Please enable JavaScript.
Coggle requires JavaScript to display documents.
MODULE 1:
DIGITAL SECURITY,ETHICS, AND PRIVACY
(THREATS,ISSUES,AND…
MODULE 1:
DIGITAL SECURITY,ETHICS, AND PRIVACY
(THREATS,ISSUES,AND DEFENSES.)
DIGITAL SECURITY RISK is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
-
-
-
-
-
-
-
-
MALWARE consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
SPYWARE >A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to
some outside source while the user is online.
TROJAN HORSE > A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.
ROOTKIT > A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device.
WORM > A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network.
RANSOMEWARE > A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money.
VIRUS > A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.
ADWARE > A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other Internet services
-
-
denial of service attack (DoS attack) ) disrupts computer access to an Internet service
(Distributed DoS attack)
BACKDOOR door is a program or set of instructions in a program that allow users to bypass security controls
SPOOFING is a technique intruders use to make their network or Internet transmission appear legitimate
-
-
-
-
BACKUP is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
-
Categories of backup: >full , differential, incremental, selective, continuous data protection & cloud
-
WIRELESS SECURITY (use pin, turn off GPS tracking, avoid clicking unsafe links,use mobile security software
PISHING is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and/or financial information
-
-
ETHICS AND SOCIETY
GREEN COMPUTING involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
TECHNOLOGY ETHICS are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
-
-
-
-
-