Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Network - Coggle Diagram
Security and Privacy in Network
Data privacy
Data breach
when private or sensitive data is accessed by an unauthorized person
Privacy laws
Sufficient for its purpose, i.e.
only collect what is needed
Used only for its intended purpose
Accessible by the owner;
Kept secure from unauthorized access
Deleted when no longer needed
how data is collected, stored, and handled
Computer Crimes
Cyberbullying
Victims of cyberbullying should report such
activities to a figure of authority immediately
Definition
:person harasses others on the internet
Phising
Definition:
Steal sensitive information such as login or credit card
details through the use of emails and websites that appear to be from trustworthy sources
Online scam
Definition
:scammers deceive victims into giving away personal information
Eg attractive online deals on websites and email
Password cracking
Eg using a keylogger to store keystrokes
Definition
:Unauthorised access into computer system by identifying or recovering a user's password
Eg Using a password cracking software
Precaution: Use a strong password
I<3mrDavidLim
Cyberattacks
Denial of services (DoS)
Definition
: Disable the availability of websites
so that users cannot access
Distributed denial of service ( DDoS)
Multiple computers launching simultaneous requests at the
target
Floods a target website with large numbers of requests so that it
overloads the server
Hacking
Definition:
Act of gaining unauthorized access to a system or computer
Hacker will install malicious software
Hacker will delete or steal confidential information
Hacker will vandalise (or defacing) websites
precaution
: install firewall
Security measures
Dealing with spam email
Avoid opening spam emails or
clicking links in spam messages
Flag them as spam
Identifying phishing
attempts
Email is not correct. eg Email from school with @ pretty.com
Wrong grammer
Preventing unauthorized
access
Using strong passwords
Using a firewall
Logging off the computer
when not in use
installing anti-virus
anti-spyware software and firewall
Malware
Type of malware
Trojan
Software that appears harmless
but contains malicious content.
Virus
A computer program that attaches
itself to a regular program and modifies it.
Worm
Able to duplicate itself and
spread to other computers in a network.
Spyware
Software that monitors a user's actions or commands on a computer and transmits that information to others without his or her knowledge.
Ransomware
Locks files on a computer system
preventing users from accessing
them until ransom is paid.
Effects
Slowing down computers of causing them to crash
Deleting or modifying files
Stealing information from computers