Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks - Coggle Diagram
Security and Privacy in Networks
Computer Crimes
Cyberbullying
Victims of cyberbullying should report such
activities to a figure of authority immediately
Definition: person harasses others on the internet
Phishing
Definition: Steal sensitive information such as login or credit card
details through the use of emails and websites that appear to be
from trustworthy sources
Precautions: Checking credible sources
before clicking on any links
Cyberattacks
Denial of service(DoS)
Definition: Disable the availability of websites
so that users cannot access
Floods a target website with large numbers of requests so that it overloads the saver
Distributed denial of service(DDoS)
Multiple computers launching simultaneous requests at the
target
Hacking
Definition: Act of gaining unauthorized access to a system or computer
Hacker will install malicious software
Hacker will delete or steal confidential information
Hacker will vandalize (or defacing) websites
Precaution: install Firewall
Online scam
Def: scammers deceive victims into giving
away personal information or money
E.g. attractive online deals on
websites and emails
Password cracking
Definition: Unauthorized access into a computer system by
identifying or recovering a user's password
E.g. Using a password cracking software
Precaution: Use a strong password
I<3mrDavidLim
E.g. using a keylogger to store keystrokes
Security
Measures
Identifying phishing
attempts
Email is not correct
e.g. Email from school
with @ pretty.com
Wrong Grammar
Installing anti-virus,
anti-spyware software and firewall
Preventing
unauthorised
access
Using strong passwords
Logging off the computer
when not in use
Using a firewall
Dealing with spam email
Avoid opening spam emails or
clicking links in spam messages
Flag them as spam
Malware
Types of Malware
Virus
A computer program that attaches
itself to a regular program and modifies it.
Worm
Able to duplicate itself and
spread to other computers in a network
Trojan
Software that appears harmless
but contains malicious content
Spyware
Software that monitors a user's action or
commands on a computer and transmits that
information to others without his or her knowledge
Ransomware
Locks files on a computer system
preventing users from accessing
them until ransom is paid
Effects
Deleting or modifying files
Stealing information
from computers
Slowing down computers
or causing them to crash
Data Privacy
Data breach
When private or sensitive data is
accessed by an unauthorized person
Privacy laws
Used only for its intended purpose
Accessible by the owner;
Sufficient for its purpose, i.e.
only collect what is needed;
Kept secure from unauthorized access
Deleted when no longer needed
How data s collected,
stored, and handled