Answer the question
In order to leave comments, you need to log in
How to completely protect a laptop from hacking?
1) How to completely protect a laptop or computer from hacking? Is it possible to do this?
2) Let's say I have a laptop and I won't connect it to the internet. How then is it safe to transfer files to it so as not to infect with a virus?
Answer the question
In order to leave comments, you need to log in
How to fully protect a laptop or computer from hacking?
Don't turn it on.
The question does not make sense until it is determined from whom you are going to defend yourself.
Different intruders have different options. In spherical information security, an abstract technical object of protection is considered.
In real life, this is absolutely not the case and a situation will easily arise when you yourself enter all the necessary passwords and tell everything you know (because a hot soldering iron in #op is very unpleasant...)
There is no protection against the method of thermorectal cryptanalysis
1) None. Because there are holes in the software and hardware, some of which are found after a few years.
2) Type texts in natural language from the keyboard. In all other cases, the file may contain an exploit using p/n 1.
1) 100% protection does not exist. This is an axiom.
There is always a thermorectal hacking method, in which you yourself will give the cracker all the passwords and show where and how to enter them. Well, the encryption program at the system level can be considered a high level of security (if without the Internet). Even if the laptop is stolen, they will not be able to get the information without a password, only the laptop itself will be of value.
In any case, it is necessary to understand in advance who the protection is from. Because the same protection from a neighbor will be 99% protected, and from a comrade major by 1%. It's like an example. The main thing here is to understand that 100% is impossible to achieve.
2) Without the Internet, you can transfer via a USB flash drive relatively safely. (see item 1 about 100% security). Even if a virus on a flash drive gets on a laptop, it will not be able to steal anything (after all, there is no Internet). The worst is the corruption of files and the laptop itself, but this is unlikely, and there should be backups for this case. Well, you need to try very hard to launch the virus itself from a flash drive, it also registers itself in specific files. Even a schoolboy will be able to view hidden files.
PS There is a microscopic chance that a virus will be written specifically for your behavior that can write stolen data to a USB flash drive in the hope that another part of this virus will receive this data on a PC with the Internet and fully send it to an attacker. But the chance is so small that you should not think about it. Plus, see above about the fact that you can not run a virus from a flash drive (and deal only with documents, pictures, sound and video, in general, with data).
In general, it is enough to have a beech with TPM and turn on the bitblocker and turn on the antivirus.
I also recommend not to install crackers and other similar software.
Farther. Passwords should be complex and different for all sites.
Next, use a password manager. Disable fingerprint and camera login. Enable screen lock after 1 minute of inactivity.
Create a server with TFTP and set up Clonezilla. Take regular disk snapshots.
Also create a traveling image to provide employees with customs authorities.
There should be duplicate posts on social networks with absolutely neutral posts.
Duplicates of these social networks should be in the smartphone.
Digital hygiene: do not register on unnecessary sites, do not click on banners, do not send passwords via instant messengers and do not store them in projects.
No system is completely secure (c)
If at least one has access, then the second can have access, etc.
There are no absolutely secure systems in the modern world. This, for now (and in the near foreseeable future, too), is a constant. Now they do not even try to build absolutely safe systems.
The goal of information security tools is to make hacking as expensive as possible. Ideally, the profit from a completely successful hack should be less than the cost of hacking. That is, to make hacking unprofitable so that no one does it.
The hardest thing is for those who have "priceless" information. For example, managing a nuclear program or other global critical infrastructure when hacking is not for money.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question