Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks - Coggle Diagram
Security and Privacy in Networks
Data privacy
Privacy laws
data breach
When private or sensitive data is accessed by an unauthorised person
sufficient for its purpose, i.e., only collect what is needed;
accessible by the owner;
used only for its intended purpose;
deleted when no longer needed.
kept secure from unauthorised access; and
how data is collected ,stored, and handled
Computer Crimes
Phishing
Steal sensitive information such as login or credit card details through the use of emails and websites that appear to be form trustworthy sources
Precaution
Checking credible source before clicking on any links.
Cyberbullying
Victims of cyberbullying should report such activities to a figure of authority immediately
Definition: person harasses others on the internet
Online scam
Scammer deceive victims into giving away personal information or money
Eg. attractive online deals on website or via other forms of communication platforms, such as emails
Cyberattacks
Hacking
Installing malicious software
deleting or stealing confidential information
Definition: Act of gaining unauthorised access to a system or computer
vandalising (or defacing website)
Password cracking
Using a keylogger to store keystrokes
Unauthorised access into a computer system by identifying or recovering a user's password
Using a password cracking software
Denial of service (DOS)
Distributed denial of service(DDoS)
multiple computers launching simultaneous requests at the target
Definition: Disable the availability of website so that users cannot access
Floods a target website with large numbers of requests so that it overloads the server
Malware
Effects
slowing down computer or causing them to crash
deleting or modifying files
Stealing information from computers
Types of malware
Trojan
Software that appears harmless but contain malicious content
Virus
A computer program that attaches itself to a regular program and modifies it.
Spyware
Software that monitors a user's actions or commands on a computer and transmits that information to other without his or her knowledge
Worm
Able duplicate itself and spread to other computers in a network
Ransomware
Locks files on a computer system preventing users from accessing them until ransom is paid
Security measures
Email is not correct eg. Email from school with@ pretty .com
Wrong grammar
Identifying phishing attempts
Dealing with spam mail
Preventing unauthorised access
Installing anti-virus and anti-spyware software
Logging of the computer when not in use
Using a firewall
Using strong passwords
Avoid opening spam emails or clicking links in spam messages.
Flag them as spam