6A Flashcards
Cybersecurity experts estimate that ___% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to the DoD’s principal cyber advisor.
90%
___ ___ refers to the practices and steps that maintain system health and improve online security.
Cyber hygiene
___ monitor data packets passing through them, and either allow or
disallow network traffic through to the internal network.
Firewalls
Typically, firewalls are managed by an organization’s network ____.
administrators
An organization’s administrators should enforce standardized antivirus software installation across the network. For antivirus software to be effective, updated ___ ___ should be regularly pushed
out to users to protect their systems.
virus definitions
Antivirus software should regularly perform ___ ___ to ensure the system does not contain any malicious software. Users should allow these scans to happen and not interfere with them
security scans
Administrators should scan all the devices and applications on the network from a central point on a ___ ___, and remotely patch and deactivate as necessary.
regular basis
On the Air Force network most users will typically use their common access card (CAC) paired with a PIN. However, many systems and websites require the use of usernames and passwords. In such cases, you should create and maintain ___ and ___ passwords to protect your accounts.
long and complex
Industry recommendation is for passwords to have the following:
- Minimum 18 characters in length. Longer is better.
- Include numbers, symbols, capital letters and lower-case letters. A mix of characters is stronger.
- Don’t use a word that would be in a dictionary. These are easy to crack.
- Don’t rely on obvious substitutions. Replacing a single letter in a dictionary word with a number is obvious and easy to crack.
All of that said, it may be difficult for someone to remember a password of random characters like “3o(t&gSp&3hZ4#t97!.” This is a strong password, but if you must save it to a document or write it
down…?
it is not secure
Additionally, it is important to not use the ___ ___ for multiple services.
same password
Again, personal password-management software is useful for handling the legwork of password creation and use. These secure wallets are ___ and ___ by a single master password.
encrypted and protected
Software patches, including operating system updates, are often issued to address security problems. Enable automatic software updates to make sure your software is kept up to date. Typically, ___ ___ are required on Windows OS machines. Restart your device regularly to apply the updates.
hardware resets
Consider periodically backing up your important data. This data should be stored offline, meaning on a storage device that can be detached from your computer. On DoD computers, however, removable storage is typically not permitted. In these cases, back up your data in multiple locations, such as ___ ___ and shared network drives.
cloud storage
Yes, ___ ___ can be long and complex, but they tell you how the sites maintain accuracy, access, security, and control of the personal information they collect; how the site uses the information,
and whether information is provided to third parties.
privacy policies