Basic Internet safety rules. How do attackers get into a computer? detailed information

Compliance with certain safety rules when working on a computer significantly reduces the risk of infection of the system with malware. Therefore, the user can safely use operating system Windows.

There are a lot of dangerous threats: programs installed on a computer can be dangerous; just by being on the Internet, you can go to an infected site, click on a suspicious link, download files from the network, copy files to your computer from a flash drive or optical drive.

Even simple text file may contain malicious code; viruses are embedded in ordinary images. All this can pose a danger to your computer.

To successfully counter this, use recommendations based on my personal experience and I hope that they will be useful to someone. By generally following these security rules, you will increase the security and safety of your data and the overall security of your computer.

Basic safety rules that will reduce the chances of infecting your computer:

  • divide the disk into several partitions to save data;
  • original Windows version more secure;
  • install Windows security updates;
  • use backup and archiving;
  • solve problems that arise on your computer using system recovery;
  • use antivirus;
  • scan your computer with anti-virus scanners;
  • disable autorun from disks;
  • safer to use account with limited rights;
  • do not disable User Account Control (UAC);
  • run unknown programs in an isolated environment;
  • use virtual machines to run unknown software;
  • follow basic internet safety rules;
  • use specialized programs to store passwords;
  • regularly update programs and maintain the system.

Partitioning a disk into several partitions

This recommendation is not directly related to security, but using it can help you save information that might suddenly be lost. For example, if you have to urgently reinstall the operating system after a virus infection, if you cannot restore Windows functionality in other ways.

If the computer only has a “C:” drive, then it is advisable to have two partitions. It is better to do this when installing the operating system on your computer.

The “C:” drive will contain the operating system and programs, and the other drive will contain the rest of the data. In the event that you need to reinstall the operating system, all data on the “C:” drive will be lost, while other data located on another drive will be saved.

Using the original version of the operating system

With builds, you don't know what exactly the author of the Windows build did to the operating system image. It is unknown what has been added to the OS, what has been removed, what has been changed in the operating system settings. At best, you can find out from the description, but you have no way to check whether it is true or not.

Over time, problems may arise when working in such an operating system, since the authors of assemblies often use different tweaks that are not always justified. Many authors integrate a huge number of programs into such assemblies, most of which are not needed by the average, ordinary computer user.

Installing updates for the operating system

After connecting to the Internet, with default settings, the operating system automatically downloads updates from Microsoft servers. Regular updates for the operating system are released approximately once a month.

Some users disable automatic updates, fearing that the activation of the Windows operating system may fail. The updates themselves mostly concern security issues, and also apply some fixes to the operating system, eliminating identified problems in Windows.

The update closes detected vulnerabilities in the operating system. Therefore, after installing updates, the system will work more stable and secure.

The case of the virus is indicative. Basically, this virus infected computers on which operating system updates were disabled, because they managed to release a patch before the outbreak began.

Data backup and archiving

It is necessary to set up backup and archiving of data so as not to lose important data in the event of an OS failure or computer problems. For example, HDD unexpectedly failed, and if you have backup copies of your files, you won’t lose them.

It is launched by the Windows 7 operating system, as well as special programs, for example, Acronis True Image, or other similar applications.

Before making a backup, you should create a system recovery disk so that you can boot from this media if the system cannot boot.

Create backup copy system disk. Copy data from your computer to external hard disk for greater safety of backup copies.

If a computer malfunction occurs, you can restore the contents of the system disk from a backup copy.

Some laptop manufacturers create special hidden section on the hard drive, with an image of the operating system, to restore it in the event of a computer failure.

You should also regularly copy other important files to a flash drive or another PC drive.

Restoring the operating system to an earlier state

If the operating system malfunctions, use the function to restore the computer to its previous state.

Make sure that System Restore is not disabled on your computer (it is enabled by default). The Windows operating system periodically and automatically creates restore points.

You can create a restore point yourself so that the user can see the previous state of the operating system at a certain point in time.

Using a computer restore to a previous state will allow you to roll back the system to a stable, operational state, without Windows reinstallation. Unfortunately, system recovery is not always successful.

In Windows 10, it will help to return your computer to its original state.

Using antivirus programs

Viruses (in this article this word means anything malicious software) can penetrate your computer from the Internet, from removable media, from optical disks, etc. To counter this, you should install an anti-virus program on your computer.

An antivirus installed on a computer constantly protects the computer. Other antivirus software, such as antivirus scanners, perform a one-time scan and disinfection of the computer, but do not provide real-time protection.

There is a wide variety of antivirus solutions, both paid and free. You will have to decide for yourself which solution to use.

To make your choice easier, read the article dedicated to the best free antiviruses. Windows 10 has a built-in antivirus - Windows Defender.

Paid antiviruses have some advantages over free ones, since they have built-in additional security modules and other components.

There is no 100% protection against viral infection, because first the virus is developed, and only then means appear to neutralize it. In any case, it is better to be mostly protected than to remain unprotected.

Getting malware onto your computer is very simple: you just need to follow a link to an infected website, open an attachment received by email, etc.

It should be remembered that any antivirus slows down your computer, but to ensure greater security you should put up with it. Antivirus manufacturers are improving their products and now antiviruses do not load the system as much as before.

After installing the antivirus on your computer, perform a full system scan. In addition to the fact that the antivirus protects the computer in real time, it is necessary, at least once a month, to conduct a full scan of the computer and all disks (if you have, for example, external hard drives).

This is necessary for additional protection of your data. During such a scan, the antivirus may detect new virus threats. Some viruses are well camouflaged and begin to show their activity after a significant period of time.

Update regularly antivirus databases, usually the antivirus does this automatically.

You cannot install two antiviruses from different manufacturers on your computer at the same time; they will conflict with each other. Antivirus and firewall may be from different manufacturers because they perform different tasks.

Make sure that it is enabled in your system settings firewall- firewall (firewall). A firewall protects your computer from network attacks and controls how programs access the Internet.

In the operating room Windows system There is a standard firewall. True, it is inferior to specialized firewalls, but such protection is better than no protection at all.

The optimal solution for home use would be to install a class anti-virus solution on your computer Internet Security. This solution includes an antivirus, firewall and other additional security modules from a single manufacturer. Basically, such programs are paid.

For an additional one-time check or treatment of the system, use special free anti-virus scanners, for example, or other similar programs. Scanners check and disinfect the system, but are not suitable for everyday use.

If it is impossible to cope with viruses, use a special boot disk with an antivirus program. Rescue disks are created by many antivirus manufacturers and such an image can be downloaded from the manufacturer’s website completely free of charge, for example, or other solutions.

In addition to the official ones, there are homemade images. These images include a large number of programs. An image, for example, Windows PE with programs, burn to disk (create bootable USB flash drive). At the right time, boot from the disk to scan and disinfect your computer.

It is possible to check files on your computer or links to sites on the Internet through online services. For example, the service conducts online check using more than 60 antivirus scanners.

It should be remembered that there are many fake antiviruses on the Internet. There are pop-up ads on the Internet that say that your computer is infected.

Fake antiviruses find many viruses on your computer and offer to download a program to treat your computer. After downloading, such a program itself will become a source of viruses.

To treat blocking viruses, antivirus companies have created special online services where you can get a code to unlock your computer for free. To solve this problem, specialized applications have been created.

Disabling autorun from disks

For security reasons, you should disable autorun from hard drive, from network drives, from removable media (flash drives, removable hard drives etc.) from a CD/DVD drive. You can read how to do this on my website in the “Security” section.

Using restricted accounts

Using restricted user accounts increases security when using your computer.

If a virus has entered the computer, then it cannot harm the system partition or the operating system registry, because it does not have access to these sections due to the fact that this account has limited administrative rights.

This reduces the damage that viruses cause when they penetrate the operating system.

Using UAC

UAC (User Account Control) is used to provide control over the launch of programs unfamiliar to the operating system. User Account Control - UAC, displays a warning asking whether to launch the program. The user independently decides to launch the application.

Before starting the program, there is time to think whether it is worth doing or not. Sometimes, this helps prevent malware from running.

How to stay safe on the Internet

When using the Internet, you must use common sense. Please remember that internet security is always at risk.

Don't go to suspicious sites. A site hung with bright advertising, obsessively imposing some offer on you, should arouse your suspicions. Don't rush to click on the links, look around.

Avoid sites that insist on offering something for free, but only ask you to send an SMS message. At best, you will lose a certain amount of money debited from your mobile phone account.

There are a huge number of different scams and scams on the Internet, so you should be careful.

In the field of development information technologies Currently, projects that teach schoolchildren about cybersecurity issues have become highly relevant. Among the projects presented on the network, a special role is occupied by the portal “Setevichok.rf”, which was developed and maintained by a group of schoolchildren with the expert support of the NP “Safe Internet League”. Resource "Setevichok.rf"- a specialized portal for training and consulting schoolchildren on cybersecurity issues.

The organizer of the project is “Blog of the School Know-It-All” www.e-parta.ru Information and educational portal for teenagers.
The project has a positive expert opinion from the Ministry of Education and Science of the Russian Federation.

    • Helpline “Children Online” is a free all-Russian telephone and online counseling service for children and adults on problems safe use Internet and mobile communications .
    • Hotline of the Friendly Runet Foundation
    • Federal program for safe children's Internet Gogul
    • Parental Controls Overview
    • Internet and children. Security tips from Kaspersky Lab
    • Rules for safe browsing on the Internet from Microsoft

Internet Safety Reminder

Every year there are more young people on the Internet, and schoolchildren are among the most active users of the Runet. Meanwhile, in addition to a huge number of opportunities, the Internet also brings problems. This guide should help you stay safe online.

A computer virus is a type computer programs, distinctive feature which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files as a whole. In most cases, viruses are spread via the Internet.

Methods of protection against malware:

  • Use modern operating systems that have a serious level of protection against malware;
  • Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
  • Work on your computer as a user, not an administrator. This will prevent most malware from installing on your personal computer;
  • Restrict physical access to the computer for unauthorized persons;
  • Use external storage media, such as a flash drive, disk or file from the Internet, only from trusted sources;
  • Do not open computer files obtained from untrusted sources. Even those files that your friend sent. It’s better to check with him whether he sent them to you.

Tips for staying safe on public Wi-Fi networks

Wi-Fi is not a type of data transmission, not a technology, but just a brand. Back in 1991, the Dutch company registered the “WECA” brand, which stood for the phrase “Wireless Fidelity,” which translates as “wireless precision.” Another abbreviation has reached our time, which is the same technology. This is an abbreviation for "Wi-Fi". This name was given with a hint of the highest standard of audio technology, Hi-Fi, which means “high precision”.

Safety tips for working on public Wi-fi networks:

  • Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins or any numbers;
  • Use and update antivirus programs and firewall. This way you will protect yourself from downloading a virus to your device;
  • When using Wi-Fi, turn off the " General access to files and printers." This function is closed by default, but some users activate it for ease of use at work or study;
  • Do not use public WI-FI to transmit personal data, for example to access social networks or email;
  • Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address, enter “https://”;
  • On your mobile phone, disable the “Connect to Wi-Fi automatically” feature. Do not allow the device to automatically connect to Wi-Fi networks without your consent.

Basic safety tips in social networks

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including those who may not have good intentions.

Basic social media safety tips:

  • Limit your friends list. Your friends should not include random or unfamiliar people;
  • Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
  • Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write, or upload anything;
  • If you are talking to people you don’t know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
  • Avoid posting photographs online that show you in a location that could indicate your location;
  • When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
  • For social networks, mail and other sites you must use different passwords. Then if you are hacked, the attackers will have access to only one place, and not all at once.

Basic tips for working safely with electronic money

Electronic money is a very convenient method of payment, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is precisely because of this that in many countries it is still not spelled out in laws. In Russia, they function and are already spelled out in the law, where they are divided into several types - anonymous and non-anonymous. The difference is that anonymous ones are those in which operations are allowed to be carried out without user identification, and in non-anonymous ones, user identification is mandatory.

You should also distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for working safely with electronic money:

  • Link to account mobile phone. This is the most convenient and quick way restore access to the account. A linked phone will help if you forget your payment password or access the site from an unfamiliar device;
  • Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
  • Choose a complex password. Criminals will have a hard time guessing a complex password. Strong passwords are passwords that are at least 8 characters long and include lowercase and uppercase letters, numbers, and multiple symbols such as dollar sign, pound sign, Exclamation point and so on. For example, $tR0ng!;;
  • Don't enter your personal information on sites you don't trust.

Basic tips for using email securely

Electronic mail is the technology and the services it provides for sending and receiving electronic messages that are distributed across computer network. Typically, an email account looks like this: user_name@domain_name. Also besides transfer plain text, it is possible to transfer files.

Basic tips for using email securely:

  • You need to choose the right mail service. There is a huge selection of free email services on the Internet, but it is better to trust those you know and who are first in the ranking;
  • Do not include personal information in your personal email. For example, it is better to select “music_fan@” or “rock2013” ​​instead of “topic13”;
  • Use two-step authentication. This is when, in addition to the password, you need to enter a code sent via SMS;
  • Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
  • If you have the opportunity to write your own personal question, use this opportunity;
  • Use several mailboxes. The first is for private correspondence with recipients you trust. This email address do not need to be used when registering on forums and websites;
  • Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files;
  • After finishing work on the mail service, before closing the tab with the site, do not forget to click on “Exit”.

Basic tips to combat cyberbullying

Cyberbullying - harassment by messages containing insults, aggression, intimidation; hooliganism; social boycotting using various Internet services.

Basic tips to combat cyberbullying:

  • Don't rush into battle. The best way: seek advice on how to behave and, if there is no one to whom you can turn, then calm down first. If you start responding to insults with insults, you will only inflame the conflict even more;
  • Manage your cyber reputation;
  • Anonymity on the Internet is imaginary. There are ways to find out who is behind an anonymous account;
  • Don't behave like a hooligan virtual life. The Internet records all your actions and stores them. It will be extremely difficult to remove them;
  • Maintain your virtual honor from a young age;
  • Ignore the single negative. One-off offensive messages are best ignored. Usually aggression stops at the initial stage;
  • Ban the aggressor. In instant messaging programs and social networks, it is possible to block sending messages from certain addresses;
  • If you are a witness to cyberbullying. Your actions: speak out against the stalker, show him that his actions are assessed negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior online.

Basic Mobile Phone Security Tips

Modern smartphones and tablets contain quite adult functionality, and now they can compete with desktop computers. However, there are still very few protection measures for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, however, expanding the functionality entails greater complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices.

Basic tips for mobile phone security:

  • Nothing is truly free. Be careful, because when you are offered free content, there may be some hidden hidden in it. paid services;
  • Think before you send an SMS, photo or video. Do you know exactly where they will end up?
  • It is necessary to update the operating system of your smartphone;
  • Use antivirus programs for mobile phones;
  • Do not download applications from an unknown source, as they may contain malicious software;
  • After you leave the site where you entered personal information, go to your browser settings and delete cookies;
  • Periodically check which paid services are activated on your number;
  • Only give your mobile number to people you know and trust;
  • Bluetooth should be turned off when you are not using it. Don't forget to check this sometimes.

Basic tips for gaming account security

Modern online games are colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription or purchase some options.

All these funds go towards maintaining and developing the game, as well as security itself: authorization systems are being improved, new patches (digital patches for programs) are released, and server vulnerabilities are closed. In such games, you should be afraid not so much of your opponents as of the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

  • If another player behaves badly or causes trouble for you, block him from the list of players;
  • Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
  • Do not provide personal information in your game profile;
  • Respect other participants in the game;
  • Do not install unofficial patches and mods;
  • Use complex and different passwords;
  • Even while playing, you should not disable your antivirus. While you are playing, your computer can be infected.

Basic tips for fighting phishing

The usual theft of money and documents today will not surprise anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how a new threat emerged: Internet fraud or phishing, the main goal of which is to obtain confidential user data - logins and passwords. On English language phishing is read as phishing (from fishing - fishing, password - password).

Basic tips to combat phishing:

  • Keep an eye on your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
  • Use safe websites, including online stores and search engines;
  • Use complex and different passwords. Thus, if you are hacked, the attackers will have access to only one of your online profiles, and not all of them;
  • If you have been hacked, then you need to warn all your friends who are added as your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
  • Set a strong password (PIN) on your mobile phone;
  • Disable password saving in the browser;
  • Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files.

Essential tips for protecting your digital reputation

Digital reputation is negative or positive information about you online. Compromising information posted on the Internet can seriously affect your real life. “Digital reputation” is your image, which is formed from information about you on the Internet. Your place of residence, study, your financial situation, character traits and stories about loved ones - all this accumulates on the Internet.

Many teenagers are frivolous about publishing personal information on the Internet, not understanding the possible consequences. You won’t even be able to guess that a photo posted 5 years ago was the reason they refused to hire you.

Hello, dear friends!

Every day we use the Internet. Everyone has already become accustomed to his existence, to the fact that he exists.

This technical progress, which gave us, helps us stay up to date with all events in the world, helps us find the information we need, watch movies online and a lot of other benefits.

And the most important and important thing in my opinion is that with the help special programs, we can be closer to each other, despite the distances.

This is all wonderful. But the Internet is not as harmless at first glance as it might seem.

After all, no matter how you look at it, the Internet is a huge world, and you don’t always meet only kind and honest people along the way.

There are enough evil trolls there, and just not good people.

So let's talk a little today about how to make sure that our life on the Internet does not suddenly turn from a fun, carefree journey into a terrible reality with elements of a horror film from modern reality and subsequently into a headache.

To do this, you need to develop habits and rules on the way to a safe Internet and understand:

There is even a holiday on the Internet - Safe Internet Day:

Safe Internet Day.

It has been celebrated since 2004. And it was created in order to draw the attention of users to this problem.

The Internet also has its own laws, but in general there is chaos here and there, in which it is very easy to get lost.

Of course, it is not possible to achieve complete security on the Internet.

Write in the comments how you protect yourself on the Internet and whether you think this problem is relevant and I hope that you will find mine useful:

Golden rules for internet safety.

WATCH A CARTOON ABOUT MASYANYA FROM THE INTERNET:

Sincerely, Larisa Mazurova.

1) Do not send confidential information (bank card number, PIN code, passport data) through social network messengers. It is better to delete letters with scanned documents immediately after sending or receiving them; there is no need to store them in the mail.

3) Turn off Wi-Fi when not in use. Protect yourself and save battery power. Be sure to turn off the automatic Wi-Fi connection feature on your phone or tablet.

4) Don't trust unverified Wi-Fi connections that don't ask for a password. Most often, it is these networks that attackers use to steal users’ personal data.

5) Do not access online banks and other important services through open Wi-Fi networks in a cafe or on the street. Use mobile internet.

6) Remember: banks, services and stores never send emails asking you to follow a link, change your password, enter your bank card number and secret code confirmation or provide other personal information!

7) Disable Siri on iPhone. Most likely, you don’t use it, but scammers have already learned how to withdraw money through online banking using voice commands.

8) Create several email addresses: personal, work and entertainment (for subscriptions and services).

9) Create a complex password, different for each mailbox. We wrote about how to do this.

10) Wherever possible, enable two-factor authentication.


11) Change passwords regularly, update your browser and spam filters.

12) Install and update antivirus programs. Outdated versions may not guarantee protection against malware. Several new viruses appear in the world every day, so an antivirus needs to receive information about methods to combat them as often as possible.

13) Clicking on links received in messages from strangers is a sure way to fall for cyber scammers and infect your device with viruses. A dangerous link can also come from a hacked friend, so it’s better to find out what he sent you and whether you need to open it.

14) Do not run unknown files, especially those with the .exe extension

15) Carefully check the link addresses, logos, text and sender of messages.

16) Never respond to spam.

17) If you receive a request via messenger from a friend asking you to urgently send money, do not send anything! First, call him back and make sure that the account has not been hacked by intruders.

18) Read Kevin Mitnick's book "The Art of Deception." Mitnik - a cult figure in the environment information security, his book, like his life story, is both fascinating and instructive. You will learn how cybercriminals gain people's trust by manipulating their feelings.

19) A minimum of personal information: do not publish your home address online, do not write what time you are not at home, do not describe your regular route, do not boast about large purchases, and generally try not to advertise your level of income.

20) Back up your data regularly. Follow the 3-2-1 rule: create one primary copy and two backup copies. Save two copies on different physical media, and one in cloud storage (Google Drive, Yandex.Disk, special solutions from Acronis). Don’t forget to backup all devices: smartphones, tablets, computers/laptops.

21) To never lose money on unnoticed payments, not to buy additional services by mistake and to accurately pay for what you need, always read the rules before checking the “I agree” checkbox and proceeding to payment.

22) If in the security question you indicated the maiden name of your mother, who is now in open access on her social media pages, be sure to change the security question.

23) Install safe mode for a child. To do this, create a separate account on the website of the search engine of your choice or use children's search engines: Gogul or Sputnik.kids.

24) Talk to your child about the Internet: agree that he will inform you about unwanted information found. Explain that not all information on the Internet is reliable, and teach them to consult with you on any unclear issue.

25) Do not download dubious applications or try to do so from unknown links. Use only official stores App Store, Google Play and Windows Market.

26) Advice for users Google Chrome, Firefox and Opera: If you often travel and access the Internet from a laptop in public places, install a special browser extension to access the Internet safely. We recommend. By default this plugin provides secure connection for Yahoo, eBay, Amazon and some other web resources. You can also add sites of your choice.

28) When purchasing from online stores, maintain healthy skepticism. Remember: the price cannot be too low, especially if you are counting on purchasing original brand products.

29) Study the history of the store online, check for contacts, find out if you can come there and meet in person. When reading reviews, pay attention that they are different. Custom reviews are written by people who have to do this many times a day, so such texts seem to be written according to a template.

30) See how sellers react to reviews. Pay special attention to the negative ones: if they are dealt with, this is a good sign (and the situation must be specific, contain the order number, etc.).

31) Pay safely! The classic case is that you will be redirected to a secure page (the address begins with “https://”). If not, it's better not to risk it. According to acquiring rules, the seller’s website must contain information about who accepts the payment. Read it and compare it with what is written on the next page.

32) Get a separate (virtual) card for online payments.

33) If you use your regular card to pay online, do not store large sums of money on it.

34) Connect your bank to SMS notifications about all transactions on cards and accounts. This way you can quickly notice if your card is compromised and block it.

35) The pages for entering confidential information of any serious service are always protected, and the data is transmitted in encrypted form. The site address must begin with “https://”, next to which there is a closed green padlock.


36) Where to go if something goes wrong? The activities of online stores are controlled by the same organizations as regular ones: Rospotrebnadzor, the Society for the Protection of Consumer Rights. Be sure to write to the Runet Hotline: www.hotline.site

37) Be careful when communicating online with strangers, they may not be who they say they are.

39) Do not repost compassionate announcements about a cute cat who is urgently looking for a home (and in the post - the owner’s phone number or card number where you can transfer money for the care of the animal). There is a high probability that these are scammers who decided to make money on compassionate and gullible citizens.

40) The logo of a well-known charitable foundation does not mean that the money will go there - the account details can be falsified. If you want to help people, do it only for people you know personally or, for example, with a project

44) By following the link http://www.tcinet.ru/whois/ you can find out when the site was created. Attackers usually create one-day pages that are closed very quickly.

45) Lost the phone to which it is linked bank card? Block both your SIM card and your card immediately.

46) It is better not to use torrents: if you download illegal content, you are not only ripping off your favorite author, but you may also download a file infected with a virus.

47) Fraudsters create websites where you can supposedly watch or download the movie you like for free, but first you need to leave your phone number or send a message to a short number. This way, a significant amount of money can be deducted from your account for SMS, and the phone itself will end up in the spammers’ database.

48) For some applications and services there is a free test period(for example, for 2-3 months), after which you must disable the service yourself. If you do not do this, the subscription may be automatically renewed and become paid, and money will be debited from the card specified during registration.

49) Do not participate in promotions with prizes where you have to pay for something and then ask several other people to do the same. It's a pyramid!

50) Always lock your computer screen, even if you are leaving “just for a minute.”


| Personal safety on the Internet

Lesson 33
Personal safety on the Internet

Reminder for schoolchildren's safety on the Internet

From Tatyana Vladimirovna Orlova's blog

Every year there are more young people on the Internet, and schoolchildren are among the most active users of the Runet. Meanwhile, in addition to a huge number of opportunities, the Internet also brings problems. This guide should help you stay safe online.

Computer viruses

Computer virus is a type of computer program, the distinctive feature of which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files as a whole. In most cases, viruses are spread via the Internet.

Anti-malware methods:

Use modern operating systems that have a serious level of protection against malware;
Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
Restrict physical access to the computer for unauthorized persons;
Use external storage media, such as a flash drive, disk or file from the Internet, only from qualified sources;
Work on your computer as a user, not an administrator. This will prevent most malware from installing on your personal computer;
Use anti-virus software products from well-known manufacturers, with automatic database updates;
Do not open computer files obtained from untrusted sources. Even those files that your friend sent. It’s better to check with him whether he sent them to you.

WI-FI networks

WiFi- this is not a type of data transmission, not a technology, but just a brand, brand. Back in 1991, the Dutch company registered the “WECA” brand, which stood for the phrase “Wireless Fidelity,” which translates as “wireless precision.” Another abbreviation has reached our time, which is the same technology. This is an abbreviation for "Wi-Fi". This name was given with a hint of the highest standard of audio technology, Hi-Fi, which means “high precision”.

Yes, free Internet access in cafes, hotels and airports is an excellent opportunity to access the Internet. But many experts believe that public Wi-Fi networks are not secure.

Safety tips for working on public Wi-fi networks:

Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins or any numbers;
Use and update antivirus programs and firewall. This way you will protect yourself from downloading a virus to your device;
When using Wi-Fi, turn off File and Printer Sharing. This function is disabled by default, but some users activate it for ease of use at work or study;
Do not use public WI-FI to transmit personal data, for example to access social networks or email;
Use only a secure connection via HTTPS, not HTTP, i.e. when typing a web address, enter “https://”;
On your mobile phone, disable the “Connect to Wi-Fi automatically” feature. Do not allow your device to automatically connect to Wi-Fi networks without your consent.

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including those who may not have good intentions.

Limit your friends list. Your friends should not include random or unfamiliar people;
Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write, or upload anything;
If you are talking to people you don’t know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
Avoid posting photographs online that show you in a location that could indicate your location;
When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
For social networks, mail and other sites, you must use different passwords. Then if you are hacked, the attackers will have access to only one place, and not all at once.

Electronic money

Electronic money- This is a very convenient method of payment, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is precisely because of this that in many countries it is still not spelled out in laws. In Russia, they function and are already spelled out in the law, where they are divided into several types - anonymous and non-anonymous. The difference is that anonymous ones are those in which operations are allowed to be carried out without user identification, and in non-anonymous ones, user identification is mandatory.

You should also distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for working safely with electronic money:

Link your mobile phone to your account. This is the most convenient and fastest way to restore access to your account. A linked phone will help if you forget your payment password or access the site from an unfamiliar device;
Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
Choose a complex password. Criminals will have a hard time guessing a complex password. Strong passwords are passwords that are at least 8 characters long and include lowercase and uppercase letters, numbers, and multiple symbols such as dollar sign, pound sign, exclamation point, etc. For example, $tR0ng!;;
Don't enter your personal information on sites you don't trust.

Email

Electronic mail is the technology and services it provides for sending and receiving electronic messages that are distributed over a computer network. Typically, an email account looks like this: user_name@domain_name. Also, in addition to transmitting simple text, it is possible to transfer files.

Basic tips for using email securely:

You need to choose the right mail service. There is a huge selection of free email services on the Internet, but it is better to trust those you know and who are first in the ranking;
Do not include personal information in your personal email. For example, it is better to select “music_fan@” or “rock2013” ​​instead of “topic13”;
Use two-step authentication. This is when, in addition to the password, you need to enter a code sent via SMS;
Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
If you have the opportunity to write your own personal question, use this opportunity;
Use multiple mailboxes. The first is for private correspondence with recipients you trust. This email address does not need to be used when registering on forums and websites;
Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files;
After finishing work on the mail service, before closing the tab with the site, do not forget to click on “Exit”.

Cyberbullying or virtual bullying

Cyberbullying- harassment by messages containing insults, aggression, intimidation; hooliganism; social boycotting using various Internet services.

Basic tips to combat cyberbullying:

Don't rush into battle. The best way: seek advice on how to behave and, if there is no one to whom you can turn, then calm down first. If you start responding to insults with insults, you will only inflame the conflict even more;
Manage your cyber reputation;
Anonymity on the Internet is imaginary. There are ways to find out who is behind an anonymous account;
You should not lead a hooligan virtual life. The Internet records all your actions and stores them. It will be extremely difficult to remove them;
Maintain your virtual honor from a young age;
Ignore the single negative. One-off offensive messages are best ignored. Usually aggression stops at the initial stage;
Ban the aggressor. In instant messaging programs and social networks, it is possible to block sending messages from certain addresses;
If you are a witness to cyberbullying. Your actions: speak out against the stalker, show him that his actions are assessed negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior online.

Mobile phone

Modern smartphones and tablets contain quite mature functionality, and now they can compete with desktop computers. However, there are still very few protection measures for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, but expanding functionality entails greater complexity and less security. Not all manufacturers release updates that close critical vulnerabilities for their devices.

Basic tips for mobile phone security:

Nothing is truly free. Be careful, because when you are offered free content, there may be some paid services hidden in it;
Think before you send an SMS, photo or video. Do you know exactly where they will end up?
It is necessary to update the operating system of your smartphone;
Use antivirus programs for mobile phones;
Do not download applications from an unknown source, as they may contain malicious software;
After you leave the site where you entered personal information, go to your browser settings and delete cookies;
Periodically check which paid services are activated on your number;
Only give your mobile number to people you know and trust;
Bluetooth should be turned off when you are not using it. Don't forget to check this sometimes.

Online games

Modern Online Games are colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription or purchase some options.

All these funds go towards maintaining and developing the game, as well as security itself: authorization systems are being improved, new patches (digital patches for programs) are released, and server vulnerabilities are closed. In such games, you should be afraid not so much of your opponents as of the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

If another player behaves badly or causes trouble for you, block him from the list of players;
Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
Do not provide personal information in your game profile;
Respect other participants in the game;
Do not install unofficial patches and mods;
Use complex and different passwords;
Even while playing, you should not disable your antivirus. While you are playing, your computer can be infected.

Phishing or identity theft

The usual theft of money and documents today will not surprise anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how a new threat emerged: Internet fraud or phishing, the main goal of which is to obtain confidential user data - logins and passwords. In English, phishing is read as phishing (from fishing - fishing, password - password).

Basic tips to combat phishing:

Keep an eye on your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
Use safe websites, including online stores and search engines;
Use complex and different passwords. Thus, if you are hacked, the attackers will have access to only one of your online profiles, and not all of them;
If you have been hacked, then you need to warn all your friends who are added as your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
Set a strong password (PIN) on your mobile phone;
Disable password saving in the browser;
Do not open files or other attachments in emails, even if they come from your friends. It’s better to check with them whether they sent you these files.

Digital reputation

Digital reputation- this is negative or positive information about you on the Internet. Compromising information posted on the Internet can seriously affect your real life. “Digital reputation” is your image, which is formed from information about you on the Internet. Your place of residence, study, your financial situation, character traits and stories about loved ones - all this accumulates on the Internet.

Many teenagers are frivolous about publishing personal information on the Internet, not understanding the possible consequences. You won’t even be able to guess that a photo posted 5 years ago was the reason they refused to hire you.




Top