Please enable JavaScript.
Coggle requires JavaScript to display documents.
DATA, image, image, image, image, image, image, image, image, image -…
DATA
preventions
Encryption Encryption is the process of converting data into a secure format to prevent unauthorized access.
Sensitive personal data can use encryption, which uses a key to scramble the data in to a coded form and it can be readable only when its decoded using a decoder.
Using passwords, PINS and biometrics for online transactions to authorize a user.
CAPTCHA tests a security measure used to confirm that a user is human, typically by asking them to identify distorted text, images, or solve puzzles.
Using anti- spyware software to detect, quarantine and remove the spywares
Phishing Phishing is a cyberattack where attackers trick people into revealing sensitive information, like passwords, by pretending to be trustworthy sources.
Pharming Pharming is a cyberattack that redirects users to fake websites to steal personal information, even if they enter the correct web address.
risks
Hacking Hacking is unauthorized access to systems or data, often for malicious purposes.
Hardware or software theft
Hardware theft is the act of stealing physical computer equipment like laptops, servers, or peripherals.
Software theft is the illegal copying, downloading, or distributing of software without proper authorization or licensing.
System malfunctioning or natural disasters like flood or fire System malfunctioning is when technology fails to work properly. Natural disasters like floods or fires can damage or destroy data and systems.
data corruption, where information becomes damaged or altered, leading to loss of integrity and reliability.
Accidental deletion of data
Accidental deletion of data is when files are unintentionally erased or lost.
-
-
-
-
-
-
-
-
-
-