Please enable JavaScript.
Coggle requires JavaScript to display documents.
security and privacy in networks - Coggle Diagram
security and privacy in networks
Computer crimes
Password cracking
using keylogger to store keystrokes
unauthorised access into a computer system by identifying or recovering a user's password
using a password cracking software
Online scam
scammers deceive victims into giving away personal information or money
Eg. attractive online deals on websites or via other forms of communication platforms, such as emails.
phishing
steal sensetive information such as login or credit card details through the use of emails and websites that appear to be from trustworthy sources.
precautions
: checking credible sources before clicking on any links
cyberbullying
victims of cyberbullying should report activities to a figure of authority immediately
definition
: person harrases others on the internet.
Cyberattacks
hacking
deleting or stealing confidential information
vandalising (or defacing) websites
installing malicious software
definition
: act of getting unauthorised access to a system or computer
Denial of service (DOS)
floods a target website with large amount of requests so that it overfloods the server
Definition
: disable the availabilty of websites so that users cannot access
distributed denial of service (DDos) multiple computers launching simultaneous requests at the target
security measures
preventing unauthorised access
using a firewall
logging off the computer when not in use
using strong passwords
identifying phishing attempts
wrong grammar
email is not correct ( eg. email from school with
....@pretty.com
)
installing anti-virus and anti-spyware software
dealing with spam mail
avoid opening spam emails or cracking links in spam messages
flag them as spam
data privacy
data breach
when private or sensetive data is accessed by an unauthoried person
privacy laws
accessible by the owner
kept secure from unauthorised access
used only for its intended purpose
sufficient for its purpose, i.e., only collect what is needed
deleted when no longer needed
how data is collected, stored and handle
types of malware
trojan
: software that can appears harmless but contain malicious content
virus
: a computer program that attaches itself to a regular program and modifies it
worm
: able to duplicate itself to and spread to other computers in netowrk.
spyware
: software that monitors a user's actions or comments on a computer and transmits that information to others without his or her knowledge
ransomware
: locks files on a computer system previewing users from accessing them until ransom is paid
effects
slowing down computers or causing them to crash
deleting or modifying files
stealing information form computers