introduction to cyber secure user

Get Started. It's Free
or sign up with your email address
introduction to cyber secure user by Mind Map: introduction to cyber secure user

1. cyber security threats

1.1. malware

1.1.1. virus worm

1.1.2. trojan horse

1.2. phishing

1.2.1. spam

1.2.2. ip spoofing

1.2.3. eavesdropping

1.2.4. botnet

1.2.5. ddos

2. how kepping secure

2.1. use strong password

2.2. keep social media id private

3. why is data protection so important

3.1. personal info

3.1.1. online acccount

4. what is cyber security

4.1. cyber security is protection of our data

4.1.1. three principles

4.1.1.1. confidenriality

4.1.1.2. integrity

4.1.1.3. avaibility