The internet has become a permanent habit in our modern days. We consume massive amounts of various content daily, news, videos, and visual material. And on top of that, everyone can upload any sort of content to the internet. While surfing the internet, we might not realize how vulnerable we can be. Our data and personal information can be stolen by anyone who knows how to exploit security weaknesses.
This course's main goal was to teach you about different cybersecurity threats and how they work. Hopefully, with this new information, you can be better prepared and keep yourself safe on the internet.
Tässä kohtaa Flashcards Grid -komponentti kuvilla, jonka tiedot alla
Email scams are intentional deception to gain personal information or to cause harm to others.
Malware is an umbrella term for different types of software that aim to cause damage to a computer or a network for example. Malware types include worms, ransomware and viruses.
Identity theft means that a criminal has obtained someone's personal information without consent and uses them to get financial gain or cause other kind of harm.
Wireless network can provide an access for hackers to your devices that don't have a proper security. Unsecure wireless networks' risks and threats include freeloading, rogue clients and DoS-attacks for example.
Internet of Things can present a threat through IoT devices and their used software without proper security.
Tässä kohtaa kuvakollaasi, joiden kuvatekstit kuvien alla
Protecting our private information is highly important to prevent its ill use. There are many ways to protect ourselves, like using strong passwords and knowing how to spot phishing emails.
Down is a list of common cyber threats and few advices on how to protect yourself from them.
During this course you have been learning more about the cyber security threats and risks. Some of them may be familiar to you, but as technology develops all the time, so does the security vulnerabilities. These vulnerabilities can usually be detected in time, but sometimes they go unnoticed or they haven't been even considered, and at that point they are taken advantage of the attackers.
We don't need complicated security measures to protect our data, just starting with a strong password and using multi-factor authentication is great. Keeping our devices and software updated will helps keeping outsiders away.
As a reminder, we should always think first on about the content we are about to share in the internet. Is the site public or is the access controlled? Should you share private information, like medical or financial details, as they could be used to gain access to your accounts or cause you harm.
Tässä kohtaa Sorting-komponentti
Tässä kohtaa Fill in the Blank -tehtäväkomponentti
Tässä kohtaa Statement B -komponentti, jonka teksti alla