Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks - Coggle Diagram
Security and Privacy in Networks
Computer crimes
Phishing
Definition
: Steal sensitive information such as login or credit card details through the use of emails and websites that appear to be from trustworthy sources
Precautions
checking credible sources before clicking on any links
Online scam
Eg. Attractive online deals on website or via other forms of communication platform and emails
Scammers deceive victims into giving away personal information or money
Cyberbullying
Victims of cyberbullying should report such activities to a figure of authority immediately
Definition
: person harasses others on the internet
Password cracking
Unauthorized access into a computer system by identifying or recovering a user's password
Using a password cracking software
Using a keylogger to store keystrokes
Cyberattacks
Hacking
Installing malicious software
Deleting or stealing confidential information
Vandalizing (or defacing) websites
Definition: Act of gaining unauthorized access to a system or computer
Denial of service (DoS)
Definition
: Disable the availability of the website so that users cannot access
Distributed denial of service (DDoS) multiple computers launching simultaneous requests at the target
Floods a target website with large numbers of requests so that it overloads the server
Malware
Types of Malware
Trojan
Software that appears harmless but contains malicious content
Virus
A computer program that attaches itself to a regular program and modifies it
Worm
Able to duplicate itself and spread to other computer in a network
Spyware
Software that monitors a user's actions or commands on a computer and transmits that information to others without his or her knowledge
Ransomware
Locks file on a computer system preventing users from accessing them until ransom is paid
Effects
Slowing down computers or causing them to crash
Deleting or modifying files
Stealing information from computers
Security Measures
Preventing unauthorized access
Using a firewall
Using string passwords
Logging off the computer when not in use
Installing anti-virus and anti-spyware software
Identifying phishing attempts
Wrong grammar
Email is not correct. Email from school with
pretty.com
Dealing with spam email
Avoid opening spam emails or clicking links in spam messages
Flag them as spam
Data privacy
How data is collected, stored, and handled
Privacy laws
Data breach
When private or sensitive data is accessed by and unauthorized person
Privacy laws
Sufficient for its purpose, i.e, only collect what is needed
used only for its intended prupose
Accessible by the owner
Kept secure from unauthorized access
Deleted when no longer needed