The alphabet of cyber security
The online version of the infographic I created under the title Alphabet of Cybersecurity.
This version adds expanded information and links to additional study material on each topic.
You can find the original infographic in print quality, for example for a bulletin board, here: Cyber Security Alphabet.png
Aa
antivirus is
need
on computer
and on mobile
scans for malicious scripts when browsing the web; scans content for malware when downloading; scans process behaviour both on disk and in RAM; monitors network traffic
Bb
be positive, there's enough hate everywhere
It is easy to abuse anyone online, use vulgarities, or slide into cyberbullying. Don't do that, let's be good together online.
Cc
value your privacy, disclose only the minimum necessary
Google, Facebook, TikTok, your ISP... they're all tracking you, monitoring your behaviour and trying to make money from it. Try to make it harder for them. A couple of articles on the subject are here: https://spajk.cz/soukromi/
Dd
Enable two-factor authentication wherever possible
The two-factor (2FA) is an additional method of verification. Combine it with a strong password. Read more here: https://spajk.cz/co-je-to-2fa
Ee
e-mail is
most important- it must have
a unique password
and a two-factor
always enable the two-factor in the email settings.
Prefer encrypted emails, use a signature and watch out for phishing!
TIP: Protonmail
Ff
don't share fake news, report it to the administrators
check sources, as there is a "share before they delete it" it's HOAX or fake news.
More here: How to spot fake news
Gg
Don't download GTA6 from save.to, cracks contain malware
Cracks and keygens for programs and games are not made for the good of humanity, but to make money. For example, by putting a coinminer (mines your cryptocurrencies) or a keylogger (sends all keystrokes to an attacker) into the crack.
Hh
don't make up passwords, use a password manager instead
Password Manager
is a special app or browser extension that remembers passwords for you. I recommend Bitwarden - is free, Czech and open-source.
Ii
only install apps from official sources
AppStore for iOS or Play Store on Android, Galaxy Store on Huawei or Fdroid - these are the only sources you should use to install apps. As soon as you are asked to install outside of them, or allow Unknown Sources, something is wrong.
Jj
walking away from the computer?
Lock it!
the WIN+L shortcut on Windows locks the comp. Apple users then use CMD+CONTROL+Q. Never walk away from an unlocked computer, installing malware or stealing passwords is a matter of seconds.
Kk
click only after you find out where the link leads
just hover your mouse over the link and it will show you where the link actually leads. Alternatively, right click, copy the link and check here: https://www.virustotal.com/gui/home/url
Ll
Verify leaked accounts at haveibeenpwned.com
link hier: haveibeenpwned.com
Plus, you can put your mail in there and if your data is leaked somewhere, you will get a notification.
Instructions here: https://www.tiktok.com/@www.spajk.cz
Mm
delete cookies and browser history
no one needs to know where you've been browsing, but just delete the cookies. Cookies remember not only what's in your shopping cart, but also that you're logged in on the device. And if you don't log out, the cookies will survive the browser closing and the comp restart.
Nn
Don't feed the trolls, you'll only
increase their
reach
🧌
arguing with trolls on the internet is a waste of time and mood. Don't get on their game, report comments over the edge or bullying, and feel free to block these existences. And you know there are Czech elves?
Oo
remove unused applications and extensions on an ongoing basis
not only will you save some space, but more importantly, you'll get rid of potential vectors of penetration - apps and extensions can contain vulnerabilities, and if you don't keep an eye on updates, this can be a problem.
Pp
The PIN is not
on the back
of the card and
on the mobile is
to have 6 digits
Similarly, do not use only 4-digit pins on your mobile or elsewhere. When guessing, it's only 10,000 combinations and on mobile it takes less than 24h to fully test even with pauses.
QR codes
can be
SCAM,
check
where they lead
be careful where the QR code directs you - they are often used for phishing or financial fraud - SCAMU. Read more about this issue here: https://spajk.cz/phishing-quishing-spam-a-scam-co-je-co-a-jak-se-v-tom-vyznat/
Rr
the router also needs to be updated regularly
this is done in its administration - it is usually at 192.168.0.1 or 192.168.1.1. If you haven't changed your password, it's written on the bottom of your router, or search the web for your router model along with the words "default password". For more information, see here: https://spajk.cz/jak-upgradovat-router-asus/
Ss
scan and verify your downloads
have HTTP/S communication checking enabled in antivirus, in Windows settings UAC enabled , do not download warez, or check for unknown files here: https://www.virustotal.com/gui/home/upload
Tt
TOR is a great anonymization tool when a VPN isn't handy
TOR is not only a protocol to get to the darknet, but it is also used to anonymize traffic. It hides your location and prevents identification from snoopers. Read more here : https://spajk.cz/vpn-tor-a-anonymizace-na-netu/
Uu
Always check the URL, it may be phishing
beware of typos in the domain, link shorteners (bit.ly) and missing padlock before the address - the data transfer is not encrypted. More about HTTPS here: https://howhttps.works/cs/
Vv
keep all your devices fully updated
from PC to mobile phone, printer, smart bulbs, vacuum cleaner, smart TV, NAS to router. Everything that connects to the internet must be updated to prevent vulnerabilities from being exploited.
Ww
Free Wi-Fi can be dangerous, use a VPN or hotspot
Each Wi-Fi can be monitored and it's a snap to intercept your traffic on it. If the communication is unencrypted, an attacker can see it for what it is. So use a VPN: https://spajk.cz/vpn-tor-a-anonymizace-na-netu/
Xx
Xtra necessary is to monitor the issue of security continuously.
so follow me on
TikTok, Twitter a
website
I also have courses here:
https://skillmea.cz
I recommend following TheHackerNews
Yy
YouTube is
a source of
information, but also
scams and fakes
So give me a subscribe, like and bell on the channel "Spike's hacking".
From
back it up!
You can lose your cloud and online accounts in seconds
Keep 3 backups - one with you, 2 on two different media and one in another location just in case. If all else fails, backups will save you.
Want to know more?
Leave us a contact…