MAPPING YOUR MIND PROTECTING COMPUTERS Malware Computer protection Malicious programs that can compromise computer functions, steal data, bypass access controls, monitor users' activity and damage hardware Classification Protecting yourself and your data Cryptography Big data Practice of hiding information so that only those for whom it is intended can read and process it Types Combination of structured, semi-structured and unstructured data collected by organisations Malicious programs Public key or asymmetrical Malware which damages data and compromise computer functions Virus Worm Backdoor Rogue security Crimeware Programs which are intended to obtain financial gain in a fraudulent way by stealing money or sensitive data Diallers Keyloggers Phishing Rootkits Spyware Trojan horses Social engineering Identity theft Private key or symmetrical Mobile malware Malicious software that is specifically designed to target mobile device systems Confidentiality Non-repudiation Authentication How to protect against risks Antivirus software Application used for scanning and removing viruses from computers Firewall Network security system designed to prevent unauthorised access to or from a private network Follow best practices Methods or techniques which have consistently shown results superior to those achieved with other means Involves Worms Authorisation Protection of rights of authorship Expander Bluejacking Bluebugging Network threats Threats that take place in the network Packet sniffing Port stealing Denial of service (DOS) Destructive attacks Copyright Can take the form of Bug Customer profiling Practice of organising customers into specific groups possessing similar goals or characteristics Through process of identification and description of integrated profiles of the ideal customers, segmented on the basis of different variables Variables Geographic Psychographic RFM (recency, frequency, monetary value) Software Customer Relationship Management system (CRM) Survey software Electronic payments Transactions between two parties through an electronic medium Types Credit cards Debit cards Bank transfers Digital wallets Mobile wallets Can use Digital currency Types Adware Is different from In a data lake Data enrichment software Copyleft Spoofing Unauthorised access Storage Behavioural Authentication Bluesnarfing Variability Socio-economic Series of policies and practices to prevent and monitor unauthorised access to a computer network and its resources Trojan horses Blueborne Value Demographic Network security Identification Ghost push Velocity Veracity Integrity Spyware Ransomware Volume Variety Objectives Browser hijackers Ransomware Features Cryptocurrency Virtual currency Central bank digital currency Customer profile software GDPR and PRIVACY REGULATIONS Complex sets of rules that concern the management of personal data in different situations General Data Protection regulation (GDPR) Italian privacy code Special regulations for ISPs