Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Network - Coggle Diagram
Security and Privacy
in Network
Computer Crimes
Cyberbullying
Victims of cyberbullying should report such activities to a figure if authority immediately
Definition person harasses others on the internet
Phishing
Definition: Steal sensitive information such as login or credit card detail through the use of email and website that appear to be from a trustworthy sources
Precautions: Checking creditable sources before clicking on any links
Online Scam
Def. scammers deceive victims into giving
away personal information or money
E.g. attractive online deals on website and email
Password cracking
Eg Using a keylogger to store key strokers
Definition: Unauthorized access into a computer system by identifying or recovering on user's password
E.g. Using a password cracking software
Precaution: Use a strong password
Cyber Attacks
Denial of service (DoS)
Distributed: denial of service (DDoS)
Multiple computer launching simultaneous request at the target
Definition: Disable the availability of websites so that user cannot access
Flood a target website with large number of request so that it overload the server
Hacking
Definition: Act of gaming unauthorized access
to a system or computer
Hacker will install malicious software
Hacker will delete or steal confidential information
Hacker will vandalize or defecting website
Precaution: Install Firewall
Security Measure
Identifying phishing
attempt
Email is not correct
eg Email from school
with @ pretty.com
Wrong Grammer
Installing anti-virus
anti-spyware software and firewall
Preventing
unauthorized
access
Using a firewall
Using strong password
Logging off the computer
when not in use
Dealing with spam email
Avoid opening spam email or clicking link in spam message
Flag them as spam
Malware
Effects
Slowing down computers
or causing them to crash
Deleting or modifying files
Stealing information
from computer
Type of Malware
Trojan
Software that appears harmless
but contain malicious content
Virus
A computer program that attaches
itself to a regular program and modifies it
Worm
Able to duplicate itself and
spread to other computer in a network
Spyware
Software that monitors a user's action or
commands on a computer and transmits that information to others without his or her knowledge.
Ransomware
Locks files on a computer system
preventing users from accessing
then until ransom is payed
Data Privacy
How data is stored and handled
Data Breach
When private or sensitive data is
accessed by an unauthorized person
Privacy Laws
Sufficient for its purpose i.e
only collect what is needed.
Used only for it intended purpose
Accessible by the owner
Kept secure from unauthorized access
delete when no longer needed