Security and Privacy in
Networks

Computer Crimes

Cyberbullying

Cyberattacks

Victims of cyberbullying should report such
activities to a figure of authority immediately

Definition: person harasses others on the internet

Phishing

Definition: Steal sensitive information such as login or credit card
details through the use of emails and websites that appear to be
from trustworthy sources

Precautions: Checking credible sources
before clicking on any links

Online Scam

scammers deceive victims into giving
away personal information or money

Eg attractive online deals on
websites and emails

Password cracking

Definition: Unauthorised access into a computer system by
identifying or recovering a user's password

Eg Using a password cracking software

Eg using a keylogger to store keystrokes

Precaution: use a strong password
I<3mrDavidLim

Denial of service (DOs)

Definition: Disable the availability of websites
so that users cannot access

Floods of target websites with large numbers of requests at the
target

Hacking

Definition: Act of gaining unauthorized access to a system or a computer

Distribute denial of service(DDoS)
Multiple computers launching simultaneous requests at the
target

Hacker will install malicious software

Hacker will delete or steal confidential information

Hacker will vandalise (or defacing) websites

Precaution: install Firewall

Data privacy

Security
Measures

Identifying phishing
attempts

Dealing with spam email

Avoid opening spam emails or
clicking links in spam messages

Email is not correct
eg Email from school
with @ pretty.com

Wrong Grammer

Flag them as spam

Preventing
unauthorised access

Installing anti-virus,
anti-spyware software and firewall

Using a firewall

Using strong passwords

Logging off the computer
when not in use

Types of Malware

Trojan
software that appears harmless
but contains malicious files

Virus
A computer program that attaches
itself to a regular program and modifies it

Worm
Able to duplicate itself and
spread to other computers in a network

Malware

Deleting or modifying files

Stealing information
from computers

Slowing down computers
or causing them to crash

Ransomware
Locks flies on computer system
preventing users from accessing
them until ransom is paid

Spyware
Software that monitors a user's actions or
commands on a computer and transmits that

Privacy laws

Sufficient for its purpose, i.e.
only collect when needed;

Used only for its intended purpose

Accessible by the owner;

how data is collected,
stored and handled

Data breach

When private or sensitive data is
accessed by an unauthorised person

Kept secure from unauthorised access

Deleted when no longer needed