Network threats
- Created by: archietiger
- Created on: 01-10-19 09:22
View mindmap
- Network threats
- Forms
of cyber attack
- planting viruses
- acquiring and using personal or confidential data
- disrupting a website or service
- Social engineering
- Shoulder surfing
- is the direct observation of someone entering their security details
- Phishing
- 1.A phishing email is one that tricks you into handing over sensitive or personal information
- 2.You receive what looks like a legitimate email, for example from a bank or an organisation such as PayPal or eBay
- 3.The website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers
- Shoulder surfing
- Protecting
yourself against email scams
- Use a SPAM filter to prevent common scams ever reaching your inbox
- Be suspicious! If you aren’t completely certain it’s genuine, NEVER click any links or download attachments
- Viruses
- A computer virus is a type of malware which is installed without your knowledge, with the purpose of doing harm
- Worms
- A worm is another type of malware
- It is a standalone program that does need to attach itself to an existing program in order to spread
- It may scan the Internet looking for vulnerable computers to infect
- Data theft
- In 2014, the details of 125,000 students of Staffordshire University were stolen from a laptop left in a car
- Forms
of cyber attack
Comments
No comments have yet been made