Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Digital hygiene=== Related to end-user training, '''digital hygiene''' or '''cyber hygiene''' is a fundamental principle relating to information security and, as the analogy with [[personal hygiene]] shows, is the equivalent of establishing simple routine measures to minimize the risks from cyber threats. The assumption is that good cyber hygiene practices can give networked users another layer of protection, reducing the risk that one vulnerable node will be used to either mount attacks or compromise another node or network, especially from common cyberattacks.<ref name="Cyber Hygiene">{{cite web |title=Cyber Hygiene β ENISA |url=https://www.enisa.europa.eu/publications/cyber-hygiene |access-date=27 September 2018 |language=en-gb}}</ref> Cyber hygiene should also not be mistaken for [[proactive cyber defence]], a military term.<ref name="Kaljulaid-2017">{{cite web |last=Kaljulaid |first=Kersti |date=16 October 2017 |title=President of the Republic at the Aftenposten's Technology Conference |url=https://president.ee/en/official-duties/speeches/13671-president-of-the-republic-at-the-aftenpostens-technology-conference/index.html |access-date=27 September 2018}}</ref> The most common acts of digital hygiene can include updating malware protection, cloud back-ups, passwords, and ensuring restricted admin rights and network firewalls.<ref>{{Cite web |title=Cyber security breaches survey 2023 |url=https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2023/cyber-security-breaches-survey-2023 |access-date=2023-12-27 |website=GOV.UK |language=en}}</ref> As opposed to a purely technology-based defense against threats, cyber hygiene mostly regards routine measures that are technically simple to implement and mostly dependent on discipline<ref>{{Cite news |last=Kuchler |first=Hannah |date=27 April 2015 |title=Security execs call on companies to improve 'cyber hygiene' |work=Financial Times |url=https://www.ft.com/content/8468cfda-e9e3-11e4-a687-00144feab7de |url-access=subscription |access-date=27 September 2018 |archive-url=https://ghostarchive.org/archive/20221210/https://www.ft.com/content/8468cfda-e9e3-11e4-a687-00144feab7de |archive-date=10 December 2022}}</ref> or education.<ref>{{Cite news |title=From AI to Russia, Here's How Estonia's President Is Planning for the Future |language=en-US |magazine=Wired |url=https://www.wired.com/story/from-ai-to-russia-heres-how-estonias-president-is-planning-for-the-future/ |access-date=28 September 2018}}</ref> It can be thought of as an abstract list of tips or measures that have been demonstrated as having a positive effect on personal or collective digital security. As such, these measures can be performed by laypeople, not just security experts. Cyber hygiene relates to personal hygiene as computer viruses relate to biological viruses (or pathogens). However, while the term ''computer virus'' was coined almost simultaneously with the creation of the first working computer viruses,<ref>{{Cite news |date=1 November 2017 |title=Professor Len Adleman explains how he coined the term "computer virus" |language=en-US |work=WeLiveSecurity |url=https://www.welivesecurity.com/2017/11/01/professor-len-adleman-explains-computer-virus-term/ |access-date=28 September 2018}}</ref> the term ''cyber hygiene'' is a much later invention, perhaps as late as 2000<ref>{{cite web |title=Statement of Dr. Vinton G. Cerf |url=https://www.jec.senate.gov/archive/Documents/Hearings/cerf22300.htm |access-date=28 September 2018 |website=www.jec.senate.gov}}</ref> by Internet pioneer [[Vint Cerf]]. It has since been adopted by the [[United States Congress|Congress]]<ref>{{USBill|115|HR|3010|pipe=Promoting Good Cyber Hygiene Act of 2017|site=yes}}</ref> and [[United States Senate|Senate]] of the United States,<ref>{{cite news |title=Analysis {{!}} The Cybersecurity 202: Agencies struggling with basic cybersecurity despite Trump's pledge to prioritize it |language=en |newspaper=The Washington Post |url=https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/2018/07/26/the-cybersecurity-202-agencies-struggling-with-basic-cybersecurity-despite-trump-s-pledge-to-prioritize-it/5b58a84e1b326b1e64695548/ |access-date=28 September 2018}}</ref> the FBI,<ref>{{cite web |title=Protected Voices |url=https://www.fbi.gov/investigate/counterintelligence/foreign-influence/protected-voices |access-date=28 September 2018 |website=Federal Bureau of Investigation |language=en-us}}</ref> [[European Union|EU]] institutions<ref name="Cyber Hygiene" /> and heads of state.<ref name="Kaljulaid-2017" />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)