Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks - Coggle Diagram
Security and Privacy in Networks
Computer Crimes
Cyberbullying
Definition :person harasses others on the internet
Victims of cyberbullying should report such activities to a figure of authority immediately
Phising
Precautions: Checking credible sources before clicking on any links
Definition: Steal sensitive information such as login or credit card details through the use of emails and websites that appear to be from trustworthy sources
Online scam
Scammers deceive victims into giving away personal information or money
eg attractive online deals on websites and emails
Password cracking
.
precaution : Use a strong password I<3mrDavidLim
using a password cracking software
Definition: Unauthorized access into a computer system by identifying or recovering a user's password
Using a keylogger to store keystrokes
Cyberattacks
Denial of service (DoS)
Definitions: Disable the availability of websites so that users cannot access
Distributed denial of service (DDoS) Multiple computers launching simultaneous requests at the target
Floods a target website with large numbers of requests so that it overloads the computer
Hacking
Hacker will installing malicious software
Hacker will delete or steal confidential information
Definitions: Act a of gaining unauthorized access to a system or computer
Hacker with vandalise (or defacing) websites
Precaution: install Firewall
Security Measures
identifying phishing attemps
Email is not correct. e.g. Email from school with @ pretty.com
Wrong Grammer
installing anti-virus, anti-spyware software and firewall
Dealing with spam email
.
Avoid opening spam emails or clicking links in spam messages
Flag them as spam
Preventing unauthorized access
Using a firewall
Using strong passwords
Logging off the computer when not in use
Malware
Types of malware
Worm
able to duplicate itself and spread to other computers in a network
Virus
A computer program that attaches itself to a regular program and modifies it
Trojan
Software that appear harmless but contains malicious content
Ransomware
Locks files on a computer system preventing users from accessing them until ransom is paid
Spyware
Software that monitors a user's action or commands on a computer and transit that information to other without his or her knowledge
Effects
Deleting or modifying files
Stealing information from computers
Slowing down computers or causing them to crash
Data Privacy
Data breach
When private or sensitive data is accessed by an unauthorized person
Privacy Laws
Sufficient for its purpose, i.e.
only collect what is needed;
Kept secure from unauthorized access
Used only for its intended purpose
Deleted when no longer needed
Accessible by the owner