Digital self-defense

Digital self-defense

Digital self-defense is the use of self-defense strategies by Internet users to ensure digital security; that is to say, the protection of confidential personal electronic information.[1] Internet security software provides initial protection by setting up a firewall, as well as scanning computers for malware, viruses, Trojan horses, worms and spyware. However information at most risk includes personal details such as birthdates, phone numbers, bank account and schooling details, sexuality, religious affiliations, email addresses and passwords. This information is often openly revealed in social networking sites leaving Internet users vulnerable to social engineering and possibly Internet crime. Mobile devices, especially those with Wi-Fi, allow this information to be shared inadvertently.[2]

Digital self-defense requires Internet users to take an active part in guarding their own personal information. Four key strategies are frequently suggested to assist that protection.

Contents

Computer security

Computer security in this context is referring to Internet security software. The ongoing security of private information requires frequent updating of virus and spyware definitions so that ongoing developments in malicious software can't interfere with, or copy,private information.[3]

Email Accounts and Usernames

Choice of Appropriate Email Account

The practice of utilising more than one email account to separate personal and business usage from recreational usage is a strategy commonly used to manage personal privacy. The free and ready availability of email accounts from sites such as Yahoo, Google or Hotmail allows the protection of personal identity through the use of different names to identify each email account. These throw-away accounts can be discarded or replaced at will, providing another level of protection.

Choice of Username

A username is required to set up email accounts and to open accounts for various official, commercial, recreational and social networking sites. In many cases an email address may also be utilised as a username. Usernames that correlate with personal information such as names or nicknames are more at risk than ones that are cryptic or anonymous, particularly on social and recreational sites.

Password Strength

A password is a mandatory security measure that accompanies usernames. The use of personal data to construct passwords i.e. family members’ names, pet’s names or birth dates increases the risk to confidential information and are easier to crack than long complicated passwords so password strength is a key strategy for protecting personal information. A password can be weak or strong:a weak password is cutekittens, a strong password is ?lACpAs56IKMs.

According to Microsoft an ideal password should be at least 14 characters in length and have letters, punctuation, symbols, and numbers, where complexity is added by the inclusion of uppercase letters.[4]

Managing Personal Information Using Privacy Options

Social networking sites offer greater security risks to personal electronic information because sensitive, private or confidential information such as personal identifiers are routinely used to create public profiles.[5] Many websites give options to suppress the amount of personal information revealed through the customisation of privacy settings. However privacy settings can reset if changes to the website occur.[6]

References

  1. ^ “Components of Security”, http://nms.csail.mit.edu/~snoeren/stp307/ppt/sld002.htm
  2. ^ “Protect yourself in the online, social network community”, Creston News Advertiser, 11 Feb 2011. http://www.crestonnewsadvertiser.com/articles/ara/2011/02/11/8044960708/index.xml
  3. ^ "Secure your computer", © Commonwealth of Australia 2010 and © Stay Smart Online. http://www.staysmartonline.gov.au/home_internet_users/secure_your_computer
  4. ^ "Create Strong Passwords",Microsoft Safety and Security Center. http://www.microsoft.com/security/online-privacy/passwords-create.aspx
  5. ^ "Safer Social Networking". © Commonwealth of Australia 2010.http://www.cybersmart.gov.au/Parents/Brochures%20and%20posters%20and%20contacts/Cybersmart%20contacts.aspx#Information
  6. ^ “Protect yourself in the online, social network community”, Creston News Advertiser, 11 Feb 2011. http://www.crestonnewsadvertiser.com/articles/ara/2011/02/11/8044960708/index.xml

See also


Wikimedia Foundation. 2010.

Игры ⚽ Поможем сделать НИР

Look at other dictionaries:

  • Right of self-defense — This article and defense of property deal with the legal concept of justified acts that might otherwise be illegal. For the general act of protecting one s person from attack, see Self defense. For the 1983 Canadian action thriller film, see Self …   Wikipedia

  • Self-publishing — is the publishing of books and other media by the authors of those works, rather than by established, third party publishers. Although it represents a small percentage of the publishing industry in terms of sales, it has been present in one form… …   Wikipedia

  • Digital divide — Graph of internet users per 100 inhabitants between 1997 and 2007 by International Telecommunication Union …   Wikipedia

  • Self-propelled artillery — British AS 90s firing in Basra, Iraq, 2006 …   Wikipedia

  • Digital identity — For related uses, see Internet identity Digital identity is the aspect of digital technology that is concerned with the mediation of people s experience of their own identity and the identity of other people and things. Digital identity also has… …   Wikipedia

  • Digital Postmarks — A Digital Postmark (DPM) is a technology that applies a trusted time stamps issued by a postal operator to an electronic document, validates electronic signatures, and stores and archives all non repudiation data needed to support a potential… …   Wikipedia

  • Defense Information School — Coordinates: 39°05′52″N 76°44′59″W / 39.0979°N 76.7498°W / 39.0979; 76.7498 …   Wikipedia

  • Outline of self — The Self is the individual person, from his or her own perspective. To you, Self is you. To a different person, Self is that person. The following outline is provided as an overview of and topical guide to the self: Contents 1 Essence of oneself… …   Wikipedia

  • Center for Homeland Defense and Security — The Center for Homeland Defense and Security (CHDS or the Center) at the Naval Postgraduate School (NPS) in Monterey, California is a school focusing on homeland security education. The Center’s programs and resources have been developed to… …   Wikipedia

  • List of digital library projects — This is a list of projects related to digital libraries.General collections* AccessMyLibrary * AJOL African Journals OnLine free multidisciplinary database of peer reviewed, African published academic journals. * Arts and Humanities Data Service… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”