Also known as cyberspace, typically refers to the virtual environment or digital space that exists within computers and networks. It encompasses all aspects of the internet, digital communication, virtual reality, and other interconnected systems.
Cybersecurity threats
Acts performed by individuals with harmful intent, whose goal is to steal data, cause damage to or disrupt computing systems
Types of Cybersecurity Threats
Worms
Viruses
Trojans
Phishing
Smishing
Keyloggers
Adware
Baiting
Worms
Malware that exploits software vulnerabilities and backdoors to gain access to an operating system
Viruses
A piece of code that injects itself into an application. When the application runs, the malicious code executes
Trojans
Malicious code or software that poses as an innocent program, hiding in apps, games or email attachments. An unsuspecting user downloads the trojan, allowing it to gain control of their device
Phishing
The attacker sends emails pretending to come from a trusted source. Phishing often involves sending fraudulent emails to as many users as possible but can also be more targeted
Smishing
SMS phishing - the attacker uses text messages as the means of deceiving the victim
Keyloggers
Record a user's keyboard operations. The majority of keyloggers will hunt for easily identifiable key entries, such as bank card numbers and passwords. Identity and intellectual property theft are frequently tied to keylogging
Adware
A type of malicious software that secretly installs itself on your device and displays unwanted advertisements and pop-ups. In some cases, adware can even track your online behavior and display personalized ads
Baiting
The attacker lures a user into a social engineering trap, usually with a promise of something attractive like a gift card. The victim provides sensitive information such as credentials to the attacker
Cyber safety
Don't add or meet online friends without a parent's permission
Don't post anything you wouldn'twant teachers, family, and future employers to see
Tell someone if you think cyber bullying is happening to you or other people
Always be kind and respectful to others
Tell a parent what you are doing online. Ask a trusted adult if you need help or are unsure of any online activity
Keep your personal information private! DO NOT share your name, location, phone number or birthday
Do not believe everything you read online. There is a lot of incorrect information on the internet
Only create accounts with trusted sites. Make sure to use strong passwords. Don't share your passwords with others
Balance your screen time. Make sure you go outside for a walk, read a book and talk face to face with others
Netiquette
Proper behavior in cyberspace
Netiquette rules
Remember the human
Adhere to the same standards of behavior online that you follow in real life
Know where you are in cyberspace
Respect other people's time and bandwidth
Make yourself look good online
Share expert knowledge
Help keep flame wars under control
Respect other people's privacy
Don't abuse your power
Be forgiving of other people's mistakes
A classmate shares a photo of you online without your permission. What should you do?