Simple rules of safe work on the Internet! You should know it! Basic Internet safety rules Internet safety rules.

1) Do not send confidential information (number bank card, PIN code, passport data) via social media messengers. It is better to delete letters with scans of documents immediately after sending or receiving, there is no need to store them in the mail.

3) Turn off Wi-Fi when not in use. Protect yourself and save battery power. Be sure to turn off the automatic Wi-Fi connection feature on your phone or tablet.

4) Don't trust unverified Wi-Fi connections that don't ask for a password. Most often, it is these networks that attackers use to steal personal data of users.

5) Do not access online banks and other important services through open Wi-Fi networks in a cafe or on the street. Take advantage of mobile internet.

6) Remember: banks, services and stores never send out letters asking you to follow the link, change your password, enter your bank card number and secret code confirmation or provide other personal data!

7) Disable Siri on iPhone. Most likely, you do not use it, but scammers have already learned how to withdraw money through the Internet bank by voice commands.

8) Set up multiple email addresses: personal, work, and entertainment (for subscriptions and services).

9) Come up with complex password, for each box is different. We wrote about how to do this.

10) Where possible, enable two-factor authentication.


11) Change your passwords regularly, update your browser and spam filters.

12) Install and update anti-virus programs. Outdated versions cannot guarantee protection against malware. Several new viruses appear in the world every day, so the antivirus needs to receive information about methods of dealing with them as often as possible.

13) Clicking on links that came in messages from strangers is a sure way to fall for the bait of cyber scammers and infect your device with viruses. A dangerous link can also come from a hacked friend, so it's better to specify what he sent you and whether you need to open it.

14) Do not run unknown files, especially with the extension .exe

15) Carefully check the link addresses, logos, text and message sender.

16) Never reply to spam.

17) If you received a request from a friend in the messenger with a request to urgently send money, do not send anything! First, call him back and make sure that the account has not been hacked by intruders.

18) Read Kevin Mitnick's The Art of Deception. Mitnick is a cult figure in the environment information security, his book, like the story of life, is both fascinating and instructive. You will learn how cybercriminals ingratiate themselves with people by manipulating their feelings.

19) Minimum personal information: do not post your home address online, do not write what time you are not at home, do not describe your regular route, do not brag about large purchases, and generally try not to advertise the level of wealth.

20) Do Regularly backup data. Follow the 3-2-1 rule: create one master and two backups. Save two copies on different physical media, and one in the cloud storage (Google Drive, Yandex.Disk, special solutions from Acronis). Do not forget to back up all devices: smartphones, tablets, computers / laptops.

21) In order to never lose money on imperceptible payments, do not buy additional services by mistake and pay exactly for the right ones, always read the rules before ticking the “agree” checkbox and proceeding to payment.

22) If in the secret question you indicated the mother's maiden name, which is now in open access on her pages in social networks, be sure to change the security question.

23) Install safe mode for a child. To do this, create a separate account on the site of your chosen search engine or use children's search engines: Gogul or Sputnik.children.

24) Talk to your child about the Internet: arrange for him to inform you of unsolicited information he finds. Explain that not all information on the network is reliable, and teach you to consult with you on any incomprehensible issue.

25) Do not download dubious applications and do not try to do this from unknown links. Use only official stores App Store, Google Play and Windows Market.

26) Tip for users Google Chrome, Firefox, and Opera: If you travel frequently and surf the web on your laptop in public places, install a dedicated browser extension to surf the web securely. Recommended. By default, this plugin provides a secure connection for Yahoo, eBay, Amazon and some other web resources. You can also add sites of your choice.

28) Maintain a healthy skepticism when shopping online. Remember: the price cannot be too low, especially if you expect to purchase original brand products.

29) Study the history of the store online, check the availability of contacts, find out if it is possible to come there and meet in person. When reading reviews, please note that they are different. Custom reviews are written by people who have to do this many times a day, so such texts seem to be written according to a template.

30) See how sellers react to reviews. Pay special attention to the negative ones: if they are worked out, this is a good sign (moreover, the situation must be specific, contain an order number, etc.).

31) Pay safely! The classic case is that you are redirected to a secure page (the address starts with "https://"). If not, it's best not to risk it. According to the acquiring rules, the seller's website should contain information about who accepts the payment. Read it and check with what is written on the next page.

32) Get a separate (possibly virtual) card for payments on the Internet.

33) If you use your regular card to pay on the Internet, do not store large amounts of money on it.

34) Connect in your bank SMS-informing about all transactions on cards and accounts. This way you can quickly notice if your card is compromised and block it.

35) Entry Pages confidential information any serious service is always protected, and data is transmitted in encrypted form. The site address must begin with "https://", next to which is a closed green padlock.


36) Where to go if something went wrong? The activities of online stores are controlled by the same organizations as conventional ones: Rospotrebnadzor, the Society for the Protection of Consumer Rights. Be sure to write to hotline Runet: www.hotline.site

37) Be careful when communicating online with strangers, they may not be who they say they are.

39) Do not repost pitiful announcements about a cute cat who is urgently looking for a home (and in the post - the owner's phone number or card number where you can transfer money for the maintenance of the animal). There is a high probability that these are scammers who decided to make money on compassionate and gullible citizens.

40) The logo of a well-known charitable foundation does not mean that the money will go there - account details can be forged. If you want to help people, do it only for people you know personally or, for example, with a project

44) By the link http://www.tcinet.ru/whois/ you can find out when the site was created. Attackers usually create one-day pages that close very quickly.

45) Lost the phone to which the bank card is linked? Immediately block both the SIM card and the card.

46) Better not use torrents: if you download illegal content, you are not only stealing from your favorite author, but you can also download a virus-infected file.

47) Fraudsters create websites where you can allegedly watch or download a movie you like for free, but first you need to leave a phone number or send a message to a short number. So, an impressive amount can be deducted from your account for SMS, and the phone itself will fall into the spammers database.

48) For some applications and services, a free trial period is provided (for example, for 2-3 months), after which you must disable the service yourself. If you do not do this, the subscription may be automatically renewed and become paid, and money will be debited from the card specified during registration.

49) Do not participate in promotions with prizes where you have to pay for something, and then ask a few more people to do the same. It's a pyramid!

50) Always lock your computer screen, even if you're "just for a minute" away.


Internet security is a very important issue of today. And it concerns everyone, from children to pensioners. It is becoming more and more relevant due to the massive arrival of Internet users who are almost, if not completely unprepared for the threats that await them. Therefore, this article will be devoted to such an issue as security on the Internet. After all, not one user suffers, but many others, united in one global structure.

The dangers that lie in wait for us online

In short, there are two main possibilities for how your computer can become a victim. The first is you yourself, wandering through various sites or installing software from unverified sources, and sometimes from verified ones, infect your computer. Secondly, a situation is also possible when attackers deliberately, using, for example, Trojans or viruses, make your device a source of danger.

As a result of all this, the computer, sometimes even secretly from its owner, starts sending spam, participates in DDoS attacks on various sites, and steals passwords. It also happens that the provider is forced to forcibly disconnect such a device from it. It turns out that if the user is not aware of what the basics of security on the Internet are, he will have a hard time.

Why do attackers need access to the user's computer

in vain ordinary user thinks that nobody needs his computer. It used to be that hackers often wrote viruses just for fun, but now it's almost always done for commercial gain. About 20 years ago, an attacker enjoyed the fact that he could simply format HDD. Or make it so that when you turn on the computer, instead of the standard desktop, any cool pictures. Now they are doing everything possible so that the PC owner does not know for as long as possible that his device is infected and secretly performs additional functions.

What is all this for? In addition, as mentioned above, hackers try to gain access to your emails, wallets, accounts in social networks, forums. It happens, for example, that you go to bed with 20,000 rubles on your electronic wallet, and in the morning you receive an SMS message stating that there is no more money on it. And from the mail all your contacts, and not only, receive spam letters, and even trojans. Hackers can combine many infected computers into a single powerful network, carry out a DDoS attack even on powerful government servers. From the simplest, but also bringing money: they will block the operation of the operating system and demand money for fixing the problem. And, by the way, the money will be taken, but the computer will be left blocked. So security on the Internet should be the basis of your work on it.

How do intruders get into a computer? detailed information

In order to crack the protection of the PC, even if it is, hackers use a number of methods, and users needlessly think that by simply installing an antivirus, they got rid of the danger, for example, to pick up a malicious program. Therefore, before looking for information on how to properly maintain security on the Internet, you need to understand where viruses and trojans come from. Now we will list the main ways of their penetration and methods of stealing various information.

  1. The first method is called Thanks to various psychological tricks, tricks and gullibility of users, hackers send you a completely harmless file or letter, and you yourself launch a Trojan in it. Or, at the request of the alleged administration of the service, you give out all your passwords and appearances.
  2. The second method - various free software is offered, pirated disks, where a lot of viruses, trojans and the like are hidden.
  3. Security holes are constantly appearing in software, including those from the most reliable trusted sources. This also applies to operating systems. Here attackers carefully and monitor such moments, try not to miss them, but use them for their own purposes. You go to some page of a site that has been checked a hundred times and - once - your device is infected.
  4. The fourth method has received special distribution recently. This is phishing when fake websites are created. And instead of the page of your bank, you find yourself on its fake copy. We won’t talk about what could be next, you can guess for yourself.

Initial protection of the user's computer

Ideally, having bought a PC, the user must perform a number of operations before rushing to surf the endless expanses of the network. We will now present some of the very first Internet security lessons.

Further Safety Lessons

Now a little information on how to ensure the safety of working on the Internet. After completing the previous section, continue to remember to protect yourself daily.


Some more Internet safety lessons

Now let's briefly talk about some more precautions. If you receive a password verification email from your bank, don't hesitate to send it to them. Banks never make such requests. All have a spam filter. Trust him. If you receive a letter about winning a million rubles or an inheritance of five million dollars, delete them immediately. We recommend installing comprehensive protection. It is more reliable than an antivirus from one manufacturer, a firewall from another, and an antispyware program from a third.


Give preference to paid versions. Since Opera and Internet Explorer- the most common browsers, for them and viruses there are most of all. Use alternatives: Apple Safari, Google Chrome and Mozilla Firefox. Do not use unlicensed software as it may have spyware installed by default. If you shop online, use only trusted options. The same applies to any other online service. Follow all these requirements, and then security on the Internet will be more or less guaranteed.

Children and the Internet

In connection with the development modern technologies all large quantity children get access to the Internet. And if before they mostly played games without even going online, now everything is completely different, and you yourself know everything. Therefore, there was new task- ensure the safety of children on the Internet. This is quite difficult, since initially it develops completely uncontrollably.

It contains a lot of information that children should not have access to. In addition, they need to be taught how not to "catch" viruses and trojans. Who will help them with this if not adults. In addition, information security on the Internet is very important, since children are completely inexperienced users. They can easily fall for the bait of an experienced scammer or intruder.

How to teach kids how to use the internet

The very first advice is that the child should spend the first sessions on the network with one of the adults. It is advisable to use programs such as to control all the activities of children on the Internet.

It is necessary to limit the independent use of mail and chats, because it can even be dangerous. Since there, for example, pedophiles can look for victims. We will give some recommendations on how you can try to ensure the maximum safety of children on the Internet.


When your child is 14-16 years old, it is unlikely that you will be able to understand computers, the Internet and all such things more than him. Although, of course, one should not forget about control and influence on it. Moreover, it is necessary to remember about such a problem as ensuring security on the Internet. After all, if the computer is shared, or all devices are connected to a single home network, then the threats will be common. In addition, you can always view reports on the activities of the child. It is recommended not to conflict with the child about this, but to try to communicate and find mutual language. Despite objections, try to force them to accept the rules for using the Internet, tell them which sites cannot be visited.

A PC with network access must be installed in a common room. This will hold your child back a little. Install software that blocks unwanted sites, do not allow any programs to be installed without your consent. And do not forget to ensure that children do not become addicted to the Internet. We hope that our tips will help protect your computers from threats.

  • Be careful with links contained in emails. They may not lead to where the text information indicates.
  • Do not send sensitive personal or financial information unless it is encrypted (when operating on a secure website). Regular emails are not encrypted.
  • Be careful! Fake websites that look like large companies are designed to deceive customers and collect their personal information. Please make sure that the websites you visit have privacy and security statements and review them carefully. Make sure the URL you need appears in the "address" or "host" field of your browser. Some websites may look similar to what you need but are actually fake. Take a few extra seconds and type the URL yourself.
  • When transferring confidential information, look for the padlock symbol in the lower right corner of the web page. This symbol indicates that the site is running in secure mode. You must see it BEFORE you enter confidential information.
  • Use strong passwords or PINs for your online accounts. Choose words that others will find difficult to guess and use a different password for each of your accounts. Use letters and numbers, and a mix of capitals and lowercase letters if passwords or PINs distinguish between lowercase and uppercase letters.
  • When exiting the program, do so in accordance with established procedures. Don't just close your browser! Follow the instructions for leaving the safe area to ensure your safety.
  • Avoid conducting any banking transactions in places where Internet services are public, such as Internet cafes. It is very difficult to determine if these computers are missing hacker programs that capture your personal information and account information. If you need to make a transaction from a public computer, change your PIN from your computer after you have used the public computer. It has great importance, as there is a risk of keystrokes being captured (including bank card numbers and credit card, as well as PIN) using special programs built into a shared computer without your knowledge.

Login and password

Login is your unique identifier, "name", which makes it possible to protect your computer connected to the Network from unauthorized access to the network by another person. When registering in our network, you indicate your login and enter a password known only to you.

Basic rules for handling Login and Password

  • Please do not share your password with others!
  • Do not respond to emails asking for your personal information!
  • Be suspicious of any company or person that asks for your password, passport number, or other sensitive information. NetByNet employees never ask for this kind of information by e-mail.
  • Periodically check your computer with an antivirus program for spyware that steals passwords and personal data.
  • Remember that all actions performed under your username / password are legally considered to be committed by you.

Viruses

A computer virus is a program that violates the integrity of information on your computer, in some cases also leading to the failure of the equipment that is part of your computer. AT modern conditions computer viruses are an integral part of the information contained in local and global (Internet) networks, however, the impact of viruses on your computer can be neutralized by adhering to the following rules.

Basic rules of anti-virus security.

  • Install reputable antivirus software
  • Despite the large selection of anti-virus systems, you should use only packages that have proven themselves in our market. You can contact us for recommendations on antivirus software. You should also give preference to well-supported products of our region, because, despite the global nature of the network, most of the viruses are inherent in the Runet (Russian-speaking Internet).
  • Update your antivirus software periodically
  • Antivirus scanners can only protect against those computer viruses, whose data is contained in the anti-virus database. This is not enough to guarantee absolute protection, if only because new types of virus programs are emerging. Therefore, it is necessary to update anti-virus databases regularly. The more often this simple operation is performed, the more secure the workplace will be.
  • Be careful with files in emails. Never open suspicious files from people you don't know.
  • Never run programs sent by an unknown person! This rule is well known and needs no explanation. However, files received from "reliable" correspondents (acquaintances, colleagues, friends) can also be infected. Your friends may not know that letters are being sent from their computer without authorization: a virus is able to send messages on behalf of someone else without the owner of the computer noticing! Before opening any file, it is necessary to check it with anti-virus tools. Naturally, good anti-virus packages check automatically.
  • Limit the circle of people using your computer
  • The ideal option is a situation where no one but you has access to your computer. However, if this is not possible, it is necessary to clearly delineate access rights and determine the range of permitted actions for other persons. First of all, this concerns working with floppy disks and CDs, the Internet and e-mail.
  • Make regular backups
  • By following this rule, you will be able to save data not only if your computer is damaged by a virus, but also in the event of a serious breakdown in the computer hardware.
  • Do not panic!

In no way do we want to give users the impression that viruses are an unrecoverable disaster. Viruses are the same programs as, say, a calculator or a Windows notebook. Their distinguishing feature is that viruses are able to multiply (i.e. create copies of themselves), integrate into other files or boot sectors, and perform other unauthorized actions. Much more harm can be caused by rash actions aimed at neutralizing the virus. If you are working on a corporate network, contact your system administrator immediately. If you are just a home user, then contact the company from which you purchased the antivirus program. Let the professionals take care of the security of your computer, otherwise you may permanently lose the information stored on your computer.

In conclusion, it should be added that malicious programs may not be viruses per se, but they certainly create difficulties when working on a computer. These can be, for example, intrusive advertising programs that enter the address of their page into the system as the start page when browsing the Internet, and do not give the opportunity to change it in the future. Therefore, in addition to anti-virus software, it is a good idea to install AdAware programs that protect against such malware.

Operation via WiFi radios

Wireless networks have a lot in common with wired networks, but there are also differences. In order to break into a wired network, a hacker needs to physically connect to it. In the Wi-Fi version, it is enough for him to install an antenna in the nearest gateway in the network coverage area.

What theoretically can an attacker get in wireless network, the setting of which was not given due attention?

Here is the standard list:

  • access to resources and disks of users of the Wi-Fi network, and through it - to LAN resources;
  • eavesdropping on traffic, extracting confidential information from it;
  • distortion of information passing through the network;
  • theft of Internet traffic;
  • attack on user PCs and network servers (for example, Denial of Service or even radio jamming);
  • the introduction of a fake access point;
  • sending spam, illegal activity on your behalf.
In the NetByNet network, customers are allowed to install wi-fi household equipment for personal use and to organize an internal wi-fi network to connect several computers within the apartment. But we urge you to pay due attention to the security of your wi-fi equipment.

The basic rules for organizing and configuring a private Wi-Fi network (if there is no task to make it public) are as follows:

  • Before the purchase network devices read the documentation carefully. Find out which protocols or encryption technologies they support. Check if your OS supports these encryption technologies. If not, then download the updates on the developer's website. If a number of technologies are not supported by the OS, then this should be supported at the driver level;
  • Pay attention to devices using WPA2 and 802.11i, because this standard uses new Advanced Encryption Standard (AES);
  • If the access point allows you to deny access to its settings using wireless connection then use this opportunity. Configure AP only by wire. Do not use SNMP protocol, web interface and telnet over the radio;
  • If the access point allows you to control client access by MAC addresses (Media Access Control, it can be called Access List in the settings), use this feature. Although the MAC address can be spoofed, it is nevertheless an additional barrier to an attacker;
  • If the equipment allows you to disable the broadcast of the SSID, use this option (the option may be called "closed network"), but in this case, the SSID can be intercepted when a legitimate client connects;
  • Deny access for clients with the default SSID "ANY" if the hardware allows it. Do not use simple SSIDs in your networks - come up with something unique that is not tied to the name of your organization and is not available in dictionaries. However, the SSID is not encrypted and can be easily intercepted (or spy on the client's PC);
  • Locate antennas as far as possible from windows, external walls of the building, and limit the power of radio emission to reduce the likelihood of connecting "from the street". Use directional antennas, do not use the default radio channel;
  • If you are prompted to choose between WEP, WEP/WPA (medium), WPA encryption technologies when installing network device drivers, select WPA (Pre-Shared Key (PSK) mode can be used in small networks). If your devices do not support WPA, be sure to enable at least WEP. When choosing a device, never buy something that does not even support 128bit WEP.
  • Always use the longest possible keys. 128-bit is the minimum (but if there are 40/64-bit cards on the network, then you won't be able to connect to them). Never prescribe simple, "default" or obvious keys and passwords in the settings (birthday, 12345), change them periodically (there is usually a convenient choice of four predefined keys in the settings - let customers know which day of the week which key is used ).
  • Do not give anyone information about how and with what passwords you connect (if passwords are used). Data corruption or theft, as well as listening to traffic by injecting it into the transmitted stream, is a very laborious task under the conditions that long dynamically changing keys are used. Therefore, it is easier for hackers to use the human factor;
  • If you use static keys and passwords, take care to change them frequently. It is better to do this to one person - the administrator;
    if the device settings offer a choice between "Shared Key" and "Open System" WEP authentication methods, select "Shared Key". If the AP does not support MAC filtering, then to enter the "Open System" it is enough to know the SSID, in the case of "Shared Key" the client must know the WEP key (www.proxim.com/ support/ all/ harmony/ technotes/ tn2001-08-10c.html). However, in the case of "Shared Key" interception of the key is possible, and the access key is the same for all clients. Because of this, many sources recommend "Open System";
  • Be sure to use a complex password to access the hotspot settings. If the access point does not allow you to restrict access with a password, its place is in a landfill;
  • If you are prompted to enter a passphrase to generate a key, then use a set of letters and numbers without spaces. When entering the WEP key manually, enter values ​​for all key fields (for hexadecimal notation, you can enter numbers 0-9 and letters a-f).
  • If possible, avoid using TCP/IP on wireless networks to organize folders, files, and shared printers. Organization of shared resources using NetBEUI tools in this case safer. Do not allow guest access to shared resources, use long complex passwords;
  • If possible, do not use DHCP in a wireless network - manually distributing static IP addresses between legitimate clients is safer;
  • Install firewalls on all PCs inside the wireless network, try not to install an access point outside the firewall, use a minimum of protocols inside the WLAN (for example, only HTTP and SMTP). The fact is that in corporate networks there is usually only one firewall - at the Internet access, while a hacker who has gained access via Wi-Fi can get into the LAN, bypassing the corporate firewall;
  • Regularly investigate the vulnerabilities of your network using specialized security scanners (including hacker ones like NetStumbler), update firmware and device drivers, install patches for Windows.

Please remember that if your wi-fi network is compromised and an attacker commits illegal actions on the Network on your behalf, it is very difficult to prove your innocence.

An important problem today is security in the global network, and this problem concerns absolutely everyone, from children to pensioners. In connection with the massive arrival of users on the Internet, this problem is becoming more urgent.


Not all users are ready to face the threats that await them in the Internet space. This review will focus on the issue of Internet security. After all, millions of users are facing this problem today.

Online dangers

In short, there are two potential possibilities for a virus to enter your computer. The first option is the fault of the user. Very often, users, by installing unverified software and traveling through dubious Internet resources, bring an infection to their computer. The second option is the activity of Trojans and viruses. Using these tools, attackers can deliberately make your device a source of danger.

As a result, the computer can start sending spam, steal passwords, and participate in DDoS attacks on websites without the knowledge of the owner. In some cases, the provider decides to forcefully disconnect the infected device from the global network. Thus, a user who has no idea about information security on the Internet will have a hard time.

Why attackers seek to gain access to a user's computer

Many users believe that no one needs access to their computer. But this is far from true. It used to be that hackers created viruses out of sheer curiosity. Today the situation is completely different. Now viruses are written with the expectation of commercial gain. A couple of decades ago, hackers got satisfaction only from the fact that they could get access to this or that information. Or, for example, remotely change the wallpaper and theme on the user's desktop. Today, every possible effort is being made to keep the PC user in the dark. Meanwhile, the device will secretly perform some additional functions. What is it for?

As mentioned at the beginning of the article, hackers today seek to gain access to user accounts and electronic payment systems. It is not uncommon for situations when at one moment all funds are debited from your e-wallet, and all your contacts in the mail receive letters with spam and trojans. Hackers today have a lot of opportunities, for example, they can connect infected computers into a single network and attack government servers.

Another simple option to get money from the user is to block operating system and demand some money to unlock it. Moreover, even if you pay the attackers the required amount, this does not mean at all that the computer will be immediately unlocked. Therefore, the safety of working on the Internet today is one of the priorities of the user.

How can attackers gain access to a computer?

Professional hackers use a number of methods to hack a personal computer. Users rely on anti-virus protection in vain. Even if you insure yourself in advance, there is still a chance of catching a virus or malware. Therefore, before searching the Internet for information about online security, it is important to understand the very mechanism of appearance on the Internet. personal computer viruses and trojans. The following will list the main ways they penetrate and gain access to the user's personal information.

The first method used by hackers is called social engineering. Through the use of tricks and psychological tricks, you open a letter sent by hackers containing a Trojan. It is noteworthy that you run the virus on your computer with your own hands. Another popular trick is offering free software. These are usually tricks containing many viruses and trojans.

By the way, even in software from trusted sources, security holes often appear. The same applies to operating systems. Attackers seize every opportunity. It is enough just to follow an unverified link - and your device is at risk of infection.

Recently, another way of spreading computer infection has gained popularity. This is the so-called phishing. Fakes of popular sites are created on the Internet. So instead official page your bank, you may find yourself on a fake copy of it. Let's not talk about what might happen next.

How to protect your PC?

Ideally, a user who has just purchased a personal computer must perform a whole range of operations before starting to conquer the Internet. Below are some recommendations for safe work in the Internet. In the operating room Windows system there is a built-in firewall.

But standard remedy protection does not provide the desired level of security. Therefore, it is recommended to install a more reliable firewall. And you will use the paid version or the free one - it depends only on your capabilities. The next step should be to install antivirus and antispyware software.

After installation, update them and set up automatic updates. It is better to make sure that the antivirus update starts automatically with the operating system. Check any installed program with an antivirus. When updates appear on the network for the browsers you use, try to download them immediately. To reduce the chances of hackers gaining access to various services, try to disable all unused components.

Information security lessons

Even if you have completed all the operations listed in the previous paragraph, do not forget about daily security measures. First of all, do not open files downloaded from unverified sources. It is also better to immediately delete letters of suspicious content. Do not pay attention to offers of easy money, and even more so do not send your logins and passwords to anyone. When registering, use complex passwords of symbols, letters and numbers. Assign a new original password each time.

Be careful when using the Internet in public areas. The same goes for using a proxy server. With this connection, it is advisable not to pay via the Internet. It is generally better to work with payment systems through special applications, and not through the official website. It's safer that way. Sites for adults are also undesirable. On such Internet resources, there is a high probability of picking up a Trojan. Even if you are using unlimited tariff, monitor internet traffic. A sudden increase in traffic for no reason is a serious cause for concern. Compliance with these simple rules of work on the Internet will allow you to avoid many problems.

This is far from all. A lot of dangers await you on the Internet, so you should not forget about protection even for a second.

Precautionary measures

Here are a few more tips to keep you safe on the Internet. If you receive an email asking you to send your password for verification, do not respond to it. Banks do not carry out such checks. Today, all email programs have a feature that allows you to filter spam.

Activate it. Also, messages about large winnings or inheritance should be ignored.
It is recommended to install programs that provide comprehensive PC protection. It is more reliable than using antivirus, antispyware and firewall from different manufacturers. And of course, it is worth considering that paid versions provide more reliable protection. Since the most common Internet browsers today are Internet Explorer and Opera, it is for them that there are most viruses.

Try alternatives internet browsers, such as GoogleChrome, MozillaFireFox, and AppleSafari. Try not to use unlicensed software: it may initially contain viruses and spyware. If you often make purchases in online stores, try to use only proven options. The same rule applies to all online services. It is enough to follow a few of these simple requirements, and you can ensure your safety on the Internet.

Internet and children

In recent years, there has been a big leap in the development of high technologies. In this regard, more and more children get the opportunity to independently access the Internet. And if quite recently children on the Internet were mainly interested only in games, today the situation has changed somewhat. You can probably guess what we are talking about.

Therefore, it became necessary to ensure the safety of children on the Internet. It is extremely difficult to organize such protection, since the Internet is developing completely uncontrollably. It contains a lot of information that children should not have access to. You should also pay attention to the basic rules when working on the Internet. This way you can teach your child to avoid Trojans and viruses. Children are the most inexperienced users. They can easily fall for the scammers. Therefore, it is very important to teach children how to use this information resource correctly.

Teaching kids how to use the internet

The main advice that can be given to all parents is to conduct at least the first sessions on the Internet with the child. It is advisable to use programs such as " Parental control". This will allow you to control the actions of the child. Limit your child's independent use of email programs. This can be extremely dangerous.

Recommendations

Try to organize your child's work on the Internet in such a way that he shares his successes and failures with you. Ask your child to tell you about everything that makes him worried. Also take some time and tell your child about what privacy is, help him choose a password for registering on information resources. Explain to your child that surfing the Internet safely will keep them out of trouble.

Let him know that on the Internet, no one should give personal information about himself. Also tell him that between the actions on the Internet and in real life no difference. Warn the child in advance that communication on the Internet can deceive his expectations, that in real life a person may not be at all who he claims to be. Be sure to install special software that allows you to control the activities of your children on the Internet.

Children from 14 to 16 years old

If your child is already adolescence, then you are unlikely to be able to tell him something new about computers. But still, do not forget about control. Remember the need to ensure information security. If the child has access to shared computer, then be sure to scan your computer for threats.

If all home devices are connected via a network, then the threat can grow into a serious problem. You can always view your child's activity reports. Try not to create conflict situations, but calmly communicate with the child on this issue. Let your child understand that there are certain rules for using the Internet.

It is better to install a computer with network access in public places. This will help to restrain the child a little. Also install software that will block your child's access to unwanted Internet sites and make sure that no new programs appear on your computer. Do not allow children to sit online for a long time, this can cause addiction. That's all the recommendations. We hope that these tips will help you improve the security of your home computer.

| Personal security on the Internet

Lesson 33
Personal security on the Internet

Memo on the safety of schoolchildren on the Internet

From the blog of Tatyana Vladimirovna Orlova

Every year there are more young people on the Internet, and schoolchildren are among the most active users of Runet. Meanwhile, in addition to a huge number of opportunities, the Internet also brings problems. This memo is to help you stay safe online.

Computer viruses

Computer virus- is a variety computer programs, a distinctive feature of which is the ability to reproduce. In addition to this, viruses can damage or completely destroy all files and data controlled by the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files in general. In most cases, viruses are spread via the Internet.

Anti-malware methods:

Use modern operating systems with a serious level of protection against malware;
Constantly install patches (digital patches that are automatically installed to improve the program) and other updates to your operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
Restrict physical access to the computer for unauthorized persons;
Use external media, such as a flash drive, disk or file from the Internet, only from qualified sources;
Work on your computer as a user, not an administrator. This will prevent most malware from being installed on your personal computer;
Use anti-virus software products from well-known manufacturers, with automatic update bases;
Do not open computer files received from unreliable sources. Even those files that your friend sent. Better ask him if he sent them to you.

WI-FI networks

WiFi- this is not a type of data transmission, not a technology, but just a brand, a brand. Back in 1991, the Dutch company registered the brand "WECA", which meant the phrase "Wireless Fidelity", which translates as "wireless precision". Another abbreviation has reached our time, which is the same technology. It is an abbreviation for Wi-Fi. This name was given with an allusion to the Hi-Fi standard of the highest sound technology, which means “high fidelity” in translation.

Yes, free Internet access in cafes, hotels and airports is a great opportunity to get online. But many experts believe that public Wi-Fi networks are not secure.

Security Tips for Using Public Wi-Fi Networks:

Do not share your personal information over public Wi-Fi networks. When working in them, it is advisable not to enter access passwords, logins and some numbers;
Use and update your antivirus software and firewall. Thus, you will protect yourself from downloading a virus to your device;
At using Wi-Fi Turn off the "File and Printer Sharing" feature. This function closed by default, but some users activate it for ease of use at work or school;
Do not use public WI-FI to transfer personal data, for example, to access social networks or email;
Use only a secure connection via HTTPS, not HTTP, ie. when typing a web address, enter exactly “https://”;
Turn off "Connect to Wi-Fi automatically" on your mobile phone. Prevent the device from automatically connecting to WiFi networks without your consent.

Social networks are actively entering our lives, many people work and live there permanently, and a billion people are already registered on Facebook, which is one seventh of all the inhabitants of the planet. Many users do not realize that the information they post on social networks can be found and used by anyone, including not necessarily with good intentions.

Limit your friends list. You should not have random and unfamiliar people in your friends;
Protect your privacy. Do not provide passwords, phone numbers, addresses, your date of birth or other personal information. Attackers can even use information about how you and your parents plan to spend your holidays;
Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you post, write and upload;
If you are talking to people you do not know, do not use your real name and other personal information: name, place of residence, place of study, etc.;
Avoid posting photos on the Internet that show you in an area that can be used to determine your location;
When registering on a social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
You must use different passwords for the social network, mail, and other sites. Then if you get hacked, then the attackers will get access to only one place, and not all at once.

Electronic money

Electronic money- this is a very convenient payment method, but there are scammers who want to get this money.

Electronic money appeared quite recently and it is because of this that in many states it is still not spelled out about them in the laws. In Russia, they function and they are already spelled out in the law, where they are divided into several types - anonymous and not anonymous. The difference is that anonymous ones are those in which transactions are allowed without user identification, while in non-anonymous user identification is mandatory.

It is also necessary to distinguish between electronic fiat money (equal to state currencies) and electronic non-fiat money (not equal to state currencies).

Basic tips for safe work with electronic money:

Link to account mobile phone. This is the most convenient and fastest way to restore access to your account. The linked phone will help if you forget your payment password or access the site from an unfamiliar device;
Use one-time passwords. After switching to enhanced authorization, you will no longer be in danger of theft or interception of your payment password;
Choose a complex password. It will not be easy for criminals to guess a complex password. Strong passwords are passwords that are at least 8 characters long and include uppercase and lowercase letters, numbers, and multiple symbols such as the dollar sign, pound sign, exclamation point, and so on. For example, $tR0ng!;;
Do not enter your personal data on sites you do not trust.

Email

Electronic mail is a technology and the services it provides for sending and receiving electronic messages that are distributed in computer network. Typically, an e-mail box looks like this: user_name@domain_name. Also, in addition to transferring plain text, it is possible to transfer files.

Basic email security tips:

You need to choose the right postal service. There is a huge selection of free email services on the Internet, but it is better to trust those you know and who are the first in the ranking;
Do not include personal information in personal mail. For example, it's better to select "music_fan@" or "rock2013" instead of "theme13";
Use two-step authorization. This is when, in addition to the password, you need to enter a code sent via SMS;
Choose a complex password. Each mailbox must have its own strong, hack-resistant password;
If there is an opportunity to write your own personal question, use this opportunity;
Use multiple mailboxes. The first one is for private correspondence with recipients you trust. This is email address do not use when registering on forums and sites;
Do not open files and other attachments in emails, even if they come from your friends. Better ask them if they sent you these files;
After finishing work on mail service Before closing the tab with the site, do not forget to click on "Exit".

Cyberbullying or virtual bullying

Cyberbullying- harassment with messages containing insults, aggression, intimidation; hooliganism; social boycott through various Internet services.

Key tips for dealing with cyberbullying:

Don't jump into the fight. The best way: consult how to behave and, if there is no one to whom you can turn, then first calm down. If you begin to respond with insults for insults, you will only ignite the conflict even more;
Manage your cyber reputation;
Anonymity in the network imaginary. There are ways to find out who is behind an anonymous account;
You should not lead a hooligan image of a virtual life. The Internet captures all your actions and saves them. It will be extremely difficult to remove them;
Respect your virtual honor from a young age;
Ignore a single negative. One-time offensive messages are best ignored. Usually aggression stops at the initial stage;
Ban the aggressor. In instant messaging programs, social networks have the ability to block sending messages from certain addresses;
If you are a witness to cyberbullying. Your actions: to speak out against the stalker, show him that his actions are evaluated negatively, support the victim who needs psychological help, inform adults about the fact of aggressive behavior on the network.

Mobile phone

Modern smartphones and tablets contain quite adult functionality, and now they can compete with desktop computers. However, there are still very few means of protection for such devices. Testing and searching for vulnerabilities in them is not as intensive as for PCs, the same applies to mobile applications. Modern mobile browsers have almost caught up with their desktop counterparts, but the expansion of functionality entails more complexity and less security. Not all manufacturers release updates that cover critical vulnerabilities for their devices.

Basic tips for mobile phone security:

Nothing is truly free. Be careful, because when you are offered free content, it may contain some paid services;
Think before you send SMS, photo or video. Do you know exactly where they will end up?
You need to update the operating system of your smartphone;
Use anti-virus programs for mobile phones;
Do not download applications from an unknown source, as they may contain malicious software;
After you leave the site where you entered personal information, go to your browser settings and delete cookies;
Periodically check which paid services are activated on your number;
Give your mobile phone number only to people you know and trust;
Bluetooth must be turned off when you are not using it. Don't forget to check it sometimes.

Online games

Modern Online Games is a colorful, exciting entertainment that unites hundreds of thousands of people around the world. Players explore the world given to them, communicate with each other, complete tasks, fight monsters and gain experience. They pay for pleasure: they buy a disc, pay for a subscription, or purchase some options.

All these funds are spent on maintaining and developing the game, as well as on security itself: authorization systems are being improved, new patches are being released (digital patches for programs), server vulnerabilities are being closed. In such games, it is not so much your rivals that you should be afraid of, but the theft of your password, on which the authorization system of most games is based.

Basic tips for the security of your gaming account:

If another player behaves badly or creates trouble for you, block him in the list of players;
Complain to the game administrators about the bad behavior of this player, it is advisable to attach some evidence in the form of screenshots;
Do not provide personal information in the game profile;
Respect other participants in the game;
Do not install unofficial patches and mods;
Use complex and different passwords;
Even during the game, do not turn off the antivirus. While you are playing, your computer may be infected.

Phishing or identity theft

The usual theft of money and documents today is no surprise to anyone, but with the development of Internet technologies, attackers have moved to the Internet and continue to do their “favorite” business. This is how a new threat appeared: Internet fraud or phishing, the main purpose of which is to obtain confidential user data - logins and passwords. On the English language phishing reads like phishing (from fishing - fishing, password - password).

Top tips for fighting phishing:

Follow your account. If you suspect that your profile has been hacked, then you need to block it and inform the resource administrators about it as soon as possible;
Use secure websites, including online stores and search engines;
Use complex and different passwords. Thus, if you are hacked, then the attackers will have access to only one of your profiles on the network, and not to all;
If you have been hacked, then you need to warn all your friends who are added to your friends that you have been hacked and, possibly, spam and links to phishing sites will be sent on your behalf;
Install strong password(PIN) to a mobile phone;
Disable password saving in the browser;
Do not open files and other attachments in emails, even if they come from your friends. Better check with them if they sent you these files.

Digital Reputation

Digital Reputation- this is negative or positive information on the network about you. Compromising information posted on the Internet can seriously affect your real life. "Digital reputation" is your image, which is formed from information about you on the Internet. Your place of residence, studies, your financial situation, character traits and stories about loved ones - all this accumulates in the network.

Many teens are reckless about posting personal information online, not understanding the potential repercussions. You will not even be able to guess that a photo posted 5 years ago was the reason for not hiring you.