Friday, October 4, 2019

Cyber Security Safe Digital Communications

For safe digital Communication some of the security measures needs to be checked. 

Good Security audit Checkpoints:

  • Passwords 
  • Screen locks
  • Data at rest 
  • Data in transit
  • Data in use 
  • Physical security 
  • Background check
To protect your identity we need to aware of all threats related to identity theft.

Junkware:

  • Junkware  is injection of malicious code by the means of Adware downloads. When installing software or application or using browser malicious advertisement by clicking it will inject Junkware.
  •  Password hygiene is important by using strong password for example password should be asdex@598*

Dangers On Internet:

  • Avoid the emails with attachment of (.Exe)extension. 
  • By using antivirus and anti Spyware programs to avoid hackers. 
  • Don't fall for as a prey for Phishing emails. 
  • If you're using https also need to verify digital certification before transaction certificate issued by third party, which is encrypted or protected. You can view a gold lock on address bar by expanding you can view. 
  • By using strong password you can protect. 
  • Don't open the suspicious email from unknown persons it may be a Phishing email. 
  • Always backup storage data in offline also. 
  • Ransomeware is a virus takes control of computer and networks. To keep safe you hard drive it should be protected. 
  • Encryption is a mathematical technique used to make readable to unreadable data. 
  • Based on encryption key will be divided into two parts. First part will be private key and private key, to decrypt the data private key will be used. 
  • Tor browser is used for private or VPN. 
  • Download.CNET.Com to download secure downloads of Internet apps. 
  • To protect from unsecure WiFi we need to protect by every techniques. WiFi pineapple is a hacker defensive device.To buy check out the link https://www.amazon.com/slp/wifi-pineapple/5tqmwqccurbx3dp

WiFi Pineapple Device:

A WiFi Pineapple is a hacking device. When a person's device scans for networks the device already knows, the WiFi Pineapple fakes as one of those networks, and the device automatically connects to it. It acts as a sort of middle man between the Internet and the device. It can intercept the device's web traffic and gather information victim. 


  • WiFi Pineapple is used to look for rogue WiFi hotspots being put in air by hackers. 
  • WiFi Pineapple has ability quietly and passively monitor for all WiFi devices in an area.
  • Tells us hackers look for what WiFi signals are there and how they configured.

WiFi at Home:
  • Secure your WiFi router and use strong passwords. 
  • Anyways use WiFi encryption using WPA2.

Social Media:
Don't over share in Facebook and avoid unwanted hackers target to victim. 

Things To Avoid:

Don't download illegal copyrighted material without paying for it.

Hill Station view:

1 comment:

felisha green said...


If you ever want to change or up your university grades contact cybergolden hacker he'll get it done and show a proof of work done before payment. He's efficient, reliable and affordable. He can also perform all sorts of hacks including text, whatsapp, password decrypt,hack any mobile phone, Escape Bancruptcy, Delete Criminal Records and the rest

Email: cybergoldenhacker at gmail dot com

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....