Nchekwa onwe na Cyber

Na cybersecurity, nchekwa onwe nke cyber na-ezo aka na nchekwa onwe onye megide mwakpo cyber. Ọ bụ ezie na ọ na-ekwusi ike na usoro nchebe cyber na-arụsi ọrụ ike site n'aka ndị ọrụ kọmputa n'onwe ha, a na-eji nchebe onwe onye cyber na-ezo aka na nchebe onwe onye nke otu n'ozuzu ya, dị ka ụlọ ọrụ ụlọ ọrụ ma ọ bụ mba dum. Nchekwa onwe nke onyunyo bụ ihe dị iche iche nke nchekwa onwe nke cyber ma na-adaba na ya. Usoro nchekwa cyber na-arụsi ọrụ ike na nke na-agafe agafe na-enye ndị na-agbachitere ọkwa dị elu nke cybersecurity, nchọpụta intrusion, njikwa ihe omume na ike ngbanwe. Akụkụ dị iche iche na òtù dị iche iche nwere iwu kwadoro ịgbaso ụkpụrụ nchekwa cyber.

Ndabere

dezie

Ndị otu dị iche iche nwere ike mee nnwale nnabata site na ndị otu ime ma ọ bụ were ọgbakọ ndị ọzọ were nyocha sistemu nzukọ a. Otu nnukwu ụlọ ọrụ nwere ike ime ihe ngosi ndị na-awakpo n'ime ime ya na ndị otu "acha uhie uhie" na-awakpo na otu "acha anụnụ anụnụ" na-agbachitere. Ndị na-agbachitere, ya bụ ndị dinta na-eyi egwu, ndị na-ahụ maka sistemụ na ndị mmemme, na-ejikwa sistemu ozi na-arụsi ọrụ ike, na-emezi adịghị ike, na-achịkọta ọgụgụ isi iyi egwu cyber ma mee ka sistemụ arụmọrụ ha, koodu, ngwaọrụ ejikọrọ na netwọkụ sie ike. Ndị otu na-acha anụnụ anụnụ nwere ike ịgụnye ozi niile yana ndị ọrụ nchekwa anụ ahụ nke nzukọ a na-arụ. Enwere ike ịnwale nchekwa anụ ahụ maka adịghị ike, yana ndị ọrụ niile nwere ike bụrụ ebumnuche nke mwakpo injinia ọha na nyocha nchekwa IT. Enwere ike nyochaa sistemụ dijitalụ na nke anụ ahụ site na ogo mmụta dị iche iche nke sistemu dị mkpa iji mee ka ọnọdụ dị adị maka ndị mwakpo na maka ndị ọrụ, bụ ndị a na-azụkarị na omume nchekwa na usoro. N'ihe ngosi nlele zuru oke, nke a maara dị ka ule igbe ọcha, ndị na-awakpo ahụ maara ozi niile dị gbasara sistemụ ndị ahịa. N'ime ule igbe ojii, a naghị enye ndị na-awakpo ahụ enweghị ozi gbasara sistemụ onye ahịa. Nnwale igbe isi awọ na-enye obere ozi nye ndị na-awakpo.

Nzọụkwụ

dezie

Nkwenye

dezie
  • Mee ka nkwenye dị iche iche.
  • Belata ihe ize ndụ nkwenye site na ibelata ọnụ ọgụgụ ndị maara ihe nkwenye atọ mmadụ na-ahụkarị, dị ka "ihe ị bụ, ihe ị maara, ma ọ bụ ihe ị nwere". A na-egosipụta ozi pụrụ iche dị ka inwe oke uru nye onye na-eyi egwu n'inweta ohere n'enweghị ikike ịnweta ozi mmadụ.
  • Belata akara mgbasa ozi ọha na eze iji belata profaịlụ ihe ize ndụ.[1]
  • Nyochaa nchekwa mgbasa ozi ọha na eze na ntọala nzuzo mmadụ mgbe niile.[1]
  • Mepụta paswọọdụ siri ike na nke pụrụ iche maka akaụntụ onye ọrụ[2][3] ọ bụla ma gbanwee paswọọdụ ugboro ugboro na mgbe ihe ọ bụla mere na nchekwa.
  • Jiri onye njikwa paswọọdụ iji zere ịchekwa paswọọdụ n'ụdị anụ ahụ. Nke a na - akpata profaịlụ ihe ize ndụ ngwanrọ dị ukwuu n'ihi ihe ize ndụ ndị nwere ike ịdị na ngwanrọ njikwa paswọọdụ, mana ọ na -ebelata ihe ize ndụ nke mmebi ma ọ bụrụ na ezuru ndepụta paswọọdụ mmadụ ma ọ bụ furu efu ma n'ọnọdụ ahụ, ndị keyloggers nọ na igwe.
  • Leebara anya na ozi mmadụ nwere ike ikpughe na mberede na ntanetị n'ịntanetị.[1]
  • Gbanwee paswọọdụ ndabara na mmemme na ọrụ iji gbochie usoro mmegbu ndabara.
  • N'ụzọ kwesịrị ekwesị jiri paswọọdụ brute force attack prevention software dị ka Fail2ban ma ọ bụ ihe dị irè.
  • Enwetala onye ọ bụla logins ma ọ bụ paswọọdụ ọ gwụla ma ọ dị mkpa ma ọ bụrụ otú ahụ, gbanwee ha ozugbo.[4]
  • Jiri ajụjụ nchekwa na azịza ndị na-agaghị ekwe omume maka onye ọ bụla ọzọ ịza maọbụ ọ bụrụ na ha nwere ohere ịnweta mgbasa ozi mgbasa ozi ma ọ bụ tinye aka na injinịa mmekọrịta mmadụ na ibe ya.[4]

Usoro ngwanrọ mgbochi

dezie
  • Jiri, ma adabereghị naanị na ngwanrọ antivirus, dịka izere ya bụ ihe na-abaghị uru maka ndị na-eyi egwu. Nke a bụ n'ihi ịdabere na ntinye aka dijitalụ gbanwere n'ụzọ dị mfe, ụdị hash etinyere, nke koodu ọjọọ a maara na mbụ.
  • Jiri ngwaahịa antimalware, dị ka Malwarebytes Anti-Malware, na njikọ ya na antivirus nwere njirimara nyocha.
  • Melite ma kwalite ngwanrọ na mmemme niile nke mmadụ - gụnyere, ma ọ bụghị naanị na sistemụ arụmọrụ onye ọrụ, firmware, ndị ọkwọ ụgbọala ngwanrọ, na ndị ọkwọ ụgbọala ngwaọrụ. Jiri ngwanrọ mmelite raara onwe ya nye ma mee ka atụmatụ mmelite akpaaka.[2][3]
  • Zoro kọmputa na ekwentị mmadụ.[2]
  • Na-emepụta nchekwa nke data mmadụ mgbe niile.[2][5]
  • Wepụ ngwanrọ na-enweghị nchebe dị ka Adobe Flash[6] na sistemụ arụmọrụ mmadụ. Zere ịnweta ibe weebụ na plugins ndị metụtara ya n'ime ihe nchọgharị weebụ mmadụ.
  • Naanị na-agba ọsọ ngwanrọ mgbe ọ dị mkpa iji belata mwakpo elu.
  • Zere ịgbanye ekwentị mmadụ ma ọ bụ ngwaọrụ na-eche ihu n'ịntanetị.[1]

Usoro nchekwa netwọk na ozi

dezie
  • Iji firewall na ngwaọrụ ejikọrọ na Ịntanetị.
  • Ọ bụghị na-agba ọsọ mmemme, ọrụ, ma ọ bụ ihe nchọgharị na akaụntụ onye ọrụ dị elu ma ọ bụ onye ọrụ nwere ihe ùgwù, dị ka mgbọrọgwụ na Linux na Unix ) ma ọ bụ dị ka Onye Nchịkwa (Windows), ọ gwụla ma mmadụ ghọtara ihe ize ndụ nchekwa nke omume dị otú ahụ.
  • Izere WiFi n'efu ma ghara ịbanye na akaụntụ ọ bụla mgbe ị na-eji ya.[3]
  • N'ụzọ kwesịrị ekwesị iji ngwanrọ nzuzo na amaghị aha dị ka Tor (netwọk amaghị aha) maka nchọgharị weebụ a na-amaghị aha, ebe ọ bụ na nke a na-adọta ụfọdụ uche.
  • N'ụzọ kwesịrị ekwesị iji HTTP na proxies Internet Protocol dị iche iche na usoro nchekwa, dị ka imebi ubi isi HTTP, nzacha, na ibugharị okporo ụzọ na sava proxy dị ka Squid Proxy, proxychains, socks4, na socks5.
  • Mbipụta mkpịsị ugodi ọha maka nkwenye PGP maka inwe ike igosi njirimara mmadụ.
  • Iji usoro izo ya ezo kachasị ike onye router na-enye ma na-emelite firmware router.[7]
  • Iji usoro nchọpụta intrusion (IDS) ma ọ bụ SIEM (Security Information and Event Management System) iji mee ka ndị na-egosi nkwekọrịta, dị ka mgbanwe nhazi na sistemụ arụmọrụ, mmụba ihe ùgwù, mmebi nchedo netwọk, na ịbanye n'enweghị ikike.[8]
  • Iji mpaghara na-enweghị agha iji belata ọnụ ọgụgụ nke usoro na ọrụ na-eche ịntanetị ihu n'ihu ọha.
  • Iji netwọk nkeonwe na IPsec iji chekwaa okporo ụzọ na oghere njem nke ụdị OSI iji mee ka nchịkọta IP sie ike.

Ịkọ akụkọ mmebi iwu na ihe omume

dezie
  • Nchịkọta ihe akaebe na nchekwa akwụkwọ na mmebi data (intrusions).
  • Kpọtụrụ ndị ọchịchị dị mkpa, ndị nchịkwa ma ọ bụ òtù ma ọ bụrụ na mwakpo cyber.[4]
  • Kpachara anya maka mmebi data weebụsaịtị ebe a na-akpọsa paswọọdụ echekwara na ozi njirimara onwe onye.
  • Na-ezo aka na iwu steeti banyere iwu ọkwa mmebi iwu.

"Ịlaghachi azụ"

dezie

Ndị na-ahụ maka iwu na ndị na-eme amụma na-atụlewanye inye ikike maka ngalaba nkeonwe ka ha mee ihe na-arụsi ọrụ ike site na "ịbanye azụ" (nke a makwaara dị ka hackbacks). N'adịghị ka usoro ọgụ na-arụsi ọrụ ike, usoro nchebe na-enweghị isi na-eweta mbelata ihe ize ndụ nke agha cyber, mmebi iwu, ndọrọ ndọrọ ọchịchị na akụ na ụba.

Otu isiokwu nke oge a na arụmụka na nyocha bụ ajụjụ nke 'mgbe mwakpo cyber, ma ọ bụ iyi egwu ya, na-eme ka ikike nchebe onwe onye?'[9]


Brad Maryman na-adọ aka ná ntị banyere ihe ndị a na-atụghị anya ya, na-ekwu na n'echiche ya "echiche na anyị kwesịrị ịme iwu ma nabata ọkwa nke omume cyber na-enweghị akwụkwọ na nke a na-eleghị anya site n'aka onye ọ bụla chere na e meela ha bụ ihe a na-apụghị ịghọta aghọta. "[10]

Leekwa

dezie
  • Nchebe cyber na-arụ ọrụ
  • CryptoParty
  • Nchebe ozi
  • Nchebe Ịntanetị

Ndetu

dezie
  1. 1.0 1.1 1.2 1.3 Conn (March 15, 2016). Cybersecurity Expert Gives Tips To Stay Safe Online. Retrieved on 13 April 2017. Kpọpụta njehie: Invalid <ref> tag; name "wuwf1" defined multiple times with different content
  2. 2.0 2.1 2.2 2.3 Kpọpụta njehie: Invalid <ref> tag; no text was provided for refs named slate1
  3. 3.0 3.1 3.2 Cyber Self Defense For Non-Geeks. jeffreycarr.blogspot.de. Retrieved on 13 April 2017. Kpọpụta njehie: Invalid <ref> tag; name "jeff1" defined multiple times with different content
  4. 4.0 4.1 4.2 Moore (2014). Cyber Self-Defense: Expert Advice to Avoid Online Predators, Identity Theft, and Cyberbullying. Rowman & Littlefield. ISBN 9781493015429.  Kpọpụta njehie: Invalid <ref> tag; name "Moore1" defined multiple times with different content
  5. Seay. 4 Keys to Cyber Security Self-Defense. Retrieved on 13 April 2017.
  6. Whittaker. "13 new vulnerabilities? You should disable or uninstall Adobe Flash | ZDNet", ZDNet. Retrieved on 13 April 2017.
  7. Stoner. Hackers Love IoT Products: Here's How to Keep Them Out (en-US). Safety Detective. Retrieved on 2018-11-22.
  8. Tiwari (April 2017). INTRUSION DETECTION SYSTEM. International Journal of Technical Research and Applications 5(2):2320-8163. Retrieved on 22 April 2019.
  9. Waxman (19 March 2013). "Self-Defensive Force Against Cyber Attacks: Legal, Strategic and Political Dimensions". 
  10. 'Self-Defense' Bill Would Allow Victims to Hack Back. Retrieved on 13 April 2017.

Njikọ mpụga

dezie