The alphabet of cyber security

The online version of the infographic I created under the title Alphabet of Cybersecurity.
This version adds expanded information and links to additional study material on each topic.

You can find the original infographic in print quality, for example for a bulletin board, here: Cyber Security Alphabet.png

Aa

antivirus is
need
on computer
and on mobile

scans for malicious scripts when browsing the web; scans content for malware when downloading; scans process behaviour both on disk and in RAM; monitors network traffic

Bb

be positive, there's enough hate everywhere

It is easy to abuse anyone online, use vulgarities, or slide into cyberbullying. Don't do that, let's be good together online.

Cc

value your privacy, disclose only the minimum necessary

Google, Facebook, TikTok, your ISP... they're all tracking you, monitoring your behaviour and trying to make money from it. Try to make it harder for them. A couple of articles on the subject are here: https://spajk.cz/soukromi/

Dd

Enable two-factor authentication wherever possible

The two-factor (2FA) is an additional method of verification. Combine it with a strong password. Read more here: https://spajk.cz/co-je-to-2fa

Ee

e-mail is
most important- it must have
a unique password
and a two-factor

always enable the two-factor in the email settings. Prefer encrypted emails, use a signature and watch out for phishing!
TIP: Protonmail

Ff

don't share fake news, report it to the administrators

check sources, as there is a "share before they delete it" it's HOAX or fake news.
More here: How to spot fake news

Gg

Don't download GTA6 from save.to, cracks contain malware

Cracks and keygens for programs and games are not made for the good of humanity, but to make money. For example, by putting a coinminer (mines your cryptocurrencies) or a keylogger (sends all keystrokes to an attacker) into the crack.

Hh

don't make up passwords, use a password manager instead

Password Manager

is a special app or browser extension that remembers passwords for you. I recommend Bitwarden - is free, Czech and open-source.

Ii

only install apps from official sources

AppStore for iOS or Play Store on Android, Galaxy Store on Huawei or Fdroid - these are the only sources you should use to install apps. As soon as you are asked to install outside of them, or allow Unknown Sources, something is wrong.

Jj

walking away from the computer?
Lock it!

the WIN+L shortcut on Windows locks the comp. Apple users then use CMD+CONTROL+Q. Never walk away from an unlocked computer, installing malware or stealing passwords is a matter of seconds.

Kk

click only after you find out where the link leads

just hover your mouse over the link and it will show you where the link actually leads. Alternatively, right click, copy the link and check here: https://www.virustotal.com/gui/home/url

Ll

Verify leaked accounts at haveibeenpwned.com

link hier: haveibeenpwned.com
Plus, you can put your mail in there and if your data is leaked somewhere, you will get a notification. Instructions here: https://www.tiktok.com/@www.spajk.cz

Mm

delete cookies and browser history

no one needs to know where you've been browsing, but just delete the cookies. Cookies remember not only what's in your shopping cart, but also that you're logged in on the device. And if you don't log out, the cookies will survive the browser closing and the comp restart.

Nn

Don't feed the trolls, you'll only
increase their
reach

🧌

arguing with trolls on the internet is a waste of time and mood. Don't get on their game, report comments over the edge or bullying, and feel free to block these existences. And you know there are Czech elves?

Oo

remove unused applications and extensions on an ongoing basis

not only will you save some space, but more importantly, you'll get rid of potential vectors of penetration - apps and extensions can contain vulnerabilities, and if you don't keep an eye on updates, this can be a problem.

Pp

The PIN is not
on the back
of the card and
on the mobile is
to have 6 digits

Similarly, do not use only 4-digit pins on your mobile or elsewhere. When guessing, it's only 10,000 combinations and on mobile it takes less than 24h to fully test even with pauses.

Qq

QR codes
can be
SCAM,
check
where they lead

be careful where the QR code directs you - they are often used for phishing or financial fraud - SCAMU. Read more about this issue here: https://spajk.cz/phishing-quishing-spam-a-scam-co-je-co-a-jak-se-v-tom-vyznat/

Rr

the router also needs to be updated regularly

this is done in its administration - it is usually at 192.168.0.1 or 192.168.1.1. If you haven't changed your password, it's written on the bottom of your router, or search the web for your router model along with the words "default password". For more information, see here: https://spajk.cz/jak-upgradovat-router-asus/

Ss

scan and verify your downloads

have HTTP/S communication checking enabled in antivirus, in Windows settings UAC enabled , do not download warez, or check for unknown files here: https://www.virustotal.com/gui/home/upload

Tt

TOR is a great anonymization tool when a VPN isn't handy

TOR is not only a protocol to get to the darknet, but it is also used to anonymize traffic. It hides your location and prevents identification from snoopers. Read more here : https://spajk.cz/vpn-tor-a-anonymizace-na-netu/

Uu

Always check the URL, it may be phishing

beware of typos in the domain, link shorteners (bit.ly) and missing padlock before the address - the data transfer is not encrypted. More about HTTPS here: https://howhttps.works/cs/

Vv

keep all your devices fully updated

from PC to mobile phone, printer, smart bulbs, vacuum cleaner, smart TV, NAS to router. Everything that connects to the internet must be updated to prevent vulnerabilities from being exploited.

Ww

Free Wi-Fi can be dangerous, use a VPN or hotspot

Each Wi-Fi can be monitored and it's a snap to intercept your traffic on it. If the communication is unencrypted, an attacker can see it for what it is. So use a VPN: https://spajk.cz/vpn-tor-a-anonymizace-na-netu/

Xx

Xtra necessary is to monitor the issue of security continuously.

so follow me on TikTok, Twitterwebsite
I also have courses here: https://skillmea.cz
I recommend following TheHackerNews

Yy

YouTube is
a source of
information, but also
scams and fakes

So give me a subscribe, like and bell on the channel "Spike's hacking".

From

back it up!
You can lose your cloud and online accounts in seconds

Keep 3 backups - one with you, 2 on two different media and one in another location just in case. If all else fails, backups will save you.

Want to know more?
Leave us a contact…

    By submitting the form, you acknowledge the personal data processing policy.

     

    Are you interested in the topic of cyber security and want to train students or employees from an ethical hacker?

      By submitting the form, you acknowledge the personal data processing policy.