Cybersecurity for your personal computer: Difference between revisions

no edit summary
No edit summary
No edit summary
Line 19: Line 19:
   
   
== Passwords == <!--T:10-->
== Passwords == <!--T:10-->
Strong passwords are essential to keep your computer and your accounts secure.  Refer to [https://docs.alliancecan.ca/wiki/Cybersecurity_for_your_personal_computer#Password_hygiene_habits Password hygiene habits] for more tips.
Strong passwords are essential to keep your computer and your accounts secure.  Refer to [[Cybersecurity for your personal computer#Password_hygiene_habits|Password hygiene habits]] for more tips.
   
   
== Antivirus ==
== Antivirus ==
Line 75: Line 75:


= Safe browsing and MFA  = <!--T:24-->
= Safe browsing and MFA  = <!--T:24-->
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share as members of the Alliance.
We rely on a variety of online resources and accounts to help us in our work and to tackle tasks effectively. How we access these tools and how we behave online can have a significant impact on our personal security and the security of the resources we share.


<!--T:25-->
<!--T:25-->
Taking control of the information we share with online service providers, limiting the extent to which commercial entities can track our activity, and thinking about how we authenticate to online accounts can all have a security benefit.
Taking control of the information we provide to online service providers, limiting the extent to which commercial entities can track our activity, and thinking about how we authenticate to online accounts can all have a security benefit.


<!--T:26-->
<!--T:26-->
We can start where we are and start today. We can choose to share less personal information voluntarily when responding to requests, signing up for services, posting on social media, and make the task of connecting the dots about who we are and what we do on and off line more challenging for attackers.
We can start where we are and start today. We can choose to share less personal information voluntarily when responding to requests, signing up for services, posting on social media. The less personal information you share about yourself, the harder it is for an attacker to connect those pieces of information and use them to target you.


<!--T:27-->
<!--T:27-->
We can choose to use privacy-enhancing search tools like DuckDuckGo ([https://duckduckgo.com/ duckduckgo.com]), install browser extensions like Privacy Badger ([https://privacybadger.org/ privacybadger.org]), HTTPS Everywhere ([https://www.eff.org/https-everywhere eff.org/https-everywhere]), uBlock Origin ([https://ublockorigin.com/ ublockorigin.com]). We can limit the use of cookies via browser settings, and turn on features that sandbox the links and tracking tools of social media companies ([https://www.mozilla.org/en-US/firefox/facebookcontainer/ mozilla.org/en-US/firefox/facebookcontainer]).
We can choose to use privacy-enhancing search tools like DuckDuckGo ([https://duckduckgo.com/ duckduckgo.com]), install browser extensions like Privacy Badger ([https://privacybadger.org/ privacybadger.org]), HTTPS Everywhere ([https://www.eff.org/https-everywhere eff.org/https-everywhere]), uBlock Origin ([https://ublockorigin.com/ ublockorigin.com]). We can limit the use of cookies via browser settings and turn on features that limit the links and tracking tools of social media companies ([https://www.mozilla.org/en-US/firefox/facebookcontainer/ mozilla.org/en-US/firefox/facebookcontainer]).


<!--T:28-->
<!--T:28-->
Line 105: Line 105:


<!--T:36-->
<!--T:36-->
Make sure you understand [https://docs.alliancecan.ca/wiki/Sharing_data#Filesystem_permissions how Linux permissions work], and restrict access to your files in our supercomputers to only those who need access to them.
Make sure you understand [[Sharing data#Filesystem_permissions|how Linux permissions work]] and restrict access to your files in our supercomputers to only those who need access to them.




<!--T:37-->
<!--T:37-->
'''''Mistake 2''''': Not using ''sticky bit'', leading to the deletion of your files by someone else.
'''''Mistake 2''''': Not using the ''sticky bit'', leading to the deletion of your files by someone else.


<!--T:38-->
<!--T:38-->
When dealing with a shared directory where multiple users have read, write and execute permission, the issue of ensuring that an individual cannot delete the files or directories of another can arise. Make sure you are familiar with [https://docs.alliancecan.ca/wiki/Sharing_data#The_Sticky_Bit the notion of sticky bit] and use it when appropriate.  
When dealing with a shared directory where multiple users have read, write and execute permission, the issue of ensuring that an individual cannot delete the files or directories of another can arise. Make sure you are familiar with [[Sharing data#The_Sticky_Bit|the notion of sticky bit]] and use it when appropriate.  




Line 119: Line 119:


<!--T:40-->
<!--T:40-->
[https://docs.alliancecan.ca/wiki/Sharing_data#Access_control_lists_.28ACLs.29 Managing ACLs (Access Control Lists)] can quickly become complex. It is best practice to use groups rather than multiple individual accounts to grant permissions when possible.  
[[Sharing data#Access_control_lists_.28ACLs.29|Managing ACLs (Access Control Lists)]] can quickly become complex. It is best practice to use groups rather than multiple individual accounts to grant permissions when possible.  


</translate>
</translate>
rsnt_translations
56,430

edits