Page 6 - CyberSecurityEssentialsEnglish
P. 6

Warning Signs and Protective Guidelines for Email Threats ....................................................................................... 26
          WiFi-related threats ..................................................................................................................................................... 27

          Private/Home Network Access Threats ....................................................................................................................... 27
          Public Internet Access Threats .................................................................................................................................... 27

       Protective Guidelines for WiFi Threats ............................................................................................................................ 29
       Mobile Phone-related threats ......................................................................................................................................... 30

          Fake Applications ......................................................................................................................................................... 30
          Fake Applications Threats ............................................................................................................................................ 30

       Protective Guidelines for Mobile Phone Threats ............................................................................................................ 31
          Guidelines for spotting fake applications .................................................................................................................... 31
          Guidelines for dealing with fake applications ................................................................. Error! Bookmark not defined.

          Guidelines for dealing with number spoofing activities .............................................................................................. 32
       CHAPTER 3 ....................................................................................................................................................................... 33

       Information sharing threats ............................................................................................................................................ 33
          Manage your privacy ................................................................................................................................................... 33
          Protect your data ......................................................................................................................................................... 34

          Understand Information Sharing Threats .................................................................................................................... 34
          The Traffic Light Protocol............................................................................................................................................. 34

          Protective Guidelines for Safe Information Sharing .................................................................................................... 34
       CHAPTER 4 ....................................................................................................................................................................... 36

       Digital Commerce Threats ............................................................................................................................................... 36
          Threats On The Buyer’s Side ........................................................................................................................................ 36

       Protective Guidelines On The Buyer’s Side ..................................................................................................................... 37
          Spotting Scam Websites .............................................................................................................................................. 37
          Types of scam websites ............................................................................................................................................... 37

          Identifying scam websites guidelines .......................................................................................................................... 39
          Protective Guidelines................................................................................................................................................... 39

          How to deal when getting scammed ........................................................................................................................... 40
          Teaching Kids Online Shopping ................................................................................................................................... 40

          Definitions.................................................................................................................................................................... 43
            In addition, the "Anti-Cyber and Information Technology Crimes Law" No. 175 of 2018 stipulates several significant
            articles ..................................................................................................................................................................... 44
          Law Chapters Summary ............................................................................................................................................... 44

            Chapter One: Attacking the Security of Information Networks, Systems and Information Technologies, The Crime
            of Unauthorized Utilization of the Telecommunications, Information Services and Technologies ........................ 44
            Chapter Two: The Crimes Committed by Using Information Systems and Technologies, Fraud and Encroachment
            Against Credit Cards, Services and Electronic Payment Tools ................................................................................. 46
            Chapter Three: The Crimes of Infringement of the Sanctity of Private Life and Unlawful Information Content ... 47

          4
   1   2   3   4   5   6   7   8   9   10   11