ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

5 simple rules of computer security

Updated on April 14, 2016

Thinking about ‘computer security,’ an average user usually imagines something difficult. We often imagine computer security as something accessible only to the understanding of specialists. In fact, it's not as scary as it seems. Here are some simple rules following which you will protect yourself from the most common web security threats. And what is the best, they are available and under the force for anyone who uses a computer.

1. The password must be reliable.

A strong password is a keystone of data protection. Everybody knows that the phone number or the name of a pet is not the best option for the password. But the majority of users still persistently choose this type of passwords. And it is not surprising. The imagination should be limitless to create unique and reliable passwords for every account. But nowadays new methods are available. To create a secure password, you shouldn't invent it. Just install a software password generator on the computer. The application will do everything for you.

A great addition to the strong password is two-factor authentication (2FA). To log into the system, protected with 2FA, you need to enter a one-time password. Usually, one-time passwords are delivered via SMS messages to the user’s phone, connected to the account. But there are more modern means of one-time passwords generation - hardware and software tokens. There are hardware tokens of different form factors and software tokens in the form of iOS/Android apps. OTP tokens use advanced one-time password generation algorithms - HOTP, TOTP, and OCRA. OCRA (OATH Challenge-Response Algorithm) is the most reliable algorithm. In some 2-factor authentication solutions, it is also amplified with data signing function (CWYS).

CWYS (Confirm What You See) function allows generating OTP passwords taking into consideration not only the secret key but also some extra factors. The CWYS function is most appropriate for financial transactions to ensure their security. That is why usually the subjects of extra analysis become some characteristics of the transaction: the sum, the currency, the payee, etc. The use of CWYS function allows avoiding such threats as banking trojan viruses, data modification, Automated Transfer Systems, and Man-in-the-Middle attacks. Even having the one-time password of the user, the hacker cannot confirm his own fake transaction. The real parameters, encoded in this OTP password (the amount, the currency or the payee) will not match with the fake information.

2. Cloud services are not always secure.

There are more reliable cloud services and less reliable ones. But there is no perfectly secure cloud service. If desired, it is possible to crack the most advanced protection. Thus, the most important information, the disclosure of which is absolutely undesirable, should not be kept on the cloud disk, no matter how convenient it may seem.

3. You can trust valuable information only to websites with HTTPS protocol support.

Of course, 2FA authentication is important. But where we send our passwords and data is no less important. Don't trust any significant data to websites that do not support secure data transfer protocol HTTPS. Especially it concerns any financial transactions on the Internet. The absence of a single letter "S" in the name of the data transfer protocol means that the website doesn't care about the safety of the information entrusted to it.

4. Any software is vulnerable to attacks.

Even the most modern programs are created by people. And people make mistakes. Including mistakes in the matters of security of the products they create. There are no perfect codes that are completely inaccessible to malicious attacks. We often forget that the software updates are not a fad, but a necessity.

Software updates so often irritate us with their ‘importunity’. But they are first of all necessary for the users, not for the developers. After finding the vulnerability or error in the program, developers release an update that they offer to download. If the user cares about the security of his computer, he will not neglect the updates.

5. A new device is not as ‘clean’ as it seems.

A recently bought laptop or smartphone seems more secure than the old computer, which was used for many years. And the fact that the new gadget is already infected with viruses or contains software with the dangerous vulnerability may become a great surprise for its happy owner. Information that until recently all the laptops by Lenovo have been supplied with the advertising application that had great vulnerabilities in its code and served as a wide ‘entrance’ for viruses and hackers, became an unpleasant surprise to many people. So, it is necessary to delete all the programs that have no obvious value from the newly purchased computer.

These are the basic rules of data protection, which are accessible to everyone. Following these simple computer security rules, you will avoid greater security threats than it might seem at first sight.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)