Please enable JavaScript.
Coggle requires JavaScript to display documents.
Protection and security - Coggle Diagram
Protection and security
Securing the digital environment
SSL protocol(https) = encryption
Password security
Basic rules for online security
regularly renew the passwords that protect the most sensitive content or access
never use the same sesame to secure several accesses or accounts
never to communicate his password
always disconnect from a service or computer before leaving it, especially if it is in a public place
The creation of a strong password's criteria
It must be at least eight characters long.
It must not contain any user, family or company name.
It must also combine lower case letters, upper case letters, numbers, special characters (for example:,?;.: /! §%µ) and / or national letters such as accented letters.
Do not use whole words.
Deliberately introducing spelling mistakes is also a good way.
Antivirus
Prevention and protection software
main functions
resident or standby protection, which analyzes any new incoming file
an automatic virus signature update module.
several possibilities to fix
it deletes the contaminated file
it places it in quarantine, preventing it from acting
it tries to fix it by eliminating the virus
Fight ransomware
types
screen lockers
file encryptors
practices to avoid being a victim
Keep your operating system up to date to avoid security errors
Install a good antivirus and keep it always up to date
Never open emails or files from unknown senders
Always have an up-to-date backup of your data, this is the best way to not lose information
Avoid surfing unsecured pages or reading unverified content
Protect personal data and privacy
Publishing on the web
secrecy regime of private correspondence
some precautions
When forwarding an email to a third party, we must make sure that the sender will not mind.
To make the content of an e-mail public, you must ask the sender for permission.
When replying to an email by quoting the initial message in the reply, be aware that if we add recipients, they will have access to previous exchanges.
obligations
It must ensure the exploitation rights of the published resources and that the sites it references are not illegal.
It must respect people's image rights by asking them for permission to publish their photos with the exception of public figures in the exercise of their function and unidentifiable people
It must verify the tortious notice has not been posted on the site because it may be held liable.
Digital identity
The interconnection of files
Collecting information
Automatic information processing
Some obligations of the persons responsible for data collection:
information retention period
purpose of processing
the possible drifts
E- mail
The use of NICT
Automatic collection and processing of information
health, well-being, and the environment
Environmental impact
Wireless communication and waves
Connected life and sensors
Effects of digital technology on physical and mental health and on the environment
Digital Wellbeing
Controlling technology
increase productivity
workstation ergonomics
artificial intelligence and robots
environmental impact
Connected life
Health