1.An Introduction to CyberSecurity:  Keeping ourselves, families and our business activities safe in an online world.

 

 

An Introduction to CyberSecurity:  Keeping ourselves, families and our business activities safe in an online world.

The online world provides everyone who has access to it with the biggest sources of information - but not all information is accurate - the ability to buy and sell goods, make financial transactions, book holidays, keep in touch with family and friends, to coordinate business, work online, learn and study, organise society. But it also provides the same access for criminals and criminal organisations.

The online world is not secure by default, but we can easily learn how to improve our own security, and the security of our families, friends, business and society.

Doing nothing is not an option. It would be like scattering all your possessions out on the streets of a large city, and then expecting them still to be there when you went back a year later. Any computer system connected to the rest of the world is like the open road to anyone who knows how to navigate the electronic highway.

What could you lose? In a word 'everything'!

From the contents of your bank account to your own identity. Confidential documents, pictures, business papers. Even the ability to use your computers and run your business can be destroyed by criminal activity.

So how do we keep ourselves, families, friends, business and society safe in an online world? A little knowledge and a few straight-forward routines and processes are the key to CyberSecurity.

Cybersecurity is both a process and an attitude to the online world in which we live, work and play.

This series of tutorials guides you to that knowledge and suggests the routine processes that you should follow to gain and maintain your CyberSecurity.

 

Cybersecurity: Understanding the nature of attacks . Stealing your money

CyberSecurity: Understanding the nature of attacks. Theft of identity

CyberSecurity: Understanding the nature of attacks: Stealing knowledge

CyberSecurity: Understanding the nature of attacks: stealing your advertising budget

CyberSecurity:  Understanding the nature of attacks: Carelessness

CyberSecurity: Understanding the technology: where attacks can take place

CyberSecurity:  Understanding the technology: The identity and location of a computer

CyberSecurity: Understanding the technology: Data stolen in transit. Networks, standards and protocols

CyberSecurity: Understanding the technology: machines with an open doorway

CyberSecurity: Understanding the technology: the spy in the machine

CyberSecurity: Understanding the technology: hardware with holes

CyberSecurity: the cybersecurity process

CyberSecurity: Selecting a secure password

Cybersecurity: How to remember our passwords

CyberSecurity: Maximise the security of Emails

Send your comment to the author


Prove you are not a robot: