StudY - Technic
- LMS-SFC (EN) - Cyber
Security - Content
"Let's make something!"
Cyber Security - Content
1. - Cyber
Security News.
List of links to the articles
presented / made by the most prestigious online publications in
the field of cyber security (and not only).
2. - Cyro
and Cyrene.
A kind of editorial (short, daily articles) that addresses the problems raised by the use of the computer.
A kind of editorial (short, daily articles) that addresses the problems raised by the use of the computer.
2.1.
Non-malicious threats.
2.2. Data
threats.
2.3. Threats to
integrity and availability.
2.3.1. - Password attacks.
2.3.2. - Account
Takeover.
2.4. - Email
threats.
2.4.1. - Phishing.
2.4.2. - Spear
Phishing.
2.4.3. - E-mail
spoofing.
2.5. -
Attacks on supply chains.
2.6. -
Cryptojacking.
2.7. -
Misinformation - poor information.
2.8. - Malware.
2.9. - Ransomware.
(Malicious attack
encrypts data and demands reward for data access)
2.10. -
Spyware.
2.11. -
Distributed denial of service (DDoS).
2.12. - MitM -
Man-in-the-Middle.
2.13. - Social
engineering.
2.14. - APT -
Advanced Persistence Threat.
3. - Cybercrime actors.
3.1. -
State-sponsored actors.
3.2. -
Industrial spies, including cyber espionage.
3.3. -
Cybercrime actors (hackers), including organized crime groups.
3.4. - Hired
hackers.
3.5. -
Malicious actors inside.
3.5. -
Hacktivist.
3.7. -
Terorist.
3. - Introduction
(1).
A brief introduction in terms
of the requirements of someone who wants to know as much as
possible in terms of cybersecurity, possibly to become something
like a professional in this field.
4. Introduction
(2).
Introduction to the "secrets
of cybersecurity" from the point of view of any user of computer
devices, both to avoid problems at home and at a service (job)
related to them.
5. - Short
organization.
6. - Antivirus.
7. "Early" education - Useful
games for "early" and / or fun access to cybersecurity.
Collection of games, from
authorized sources, in cyber security for children.
Dorin M - May 9, 2021