本文主要是介绍网络犯罪取证_您是否在保护自己的数字房屋免受网络犯罪的侵害,希望对大家解决编程问题提供一定的参考价值,需要的开发者们随着小编来一起学习吧!
网络犯罪取证
(BPT) — As the pace of technology advances, cybersecurity threats do, too. Data breaches, identity theft, phishing and malware make headlines seemingly every day. Internet-connected devices, social media, digital assistants and mobile apps have become indispensable in our everyday lives, but their connectedness makes us increasingly vulnerable to cyberattacks. Recent reports estimate that damages relating to cybercrime are expected to hit $6 trillion annually by 2021.
(BPT)-随着技术的进步,网络安全威胁也随之增加。 数据泄露,身份盗用,网络钓鱼和恶意软件似乎每天都成为头条新闻。 连接互联网的设备,社交媒体,数字助理和移动应用程序已成为我们日常生活中不可或缺的组成部分,但它们的连接性使我们越来越容易受到网络攻击。 最新报告估计,到2021年,与网络犯罪有关的损害每年将达到6万亿美元。
“It’s impossible to predict when you will be affected by cybercrime,” says Bashar Abouseido, chief information security officer for Charles Schwab. “The best defense is to stay informed.”
Charles Schwab首席信息安全官Bashar Abouseido说:“无法预测您何时会受到网络犯罪的影响。” “最好的防御是随时了解情况。”
It can be helpful to envision your computer and digital devices as a house where you store your personal data. October is National Cybersecurity Awareness Month, so it’s a good time to make sure your digital house is secure. The first step is to understand the ways cybercriminals may attempt to access your data.
将计算机和数字设备设想为存储个人数据的房屋会很有帮助。 十月是全国网络安全意识月,因此现在是确保数字房屋安全的好时机。 第一步是了解网络犯罪分子可能试图访问您的数据的方式。

网络犯罪的类型 (Types of cybercrimes)
Data breaches occur when there is unauthorized access to sensitive personal information. These incidents often make headline news and can affect large numbers of consumers.
当未经授权访问敏感的个人信息时,就会发生数据泄露 。 这些事件经常成为头条新闻,并可能影响大量消费者。
Malicious software, also known as malware, spyware, ransomware and viruses, refers to software programs designed with the purpose of gaining unauthorized access to a mobile app, digital device or computer.
恶意软件 ,也称为恶意软件,间谍软件,勒索软件和病毒,是指旨在获得未经授权访问移动应用程序,数字设备或计算机的目的而设计的软件程序。
Phishing is one of the most common forms of online fraud and cybercrime. Cybercriminals try to lure you with a fake email sent from what they have designed to appear to be a trusted source or contact that encourages you to click a link or open an attachment in order to extract personal account information.
网络钓鱼是在线欺诈和网络犯罪的最常见形式之一。 网络犯罪分子试图通过伪造的电子邮件诱使您,这些电子邮件的设计意图是使他们看起来像是可信任的来源或联系人,鼓励您单击链接或打开附件以提取个人帐户信息。
保护您的数字房屋的5个技巧 (5 tips to protect your digital house)
1. Remodel your digital house: Installing updates is an essential first step.
1.改造数字房屋:安装更新是必不可少的第一步。
Think of system updates as basic maintenance to your digital house that is keeping your personal data safe. It can be annoying to see those system update prompts on your computer or mobile device, but software developers are constantly improving their software to repel the latest malware. By keeping your operating system and apps updated, you are making sure that your digital house is as secure as possible.
将系统更新视为对数字房屋的基本维护,以确保您的个人数据安全。 在您的计算机或移动设备上看到这些系统更新提示可能会很烦人,但是软件开发人员正在不断改进其软件以抵御最新的恶意软件。 通过更新操作系统和应用程序,可以确保您的数字房屋尽可能安全。
2. Don’t have a leaky house: Be wary of public Wi-Fi networks.
2.不要让房屋漏水:警惕公共Wi-Fi网络。
Using public — and often free — Wi-Fi networks is convenient, but it is a common entry point for criminals to use malware to infect your devices and apps. Use only networks you trust or use your own personal Wi-Fi hotspot if you have one. Never update your devices when you are connected to a public Wi-Fi network.
使用公共的(通常是免费的)Wi-Fi网络很方便,但这是罪犯使用恶意软件感染您的设备和应用程序的常见入口。 仅使用您信任的网络,或者使用自己的个人Wi-Fi热点。 当您连接到公共Wi-Fi网络时,切勿更新设备。

3. Keep your keys secure: Choose unique access credentials.
3.保持密钥安全:选择唯一的访问凭据。
Access credentials — usernames and passwords — are the keys that keep your digital house safe and secure. Select credentials that are unique and don’t include personal identifying information such as a name, address or birthday. For added protection, choose two-step verification to access critical online accounts for your banking, retirement or investment accounts. Two-step verification is typically a key or another code provided by the service provider in addition to your primary access credentials to verify your identity.
访问凭证(用户名和密码)是确保数字房屋安全的关键。 选择唯一的凭证,并且不包含个人识别信息,例如姓名,地址或生日。 为了提供更多保护,请选择两步验证来访问银行帐户,退休帐户或投资帐户的关键在线帐户。 除了用于验证您身份的主要访问凭证之外,两步验证通常是服务提供商提供的密钥或其他代码。

4. Secure doors and windows: Use only secure websites and app stores.
4.保护门窗:仅使用安全的网站和应用程序商店。
Web browsers and app stores are like the doors and windows in your digital house. Make sure they are secure by using web addresses that start with “https” and downloading apps only from the Apple App Store, Microsoft Store and Google Play store.
Web浏览器和应用程序商店就像数字房屋中的门窗一样。 通过使用以“ https”开头的网址并仅从Apple App Store,Microsoft Store和Google Play商店下载应用程序,确保它们的安全。
5. Don’t open that door: Delete suspicious emails.
5.不要打开那扇门:删除可疑电子邮件。
That knock on your cyber front door is the sound of a cybercriminal sending you a phishing email. Be suspicious of emails that come from unknown senders. Use your cursor to hover over questionable links and email addresses to reveal the true identity of the link or sender. When in doubt, don’t click on any links or open any attachments and delete the email immediately.
网络前门的敲门声是网络犯罪分子向您发送网络钓鱼电子邮件的声音。 怀疑来自未知发件人的电子邮件。 使用光标悬停在有问题的链接和电子邮件地址上,以显示链接或发件人的真实身份。 如有疑问,请不要单击任何链接或打开任何附件并立即删除电子邮件。
For more information on more ways to educate and protect yourself from cybercrimes, visit SchwabSafe.
有关更多教育和保护自己免受网络犯罪影响的方法的更多信息,请访问SchwabSafe 。
Originally published on The Idea Publishing at http://www.theideapublishing.com/techideas/are-you-protecting-your-digital-house-from-cybercrime.
最初发布在 The Idea Publishing上 , 网址 为 http://www.theideapublishing.com/techideas/are-you-protecting-your-digital-house-from-cybercrime 。
翻译自: https://medium.com/good-advice-publishing/are-you-protecting-your-digital-house-from-cybercrime-58078d4ab59e
网络犯罪取证
相关文章:
这篇关于网络犯罪取证_您是否在保护自己的数字房屋免受网络犯罪的侵害的文章就介绍到这儿,希望我们推荐的文章对编程师们有所帮助!