Cyber Campaigns - Úvod  Cyber Campaigns  Operation  CERT Alert  CERT Analysy New  CERT Publication New 

Analyst Tools - Diamond Model  Kill Chain  Three Tools Every Cyber Analyst Should Have

Cyber Arms Dealers - Eye Pyramid  Hacking Team  Lench IT Solutions  EndGame  NetraGard  NSO Group  Zerodium

CHINA - APT1  APT 3  APT 12  APT18  APT30  Aurora  Axiom   DeputyDog  Operation Ephemeral Hydra  Derusbi  Anchor  Beijing North Computer Center  Clandestine Fox  Codoso  Deep Panda  Elderwood Project  GhostNet  Gothic Panda  Hellsing APT  Hurricane Panda  Ice Fog  Yanbian Group  IXESHE  Lotus Blossom  Lucky Cat  Nation Research Council  Net Traveler  Mirage  Naikon  Night Dragon  Numbered Panda  Putter Panda  VOHO  RSA Hack  Safe – A Targeted Threat  Samurai Panda  Shady Rat  Shiqiang Gang  Sin Digoo  Su Bin  SunShop  Titan Rain and Moonlight Maze  Tropic Trooper

IRAN - Operation Ababil  Operation Cleaver  U.S. Navy Marine Corps Intranet (1, 2, 3Newscaster  Copy Kitten  Rocket Kitten  Saffron Rose (Flying Kitten) (and more)  Sands Casino  Shamoon  Threat Group-2889  Woolen Goldfish

Russia - 2008 Attack on Georgia  Anunak  Armageddon  Berserk Bear  Cloud Atlas  CozyDuke (aka CozyBear, CozyCar, OnionDuke or Office Monkeys)  Energetic Bear/DragonFly/Havex  Fort Disco  Inception   Kelihos Botnet  Red October  PawnStorm (AKA Sofacy/APT28/ More APT 28Scarab  Scarcruft  Sandworm  TeamSpy  Turla  Uroburos

N.Korea and S.Korea - Cyber Attacks in South Korea March 2013  Bureau 121  DarkSeoul  OnionDog  Guardians of Peace (Sony Pictures) (Alternate site) (alternate name: Silent ChollimaOperation Troy  DarkHotel <possible South Korea>

India - Operation Hangover

France -  Snowglobe

Spanish - The Mask Careto  El Machete

US - Payback  Blitzkrieg  Operation Ferguson  Operation KKK  Operation Uncaged (PawSec/Op4Paws)  Operation Death Eaters (Anonymous vs. Pedophiles)  OpSeaWorld  OpDonaldTrump

Middle Eastern - OpIsrael/OpUSA/OpPetrol  AridViper  OpGaza (1, 2)

Cyber and BotNets - Asporx  Butteryfly  CoreFlood  CryptoLocker  DarkHotel  Fin4  Ghost Click  High Roller  Threat Group-3279 (targeting video game industry)  Xu Gang

Military - Operation 54 (Citadel)  Operation ACHing Mules  Operation Buckshot Yankee (DOD – Agent.Btz)  Operation BugDrop  Operation Card Shop  Operation Clean Internet (China)  Operation Cyber Knight  Operation Cyberslam  Operation Onymous  Operation Rolling Tide  Operation Shrouded Horizon  Operation Torpedo  Operation Tovar (Gameover Zeus) Bot Roast  Gozi Takedown  LulzsSec Demantling  MegaUpload (KimDotCom Arrest)  Silk Road Takedown  Silk Road 2.0 Takedown  U.S. Charges Five Chinese Military Hackers

Malware - Agent BTZ (Russia)  Comfoo (PRC APTs)  DNS Changer (Ghost Click)  HTRAN  Hydraq  IEXPLORE RAT  LOIC  Lurid  MyDoom  Poison Ivy

Other - 414s  Corsair Jackal   DustySky  Equation Group  Flame  Stuxnet  Regin  Operation Emmental  Operation Socialist  Operation Pawn Storm   Volatile Cedar  Desert Falcon 

CyberSpy - Operation Wilted Tulip

 


Operation

Operation Ababil  Operation AntiSec  Operation Blackout  Operation Defense  Operation Payback  #OpIsrael  Operation PZCHAO  OpNoDAPL  OpKillingBay 2016 Update  OpIcarus Project Mayhem  OperationLGBT  OpIcarus Re-Engaged  OpOperadoras  OpWhiteRose vs Donald Trump  OpTrump Attacks & Other DDoS Attacks on Donald Trump  OpIsrael Update - April 2016  OpGaston  OpIsrael Update - February 2016  OpAfrica Update - March 2016  OpAbdiMohamed  OpRight2Rest  OpIcarus  OpKillingBay Update - February 2016  OpAfrica  OpISIS  OpKillingBay  OpParis  OpKillingBay Update  OpParis Update  OpTrump  OpSaveGaza  OpIsrael 2015 


CERT Alert

Date

Název

CERT

2018TA18-276B : Advanced Persistent Threat Activity Exploiting Managed Service ProvidersUS CERT

2018

TA18-276A : Using Rigorous Credential Control to Mitigate Trusted Network Exploitation

US CERT

2018TA18-275A : HIDDEN COBRA – FASTCash CampaignUS CERT

2018

TA18-201A : Emotet Malware

US CERT

2018

TA18-149A : HIDDEN COBRA – Joanap Backdoor Trojan and Brambul Server Message Block Worm

US CERT

2018

TA18-145A : Cyber Actors Target Home and Office Routers and Networked Devices Worldwide

US CERT

2018

TA18-141A : Side-Channel Vulnerability Variants 3a and 4

US CERT

2018

TA18-106A : Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

US CERT

2018

TA18-086A : Brute Force Attacks Conducted by Cyber Actors

US CERT

2018

TA18-074A : Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

US CERT

2018

TA18-004A : Meltdown and Spectre Side-Channel Vulnerability Guidance

US CERT

2017

TA17-318B : HIDDEN COBRA – North Korean Trojan: Volgmer

US CERT

2017

TA17-318A : HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL

US CERT

2017

TA17-293A : Advanced Persistent Threat Activity Targeting Energy and Other Critical Infrastructure Sectors

US CERT

2017

TA17-181A : Petya Ransomware

US CERT

2017

TA17-164A : HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure

US CERT

2017

TA17-163A : CrashOverride Malware

US CERT

2017

TA17-156A : Reducing the Risk of SNMP Abuse

US CERT

2017

TA17-132A : Indicators Associated With WannaCry Ransomwar

US CERT

2017

TA17-117A : Intrusions Affecting Multiple Victims Across Multiple Sectors

US CERT

2017

TA17-075A : HTTPS Interception Weakens TLS Security

US CERT

2016

TA16-336A : Avalanche (crimeware-as-a-service infrastructure)

US CERT

2016

TA16-288A : Heightened DDoS Threat Posed by Mirai and Other Botnets

US CERT

2016

TA16-250A : The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations

US CERT

2016

TA16-187A : Symantec and Norton Security Products Contain Critical Vulnerabilities

US CERT

2016

TA16-144A : WPAD Name Collision Vulnerability

US CERT

2016

TA16-132A : Exploitation of SAP Business Applications

US CERT

2016

TA16-105A : Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced

US CERT

2016

TA16-091A : Ransomware and Recent Variants

US CERT

2015

TA15-337A : Dorkbot

US CERT

2015

TA15-314A : Compromised Web Servers and Web Shells - Threat Awareness and Guidance

US CERT

2015

TA15-286A : Dridex P2P Malware

US CERT

2015

TA15-240A : Controlling Outbound DNS Access

US CERT

2015

TA15-213A : Recent Email Phishing Campaigns – Mitigation and Response Recommendations

US CERT

2015

TA15-195A : Adobe Flash and Microsoft Windows Vulnerabilities

US CERT

2015

TA15-120A : Securing End-to-End Communications

US CERT

2015

TA15-119A : Top 30 Targeted High Risk Vulnerabilities

US CERT

2015

TA15-119A : Top 30 Targeted High Risk Vulnerabilities

US CERT

2015

TA15-105A : Simda Botnet

US CERT

2015

TA15-103A : DNS Zone Transfer AXFR Requests May Leak Domain Information

US CERT

2015

TA15-098A : AAEH

US CERT

2015

TA15-051A : Lenovo Superfish Adware Vulnerable to HTTPS Spoofing

US CERT

2014

TA14-353A : Targeted Destructive Malware

US CERT

2014

TA14-329A : Regin Malware

US CERT

2014

TA14-323A : Microsoft Windows Kerberos KDC Remote Privilege Escalation Vulnerability

US CERT

2014

TA14-318B : Microsoft Windows OLE Automation Array Remote Code Execution Vulnerability

US CERT

2014

TA14-318A : Microsoft Secure Channel (Schannel) Vulnerability (CVE-2014-6321)

US CERT

2014

TA14-317A : Apple iOS 'Masque Attack' Technique

US CERT

2014

TA14-310A : Microsoft Ending Support for Windows Server 2003 Operating System

US CERT

2014

TA14-300A : Phishing Campaign Linked with “Dyre” Banking Malware

US CERT

2014

TA14-295A : Crypto Ransomware

US CERT

2014

TA14-290A : SSL 3.0 Protocol Vulnerability and POODLE Attack

US CERT

2014

TA14-268A : GNU Bourne-Again Shell (Bash) ‘Shellshock’ Vulnerability (CVE-2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014-6277 and CVE 2014-6278)

US CERT

2014

TA14-212A : Backoff Point-of-Sale Malware

US CERT

2014

TA14-150A : GameOver Zeus P2P Malware

US CERT

2014

TA14-098A : OpenSSL 'Heartbleed' vulnerability (CVE-2014-0160)

US CERT

2014

TA14-069A : Microsoft Ending Support for Windows XP and Office 2003

US CERT

2014

TA14-017A : UDP-Based Amplification Attacks

US CERT

2014

TA14-013A : NTP Amplification Attacks Using CVE-2013-5211

US CERT

2014

TA14-002A : Malware Targeting Point of Sale Systems

US CERT

2014

TA13-317A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2014

TA13-309A : CryptoLocker Ransomware Infections

US CERT

2014

TA13-288A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2014

TA13-253A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2014

TA13-225A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2014

TA13-207A : Risks of Using the Intelligent Platform Management Interface (IPMI)

US CERT

2013

TA13-193A : Exploit Tool Targets Vulnerabilities in McAfee ePolicy Orchestrator (ePO)

US CERT

2013

TA13-190A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2013

TA13-175A : Risks of Default Passwords on the Internet

US CERT

2013

TA13-169A : Oracle Releases Updates for Javadoc and Other Java SE Vulnerabilities

US CERT

2013

TA13-168A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2013

TA13-141A : Washington, DC Radio Station Web Site Compromises

US CERT

2013

TA13-134A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2013

TA13-107A : Oracle Has Released Multiple Updates for Java SE

US CERT

2013

TA13-100A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2013

TA13-088A : DNS Amplification Attacks

US CERT

2013

TA13-071A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2013

TA13-064A : Oracle Java Contains Multiple Vulnerabilities

US CERT

2013

TA13-051A : Oracle Java Multiple Vulnerabilities

US CERT

2013

TA13-043B : Microsoft Updates for Multiple Vulnerabilities

US CERT

2013

TA13-043A : Adobe Updates for Multiple Vulnerabilities

US CERT

2013

TA13-032A : Oracle Java Multiple Vulnerabilities

US CERT

2013

TA13-024A : Content Management Systems Security and Associated Risks

US CERT

2013

TA13-015A : Microsoft Releases Update for Internet Explorer Vulnerability CVE-2012-4792

US CERT

2013

TA13-010A : Oracle Java 7 Security Manager Bypass Vulnerability

US CERT

2013

TA13-008A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-346A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-318A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-283A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-265A : Microsoft Releases Patch for Internet Explorer Exploit

US CERT

2012

TA12-262A : Microsoft Security Advisory for Internet Explorer Exploit

US CERT

2012

TA12-255A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-251A : Microsoft Update For Minimum Certificate Key Length

US CERT

2012

TA12-240A : Oracle Java 7 Security Manager Bypass Vulnerability

US CERT

2012

TA12-227A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-192A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-174A : Microsoft XML Core Services Attack Activity

US CERT

2012

TA12-164A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-129A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-101B : Adobe Reader and Acrobat Security Updates and Architectural Improvements

US CERT

2012

TA12-101A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-073A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-045A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-024A : "Anonymous" DDoS Activity

US CERT

2012

TA12-010A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2012

TA12-006A : Wi-Fi Protected Setup (WPS) Vulnerable to Brute-Force Attack

US CERT

2011

TA11-350A : Adobe Updates for Multiple Vulnerabilities

US CERT

2011

TA11-347A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-312A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-286A : Apple Updates for Multiple Vulnerabilities

US CERT

2011

TA11-284A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-256A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-222A : Adobe Updates for Multiple Vulnerabilities

US CERT

2011

TA11-221A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-201A : Oracle Updates for Multiple Vulnerabilities

US CERT

2011

TA11-200A : Security Recommendations to Prevent Cyber Intrusions

US CERT

2011

TA11-193A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-166A : Adobe Updates for Multiple Vulnerabilities

US CERT

2011

TA11-165A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-130A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-102A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-067A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-039A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2011

TA11-011A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-348A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-313A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-287A : Oracle Updates for Multiple Vulnerabilities

US CERT

2010

TA10-285A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-279A : Adobe Reader and Acrobat Affected by Multiple Vulnerabilities

US CERT

2010

TA10-263A : Adobe Flash Vulnerabilities

US CERT

2010

TA10-257A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-238A : Microsoft Windows Insecurely Loads Dynamic Libraries

US CERT

2010

TA10-231A : Adobe Reader and Acrobat Vulnerabilities

US CERT

2010

TA10-223A : Adobe Flash and AIR Vulnerabilities

US CERT

2010

TA10-222A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-194B : Oracle Updates for Multiple Vulnerabilities

US CERT

2010

TA10-194A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-162A : Adobe Flash and AIR Vulnerabilities

US CERT

2010

TA10-159B : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-159A : Adobe Flash, Reader, and Acrobat Vulnerability

US CERT

2010

TA10-131A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-103C : Adobe Reader and Acrobat Vulnerabilities

US CERT

2010

TA10-103B : Oracle Updates for Multiple Vulnerabilities

US CERT

2010

TA10-089A : Microsoft Internet Explorer Vulnerabilities

US CERT

2010

TA10-068A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-040A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2010

TA10-021A : Microsoft Internet Explorer Vulnerabilities

US CERT

2010

TA10-013A : Adobe Reader and Acrobat Vulnerabilities

US CERT

2010

TA10-012B : Microsoft Windows EOT Font and Adobe Flash Player 6 Vulnerabilities

US CERT

2010

TA10-012A : Oracle Updates for Multiple Vulnerabilities

US CERT

2009

TA09-343A : Adobe Flash Vulnerabilities Affect Flash Player and Adobe AIR

US CERT

2009

TA09-342A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-314A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-294A : Oracle Updates for Multiple Vulnerabilities

US CERT

2009

TA09-286B : Adobe Reader and Acrobat Vulnerabilities

US CERT

2009

TA09-286A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-251A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-223A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-218A : Apple Updates for Multiple Vulnerabilities

US CERT

2009

TA09-209A : Microsoft Windows, Internet Explorer, and Active Template Library (ATL) Vulnerabilities

US CERT

2009

TA09-204A : Adobe Flash Vulnerability Affects Flash Player and Other Adobe Products

US CERT

2009

TA09-195A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-187A : Microsoft Video ActiveX Control Vulnerability

US CERT

2009

TA09-161A : Adobe Acrobat and Reader Vulnerabilities

US CERT

2009

TA09-160A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-133B : Adobe Reader and Acrobat JavaScript Vulnerabilities

US CERT

2009

TA09-133A : Apple Updates for Multiple Vulnerabilities

US CERT

2009

TA09-132A : Microsoft PowerPoint Multiple Vulnerabilities

US CERT

2009

TA09-105A : Oracle Updates for Multiple Vulnerabilities

US CERT

2009

TA09-104A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-088A : Conficker Worm Targets Microsoft Windows Systems

US CERT

2009

TA09-069A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-051A : Adobe Acrobat and Reader Vulnerability

US CERT

2009

TA09-041A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2009

TA09-022A : Apple QuickTime Updates for Multiple Vulnerabilities

US CERT

2009

TA09-020A : Microsoft Windows Does Not Disable AutoRun Properly

US CERT

2009

TA09-015A : Oracle Updates for Multiple Vulnerabilities

US CERT

2009

TA09-013A : Microsoft Updates for Multiple SMB Protocol Vulnerabilities

US CERT

2008

TA08-352A : Microsoft Internet Explorer Data Binding Vulnerability

US CERT

2008

TA08-350A : Apple Updates for Multiple Vulnerabilities

US CERT

2008

TA08-344A : Microsoft Updates for Multiple Vulnerabilities

US CERT

2008

TA08-340A : Sun Java Updates for Multiple Vulnerabilities

US CERT

2008

TA08-319A : Mozilla Updates for Multiple Vulnerabilities

US CERT

 

CERT Analysy -

Date

Název

CERT

August 09, 2018

MAR-10135536-17 – North Korean Trojan: KEYMARBLE

USA

June 14, 2018

MAR-10135536-12 – North Korean Trojan: TYPEFRAME

USA

May 31, 2018

MAR-10135536-3 - HIDDEN COBRA RAT/Worm

USA

 

CERT Publication -

Základní zabezpečení

Název

Info

Download

Understanding Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) is a form of communication that allows you to make phone calls over a broadband internet connection instead of typical analog telephone lines. Some VoIP services require a computer or a dedicated VoIP phone, while others allow you to use your landline phone to place VoIP calls through a special adapter.PDF icon understanding_voip.pdf
Banking Securely OnlineOnline banking continues to present challenges to your financial security and personal privacy. Millions of people have had their checking accounts compromised, mainly as a result of online banking. If you are going to use online banking to conduct financial transactions, make yourself aware of the risks and take precautions to minimize them.PDF icon Banking_Securely_
Online07102006.pdf
Playing it Safe: Avoiding Online Gaming RisksNew technologies and high-speed internet connections have helped online gaming become a popular pastime on the internet. Because gamers invest large amounts of time and money in today’s sophisticated games, others see an opportunity for mischief or illicit profitPDF icon gaming.pdf
Protecting Aggregated DataIn their ongoing quest for improved operational efficiency, organizations have come to rely on the ability to collect, access, and process large volumes of electronic data (aggregated data). This reliance has evolved with the development of sophisticated database software and the growing availability of hardware with storage capacity measured in terabytes. By possessing such large volumes of data, however, organizations assume certain risks and responsibilities. Large data stores are valuable informational assets that have become targets for cyber criminals.PDF icon Data-Agg-120605.pdf
Introduction to Information SecurityThe internet is a worldwide collection of loosely connected networks that are accessible to anyone with a computer and a network connection. Thus, individuals and organizations can reach any point on the internet without regard to national or geographic boundaries or time of dayPDF icon infosecuritybasics.pdf
South Korean Malware AttackReporting and technical details surrounding the malware used in the March 20, 2013, attack on South Korean assets have been varied and inconsistent. This paper outlines the attack's common attributes, gives guidance to U.S. Cricital Infrastructure and Key Resource owners and operators, and lists defensive measures against the DarkSeoul malwarePDF icon South Korean Malware
Attack.pdf
The Risks of Using Portable DevicesPortable devices such as jump drives, personal audio players, and tablets give users convenient access to business and personal data on the go. As their use increases, however, so do the associated risks.PDF icon RisksOfPortable
Devices.pdf
Cyber Threats to Mobile PhonesSmartphones and personal digital assistants (PDAs) give users mobile access to email, the internet, GPS navigation, and many other applications. However, smartphone security has not kept pace with traditional computer security.PDF icon cyber_threats_to_mobile_
phones.pdf
Understanding and Protecting Yourself Against Money Mule Schemes“Money mules” are people who are used to transport and launder stolen money or some kind of merchandise. Criminals may even recruit money mules to use stolen credit card information. People who are used as money mules may be willing participants; however, many money mules are not aware that they are being used to commit fraudPDF icon money_mules.pdf
Socializing Securely: Using Social Networking ServicesSocial networking is a way for people to connect and share information with each other online. Millions of people worldwide regularly access these types of services from mobile devices, applications, and websites.PDF icon safe_social_networking.pdf