Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security and Privacy in Networks - Coggle Diagram
Security and Privacy in Networks
Cyberbullying:
victims of cyberbullying should report such activities to figure of authority immediately.
Cyberbullying (definition):
Person harasses others on the internet.
Phishing(definition):
Steal sensitive information such as login or credit card details through use of emails and websites that appear to be from trustworthy sources.
Precaution of Phishing:
checking credible sources before clicking on any links
Online Scam(definition):
scammers deceive victims into giving away personal information or money.
Examples of Online Scam:
attractive online deals on websites and emails.
Password Cracking(definition):
unauthorized access into a computer system by identifying or recovering a user's background
Password Cracking Examples:
Using a keylogger to store keystrokes and using a password cracking software
Precaution of Password Cracking:
use a strong password (I<3mrdavidlim)
๐๐๐ฏ๐ฒ๐ฟ๐ฎ๐๐๐ฎ๐ฐ๐ธ๐
Denial of Service (DoS):Distrubuted denial of service (DDoS)
Multiple computers launching simultaneous request at the target. Floods a target website with many requests so that it overloads the server.
Definition of ( DoS): disable the availability of websites so that user's cannot access.
๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด
Definition of Hacking: act of gaining unauthorized accessed to a system or computer.
Hacking examples: Hacker will install malicious software, delete, or steal confidential information, vandalizing (or defacing) websites.
Hacking Precaution: Install Firewall
๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐๐๐ฌ๐ฎ๐ซ๐๐ฌ
Security measures: installing anti-virus, anti-spyware software and firewall.
Preventing unauthorized access: use firewall, using strong passwords and log off the computer when not in use.
Dealing with spam deals: avoid opening spam emails or clicking links in spam messages and flag them as spam.
Identifying Phishing Attempts: email is not correct. E.g. email from school with
pretty.com.
Types of Malwares
Trojan: a computer program that attaches itself to regular program and modifies it.
Worm: able to duplicate itself and spread to other computers in a network.
Spyware: software that monitors a userโs actions or commands on a computer and transmits that information to others without his or her knowledge.
Ransomeware: lock files on a computer system preventing users from accessing them until ransom in paid.
๐๐๐ญ๐ ๐๐ซ๐ข๐ฏ๐๐๐ฒ
Data Privacy definition: how data is collected, stored and handled
Data Breach: when private or sensitive data is accessed by an unauthorized person.
Privacy Laws: Sufficient for its purpose, e.g. only collect what is needed. Used only for its intended purpose. Accessible by the owner. Kept secure from unauthorized access and deleted when no longer needed.
Malwares
Effects of Malwares:
1) Slows down computers or cause them to crash
2) Deleting or modifying files
3) Stealing information from computers.