Please enable JavaScript.
Coggle requires JavaScript to display documents.
E-SAFETY - Coggle Diagram
E-SAFETY
Phishing
Phishing is a fraudulent attack which the attacker uses email to get your personal information and data.
How does it work? - Phishing occurs when the attacker sends you an email which contain a link to a fraudulent website and request you to share you your private information like credit card account.
Examples:
- A notice that your email password will expire, with a link to change the password that leads to a malicious website.
- A urgent message about family member or a friend of yours need money which attach a link to send your money.
Solutions:
- Update your browser and other programs.
-
- Change all of your passwords.
- Call your credit card company immediately.
Prevention:
- Think carefully before you click on something.
- Check your online accounts regularly, see if anything change.
- Never give out personal information.
- Use anti-virus software.
Pharming
Solutions:
Change all of your passwords, make sure it strong and unique.
-
-
Report fraud procedures on your online banking, email, or social media, if applicable.
-
Examples: Attacker create a web page that appears to be for a specific bank, requesting a username and password for login.
It happens when a user is fooled into thinking a website is legitimate based on how it looks. The user can be fooled into entering sensitive data such as a password or credit card number into the false website.
Pharming is a scamming practice in which malicious code is put on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or acceptance.
Virus
It happens when the virus attach itself to a program or file allow it to spread from one computer to another, but it cannot infect your computer unless you run or open malicious program.
Effects: Computer performance becomes much slower, some of your files loss without any reason, computer crash frequently, it might steal important information from your computer and send to some other person, unexpected pop-ups appear on your system.
Preventions: Install anti-virus software into your computer, run anti-virus scan, use strong password and change it frequently, think about it when you click into a program.
Solutions: Run a virus scan, change all of your passwords, update your software and browser, delete the files that contain virus.
Trojan horse
It happen when the hacker spams emails to anyone. When the recipient opens the email attachment, it will infect the computer immediately. It's like a backdoor of your computer which allow malicious users to enter and control you computer system.
Effects: Hackers could sending, delete your files, display data, rebooting the computer.
Prevention: Never open unsolicited emails from unknown senders, use firewall software which can block unsolicited connections, updated antivirus program whenever you are using the Internet.
Worm
Worm is like virus but it has ability to travel without human action. It can spread through the internet such as email. Once a device has been infected, the worm replicate itself by emailing copies of itself to everyone.