End-user Computer Security/Main content/Miscellaneous notes
End-user Computer Security
Inexpensive security
for |
⦾ individuals |
|
National Cyber Security Centre[edit | edit source] |
|
Cyber-security advice is freely available on the National Cyber Security Centre (NCSC) website. Specific NCSC information that may be of interest to you:
Cybersecurity standards[edit | edit source] |
|
See here for cybersecurity-standards information from which might be obtained, insights into the security measures and processes helpful for an entity’s security.
Deep hardware hacking[edit | edit source] |
|
Consideration of deep hardware-hacking attacks is probably an overkill for most individuals, sole traders and small businesses—have to draw the line somewhere. However, if you are interested in defending against such attacks, the Novena open-source computing hardware platform and other related information hosted here, may be of interest to you.
Cryptocurrency security[edit | edit source] |
|
If you are interested in adopting security measures suggested for Bitcoin users, have a look at the Glacier protocol.
Using phones and computers as motion detector alarms[edit | edit source] |
|
Phones and computers can be turned into motion detector alarms, by using their built-in cameras and other sensors, with apps such as the “Haven: Keep Watch” app. This could provide extra security during sleeping hours. Psychic phenomena, including phenomena that have been verified and accepted by the scientific community, might be able to induce a person to stay asleep or suffer amnesia whilst intruders enter premises and room whilst the person is asleep; technological measures such as loud alarms may be helpful to defend against such attacks.
Steganography: easy hiding of information in computer documents[edit | edit source] |
|
White-on-white text in computer documents and emails can be used for hiding and sending security sensitive information. This might be both simple and effective for low threat models.
Chapter 9 What to do when you discover your computer has been hacked |
Appendix: New security inventions requiring a non‑trivial investment in new technology |
- Book:End-user Computer Security/Hash-tagged/#️Software/#️Malware
- Book:End-user Computer Security/Hash-tagged/#️Software
- Book:End-user Computer Security/Hash-tagged
- Book:End-user Computer Security
- Book:End-user Computer Security/Hash-tagged/#Privacy/#Keyboard privacy
- Book:End-user Computer Security/Hash-tagged/#Privacy
- Book:End-user Computer Security/Hash-tagged/#Privacy/#Electronic signals privacy
- Book:End-user Computer Security/Hash-tagged/#Privacy/#Visuals privacy
- Book:End-user Computer Security/Hash-tagged/#Communication/#Secure communication
- Book:End-user Computer Security/Hash-tagged/#Communication
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering/#Tamper prevention/#Tamper detection
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering/#Tamper prevention
- Book:End-user Computer Security/Hash-tagged/#Tamper, tampering
- Book:End-user Computer Security/Hash-tagged/#Digital storage
- Book:End-user Computer Security/Hash-tagged/#Physical security
- Book:End-user Computer Security/Hash-tagged/#Simple security measures
- Book:End-user Computer Security/Hash-tagged/#Audio-based security
- Book:End-user Computer Security/Book part/Main content/Chapters/«Miscellaneous notes», chapter 10
- Book:End-user Computer Security/Book part/Main content/Chapters
- Book:End-user Computer Security/Book part/Main content
- Book:End-user Computer Security/Book part
- Book:End-user Computer Security/Hash-tagged/#Programming