Prevention is always better than cure. Always alert to everything, just to function properly. You must be part of a cyber life. : Care, prevention, conservation, protection and tenacity saileshkumar Zarkar, technical adviser and the Mumbai police cyber crime, network security, 5P mantra for online security specialist advocates cells. Consider the following issues must be user
There is no information about you 1.For electronic harassment does not occur to avoid. It is not known to hide their identity, but also public places.
2.always foreigners, in particular, a photograph photos online and chat with friends, to prevent abuse were reported.
And anti-virus software, virus attacks 3.always access to the latest updates to protect against.
The amount of pollution in the loss of all data 4.Always virus can be recovered
Your credit card number of each site, to protect against fraud 5.never not safe.
Child abuse and corruption 6.always sites your kids or take a look at all areas of a form of resistance.
8.web site traffic and site owners for any irregularities should be tested. Host Intrusion Detection can be based on the device for the server.
9.Use firewall may be helpful.
And 10. The web server is physically separated from public areas must be protected from the internal corporate network.
In Bangladesh, information technology and communication to Parliament a bill is prepared.
There is no information about you 1.For electronic harassment does not occur to avoid. It is not known to hide their identity, but also public places.
2.always foreigners, in particular, a photograph photos online and chat with friends, to prevent abuse were reported.
And anti-virus software, virus attacks 3.always access to the latest updates to protect against.
The amount of pollution in the loss of all data 4.Always virus can be recovered
Your credit card number of each site, to protect against fraud 5.never not safe.
Child abuse and corruption 6.always sites your kids or take a look at all areas of a form of resistance.
8.web site traffic and site owners for any irregularities should be tested. Host Intrusion Detection can be based on the device for the server.
9.Use firewall may be helpful.
And 10. The web server is physically separated from public areas must be protected from the internal corporate network.
In Bangladesh, information technology and communication to Parliament a bill is prepared.
No comments:
Post a Comment