CSCI4.1 Cyberbullying

Cyberbullying is an act of sending, posting, or sharing negative, harmful, false, or demeaning content regarding others. Sharing personal or private information which could cause embarrassment or humiliation to others also falls under the ambit of Cyberbullying. It takes place through digital devices such as cell phones, computers, and tablets via services such as SMS, texts, […]

CSCI5.1 Protecting Your Privacy

10 Personal Cybersecurity Tips 1. Keep Your Software Up to Date  Ransomware attacks were a major attack vector of 2017 for both businesses and consumers. One of the most important cyber security tips to mitigate ransomware is patching outdated software, both operating systems, and applications. This helps remove critical vulnerabilities that hackers use to access […]

CSCI5.3 Protecting Organizations

There are various strategies and tools used by cybersecurity professionals to protect an organization’s network, data, and equipment from cybercrime. There is no single security appliance or piece of technology that will solve all the network security needs in an organization. That is why cybersecurity professionals must consider what tools will be most effective as […]

CSCI3.3 Passive Attack

What is a passive attack? Passive attacks include active reconnaissance and passive reconnaissance. The word reconnaissance comes from the military term that refers to the act of exploring an enemy territory to gather information. In a computer security context, reconnaissance is the act of exploring a system or network in order to gather information before conducting a full attack. These […]

CSCI3.2 Denial of Service Attacks

Victims of DoS attacks often target web servers of high-profile organizations such as banking, commerce, and media companies, or government and trade organizations. Though DoS attacks do not typically result in the theft or loss of significant information or other assets, they can cost the victim a great deal of time and money to handle. […]

CSCI4.2 Identity Theft

What Is Identity Theft?  Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Identity theft is committed in many different ways and its victims are typically left with damage to their credit, finances, and reputation. […]

CSCI3.1 Phishing

What is a Phishing Attack? Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which […]

CSCI2.4 Worms

How do computer worms work?  Worms can be transmitted via software vulnerabilities, which are weaknesses in the system that malware can exploit to gain access to the system. Computer worms could also arrive as attachments in spam emails or instant messages (IMs). Once opened, these files could provide a link to a malicious website or […]

CSCI2.3 Trojans

A Trojan acts as a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for. A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a […]

CSCI2.2 Spyware

Spyware Definition Whether legitimate or based in fraud, spyware’s surveillance activity leaves you open to data breaches and misuse of your private data. Spyware also affects network and device performance, slowing down daily user activities. By becoming aware of how spyware works, you can avoid issues in enterprise and personal use. In this article, we’ll […]