Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and privacy in networks - Coggle Diagram
Security and privacy in networks
Malware
Slowing down computers or causing them to crash
installing anti virus and anti-spyware software
Installing anti virus and anti-spyware software
Identifying phishing attempts
Preventing unauthorised access
using a firewall
Using strong passwords
Computer crimes
Online scams
Precautions: Checking credibility sources before clicking on any links
Scammers
deceive such as login or credit card card details through the use of emails or websites that
Steal sensitive information such as login or credit card details through
Password cracking
Eg: attractive online deals on websites or emails
Scammers deceive victims into giving away personal information or money
Online scam
Definition: Scammers decieve victims into giving away personal information or money
Definition: Scammers decieve victims into giving away personal information or money
Attractive online deals on websites or emails
Types of Malware
Virus
A computer program that attaches itself to a computer program and modifies it
Worm
Able to duplicate itself to a regular program and spread to other computers in a network
Trojan horse
Software that contain harmless but contains malicious content
ransomware
locks files into a computer system, preventing users from accessing them until randsomware is paid
Security measures
Identifying phishing attempts
Wrong grammar
Email is not correct, eg: email from school with
pretty.com
Preventing unautorised access
Dealing with spam email
Opening spam emails or clicking them with spam messages
Flag them as spam
Cyberattacks
Hacking
Installing malicious software
deleting or stealing confidential information
vandalising (for defacing) websites
Denial of service(DOS)
Definition: disable the availability of websites so that users cannot access it
Distributed of denial service(DDOS) Multiple computers launching simultaneous requests at the target
Data privacy
privacy laws
How data is stored, handled or collected
Privacy laws, how dats is handled stored or collected
Accessible by the owner
Kept secure from unauthorised access
Deleted when no longer needed
Data breach
When private or sensitive information is accessed by an authorised person