Get Started. It's Free
or sign up with your email address
Internet Security by Mind Map: Internet Security

1. The Intermer proids a wide varieу of opporuntes for кommunicarion and development, bur unfortunately it so has its dark side. Crackers, or black-hat hackers, are computer criminals who use technolоgy го рerforma variety of crimes virus propagation, fraud, intellecrual prгopery theft, etc. Intermer-based crimes include scam, email fraаиd to obtain money or valuables, and phishing, bank fraud, to ger banking information such as passwords of Interner bank accounts or cтedix card details.

1.1. Malware:

1.1.1. Viruses

1.1.1.1. A virus can enter a PC via a disc drive - if you insert an infected disc -or via the Internet

1.1.2. Worms

1.1.2.1. A worm is a self-copying progam that spreads through email attachments, replicates itself and sends a copy to everyone in an address book

1.1.3. Trojan Horses

1.1.3.1. Trojan horse is disguised as a useful program it may affect data security

1.1.4. Spyware

1.1.4.1. Spyware collects information from your PC without your consent.

2. Security and privacy on the Internet.

2.1. Security on the web

2.1.1. If one of the intermediary computers is infiltrated by hackers, your data can be copied To avoid risks, you should set al security alerts to high on your web browser. If you use online banking services, make sure they use digital certificates - files that are like digital identification cards and that identify users and web servers

2.2. Email privacy

2.2.1. Email privacy Similarly, as your email travels across the Net, it is copled temporarily onto many computers in between. This means that it can be read by people who illegally enter computer systems. The only way to protect a message is to put it in a sort of virtual envelope -that is, to encode it with some form of encryption.

2.3. Network Sucurity

2.3.1. The most common methods of protection are passwords for access control, firewalls, and encryption decryption systems Encryption changes data into a secret code so that only someone with a key can read it Decryption converts encrypted data back Into its ariginal form.

3. Сybercrime

3.1. Cybercrimes

3.1.1. Plagiarism

3.1.1.1. Plagiarism and theft of intellectual property-pretending that someone else's work is your own

3.1.2. Phishing

3.1.2.1. (password harvesting phishing)-getting passwords for online bank accounts or credit card numbers by using emails that look like they are from real organizations, but are in fact fake: people belleve the message is from their bank and send their security detals

3.1.3. IP spoofing

3.1.3.1. making one computer look like another in order to gain unauthorized access

3.1.4. Cyberstalking

3.1.4.1. online harassment or abuse, mainiy in chat rooms or newsgroups

3.1.5. Distribution of indecent or offensive material

3.1.6. Piracy

3.1.6.1. he illegal copy and distribution of copyrighted software games or music files

3.1.7. Spreading of malicious software

3.1.8. social engineering-

3.1.8.1. is a technology of managing people in the Internet space.

3.1.9. Illegal content

3.1.9.1. content that promotes extremism, terrorism, drug addiction, pornography, the cult of cruelty and violence.

3.1.10. Refilling

3.1.10.1. Іs an illegal substitution of telephone traffic.

3.1.11. Carding