ||
This is a type of phishing attack where the attacker obtains all available information to best target his attack. The message is written in this way, i.e. tailored to the recipient, as this attack targets an individual, which means that the attacker focuses on a specific person and really gets to know them. '''Phishing attacks also occur on social networks or during a phone call!''' | |||
===Pharming=== | ===Pharming=== | ||
This technique is similar to phishing. Offenders receive sensitive data from victims by attacking DNS servers and rewriting IP addresses, redirecting the victim to a fraud online banking systems which are not recognizable from the original. If the website does not behave as usual and will require information it does not require usually, check the address line and if necessary, track your bank security certificates. | |||
=== Ransomware === | === Ransomware === | ||
Ransomware | Ransomware is malicious code that locks access to a device or encrypts its contents. The attackers then demand a ransom, saying that after paying it, the data will be unlocked. However, unlocking the data is not guaranteed. The code can get into the device, for example by opening an unknown attachment in an email, but infection can also occur through another infected machine on the network. The device reports the need for repair and disk check, as soon as you confirm it, the data is encrypted and a ransom demand pops up. | ||
You can protect yourself from this type of attack by regularly backing up your data. Ideally, back up to an external drive and to the cloud. Regularly update your operating system, applications and, most importantly, your antivirus program. Limit or disable the use of remote desktop, today attacks on devices are often conducted through the use of remote desktop, when the attacker takes control of your device right before your eyes. | |||
=== Malware === | === Malware === | ||
The word malware is a combination of the English words malicious and software, i.e. malicious software. It is malicious software that is intended to provide an attacker with access to your device. The attacker wants to use it to obtain user data, damage or control the device. It is a computer program or any piece of program code created for the purpose of attacking - breaking into a system (infecting it) in order to damage it, control it, steal data, monitor the user, etc. | |||
=== Keylogger === | === Keylogger === | ||
This is an attack using a program that records all the characters that the user types on the keyboard. It records passwords, credit card numbers, addresses, etc. | |||
== General rules for preventing cyber attacks == | |||
1. Use a secure Windows system (Mac, Linux). | |||
1. | |||
2. Regularly install updates, including antivirus. | |||
2. | |||
3. Do not ignore computer warning messages. | |||
3. | |||
4. Only install safe programs from known sources. | |||
4. | |||
5. Back up – or use cloud storage or network drives. | |||
5. | |||
6. Protect your password, change it occasionally. | |||
6. | |||
7. Do not use the same password for multiple systems. | |||
7. | |||
8. Never respond to email requests for your password. | |||
8. | |||
9. Lock your computer screen. Automatically. | |||
9. | |||
10. Keep an encrypted disk on your laptop, use a phone lock. | |||
10. | |||
And one more thing: If you are unsure about something, contact your network administrator. | |||