Booklet - How to use the internet in a safe and productive way
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
PART III
CYBERSECURITY PROTECT YOURSELF
Cybersecurity
• What is Cybersecurity?
• Types of vulnerabilities
- Introduced by product issues
- Introduced by user
• Sources of attacks
- Distributed attacks vs single attacks
- Other compromised accounts
• Who handles Cybersecurity?
22 HOW TO WORK SAFELY AND WHAT TO WATCH