NETWORK SECURITY ISSUES (BITCON)
Author
suneri sayuni
Last Updated
9 yıl önce
License
Creative Commons CC BY 4.0
Abstract
It's very important to be on the safe side by avoiding hackers and other crimes while using the network.
\documentclass[a4paper]{article}
\usepackage[english]{babel}
\usepackage[utf8]{inputenc}
\usepackage{amsmath}
\usepackage{graphicx}
\title{NETWORK SECURITY ISSUES}
\author{Sayuni F Suneri UB012/0014/14}
\date{\3JULY2015}
\begin{document}
\section{Introduction to Bitcon}
Bitcon can be defined as decentralized P2P electronic cash system without a central server and trusted parties. Bitcon enables users to make money transactions among people through the network. Satoshi a creator of bitcon, his purpose was to create a global currency that existed not in banks or government.
\subsection{Identity management}
Identity management is important while using Bitcon so as to be on the safe side.When a person increases the number of accounts the risk of being hacked increases.When using smart phones and Google authenticator one has to be careful not to download over hyped free software because hackers can easily get the codes, passwords and user names.
It is very risky to use a single email for all accounts because when a single email account is hacked, all other accounts are hacked. A single hacked email account can lead to exposure of other online digital identification so as to avoid risks one must not allow the browser to remember passwords since hackers can use links to get to passwords and user names saved by browsers.
\subsection{Use of digital security}
This involves seven easy steps which are as follows;
\subsubsection{Platform choice}
To be on the safe side bitcon user has to do a research which will enable him or her to choose an excellent password management system through which an account will be created. That goes hand in hand with activating a two factor authentication through which logins credentials and websites can be added.
\subsubsection{To add sites}
A person can add sites by logging into an account and another way is by using URL.In case the user saves user names and passwords in spreadsheet, then he or she can just adjust the spreadsheet columns and upload.
\subsubsection{Site testing}
This step is very important to take since after creation of new account, usually the URL picked up by the system is not the logins URL.
Site testing is done simply by clicking the site after saving it.
\subsubsection{Delete the old list}
After setting up a password manager one has to delete all the old files so as to be on the safe side that is avoiding the risk of being hacked using old files links.
\subsubsection{ Unique email creation}
In order for the user online identity to be on the safe side, its important to learn how to differentiate email to be used for communication purposes from that used for account creation set up.
The user is not obligated to create an email account with names and other personal information such as saysuneri1992@gmail.com.After creating one should replace the previous email with the new unique email.
\subsubsection{Change password}
It's very easy for hackers to learn a new password rather than a strong password.It should be clear that when one account is hacked then the rest are hacked as well. A strong password should be not a minimum of 16 characters and it should be created by using a random generator which is provided within password management software and it's capable of remembering passwords.
This set should be done after creating a unique email.
\subsubsection{Secure bitcon wallets}
In order for bitcon user to secure his or her wallet, he or she will need pass-phrase so as to access the bitcon. Poor handling of pass-phrase can lead to loss of bitcons.
\subsection{Conclusion}
For the bitcon user to be on the safe side, one must ensure that his or her account is not easily accessible to hackers. One of the strategy to ensure this is by using the best password managers, one of them is LastPass. It has multiple two factor authentication options and a security score card to display password strength.
Also it's better to install anti-virus and anti-malware software.
\end{document}