User Tools

Site Tools


cybersecuritybasics

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
cybersecuritybasics [2022/10/28 18:35] – [Separate Networks] jgmac1106cybersecuritybasics [2022/10/28 19:34] (current) – getting rid of meta writing statements jgmac1106
Line 1: Line 1:
-As an Internet activist, a member of a marginalized group, or just a concerned security citizen you may want to take steps to protect yourself online. You can take a few steps to go a long way. Below you will find my best tips in descending order of both capability and complexity. Meaning everyone should "Be Smart" but not everyone needs to use "network segmentation."+As an Internet activist, a member of a marginalized group, or just a concerned security citizen you may want to take steps to protect yourself online. You can take a few steps to go a long way.Based on threats to your self and data think about security as  descending order of both capability and complexity. Meaning everyone should "Be Smart" but not everyone needs to use "network segmentation."
  
 Please share tips you find useful for the average internet activist who may not have networking and IT skills. Please share tips you find useful for the average internet activist who may not have networking and IT skills.
Line 11: Line 11:
 ===== Turn on 2FA/MFA ===== ===== Turn on 2FA/MFA =====
  
-Authentication means proving who you are when you try to gain access to a newtwork. Usually you get authorized by authenticating a username and a password match. You need better security. Enable multi-factor authentication on all your online services.+Authentication means proving who you are when you try to gain access to a network or system. Usually you get authorized by authenticating a username and a password match. You need better security. Enable multi-factor authentication on all your online services.
  
 With Multi-factor-authentication, MFA, you can verify something you know, something you are, and something you own. Many services allow SMS, test messages, as an additional factor. For most use cases this method is acceptable but it is not the most secure. With Multi-factor-authentication, MFA, you can verify something you know, something you are, and something you own. Many services allow SMS, test messages, as an additional factor. For most use cases this method is acceptable but it is not the most secure.
Line 27: Line 27:
 Rarely, better yet, never click on any link sent over SMS or private message. If you do make sure you know the sender. Look at the URL, if not shortened. Make sure it seems legitimate. Remember the accounts of people you trust can get compromised. Rarely, better yet, never click on any link sent over SMS or private message. If you do make sure you know the sender. Look at the URL, if not shortened. Make sure it seems legitimate. Remember the accounts of people you trust can get compromised.
    
-If you work with really sensitive data, or your identity puts you at risk, you should never open links through SMS and make sure any external connection gets scanned for malicious code. You should not use browser based email and only use a client with trusted AV capabilities.+If you work with really sensitive data, or your identity puts you at risk, you should never open links through SMS and make sure any external connection gets scanned for malicious code. You should not use browser based email and only use a client with trusted Anti-virus capabilities.
  
 ===== Passwords ===== ===== Passwords =====
Line 42: Line 42:
    
   * Maybe password books make sense. I know this sounds like blasphemy to security experts but to a family of five where people may have dozens of passwords each writing them down seems understandable. Granted please use a password manager but password books aren't evil for personal use cases. If a family keeps one in a fireproof safe it will help after catastrophe. I know it creates risk but if you have physical access to a families password book, in their safe,  they have bigger problems than getting hacked.   * Maybe password books make sense. I know this sounds like blasphemy to security experts but to a family of five where people may have dozens of passwords each writing them down seems understandable. Granted please use a password manager but password books aren't evil for personal use cases. If a family keeps one in a fireproof safe it will help after catastrophe. I know it creates risk but if you have physical access to a families password book, in their safe,  they have bigger problems than getting hacked.
 +
 +  * Use incorrect answers for security questions. Many systems ask questions for password recovery. Your first pet or Mother's family name may be found online through social engineering. Use falso or masked information when filling out these help features.
  
 ===== Separation of Duties ===== ===== Separation of Duties =====
Line 47: Line 49:
 Think of your devices as having two different users. One would have admin rights and the other has user rights. Set up all your laptops and devices with two users. Give one of them full rights to install software, run updates automatically, and modify the system. Think of your devices as having two different users. One would have admin rights and the other has user rights. Set up all your laptops and devices with two users. Give one of them full rights to install software, run updates automatically, and modify the system.
  
-Then make yourself a second user. This user will connect to external systems like we apps and social media. This user should not have rights to modify the system. If you come across a program you need to install you would log out and log in with the admin account. Then grant the user account access to to the application.+Then make yourself a second user. This user will connect to external systems like web apps and social media. This user should not have rights to modify the system. If you come across a program you need to install you would log out and log in with the admin account. Then grant the user account access to to the application.
  
 ===== Backups ===== ===== Backups =====
Line 69: Line 71:
 ===== Wires Rock ===== ===== Wires Rock =====
  
-Every wireless access point and  every Bluetooth connection creates an attack vector for adversaries. Getting into offline hard wired systems will often take physical access. Try to use wires whenever possible. Plus your bitrate to your wireless speaker makes the music awful. Not having your XBOX wwired why you get bodies by little kids and lag, and think about how many Lithium batteries we could eliminate with wired mice.+Every wireless access point and  every Bluetooth connection creates an attack vector for adversaries. Getting into offline hard wired systems will often take physical access. Try to use wires whenever possible. Plus your bitrate to your wireless speaker makes the music awful. You really should use wired cans instead of wireless earbuds(and a lossless format) unless you hate music. Not having your XBOX wired is why you get bodied by little kids and lag, and think about how many Lithium batteries we could eliminate with wired mice.
  
 ===== Separate Networks ===== ===== Separate Networks =====
cybersecuritybasics.1666982127.txt.gz · Last modified: 2022/10/28 18:35 by jgmac1106