End-user Computer Security/Main content/What to do when you discover your computer has been hacked
Jump to navigation
Jump to search
End-user Computer Security
Inexpensive security
for |
⦾ individuals |
What to do when you discover your computer has been hacked | / Chapter 9 | |
|
Backing-up files[edit | edit source] |
|
If it is ever discovered that a computer has been hacked,
🛡 | i) | restarting the computer into some kind of safe-mode with WiFi, Bluetooth, NFC and other things deactivated, might be a secure way to get access to your files so that you can back them up. |
🛡 | ii) | However, likely more secure than this is to run off the same computer, another operating system installation using a physical drive that was never previously used with the computer, or a live DVD/CD, and then access your files through the other OS installation or live DVD/CD so that you can back them up. |
🛡 | iii) | Even more secure, is to take the drive out containing your files, interface with the drive using a completely different computer that is running a live DVD/CD, and then access your files through the live DVD/CD in order to back them up. |
When to change digital passwords and keys?[edit | edit source] |
|
You may be tempted to change such security credentials straight-away after discovering that you have been hacked. However, could it be better to wait until you are sure that your system is secure rather than changing such credentials using an unsecure system?
Further information[edit | edit source] |
|
The National Cyber Security Centre for the UK (NCSC) outlines steps to be urgently taken when you’ve discovered you’ve been infected with malware. Also, see here for their guide for small businesses on response and recovery from cyberattacks.
Chapter 8 Broad security principles |
Chapter 10 Miscellaneous notes |
Categories:
- Book:End-user Computer Security/Hash-tagged/#️Software/#️Malware
- Book:End-user Computer Security/Hash-tagged/#️Software
- Book:End-user Computer Security/Hash-tagged
- Book:End-user Computer Security
- Book:End-user Computer Security/Hash-tagged/#Security credentials
- Book:End-user Computer Security/Hash-tagged/#Security credentials/#Passwords
- Book:End-user Computer Security/Hash-tagged/#Security credentials/#digital keys
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering/#Tamper prevention
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering
- Book:End-user Computer Security/Hash-tagged/#Backing up, backups
- Book:End-user Computer Security/Hash-tagged/#Digital storage
- Book:End-user Computer Security/Hash-tagged/#Physical security
- Book:End-user Computer Security/Hash-tagged/#Security induced by specific computer power state
- Book:End-user Computer Security/Book part/Main content/Chapters/«What to do when you discover your computer has been hacked», chapter 9
- Book:End-user Computer Security/Book part/Main content/Chapters
- Book:End-user Computer Security/Book part/Main content
- Book:End-user Computer Security/Book part
- Book:End-user Computer Security/Hash-tagged/#Backing up, backups/#Backing-up files
- Book:End-user Computer Security/Hash-tagged/#Security credentials/#Changing security credentials