Digital Survival - encrypt https://survival.tacticaltech.org/taxonomy/term/78 en FAQs: Password and encryption https://survival.tacticaltech.org/computer/security/FAQs <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><strong>Should I protect my computer with a password? </strong></p> <p>As standard practice you should password-protect your computer. This is to safeguard it from unwanted eyes or someone walking up to your computer and quickly copying files to an external USB stick. However, password-protecting your computer won't prevent someone having access to your data if your computer is stolen or falls into the wrong hands. To create a password to protect your computer, make it long, make it complex and make it difficult for anyone to guess. But also make it practical for you to remember, and always keep it secret.</p> <p><strong>Should I encrypt my hard drive?</strong></p> <p>If you keep any information on your hard drive that is sensitive, you should keep your hard drive encrypted. This will prevent the information from falling into the wrong hands if your computer is stolen.</p> <p>For more on encrypting your hard drive please see: <a href="http://security.tacticaltech.org/chapter_4_1">http://security.tacticaltech.org/chapter_4_1</a></p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item odd"><a href="/taxonomy/term/78" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">encrypt</a></div><div class="field-item even"><a href="/taxonomy/term/77" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">passwords</a></div></div></div> Wed, 02 Feb 2011 13:21:56 +0000 katie 18 at https://survival.tacticaltech.org https://survival.tacticaltech.org/computer/security/FAQs#comments Keeping your computer and data safeĀ  https://survival.tacticaltech.org/computer/security <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><img style="float: right;" src="/sites/survival.tacticaltech.org/files/public/digitalsecurity/CH1_img9.jpg" alt="" width="221" height="315" />Any connection in to your computer can be a source of vulnerability: your office or home network, the internet, a USB flash drive or even someone who has just walked into your office.</p> <p><strong>Assess your risks</strong></p> <p>Security risks differ according to the user and the context of use. What's the last thing you'd want to see happening to your data? Who are the last people you'd want to see getting their hands on it? Think about how to prevent these fears from being realised. Remember that one piece of information may be vulnerable on many different levels.</p> <p>Think about:</p> <ul><li>The communication channels you use and how you use them </li> <li>How you store important information </li> <li>The physical location of your computer, your external drive and any printed documents containing sensitive information </li> </ul><p>For more on assessing your risks see: <a href="http://security.tacticaltech.org/chapter_2_1">http://security.tacticaltech.org/chapter_2_1</a></p> <p>Other important things to consider:</p> <p><strong><span style="background-color: #ffffff;">Firewalls </span></strong></p> <p>A firewall is the first programme on a computer to receive incoming data from the internet. It is also the last programme to handle outgoing information. Like a security guard posted at the door of a building to decide who can enter and who can leave, a firewall receives, inspects and makes decisions about all incoming and outgoing data. Most operating systems have a built-in firewall, which should always be switched on. In addition, many anti-virus programmes also come with a firewall.</p> <p><strong>Passwords</strong></p> <p><strong> </strong> If you have information you want to keep private, you can save documents or files with a password which only you know. There is an option to create a password on your computer system itself to restrict or limit other users of the computer. You can also save your documents with passwords. In Microsoft Office applications click Save As&gt;Tools&gt;General Options, and then a window will pop up where you can type in your password. In Open Office, go to File&gt;Save As, and then tick the 'Password' option.</p> <p class="callout">Physical security still affects your digital security. You might think your anti-virus software is protecting the information on your USB stick, but if you are carrying that USB stick in your pocket and it starts pouring with rain, you would probably be better off with a sealed plastic bag! Even if you encrypt the data on the hard drive of your computer, you won't be able to use it anymore if someone breaks in and steals your computer.</p> <p>An 'intruder' can gain access to the information on your computer or portable storage devices remotely, by reading or modifying your data over the internet, or physically, if they manage to get access to your hardware. It is best to have several layers of defence, which is why you should also protect the files themselves. That way your sensitive information is likely to remain safe even if your other security efforts prove inadequate.</p> <p>There are two general approaches to the challenge of securing your data in this way: you can encrypt your files, making them unreadable to anyone but you, or you can hide them in the hope that an intruder will be unable to find your sensitive information.</p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above"><div class="field-label">Tags:&nbsp;</div><div class="field-items"><div class="field-item even"><a href="/taxonomy/term/74" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">security</a></div><div class="field-item odd"><a href="/taxonomy/term/78" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">encrypt</a></div><div class="field-item even"><a href="/taxonomy/term/76" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">firewalls</a></div><div class="field-item odd"><a href="/taxonomy/term/77" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">passwords</a></div></div></div> Wed, 02 Feb 2011 13:12:54 +0000 katie 16 at https://survival.tacticaltech.org https://survival.tacticaltech.org/computer/security#comments