2. FABRIKAM
Digital Security Risks
C a n c a u s e d a m a g e t o
c o m p u t e r o r m o b i l e d e v i c e ’ s
h a r d w a r e , d a t a , s o f t w a r e e t c .
Cybercrime
• Illegal action
based on Internet
or online
Computer crime
• Illegal action
involving using of
computer
2
4. FABRIKAM
HACKER VS CRACKER
• A hacker is a person intensely interested in hacking any computer
operating system. Hackers are most often programmers. As such,
hackers obtain advanced knowledge of operating systems and
programming languages. They might discover holes within systems
and the reasons for such holes. Hackers constantly seek further
knowledge and never intentionally damage data.
• A cracker is one who breaks into or violates the system integrity of
remote machines with malicious intent. Having gained unauthorized
access, crackers destroy vital data, deny legitimate users service, or
cause problems for their targets. Crackers can easily be identified
because their actions are malicious.
4
5. FABRIKAMFABRIKAM
TITLE GOES HERE
S U B T I T L E G O E S H E R E
Lorem ipsum dolor sit amet, consectetur adipiscing
elit. Ut gravida eros erat. Proin a tellus sed risus
lobortis sagittis eu quis est. Duis ut aliquam nisi.
Suspendisse vehicula mi diam, sit amet lacinia
massa sodales ac. Fusce condimentum egestas
nunc a maximus. Quisque et orci purus. Proin dolor
mi, ultrices sit amet ipsum placerat, congue mattis
turpis. Donec vestibulum eros eget mauris
dignissim, ut ultricies dolor viverra. Phasellus
efficitur ante nec sem convallis, in ornare est
accumsan. Lorem ipsum dolor sit amet, consectetur
adipiscing elit. Ut gravida eros erat. Proin a tellus
sed risus lobortis sagittis eu quis est.
5
6. FABRIKAMFABRIKAM
UNAUTHORIZED ACCESS AND USE
U n a u t h o r i z e d A c c e s s
Use of its computer or network without permission.
U n a t h o r i z e d U s e
Use of its computer or data for illegal activities.
Diagram that was shown on the right is how to secure
from unauthorized access and use.
6
7. FABRIKAM
5 ONLINE SAFETY TIPS
TIPS HOW
Keep Private
Personal information must remain private-no
exceptions.
Stay Protected
Protect your data with strong passwords. Only
share your passwords with your parents.
Share Safely
Sharing information on the Internet is
permanent and cannot be erased.
Be Secured
Use protective software to protect from the
inappropriate information and intruders.
Be Alert
Always be aware when receiving emails,
images, or texts. Harmful viruses and messages
can be sent so think carefully before opening
something unfamiliar.
7