Cyber Crime

Description

Key Stage 3 IT Mind Map on Cyber Crime, created by Farhan Chowdhury Y9R on 16/09/2022.
Farhan Chowdhury Y9R
Mind Map by Farhan Chowdhury Y9R, updated more than 1 year ago
Farhan Chowdhury Y9R
Created by Farhan Chowdhury Y9R over 2 years ago
1
0
1 2 3 4 5 (0)

Resource summary

Cyber Crime
  1. Email scams
    1. Phishing
      1. Trojan Horse/malware
        1. Fraudulent requests for money/advanced payments
          1. Virus-generated email
          2. Usually includes a link that when opened, downloads a virus onto your device
          3. Emails claiming to be from genuine companies, asking for your personal details e.g to sort out a problem.
            1. Emails asking for financial help
          4. Computer Misuse
            1. Malware
              1. Ransomware
                1. NHS WannaCry Attack 2017
                2. Meaning "malicious software"
              2. Unsecure Password
                1. Stop using things like: password or 123456
                2. Protecting Personal Data
                  1. TalkTalk data breach
                    1. SOCIAL MEDIA - much information about someone can be found on social media such as Snapchat where, with the SnapMap option, people can see your location.
                    2. Copyright
                      1. In the UK, copyright lasts for the author's lifetime plus up to 70 years after the author dies
                        1. Online Copyright Infringement
                          1. Even adding music tracks to a video you make is copyright
                        2. Health and Safety
                          1. Physical and mental health is very important to consider when using a computer
                            1. POSTURE - poor posture is a huge problem with using computers, a main consequence being spinal injury
                          Show full summary Hide full summary

                          0 comments

                          There are no comments, be the first and leave one below:

                          Similar

                          Project Communications Management
                          farzanajeffri
                          Network Protocols
                          Shannon Anderson-Rush
                          Abstraction
                          Shannon Anderson-Rush
                          Computing
                          Kwame Oteng-Adusei
                          HTTPS explained with Carrier Pigeons
                          Shannon Anderson-Rush
                          Introduction to the Internet
                          Shannon Anderson-Rush
                          Construcción de software
                          CRHISTIAN SUAREZ
                          Historical Development of Computer Languages
                          Shannon Anderson-Rush
                          Useful String Methods
                          Shannon Anderson-Rush
                          Web Designing & Development Full Tutorial
                          Nandkishor Dhekane