Please enable JavaScript.
Coggle requires JavaScript to display documents.
Online safety ( •̀ ω •́ )✧ - Coggle Diagram
Online safety
( •̀ ω •́ )✧
Online predators (;´д`)ゞ
online predators are people who don't say what they really are, like a middle aged man saying that they are a young woman.
link to find out more info
people can fall for this, and because of this, people were kidnapped because of this.
skimming ◑﹏◐
skimming is the act where someone steals another person's card details and uses their card
Link to find out more info on skimming
this is achieved by having people steal your credit card email and PIN
Identity theft (っ °Д °;)っ
identity theft is where someone is impersonating another individual to do malicious things as them
link to find out more info on impersonation & identity theft
this identity theft can be done by having misleading emails sent, requesting for their account info, so they can impersonate them.
viruses & malicous software ~(>_<。)\
viruses are software that are intended to do harm
malicious software are software created to infect people's computers and infect
types of malicious software
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.
A Trojan Horse disguises itself as legitimate software with the purpose of tricking you into executing malicious software on your computer.
Spyware is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising. However, malicious spyware is explicitly used to profit from stolen data.
Adware, also known as advertisement-supported software, generates revenue for its developers by automatically generating adverts on your screen, usually within a web browser. Adware is typically created for computers but can also be found on mobile devices. Some forms of adware are highly manipulative and create an open door for malicious programs.
A rootkit is a type of malware designed to give hackers access to and control over a target device. Although most rootkits affect the software and the operating system, some can also infect your computer’s hardware and firmware. Rootkits are adept at concealing their presence, but while they remain hidden, they are active.
ransomware is where the software first gains access to the device. Depending on the type of ransomware, either the entire operating system or individual files are encrypted. A ransom is then demanded from the victim.
Keylogger tools can either be hardware or software meant to automate the process of keystroke logging. These tools record the data sent by every keystroke into a text file to be retrieved at a later time. Some tools can record everything on your copy-cut-paste clipboard, calls, GPS data, and even microphone or camera footage.
link to find out more info on viruses
phishing ⊙﹏⊙∥
phishing is where someone uses a fake email to get someone's personal details.
link to find new info on phishing
phishing can also mean that they get your bank info and personal details.
hackers ( ˘︹˘ )
hackers are people who like to infect sites, either black hat hackers or white hat hackers.
link to find out more info on hackers
white hat hackers are where people hire them to hack websites to test how secure they are, and black hat ones are hackers that hack for malicious purposes
censorship (°ロ°)
censorship is the act of hiding something that is inappropriate to someone that isnt supposed to see it.
link to find out more info on censorship
censorship is a very useful asset because it makes it so young users can't see things that aren't appropriate for them.
Innapropriate things (σ`д′)σ
innapropriate things are things that are not supposed to be seen by young users.
link to find out more info on inappropriate things
cyberflashing is where someone gives another individual a picture of their genitals, and they may ask for this, and they might not have asked for it.
when people see what they aren't supposed to see, they might be traumatized.