Protecting devices, data, and services from theft or damage.
1. Threats & Defence
Cyber Security
Protecting devices (phones, laptops) and services (banking, email) from theft or damage.
It prevents unauthorised access to your personal information.
Why?
We rely on the internet for everything: banking, shopping, social media. Criminals want that data!
Phishing
Fake messages designed to trick you into giving up passwords or money.
The 6 Clues:- Urgency: "Act now or lose account!"
- Errors: Bad spelling/grammar.
- Too Good: "You won a prize!"
- Dodgy Link: Shortened/weird URL.
- Generic: "Dear Customer" (no name).
- Threats: "Police will arrest you".
Forensics & Defence
Updates
Software updates patch security holes. Always update your phone/apps!
Digital Forensics
Finding evidence on digital devices.
Volatile Data (Lost on Power Off)
- RAM (Active memory)
- Guest Mode sessions
- Non-persistent Virtual Machines
2. Encryption & Ciphers
Encryption
Encryption
Scrambling a message to hide the original text.
Decryption
Unscrambling the message back to original text.
Cipher Types
1. Caesar Cipher (Shift)
Shift alphabet by X places.
Example (Shift 1): A -> B, B -> C.
HAL -> IBM
2. Number Replacement
A=1, B=2, C=3...
8 5 12 12 15 -> HELLO
3. Pigpen
Uses grid shapes/dots instead of letters.
A
B
C
D
E
F
4. Keypad (Old Phone)
Numbers represent letters (2=ABC, 3=DEF).
44 33 555 555 666 -> HELLO