Please enable JavaScript.
Coggle requires JavaScript to display documents.
Cybersecurity (Chi commette i crimini? (Criminalità Organizzata,…
Cybersecurity
Chi commette i crimini?
Criminalità Organizzata
Terroristi
Nazioni Straniere
Insiders
Attivisti
Ladri comuni
Confidentiality
keep info offline
protect access
encrypt info
password protection
Computer Best Practices
WHY DO WE CARE?
tipi di attacco
how is malware distributed?
Email
Instant message
sw peer to peer
Removable media
Downloads from the web
Malware
Trojann Horses
sembra bono ma non è
Backdoor
unrestained access to the sysem
Virus/Worms
Information Theft
Zombies/Botnet
Illegitimate Access
what damage can be done
what can we do?
follow company policy
report any suspicious to the security team
don't click on link emails
strong passwords
8 caratteri
alphanumeric e non alphanumeric
uppercase e lowercase
attacker know the clever things we do
paraphrasi ma non common
don't reuse pwds
if write, protect
password safe or password vault program
changepassword regularly
other best practices
logoff or lock your system
encrypt sensitive files
non dare mai le credenziali
proteggere la password
secure laptops with cable logs
report any potential breach
Availability
Denial of Service Attacks
Expect the Unexpected
Beware of Natural/Handmade disasters
Integrity
Preventing unauthorized modification of information
Email
data
digital download
reliability / Trustworthiness
hijacked websites
email with modified content
corrupted files