Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks : - Coggle Diagram
Security and Privacy in Networks :
Malware
Types
Virus
a computer program that attaches itself to a regular program and modify it
Trojan
Software that appears harmless but contains malicious content
Worm
Able to duplicate itself and spread to other computers in a network
Spyware
Software that monitors a users actions or commands on a computer and transmits that information to others without his or her knowledge
Ransomware
Locks files on a computer system preventing users from accessing them until ransom is paid
Effects
Slowing down computers or causing them to crash
Deleting or modifying files
Stealing information from computers
Computer Crimes
Phishing
Precautions checking credible sources before clicking on any links
Steal sensitive information such as login or credit card details through the use of emails and websites that appear to be from trustworthy sources
Online Scams
Eg attractive online deals on websites or via other forms of communication platforms, such as emails
Scammers deceive victims into giving away personal information or money
Cyberbullying
Definition: person harasses others on the internet
Victiim of cyberbullying should report such activities to a figure of authority immediately
Cyber Attacks
Hacking
Installing malicious software
Deleting or stealing confidential information
Defintion: Acts of gaining unauthorised access to a system or computer
Vandalising (or defacing) websites
Denial of service (DoS)
Distributed denial of service (DDoS) multiple computers launching simultaneous requests at the target
Defintion: Disable the avaliability of websites so that users cannot access
Floods a target website with large numbers of requests so that it overloads the server
Password Cracking
Using a keylogger to store ketstrokes
Unauthorised access into a computer system by identifying or recovering a users password
Using a password cracking software
Data Privacy
Privacy laws
suffi cient for its purpose, i.e., only collect what is needed;
used only for its intended purpose;
accessible by the owner;
kept secure from unauthorised access; and
Deleted when no longer needed
Data Breach
When private or sensitive data is accessed by an unauthorised person
How data is collected so, stored, and handled
Security measures
Identifying phishing attempts
Email is not correct. eg Email from school with @ pretty.com
Wrong Grammar
Installing anti-virus and anti-spyware software
Preventing unauthorized access
Using a firewall
Using strong passwords
Logging off the computer when not in use
Dealing with spam email
Avoid opening spam emails or clicking links in spam messages
Flag them as spam