Digital Survival - passwords https://survival.tacticaltech.org/taxonomy/term/77 en FAQs: Password and encryption https://survival.tacticaltech.org/computer/security/FAQs <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><strong>Should I protect my computer with a password? </strong></p> <p>As standard practice you should password-protect your computer. This is to safeguard it from unwanted eyes or someone walking up to your computer and quickly copying files to an external USB stick. However, password-protecting your computer won't prevent someone having access to your data if your computer is stolen or falls into the wrong hands. To create a password to protect your computer, make it long, make it complex and make it difficult for anyone to guess. But also make it practical for you to remember, and always keep it secret.</p> <p><strong>Should I encrypt my hard drive?</strong></p> <p>If you keep any information on your hard drive that is sensitive, you should keep your hard drive encrypted. This will prevent the information from falling into the wrong hands if your computer is stolen.</p> <p>For more on encrypting your hard drive please see: <a href="http://security.tacticaltech.org/chapter_4_1">http://security.tacticaltech.org/chapter_4_1</a></p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item odd"><a href="/taxonomy/term/78" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">encrypt</a></div><div class="field-item even"><a href="/taxonomy/term/77" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">passwords</a></div></div></div> Wed, 02 Feb 2011 13:21:56 +0000 katie 18 at https://survival.tacticaltech.org https://survival.tacticaltech.org/computer/security/FAQs#comments Tip: Passwords https://survival.tacticaltech.org/computer/security/passwords <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p>1. Pick one really easy password and use it only for <strong>nuisance</strong> logins - those sites where you know you won't really care if someone gets hold of your account. Yes, someone could steal your password - but what are they going to do with it? If you’re worried about protecting your privacy, use a better password, but if you aren't, use the same plain word over and over again and don't think twice about it. Good examples of nuisance logins are:</p> <ul><li>Newspapers and other online content </li> </ul><ul><li>Travel sites or airline sites </li> </ul><ul><li>Email lists, online communities and photo sharing site</li> </ul><p>2. Pick one password for private things that aren't life or death. Find a random password or invent a semi-random password. Passwords you should be able to keep to yourself:</p> <ul><li>Your email account(s) </li> <li>The FTP login for your website </li> </ul><p>3. You might need a few passwords you can <strong>share</strong> – these should change at least as often as staff changes. They should be random passwords, but they shouldn't be the same as any password you use for personal logins. Server passwords and shared websites often fall into the shared category.</p> <p>4. Your last password category is for <strong>really sensitive</strong> stuff. Ideally, you wouldn't reuse these passwords, but more importantly, this should be a truly random password, and you should change it from time to time. For example:</p> <ul><li>A web-based membership database </li> <li>Remote access to your desktop computer </li> <li>Banking websites or anywhere your information is stored </li> </ul><p>Passwords are strongest when they have a combination of letters, numbers and symbols. Easy-to-remember passwords can be made stronger by incorporating numbers in place of letters, for instance: “f@6u1ou5”</p> <p>For more on password-protecting your computer please see: <a href="http://security.tacticaltech.org/chapter_3_1">http://security.tacticaltech.org/chapter_3_1</a></p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item odd"><a href="/taxonomy/term/77" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">passwords</a></div></div></div> Wed, 02 Feb 2011 13:19:34 +0000 katie 17 at https://survival.tacticaltech.org https://survival.tacticaltech.org/computer/security/passwords#comments Keeping your computer and data safe  https://survival.tacticaltech.org/computer/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img9.jpg" alt="" width="221" height="315" />Any connection in to your computer can be a source of vulnerability: your office or home network, the internet, a USB flash drive or even someone who has just walked into your office.</p> <p><strong>Assess your risks</strong></p> <p>Security risks differ according to the user and the context of use. What's the last thing you'd want to see happening to your data? Who are the last people you'd want to see getting their hands on it? Think about how to prevent these fears from being realised. Remember that one piece of information may be vulnerable on many different levels.</p> <p>Think about:</p> <ul><li>The communication channels you use and how you use them </li> <li>How you store important information </li> <li>The physical location of your computer, your external drive and any printed documents containing sensitive information </li> </ul><p>For more on assessing your risks see: <a href="http://security.tacticaltech.org/chapter_2_1">http://security.tacticaltech.org/chapter_2_1</a></p> <p>Other important things to consider:</p> <p><strong><span style="background-color: #ffffff;">Firewalls </span></strong></p> <p>A firewall is the first programme on a computer to receive incoming data from the internet. It is also the last programme to handle outgoing information. Like a security guard posted at the door of a building to decide who can enter and who can leave, a firewall receives, inspects and makes decisions about all incoming and outgoing data. Most operating systems have a built-in firewall, which should always be switched on. In addition, many anti-virus programmes also come with a firewall.</p> <p><strong>Passwords</strong></p> <p><strong> </strong> If you have information you want to keep private, you can save documents or files with a password which only you know. There is an option to create a password on your computer system itself to restrict or limit other users of the computer. You can also save your documents with passwords. In Microsoft Office applications click Save As&gt;Tools&gt;General Options, and then a window will pop up where you can type in your password. In Open Office, go to File&gt;Save As, and then tick the 'Password' option.</p> <p class="callout">Physical security still affects your digital security. You might think your anti-virus software is protecting the information on your USB stick, but if you are carrying that USB stick in your pocket and it starts pouring with rain, you would probably be better off with a sealed plastic bag! Even if you encrypt the data on the hard drive of your computer, you won't be able to use it anymore if someone breaks in and steals your computer.</p> <p>An 'intruder' can gain access to the information on your computer or portable storage devices remotely, by reading or modifying your data over the internet, or physically, if they manage to get access to your hardware. It is best to have several layers of defence, which is why you should also protect the files themselves. That way your sensitive information is likely to remain safe even if your other security efforts prove inadequate.</p> <p>There are two general approaches to the challenge of securing your data in this way: you can encrypt your files, making them unreadable to anyone but you, or you can hide them in the hope that an intruder will be unable to find your sensitive information.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item odd"><a href="/taxonomy/term/78" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">encrypt</a></div><div class="field-item even"><a href="/taxonomy/term/76" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">firewalls</a></div><div class="field-item odd"><a href="/taxonomy/term/77" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">passwords</a></div></div></div> Wed, 02 Feb 2011 13:12:54 +0000 katie 16 at https://survival.tacticaltech.org https://survival.tacticaltech.org/computer/security#comments