Many people often pay attention to the security of information systems, such as security settings for browsers, installation of anti-virus software, set up a complex power-on password. Even develop some complex security policies. But few people are as aware of the security of mobile devices as servers. Smartphones, tablets that can connect Wi-Fi hotspots or WLANs, such as all kinds of storage, are mobile information systems or a subset of them, and even some laptops are mobile devices. In the field of information security, these things tend to be safely overlooked.
A random search of Web browsers in networked mobile terminals and computers can search for a great deal of articles on how to secure information systems, even though some articles don't solve all the problems, but they solve most problems, and there are a lot of security-related topics. So, in this article, there is little mention of technical solutions, and it is mainly about raising awareness about preventing unauthorized access.
This issue is also a hot topic for discussion, and there are many solutions. But it is difficult to really give the person who has seen it enough attention and to start applying it in practice.
This column more highlights: http://www.bianceng.cnhttp://www.bianceng.cn/Network/Security/
A lot of people are working in the enterprise, the enterprise is usually a few people in a studio (office) to work. It is possible to work in a local area network even if you are not working in a studio (office). This can lead to a lot of problems. Free on the workbench anything that contains personal information is likely to be taken away by malicious people, peeped out or inadvertently viewed (randomly rummaging through workbooks, moving mobile phones, playing ipad, etc.). It is possible to expose some useful information, especially if there are malicious people who use certain social engineering (what is social engineering advice for everyone to understand, good) to get useful information. And in the LAN, unless there is strict audit and management, access control and VLAN division, or even in the LAN is not secure. There are too many software (including malware, hacker software, security penetration tools, security management, and auditing tools) that can help malicious people "invade" your system. Sometimes a simple Trojan horse (such as a keylogger software, a password sniffer) can easily steal information such as your password. Be sure not to enter a critical username and password on someone else's computer that is not trusted. The rest of you can think for yourself first.
There are some small suggestions for everyone:
0. Whenever and wherever, for anyone to improve security awareness, at any time to do a good job of information security failure preparation (I did not say how to improve the security of the system), always have to consider their own information (information systems) whether there are security risks. This is the most critical.
1. Additional attention should be paid to storage devices for memory and backup purposes, with or with emphasis kept as far as possible.
2. For smartphones also need keyboard password lock, key information (especially short messages, phone numbers, saved e-mail, web browser-related information, etc.) and then set up a special password protection, regular backup phone book and other information.
3. For tablets, it is generally possible to lend to others to play, if there is such a situation to carry out the necessary protection. Key information, login password (preferably not on the phone, pad) also do not stay inside. Perhaps one day lost, broken, poisoned can be faced with the risk of loss and leakage.
4. For laptops and so on, in addition to the basic input and output system (BIOS setup password (startup password, hard drive password, administrator password, etc.), prohibit the use of external devices to boot, hide key prompts, disable ports, use laptop lock, lock screen when leaving, etc., you can also start from the inside. There are many ways to start from the inside, with the use of encrypted partitions (full encryption for Linux and UNIX, partial encryption (for Linux, UNIX and Windows) (detailed methods are not here wordy, a random search on the Internet), using a more secure file system, user access control, Regularly check events and logs, and so on.
5. Finally, a special emphasis may be placed on the use of laptops with mechanical hard disks on trains or automobiles. Try to avoid the use, if very necessary, you must pay special attention to shock and fall.
Finally, attach this article to the writing reason: Today by train, using a notebook computer, the hard drive bumps bad. This article is just to improve the safety awareness of everyone, is not a special tutorial or something like that. The technology or tips involved are just for the sake of enriching the article, but it also has reference value.
Everyone is welcome to make comments and correct mistakes.
This article is from the "Communication, My favorite" blog, please be sure to keep this source http://dgd2010.blog.51cto.com/1539422/947189