Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
Computer security
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Digital hygiene=== Related to end-user training, '''digital hygiene''' or '''cyber hygiene''' is a fundamental principle relating to information security and, as the analogy with [[personal hygiene]] shows, is the equivalent of establishing simple routine measures to minimize the risks from cyber threats. The assumption is that good cyber hygiene practices can give networked users another layer of protection, reducing the risk that one vulnerable node will be used to either mount attacks or compromise another node or network, especially from common cyberattacks.<ref name="Cyber Hygiene">{{cite web |title=Cyber Hygiene β ENISA |url=https://www.enisa.europa.eu/publications/cyber-hygiene |access-date=27 September 2018 |language=en-gb}}</ref> Cyber hygiene should also not be mistaken for [[proactive cyber defence]], a military term.<ref name="Kaljulaid-2017">{{cite web |last=Kaljulaid |first=Kersti |date=16 October 2017 |title=President of the Republic at the Aftenposten's Technology Conference |url=https://president.ee/en/official-duties/speeches/13671-president-of-the-republic-at-the-aftenpostens-technology-conference/index.html |access-date=27 September 2018}}</ref> The most common acts of digital hygiene can include updating malware protection, cloud back-ups, passwords, and ensuring restricted admin rights and network firewalls.<ref>{{Cite web |title=Cyber security breaches survey 2023 |url=https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023 |access-date=2023-12-27 |website=GOV.UK |language=en}}</ref> As opposed to a purely technology-based defense against threats, cyber hygiene mostly regards routine measures that are technically simple to implement and mostly dependent on discipline<ref>{{Cite news |last=Kuchler |first=Hannah |date=27 April 2015 |title=Security execs call on companies to improve 'cyber hygiene' |work=Financial Times |url=https://www.ft.com/content/8468cfda-e9e3-11e4-a687-00144feab7de |url-access=subscription |access-date=27 September 2018 |archive-url=https://ghostarchive.org/archive/20221210/https://www.ft.com/content/8468cfda-e9e3-11e4-a687-00144feab7de |archive-date=10 December 2022}}</ref> or education.<ref>{{Cite news |title=From AI to Russia, Here's How Estonia's President Is Planning for the Future |language=en-US |magazine=Wired |url=https://www.wired.com/story/from-ai-to-russia-heres-how-estonias-president-is-planning-for-the-future/ |access-date=28 September 2018}}</ref> It can be thought of as an abstract list of tips or measures that have been demonstrated as having a positive effect on personal or collective digital security. As such, these measures can be performed by laypeople, not just security experts. Cyber hygiene relates to personal hygiene as computer viruses relate to biological viruses (or pathogens). However, while the term ''computer virus'' was coined almost simultaneously with the creation of the first working computer viruses,<ref>{{Cite news |date=1 November 2017 |title=Professor Len Adleman explains how he coined the term "computer virus" |language=en-US |work=WeLiveSecurity |url=https://www.welivesecurity.com/2017/11/01/professor-len-adleman-explains-computer-virus-term/ |access-date=28 September 2018}}</ref> the term ''cyber hygiene'' is a much later invention, perhaps as late as 2000<ref>{{cite web |title=Statement of Dr. Vinton G. Cerf |url=https://www.jec.senate.gov/archive/Documents/Hearings/cerf22300.htm |access-date=28 September 2018 |website=www.jec.senate.gov}}</ref> by Internet pioneer [[Vint Cerf]]. It has since been adopted by the [[United States Congress|Congress]]<ref>{{USBill|115|HR|3010|pipe=Promoting Good Cyber Hygiene Act of 2017|site=yes}}</ref> and [[United States Senate|Senate]] of the United States,<ref>{{cite news |title=Analysis {{!}} The Cybersecurity 202: Agencies struggling with basic cybersecurity despite Trump's pledge to prioritize it |language=en |newspaper=The Washington Post |url=https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/07/26/the-cybersecurity-202-agencies-struggling-with-basic-cybersecurity-despite-trump-s-pledge-to-prioritize-it/5b58a84e1b326b1e64695548/ |access-date=28 September 2018}}</ref> the FBI,<ref>{{cite web |title=Protected Voices |url=https://www.fbi.gov/investigate/counterintelligence/foreign-influence/protected-voices |access-date=28 September 2018 |website=Federal Bureau of Investigation |language=en-us}}</ref> [[European Union|EU]] institutions<ref name="Cyber Hygiene" /> and heads of state.<ref name="Kaljulaid-2017" />
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
Computer security
(section)
Add topic