Module5 (1)
Module5 (1)
A. Use Encryption: Encrypt your sensitive data, both on your devices and when
transmitting over networks. This ensures that even if your data is intercepted, it
remains unreadable without the encryption key.
Encryption is the process of converting information or data into a code to prevent
unauthorized access. It ensures that even if someone intercepts the data, they won't
be able to understand it without the encryption key. Here are some common ways
encryption is used to enhance security:
1. Data Encryption at Rest: This involves encrypting data stored on your devices,
such as laptops, smartphones, or external hard drives. If someone gains physical
access to your device, they won't be able to access the data without the decryption
key.
3. End-to-End Encryption (E2EE): E2EE ensures that data is encrypted from the
sender's device all the way to the recipient's device, with only the sender and
recipient having access to the decryption keys. This prevents intermediaries,
including service providers, from accessing the plaintext data.
4. File and Folder Encryption: Some operating systems and third-party software
allow you to encrypt individual files or folders. This is useful for protecting
specific sensitive documents or data on your device.
6. Full Disk Encryption (FDE): FDE encrypts the entire contents of a disk drive,
including the operating system and system files. This protects the data stored on
the disk in case the device is lost or stolen.
10. Secure Web Gateways (SWG): SWG software filters and monitors web
traffic to protect users from web-based threats such as malware, phishing, and
malicious websites. It enforces security policies and controls access to web
content.
- Enable the Firewall: Ensure that the firewall is enabled on your device or
network device. By default, most firewalls are enabled, but it's essential to verify.
- Define Security Rules: Set up firewall rules to specify which types of traffic are
allowed or blocked. You can create rules based on protocols, ports, IP addresses, or
applications. For example, block incoming traffic on specific ports known to be
exploited by malware.
- Regularly Review and Update Rules: Periodically review and update firewall
rules to reflect changes in your network environment and security requirements.
Remove unnecessary rules and tighten security where possible.
- Monitor Firewall Logs: Monitor firewall logs regularly to detect and investigate
suspicious activities, such as intrusion attempts or unauthorized access attempts.
Configure alerts to notify you of potential security incidents.