false
OasisLMS
Login
Catalog
Cyber Security
Cyber Security - Quick Reference Guide
Cyber Security - Quick Reference Guide
Back to course
Pdf Summary
This quick reference guide explains common cyber security risks and practical ways to reduce them for individuals and organizations of any size. It notes that security breaches can occur through viruses and other malware, phishing scams, software and hardware vulnerabilities, and weaknesses in network security. The guide highlights the scope of the problem with statistics indicating many adults have experienced stolen personal information or hacked accounts, most software has vulnerabilities, and many people do not know how to protect themselves online.<br /><br />A key recommendation is using strong, complex passwords as a first line of defense. Passwords should be at least eight characters and include a mix of uppercase and lowercase letters, numbers, and special characters. The guide emphasizes that complex passwords are exponentially harder to crack, providing examples where simple passwords can be broken in hours or days, while comparable complex passwords may take years or even far longer.<br /><br />The document defines confidentiality as ensuring private information is not accessed by unauthorized parties. It lists examples of confidential personal information (e.g., Social Security numbers, addresses, salary history, credit card numbers) and corporate information (e.g., processes, customer lists, R&D, strategies, objectives).<br /><br />It also explains the role of firewalls—hardware or software tools that act as barriers to prevent unauthorized access to computers and networks.<br /><br />For network security, it recommends changing default Wi‑Fi passwords, securing shared-file permissions, using only trusted public Wi‑Fi, relying on HTTPS for sensitive activities, keeping operating systems updated, and performing regular security checks.<br /><br />Finally, it describes phishing emails and how to spot them (mismatched sender addresses, suspicious links, unexpected attachments, poor grammar, generic greetings, and urgent calls to action). It stresses using HTTPS sites (identified by a padlock) when logging in or transferring confidential data, and avoiding non-HTTPS sites for personal information.
Keywords
cybersecurity risks
malware and viruses
phishing detection
strong password policy
password complexity
confidentiality of data
firewalls
network security best practices
Wi-Fi security
HTTPS and secure browsing
×
Please select your language
1
English