Cybersecurity 101
US-CERT
The United States Computer Emergency Readiness Team (US-CERT) was created by the US Department of Homeland Security (DHS) to improve America’s overall cybersecurity posture. US-CERT operates 24/7 to react to cyber threats by providing technical assistance to information systems operators and issuing alerts for current and potential security threats and vulnerabilities. US-CERT has assembled this collection of tips to advise the American public about common threats to cybersecurity and how to safeguard against them. General Security:
- Why is Cybersecurity a Problem?
- Good Security Habits
- Understanding Anti-Virus Software
- Understanding Firewalls
- Safeguarding Your Data
- Coordinating Virus and Spyware Defense
- Choosing and Protecting Passwords
- Debunking Some Common Myths
- Keeping Children Safe Online
Attacks and Threats:
- Handling Destructive Malware
- Understanding Hidden Threats: Rootkits and Botnets
- Dealing with Cyberbullies
- Avoiding the Pitfalls of Online Trading
- Identifying Hoaxes and Urban Legends
- Understanding Hidden Threats: Corrupted Software Files
- Recognizing Fake Antiviruses
- Recognizing and Avoiding Spyware
- Understanding Denial-of-Service Attacks
- Avoiding Social Engineering and Phishing Attacks
- Preventing and Responding to Identity Theft
- Recovering from Viruses, Worms, and Trojan Horses
Email and Communication:
- Staying Safe on Social Networking Sites
- Understanding Your Computer: Email Clients
- Understanding Digital Signatures
- Using Instant Messaging and Chat Rooms Safely
- Using Caution with Email Attachments
- Benefits of BCC
- Reducing Spam
- Benefits and Risks of Free Email Services
Privacy:
- Supplementing Passwords
- Effectively Erasing Files
- How Anonymous Are You?
- Understanding Encryption
- Protecting Your Privacy
Safe Browsing:
- Shopping Safely Online
- Understanding Bluetooth Technology
- Understanding Web Site Certificates
- Avoiding Copyright Infringement
- Understanding Your Computer: Web Browsers
- Understanding Internationalized Domain Names
- Evaluating Your Web Browser’s Security Settings
- Understanding Active Content and Cookies
Software and Applications: