Cyber Security

Protecting devices (phones, laptops) and services (banking, email) from theft or damage.

It prevents unauthorised access to your personal information.

Why?

We rely on the internet for everything: banking, shopping, social media. Criminals want that data!

Phishing

Fake messages designed to trick you into giving up passwords or money.

The 6 Clues:
  • Urgency: "Act now or lose account!"
  • Errors: Bad spelling/grammar.
  • Too Good: "You won a prize!"
  • Dodgy Link: Shortened/weird URL.
  • Generic: "Dear Customer" (no name).
  • Threats: "Police will arrest you".

Forensics & Defence

Updates

Software updates patch security holes. Always update your phone/apps!

Digital Forensics

Finding evidence on digital devices.

Volatile Data (Lost on Power Off)
  • RAM (Active memory)
  • Guest Mode sessions
  • Non-persistent Virtual Machines

Encryption

Encryption Scrambling a message to hide the original text.
Decryption Unscrambling the message back to original text.

Cipher Types

1. Caesar Cipher (Shift)

Shift alphabet by X places.
Example (Shift 1): A -> B, B -> C.

HAL -> IBM
2. Number Replacement

A=1, B=2, C=3...

8 5 12 12 15 -> HELLO
3. Pigpen

Uses grid shapes/dots instead of letters.

A
B
C
D
E
F
4. Keypad (Old Phone)

Numbers represent letters (2=ABC, 3=DEF).

44 33 555 555 666 -> HELLO