Security and Privacy in
Networks
Computer Crimes
Cyberbullying
Cyberattacks
Victims of cyberbullying should report such
activities to a figure of authority immediately
Definition: person harasses others on the internet
Phishing
Definition: Steal sensitive information such as login or credit card
details through the use of emails and websites that appear to be
from trustworthy sources
Precautions: Checking credible sources
before clicking on any links
Online Scam
scammers deceive victims into giving
away personal information or money
Eg attractive online deals on
websites and emails
Password cracking
Definition: Unauthorised access into a computer system by
identifying or recovering a user's password
Eg Using a password cracking software
Eg using a keylogger to store keystrokes
Precaution: use a strong password
I<3mrDavidLim
Denial of service (DOs)
Definition: Disable the availability of websites
so that users cannot access
Floods of target websites with large numbers of requests at the
target
Hacking
Definition: Act of gaining unauthorized access to a system or a computer
Distribute denial of service(DDoS)
Multiple computers launching simultaneous requests at the
target
Hacker will install malicious software
Hacker will delete or steal confidential information
Hacker will vandalise (or defacing) websites
Precaution: install Firewall
Data privacy
Security
Measures
Identifying phishing
attempts
Dealing with spam email
Avoid opening spam emails or
clicking links in spam messages
Email is not correct
eg Email from school
with @ pretty.com
Wrong Grammer
Flag them as spam
Preventing
unauthorised access
Installing anti-virus,
anti-spyware software and firewall
Using a firewall
Using strong passwords
Logging off the computer
when not in use
Types of Malware
Trojan
software that appears harmless
but contains malicious files
Virus
A computer program that attaches
itself to a regular program and modifies it
Worm
Able to duplicate itself and
spread to other computers in a network
Malware
Deleting or modifying files
Stealing information
from computers
Slowing down computers
or causing them to crash
Ransomware
Locks flies on computer system
preventing users from accessing
them until ransom is paid
Spyware
Software that monitors a user's actions or
commands on a computer and transmits that
Privacy laws
Sufficient for its purpose, i.e.
only collect when needed;
Used only for its intended purpose
Accessible by the owner;
how data is collected,
stored and handled
Data breach
When private or sensitive data is
accessed by an unauthorised person
Kept secure from unauthorised access
Deleted when no longer needed