Please enable JavaScript.
Coggle requires JavaScript to display documents.
security and privacy in networks - Coggle Diagram
security and privacy in networks
computer crimes
Online scam
Eg attractive online deals on websites and emails
scammers deceive victims into giving away personal information or money
Phising
steal sensitive information such as login or credit card details through the use of emails and websites that appear to be from trustworthy sources
precautious: checking credible sources before clicking on any links
cyberattack
Denial of service (DoS)
definition
: disable the availability of websites so that users cannot access
Floods the target website with large numbers of requests so that it overloads the server
distributed denial of service (DDoS)
hacking
deleting or stealing confidential infoormation
vandalising (or defacing) websites
installing malicious software
definition: act of gaining unauthorised access to a system or computer
Password cracking
using a password cracking software
unauthorised access into a computer system by identifying or recovering a user's password
using a keylogger to store keystrokes
Cyberbullying
definition: person harasses others on the internet
victims of cyberbullying should report such activities to a figure of authority immediately
data privacy
privacy laws
used only for its intended purpose
accessible by the owner
sufficient for its purpose, i.e. only collect what is needed
kept secure from unauthorised access
deleted when no longer needed
how data is collected, stored, and handled
data breach
when private or sensitive data is accessed by an unauthorised person
malware
Types of malware
Trojan:
Software that appears harmless but contains malicious content
virus:
a computer program that attaches itself to a regular program and modifies it
worm
: able to duplicate itself and spread to other computers in a network
spyware
: software that monitors a user's actions or commands on a computer a transmits that information to other without his or her knowledge.
ransomware
: lock files on a computer system preventing users from accessing them until ransom is paid
effects
stealing information from computers
slowing down computers or causing them to crash
deleting or modifying files
security measures
preventing unauthorised access
using strong password
logging off the computer when not in use
using firewall
installing anti-virus and anti-spyware software
identifying phishing attempts
email is not correct. eg email from school with @ pretty .com
wrong grammar
dealing with spam emails
avoid opening spam emails or clicking links in spam messages
flag them as spam