firewall
hardware or software that prevents hackers from accessing your personal or company data
antivirus
a program that scans a computer for malicious software and deletes it
spyware
monitors online activities and collects personal information without permission
virus
destroys data and can slow down a computer
Secure the browser and operating system
to use the latest software and security patches/updates
Shodan
a web based device scanner
Service Set Identifier (SSID)
connect to a specific wireless network by the way of a network identifier
disable an SSID broadcast
adds an additional barrier to discovering the network and provides minimal security
encrypt wireless communication
enable wireless security and use WPA2 encryption feature
public Wi-Fi hot spot
a public location to surf the Internet but where it is best not to access or send any sensitive personal information
encrypted VPN
an encrypted connection between a computer and a VPN server to prevent data interception
password manager
a software or service that stores and encrypts different and complex passwords for use with online accounts
How can you make a secure password?
Do not use dictionary words or names in any languages. Do not use common misspellings of dictionary words. Do not use computer names or account names. If possible use special characters, such as ! @ # $ % ^ & * ( ). Use at least a ten character password.
encryption
the process of converting information into a form where an unauthorized party cannot read it
data backup
prevents the loss of irreplaceable data through a local or cloud storage solution
How can you make a file unrecoverable?
Physically destroy the hard drive or storage device.
Two Factor authentication
in addition to a username and password, the requirement of a second token, such as a credit card or phone number, to verify the credentials of a user
Open Authorization (Oauth)
an open standard protocol that allows an end user to access third party applications without exposing the password of the user
Microsoft Internet Explorer: InPrivate, Google Chrome: Incognito, Mozilla Firefox: Private tab / private window, Safari: Private: Private browsing
Methods of keeping Internet browsing history private by automatically disabling cookies, deleting temporary Internet files, and having browsing history removed after closing the window or program