Module 4 : Cybersecurity

Introduction

It is an undeniable fact that over the last decades Information Technology (IT) has made great progress and the Internet is now an integral part of our lives. However, despite the significant advantages, there are major drawbacks involved as well. In fact, the more technology is growing, the more sophisticated online threats are appearing. Additionally, as information is nowadays stored, processed and shared in a digital form, protecting our electronic devices and all the electronically stored information seems vital.

Various ways exist to avoid the potential threats which are generally referred to as cybersecurity. But what exactly does cybersecurity mean? Experts state that cybersecurity is a subcategory of information security and according to Merriam-Webster online dictionary cybersecurity is defined as measures taken to protect a computer or computer system against unauthorized access or attack(Merriam-Webster, n.d.). Furthermore, cybersecurity is related to adopted and various actions and safety measures that are to defend information systems and to preserve the unauthorised users access and attack, ensuring the confidentiality, integrity and availability of data (Bettina Jakobsen[Member of European Court of Auditors] et al., 2019, p. 6, p. 57).

Individuals face different cyber threats than businesses or organisations. A common experience that individuals encounter is, their social media accounts been hacked or personal information retrieved while people’s identities stolen (more practical examples are presented in Unit 2). Thus, new European Union (EU) regulations and laws came into force with the aim to protect personal data, such as General Data Protection Regulation (GDPR) 2016 , while organisations are obliged to implement these regulations, otherwise they can receive fines. These laws are important steps towards protection and control of personal data, respecting the individuals’ fundamental rights in the digital age guiding organisations on and how they are allowed to process them.

Objective

Module 4 will give you a thorough overview of the most common cyber threats. Moreover, it will help you to recognise threats or fraudulent activity and how to defend against them.

Introduction

1
Introduction
2
Objectives
3
Expected learning outcomes

Topic 1 : Fundamentals of Cybersecurity

1
Introduction
2
4.1.1 Basic vocabulary terms
3
4.1.2 Protect the device
4
4.1.3 Protect the connection
5
4.1.4 Protect email communication
6
4.1.5 Protect and back up electronic documents and files
7
Unit Review/Summary
8
Exercise 1
9
Exercise 2
10
Exercise 3
11
Exercise 4
12
Exercise 5
13
Exercise 6
14
Exercise 7
15
Exercise 8

Topic 2 : Most common Internet scams and frauds

1
Introduction
2
4.2.1 Phising
3
4.2.2 Pharming
4
4.2.3 Malicious software installation by email
5
4.2.4 Shopping scams
6
4.2.5 Fake lotteries/charities
7
4.2.6 False surveys
8
4.2.7 Account failure/problem
9
4.2.8 Identity theft
10
Unit Review / Summary
11
Exercise 1

Topic 3 : Guidelines: how to recognise fraudulent activity and how to avoid getting scammed

1
4.3.1 How to recognise fraudulent activity
2
4.3.2 How to avoid getting scammed
3
Unit Review / Summary
4
Exercises

Self-Assessment Questionnaire

1
Final Quiz
8 questions

Resources References and Materials

1
Downloadable resources
2
Extra reading materials
3
Reference and resources
4
Module’s Infographic

Be the first to add a review.

Please, login to leave a review
Enrolled: 35 students
Lectures: 27