introduction to cyber secure user
by Dev Shah
1. cyber security threats
1.1. malware
1.1.1. virus worm
1.1.2. trojan horse
1.2. phishing
1.2.1. spam
1.2.2. ip spoofing
1.2.3. eavesdropping
1.2.4. botnet
1.2.5. ddos
2. how kepping secure
2.1. use strong password
2.2. keep social media id private
3. why is data protection so important
3.1. personal info
3.1.1. online acccount
4. what is cyber security
4.1. cyber security is protection of our data
4.1.1. three principles
4.1.1.1. confidenriality
4.1.1.2. integrity
4.1.1.3. avaibility