27.04.2020 Views

Booklet - How to use the internet in a safe and productive way

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

PART III

CYBERSECURITY PROTECT YOURSELF

Cybersecurity

• What is Cybersecurity?

• Types of vulnerabilities

- Introduced by product issues

- Introduced by user

• Sources of attacks

- Distributed attacks vs single attacks

- Other compromised accounts

• Who handles Cybersecurity?

22 HOW TO WORK SAFELY AND WHAT TO WATCH

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!