Page 6 - CyberSecurityEssentialsEnglish
P. 6
Warning Signs and Protective Guidelines for Email Threats ....................................................................................... 26
WiFi-related threats ..................................................................................................................................................... 27
Private/Home Network Access Threats ....................................................................................................................... 27
Public Internet Access Threats .................................................................................................................................... 27
Protective Guidelines for WiFi Threats ............................................................................................................................ 29
Mobile Phone-related threats ......................................................................................................................................... 30
Fake Applications ......................................................................................................................................................... 30
Fake Applications Threats ............................................................................................................................................ 30
Protective Guidelines for Mobile Phone Threats ............................................................................................................ 31
Guidelines for spotting fake applications .................................................................................................................... 31
Guidelines for dealing with fake applications ................................................................. Error! Bookmark not defined.
Guidelines for dealing with number spoofing activities .............................................................................................. 32
CHAPTER 3 ....................................................................................................................................................................... 33
Information sharing threats ............................................................................................................................................ 33
Manage your privacy ................................................................................................................................................... 33
Protect your data ......................................................................................................................................................... 34
Understand Information Sharing Threats .................................................................................................................... 34
The Traffic Light Protocol............................................................................................................................................. 34
Protective Guidelines for Safe Information Sharing .................................................................................................... 34
CHAPTER 4 ....................................................................................................................................................................... 36
Digital Commerce Threats ............................................................................................................................................... 36
Threats On The Buyer’s Side ........................................................................................................................................ 36
Protective Guidelines On The Buyer’s Side ..................................................................................................................... 37
Spotting Scam Websites .............................................................................................................................................. 37
Types of scam websites ............................................................................................................................................... 37
Identifying scam websites guidelines .......................................................................................................................... 39
Protective Guidelines................................................................................................................................................... 39
How to deal when getting scammed ........................................................................................................................... 40
Teaching Kids Online Shopping ................................................................................................................................... 40
Definitions.................................................................................................................................................................... 43
In addition, the "Anti-Cyber and Information Technology Crimes Law" No. 175 of 2018 stipulates several significant
articles ..................................................................................................................................................................... 44
Law Chapters Summary ............................................................................................................................................... 44
Chapter One: Attacking the Security of Information Networks, Systems and Information Technologies, The Crime
of Unauthorized Utilization of the Telecommunications, Information Services and Technologies ........................ 44
Chapter Two: The Crimes Committed by Using Information Systems and Technologies, Fraud and Encroachment
Against Credit Cards, Services and Electronic Payment Tools ................................................................................. 46
Chapter Three: The Crimes of Infringement of the Sanctity of Private Life and Unlawful Information Content ... 47
4

