End-user Computer Security/Main content/Miscellaneous notes

From Wikibooks, open books for an open world
Jump to navigation Jump to search
Electronic-security artwork (lock & circuit-board patterns).jpg
=𓆉

End-user Computer Security
Inexpensive security

for   

individuals
sole traders
small businesses

Miscellaneous notes  /  Chapter 10
[edit]

⬆ Up-vote section | Miscellaneous notes (chapter 10) ⬇ Down-vote section | Miscellaneous notes (chapter 10)

National Cyber Security CentreExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | National Cyber Security Centre ⬇ Down-vote section | National Cyber Security Centre

Cyber-security advice is freely available on the National Cyber Security Centre (NCSC) website. Specific NCSC information that may be of interest to you:

⦾  For small businesses: general information; online security.
⦾  Listed, advertised, and supported security products and services.
⦾  Advice and guidance on the issue of authentication.
⦾  Security advice on home and mobile working.
⦾  Information on cyber security in relation to GDPR (General Data Protection Regulation).
⦾  Information on security in relation to computer peripherals

(such as USB keyboards, Bluetooth devices, memory sticks, etc.)

⦾  8 Principles of Secure Development & Deployment.
⦾  Secure design principles: Guides for the design of cyber secure systems” publication
⦾  Information and guidance on the importance of having high security specifically for your email account.
⦾  Guidance on whether you need to use antivirus software on your Android device.
⦾  Information explaining what is malware and how to defend against it.

CybersecurityExtlink for End-user Computer Security book -B5.svg standards[edit]

⬆ Up-vote section | Cybersecurity standards ⬇ Down-vote section | Cybersecurity standards

See here for cybersecurity-standards information from which might be obtained, insights into the security measures and processes helpful for an entity’s security.

Deep hardwareExtlink for End-user Computer Security book -B5.svg hackingExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Deep hardware hacking ⬇ Down-vote section | Deep hardware hacking

Consideration of deep hardware-hacking attacks is probably an overkill for most individuals, sole traders and small businesses—have to draw the line somewhere. However, if you are interested in defending against such attacks, the Novena open-source computing hardware platform and other related information hosted here, may be of interest to you.

Cryptocurrency securityExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Cryptocurrency security ⬇ Down-vote section | Cryptocurrency security

If you are interested in adopting security measures suggested for Bitcoin users, have a look at the Glacier protocol.

Using phonesExtlink for End-user Computer Security book -B5.svg and computers as motion detector alarmsExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Using phones and computers as motion detector alarms ⬇ Down-vote section | Using phones and computers as motion detector alarms

Phones and computers can be turned into motion detector alarms, by using their built-in cameras and other sensors, with apps such as the “Haven: Keep Watch” app. This could provide extra security during sleeping hours. Psychic phenomena, including phenomena that have been verified and accepted by the scientific community, might be able to induce a person to stay asleep or suffer amnesia whilst intruders enter premises and room whilst the person is asleep; technological measures such as loud alarms may be helpful to defend against such attacks.

SteganographyExtlink for End-user Computer Security book -B5.svg: easy hiding of information in computer documentsExtlink for End-user Computer Security book -B5.svg[edit]

⬆ Up-vote section | Steganography: easy hiding of information in computer documents ⬇ Down-vote section | Steganography: easy hiding of information in computer documents

White-on-white text in computer documents and emails can be used for hiding and sending security sensitive information. This might be both simple and effective for low threat models.


Previous chapter: chapter 9, entitled 'What to do when you discover your computer has been hacked'

Chapter 9
What to do when you discover your computer has been hacked
Go to page for contents, index, and foreword

Contents, Index, Foreword

Appendix:
New security inventions requiring
a non‑trivial investment in new technology
Next section: Part 1 of Appendix, entitled 'New security inventions requiring a non‑trivial investment in new technology'