CYBER SECURITY AND CRIME- email scams

Description

Year 8 Computing Mind Map on CYBER SECURITY AND CRIME- email scams, created by Dillani Arulananthan on 20/01/2020.
Dillani Arulananthan
Mind Map by Dillani Arulananthan, updated more than 1 year ago
Dillani Arulananthan
Created by Dillani Arulananthan almost 5 years ago
10
0

Resource summary

CYBER SECURITY AND CRIME- email scams
  1. Email scams
    1. scam is when someone tries to trick you/a dishonest scheme
    2. email spoofing
      1. the creation of email messages with a forged sender address so that the message appears to have originated from somewhere other than the actual source
      2. used for getting card details
        1. if the website you're giving away information on doesn't start with https then its not secure meaning its not from a genuine organisation
          1. the 's' means secure so if its just http, its not secure
        2. CYBERCRIME is a crime committed on computer
          1. identity theft
            1. cyberbullying
              1. hacking
                1. when someone accesses your computer system without your permission
                  1. account hacking
                    1. e.g. you may be sent an email saying you won £1000 and that you have to fill a form including bank details to claim it. After doing that,those online frauds can get into your account and withdraw money
                      1. what the phisher has done is called email spoofing
                2. the deliberate use of someone else's identity usually to gain a financial advantage or benefit
                3. VICTIMS: everyone but most likely women or children
                4. CYBERCRIME has increased because it is apart of daily life and now people are learning more about computers so they can do more things
                  1. Advance fee scam
                    1. The scam typically involves promising the victim a significant share of a large sum of money, in return for a small up-front payment, which the fraudster requires in order to obtain the large sum.
                      1. Virus generated email
                        1. will appear to be sent from a friend
                          1. usually means your friend's email has been infected with a virus and has sent the email to their whole address book
                            1. typically includes a product or shop recommendation or asks for emergency cash
                        2. never send money to someone you've never seen
                          1. There is no need of an advance payment
                      2. THINGS TO LOOK OUT FOR:
                        1. Greeting- phisers don't know your name so greeting is not personalised
                          1. Forged link- the link looks genuine but may not link to the website given
                            1. request for personal info- genuine organisations never do this
                              1. sense of urgency- criminals try to persuade you that something bad will happen if you don't act fast
                                1. poor spelling and grammar
                                  1. the sender's address is often a variation of the genuine address
                        2. Phishing
                          1. the attempt to acquire sensitive information for malicious uses by disguising oneself as a trustworthy source in an electronic communication
                            1. Prevention
                              1. copy and paste the link into a browser and see whether it has https or the padlock if not just discard it
                                1. keep changing your password and don't share it
                                  1. use a SPAM filter which stops common scams reaching your inbox
                              2. TROJAN HORSE AND MALWARE
                                1. Offers something tempting to look at, either an attachment or link – for example a funny video. When you open the attachment or click the link, it installs a virus on your computer .
                                  1. The virus might : Record your keystrokes and send them to the attacker, Provide someone else with access to your files, Use your computer to send spam to everyone in your address book
                                Show full summary Hide full summary

                                Similar

                                Types and Components of Computer Systems
                                Jess Peason
                                Input Devices
                                Jess Peason
                                Output Devices
                                Jess Peason
                                Computing
                                Kwame Oteng-Adusei
                                Pack of playing cards answer
                                Karl Taylor
                                Code Challenge Flow Chart
                                Charlotte Hilton
                                Computing Hardware - CPU and Memory
                                ollietablet123
                                Input, output and storage devices
                                Mr A Esch
                                GCSE Computing - 4 - Representation of data in computer systems
                                lilymate
                                GCSE Computing: Hardware
                                Yasmin F
                                OCR gcse computer science
                                Jodie Awthinre