Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Network - Coggle Diagram
Security and Privacy in Network
Computer Crime
Phishing
Definition: Steal sensitive information such as login or credit card detail through the use of email and website that appear to be from trustworthy source
Precaution: Checking credible source before clicking on any links
Online Scam
scammers deceive victim into giving away personal information or money
E.g. attractive online deal on website and email
Cyberbullying
Victim of cyberbullying should report such activities to a figure of authority immediately
Definition person harassed others on the internet
Password cracking
Eg using a keylogger to store keystrokes
Definition: Unauthorized access into computer system to idenifying to recovering a user password
E.g. using a password cracking software
Precaution: Use a strong password: I<3mrdavidlim
Cyberattacks
Denial of service(DOS)
Definition: Disable the availability of website so that users cannot access
Flood at target website with large numbers of request so that it overload the server
Distributed denial of service multiple computer launching simultaneous request at the target
Hacki
ng
Hacker will delete or steal confidential information
Hackers will vandalize or defacing website
Hacker will install malicious software
Precaution: install firewall
Definition: Act of gaming unauthorized access to system or computer
Security Measure
Installing anti-virus
: anti-spyware software and firewall
Preventing unauthorized access
Using strong password
Logging off the computer when not in use
Using a firewall
identifying phishing attempt
Email is not correct E.g Email from school with @ Email.com
Wrong Grammar
Dealing with spam email
Avoid opening spam email or clicking link in spam message
Flag them as spam
Malware
Effects
Delete or modifying file
Stealing information from computers
Slowing down computers or causing them to crash
Types of Malware
Worm
Able to duplicate itself and spread to other computer in a network
Spyware
Software that monitors a user's actions or commands on a computer and transmits that information to other without his or her knowledge
Virus
A computer program that attaches itself to a regular program and modifier it
Ransomware
Looks file on a computer system preventing users from accessing them until ransom is paid
Trojan
Software that appears harmless but contain malicious content
Data Privacy
Data breach
When private or sensitive data is accessed by an unauthorized person
Privacy laws
Accessible by the owner
Kept secure from unauthorized access
used only for its intended purpose
Deleted when no longer needed
Sufficient for its purpose i.e. unity collect what is needed
how data is collected, stored and handled