Studying

INFORMATION MEMO
FOR STUDENTS TO EMBED
ON THE OFFICIAL INTERNET RESOURCES

Every year, young people on the Internet to become more, and students are one of the most active users of the Runet. Meanwhile, in addition to the huge number of opportunities, the Internet is and problems. This memo should help you stay online safely.

Computer virus

A computer virus is a type of computer program, the distinctive feature of which is the ability to reproduce. In addition, viruses can damage or completely destroy all files and data under the control of the user on whose behalf the infected program was launched, as well as damage or even destroy the operating system with all files in General. In most cases, viruses spread over the Internet.
Anti-malware methods:
1. Use modern operating systems that have a serious level of protection against malware;
2. Constantly install pachti (digital patches, which are automatically installed to finalize the program) and other updates to its operating system. Download them only from the official website of the OS developer. If there is an automatic update mode, turn it on;
3. Use your computer as a user, not as an administrator. This will prevent most malware from installing on your personal computer;
4. Use anti-virus software products of well-known manufacturers, with automatic database update;
5. Restrict physical access to the computer for unauthorized persons;
6. Use external media, such as a flash drive, disk or file from the Internet, only from trusted sources;
7. Do not open computer files obtained from unreliable sources. Even those files which are sent to your friend. Better check with him if he sent them to you.

WI-FI network

Wi - Fi is not a type of data transmission, not a technology, but only a brand, a brand. Back in 1991, the Dutch company registered the brand "WECA", which means the phrase "Wireless Fidelity", which translates as "wireless accuracy".
Another abbreviation, which is the same technology, has reached our time. That's the abbreviation for Wi-Fi. This name was given with a hint of the standard of the highest sound technology Hi-Fi, which means "high accuracy".
Yes, free Internet access in cafes, hotels and airports is a great opportunity to access the Internet. But many experts believe that public Wi-Fi networks are not secure.
Security tips for working in public Wi-fi networks:
1. Do not share your personal information over public Wi-Fi networks. Working in them, it is desirable not to enter passwords, logins and some numbers;
2. Use and update anti-virus software and a firewall. Thus you will protect yourself from downloading the virus on your device;
3. When using Wi-Fi, please disable the "share files and printers". This feature is closed by default, but some users enable it for ease of use in work or school;
4. Do not use public WI-FI to transfer personal data, for example, to access social networks or e-mail;
5. Use only a secure connection via HTTPS, not HTTP, ie when typing web addresses enter it " https://";
6. In your mobile phone, turn off the "automatically Connect to Wi-Fi"feature. Do not automatically connect your device to Wi-Fi networks without your consent.

Social network

Social networks are actively included in our lives, many people work and live there permanently, and Facebook has already registered a billion people, which is one seventh of all the inhabitants of the planet. Many users do not understand that the information they post on social networks can be found and used by anyone, including not necessarily with good intentions.
Basic security tips on social media:
1. Limit the list of friends. You shouldn't have random and unfamiliar people as friends.;
2. Protect your privacy. Do not include passwords, phone numbers, addresses, your date of birth and other personal information. Attackers can even use information about how you and your parents plan to spend the holidays;
3. Protect your reputation - keep it clean and ask yourself: would you like other users to see what you upload? Think before you publish something, write and upload;
4. If you are talking to people you do not know, do not use your real name and other personal information: name, place of residence, place of study, etc;
5. Avoid posting photos on the Internet, where you are depicted on the ground, which can determine your location;
6. When registering on the social network, you must use complex passwords consisting of letters and numbers and with at least 8 characters;
7. For social network, email and other sites you need to use different passwords. Then if you get hacked, the attackers will have access to only one place, not all at once.

Electronic money

E - money is a very convenient payment method, but there are scammers who want to get this money.
Electronic money appeared quite recently and because of this in many States is still not registered about them in the laws.
In Russia, they function and they are already spelled out in the law, where they are divided into several types - anonymous and not anonymous. The difference is that anonymous ones are those that allow operations without user identification, and in non - anonymous ones, user identification is mandatory.
It is also necessary to distinguish between electronic Fiat money (equal to state currencies) and electronic non-Fiat money (not equal to state currencies).
Basic tips for safe working with e-money:
1. Tie the mobile phone to the account. This is the most convenient and quick way to restore access to the account. A linked phone will help if you forget your payment password or visit the site from an unfamiliar device;
2. Use one-time passwords. After switching to enhanced authorization you will no longer be in danger of theft or interception of the payment password;
3. Choose a strong password. Criminals will not just guess a complex password. Strong passwords are passwords that contain at least 8 characters and include lowercase and uppercase letters, numbers, and several characters, such as the dollar sign, pound sign, exclamation mark, etc. for example, $tR0ng!;;
4. Don't enter your personal information on sites you don't trust.

Email

E - mail is a technology and the services it provides to send and receive e-mail messages that are distributed over a computer network. Typically, the e-mail mailbox looks like this: username@domain_name. Also, in addition to the transfer of plain text, it is possible to transfer files.
Basic tips for safe e - mail:
1. You have to choose the right mail service. The Internet has a huge selection of free email services, but it is better to trust those who know and who is the first in the ranking;
2. Don't put any personal information in your personal email. For example, it is better to choose "muzykalnyy@" or "рок2013" instead of "тема13";
3. Use two-step authorization. This is when in addition to the password you need to enter the code sent by SMS;
4. Choose a strong password. For each mailbox must be a strong, resistant to hacking password;
5. If you have the opportunity to write your own personal question, use this opportunity;
6. Use multiple mailboxes. The first is for private correspondence with recipients you trust. This email address should not be used when registering on forums and websites;
7. Don't open files and other attachments in emails, even if they came from your friends. Better check with them if they sent you these files;
8. After finishing work on the mail service before closing the tab with the site do not forget to click on "Exit".

Cyber bullying or virtual abuse

Cyberbullying-harassment with messages containing insults, aggression, intimidation; hooliganism; social boycotting with the help of various Internet services.
Basic tips to combat cyberbullying:
1. Don't fight. The best way: to consult how to behave and, if there is no one to whom you can apply, then first calm down. If you start to respond with insults to insults, you will only further inflame the conflict;
2. Manage your cyber;
3. The anonymity of the Internet is imaginary. There are ways to find out who is behind an anonymous account;
4. It is not necessary to lead a hooligan way of virtual life. The Internet records all your actions and saves them. It will be extremely difficult to remove them;
5. Keep your virtual honor young;
6. Ignore the single negative. Disposable offensive messages it is better to ignore. Usually the aggression is stopped at the initial stage;
7. Ban the aggressor. In instant messaging programs, social networks have the ability to block the sending of messages from certain addresses;
8. If you're a witness to cyberbullying. Your actions: to oppose the persecutor, to show him that his actions are evaluated negatively, to support the victim who needs psychological help, to inform adults about the fact of aggressive behavior in the network.

Mobile phone

Modern smartphones and tablets contain quite adult functionality, and now they can compete with desktop computers. However, there are very few protection means for such devices. Testing and finding vulnerabilities in them is not as intense as for the PC, the same applies to mobile applications.
Modern mobile browsers have almost caught up with desktop counterparts, but the expansion of functionality entails more complexity and less security.
Not all manufacturers release updates that cover critical vulnerabilities for their devices.