Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks - Coggle Diagram
Security and Privacy in Networks
Computer Crimes
Phishing
Steal sensitive information such as login or credit details through the use of emails and websites that appear to be from trustworthy sources
Precautions: Checking credible sources before clicking in any links
Online scam
scammers deceive victims into giving away personal information or money
Eg attractive online deals on website or via other forms of communication platforms, such as emails
Cyberbullying
Victims of cyberbullying should report such activities to a figure of authority immediately
Definition: Person harasses others on the internet
Password cracking
Unauthorised access into a computer system by identifying or recovering a user's password
Using a password cracking software
Using a keylogger to store keystrokes
Cyberattacks
Denial of Service (DoS)
Definition: Disable the availability of websites so that users cannot access
Floods a target website with large numbers of requests so that it overloads the server
Distributed (DoS) Multiple computers launching simultaneous requests at the target
Hacking
Act of gaining unauthorised access to a system or computer
Vandalising (or defacing) websites
Installing malicious software
deleting or stealing confidential information
Malware
Types of Malware
Virus
A computer program that attaches itself to a regular program and modifies it
Worm
Able to duplicate itself and spread to other computers in a network
Trojan
Software that appears harmless but contains malicious content
Spyware
Software that monitors a user's actions or commands on a computer and transmits that information to others without his or her knowledge
Ransomware
Locks files on computer system preventing users from accessing them until ransom is paid
Effects
deleting or modifying files
Stealing information from computers
Slowing down computers or causing them to crash
Data Privacy
data breach
When private data or sensitive data is accessed by an unauthorised person
How data is collected, stored, and handled
Privacy laws
sufficient for its purpose, eg only collect what is needed
accessible by the owner
used only for its intended purpose
deleted when no longer needed
kept secure from unauthorised access
Security Measures
Installing anti-virus and anti-spyware software
Preventing unauthorised access
Using strong passwords
Logging off the computer when not in use
Using firewall
Identifying phishing attempts
Wrong Grammar
Email is not correct. eg. Email from school with
random.com
Dealing with spam mail
Avoid opening spam emails or clicking links in spam messages
Flag them as spam