Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and privacy in networks - Coggle Diagram
Security and privacy in networks
Computer crime
Phishing
Definition: Steal sensitive information such as login or credit card
details through the use of emails and websites that appear to be from trustworthy sources.
Precautions: Checking credible sources
before clicking of any links.
Online scam
Definition: scammers deceive victims into giving
away personal information or money
Eg attractive online deals on
websites and emails
Cyber bullying
Victims of cyberbullying should report such
activities to figure of authority immediately
Definition: Person harasses others on the internet
Password cracking
Using a keylogger to store keystrokes
definition: disable the availability of websites
so that user cannot access
Using a password cracking software
use strong password
Cyber attacks
Denial of service
Definition: disable the availability of websites
so that users cannot access
Floods a target websites with large numbers of request so that it
overloads the server
Multiple computers launching simultaneous request at the
target
Hacking
Hacker will install malicious software
Hacker will delete or steal confidential information
Definition: act of gaining unauthorized access
to a system or computer
hacker will vandalize website
Precaution: install firewall
Security
Measures
Installing anti-virus,
anti-spyware software and firewall
Dealing with spam email
Avoid opening spam emails or
clicking in spam messages.
Flag them as spam
Identifying Phishing
Emails is not correct
Wrong grammar
Preventing unauthorized access
Using strong passwords
Logging off the computer
when not in use
Using a firewall
Types of malware
worm
Able to duplicate itself and
spread to other computers in a network
Spyware
software that monitors a user's actions or
commands on a computer and transmit that
information to others without his or her knowledge
Virus
A computer program that attaches
itself to a regular program and modifies it.
Ransomware
Locks file on a computer system
preventing users from accessing
them until ransom is paid
Trojan
Software that appears harmless
but contains malicious content
Malware
Effects
Deleting or modifying files
Stealing information
from computers
Slowing down computers
or causing them to crash
Data privacy
Data bleach
When private or sensitive data is
accessed by an unauthorized person
Privacy laws
Accessible by the owner
Kept secure form unauthorized accessed
Used only for its intended purpose
Deleted when no longer needed
Sufficient for its purpose,i.e.
only collect what is needed;
how data is collected,
stored, and handled