TECHNOLOGY IN ACTION.

Slides:



Advertisements
Similar presentations
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Computer Security Keeping you and your computer safe in the digital world.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 9 Securing Your System: Protecting Your Digital Data
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
Malware and Computer Maintenance
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Unit 4 IT Security.
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
TECHNOLOGY IN ACTION Chapter 9
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Chapter 9 Securing Your System: Digital Data and Devices
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
How to keep the bad guys out and your data safe
Securing your system, protecting your digital data and devices.
Lesson 2- Protecting Yourself Online
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

TECHNOLOGY IN ACTION

Chapter 9 Securing Your System: Protecting Your Digital Data and Devices In this chapter we explore how you can protect your system and yourself from various types of cybercrime.

Threats to Your Digital Assets Identity Theft and Hackers Computer Viruses Online Annoyances and Social Engineering In this section, several key concepts about threats to your digital assets will be evaluated.

Identity Theft and Hackers Objectives 9.1 Describe how identity theft is committed and the types of scams identity thieves perpetrate. 9.2 List and describe the different types of hackers. 9.3 Describe the various tools hackers use and the types of attacks they might launch against computers. The three objectives involved in understanding identity theft and hackers are: Describe how identity theft is committed and the types of scams identity thieves perpetrate. List and describe the different types of hackers. Describe the various tools hackers use and the types of attacks they might launch against computers. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Computer Viruses Objectives 9.4 Explain what a computer virus is, why they are a threat to your security, how a computing device catches a virus, and the symptoms it may display. 9.5 List the different categories of computer viruses, and describe their behaviors. The two objectives involved in understanding computer viruses are: Explain what a computer virus is, why they are a threat to your security, how a computing device catches a virus, and the symptoms it may display List the different categories of computer viruses, and describe their behaviors Copyright © 2017 Pearson Education, Inc.

Online Annoyances and Social Engineering Objectives 9.6 Explain what malware is, and list the common types of malware. 9.7 Define spam, and describe strategies to combat it. 9.8 Explain what cookies are and whether they pose a security threat. 9.9 Describe social engineering techniques, and explain strategies to avoid falling prey to them. The four objectives involved in understanding online annoyances and social engineering are: Explain what malware is, and list the common types of malware. Define spam, and describe strategies to combat it. Explain what cookies are and whether they pose a security threat. Describe social engineering techniques, and explain strategies to avoid falling prey to them. Copyright © 2017 Pearson Education, Inc.

Identity Theft and Hackers Cybercrime Cybercriminals Common types of cybercrimes Cybercrime is any criminal action perpetrated primarily through the use of a computer. Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime. Four common categories of complaints received were FBI-related scams, identity theft, nonauction/non-delivery of merchandise, and advance fee fraud. Although the top four complaints all relate to some type of fraud, other complaints received involved equally serious matters such as computer intrusions—hacking—child pornography, and blackmail. Copyright © 2017 Pearson Education, Inc.

Identity Theft and Hackers Identity Theft Most financially damaging cybercrime for individuals Definition of identity theft Types of scams Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) Found half of e-mail users have opened spam Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts. Identity theft occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account number, and credit card information and runs up debts in your name. The nefarious acts cover a wide range of activities. A survey by the Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG) found that half of e-mail users in North America and Europe have opened spam. Copyright © 2017 Pearson Education, Inc.

Identity Theft and Hackers Hacking Types of hackers White-hat (ethical hackers) Black-hat hackers Grey-hat hackers Packet analyzer (sniffer) Keylogger A hacker is most commonly defined as anyone who unlawfully breaks into a computer system. Hackers may be identified as: White-hat hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities or to expose undisclosed weaknesses. Black-hat hackers break into systems to destroy information or for illegal gain. Grey-hat hackers illegally break into systems to flaunt their expertise or to attempt to sell their services in repairing security breaches. A packet analyzer (sniffer) is a program deployed by hackers that looks at (or sniffs) each packet as it travels on the Internet. A keylogger is a program that captures all keystrokes made on a computer. Copyright © 2017 Pearson Education, Inc.

Identity Theft and Hackers Hacking Tools and Attack Types Trojan horses—Appear to be useful Rootkits Zombies A Trojan horse is a program that appears to be something useful or desirable, but does something malicious in the background without your knowledge. Backdoor programs and rootkits are programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. A computer that a hacker controls is referred to as a zombie. Zombies are often used to launch denial-of-service attacks on other computers. Copyright © 2017 Pearson Education, Inc.

Identity Theft and Hackers Hacking Tools and Attack Types Denial-of-Service Legitimate users are denied access to a computer system System shuts down DDoS In a denial-of-service attack, legitimate users are denied access to a system because a hacker is repeatedly making requests of that system through a computer the hacker has taken over as a zombie. A computer can handle only a certain number of requests for information at one time. When it is flooded with requests, it shuts down and refuses to answer any requests for information, even if the requests are from a legitimate user. A distributed denial-of-service (DDoS) attack, launches DoS attacks from more than one zombie at the same time. Copyright © 2017 Pearson Education, Inc.

Computer Viruses Virus Basics Not limited to computers Smartphones, tablets Widespread cybercrime: Spreading viruses Main purpose Secondary objectives Sources of virus infection Viruses are not limited to computers; smartphones, tablet computers, and other devices can be infected. Creating and disseminating viruses are two of the most widespread types of cybercrimes. A virus’s main purpose is to replicate itself and copy its code into as many other host files as possible. The majority of viruses have secondary objectives or side effects. Downloading and running a file that’s attached to the e-mail are common ways to infect your computer. Copyright © 2017 Pearson Education, Inc.

Computer Viruses Types of Viruses Although thousands of computer viruses and variants exist, they can be grouped into six broad categories based on their behavior and method of transmission. Figure 9.7 summarizes the major types of viruses. Copyright © 2017 Pearson Education, Inc.

Computer Viruses Types of Viruses Classified by methods used to avoid detection Polymorphic viruses Multipartite viruses Stealth viruses Viruses can be classified by the methods they take to avoid detection: A polymorphic virus changes its code to avoid detection. Most polymorphic viruses infect a particular type of file. A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. Stealth viruses temporarily erase their code from the files where they reside and hide in the active memory of the computer. Copyright © 2017 Pearson Education, Inc.

Online Annoyances and Social Engineering Malware: Adware and Spyware Malware has malicious intent Adware displays sponsored advertisements Spyware is an unwanted piggy-back program Transmits information Tracking cookies Keystroke logger Many antispyware packages are available Malware is software that has a malicious intent Adware displays unsponsored advertisements Spyware is an unwanted program that downloads with other software from the Internet and runs in the background. Spyware transmits information about you. Many spyware programs use tracking cookies. A keystroke logger program monitors keystrokes. Other anti-spyware programs are easy to install and update. Copyright © 2017 Pearson Education, Inc.

Online Annoyances and Social Engineering Spam Spam—junk e-mail Tactics to minimize spam Spam is unwanted or junk e-mail. There are several ways to help avoid spam: Create a free e-mail address Spam filters Buy third-party programs Reclassify e-mails that have been misidentified as spam Copyright © 2017 Pearson Education, Inc.

Online Annoyances and Social Engineering Cookies Cookies are small text files received when you visit a website Help companies determine the effectiveness of their marketing Do not search drive for personal information May invade your privacy Pose no security threat Cookies are small text files that some websites automatically store on your hard drive when you visit them. Companies use this information to determine the traffic flowing through their website and the effectiveness of their marketing strategy. Cookies do not go through your hard drive in search of personal information. The main concern is that advertisers will use this information indiscriminately, thus invading your privacy. Cookies pose no security threat because it is virtually impossible to hide a virus or malicious software program in a cookie. Copyright © 2017 Pearson Education, Inc.

Online Annoyances and Social Engineering Phishing and Pharming Luring people into revealing information Pharming Malicious code planted on your computer to gather information Guidelines to avoid schemes Phishing lures Internet users to reveal personal information. Pharming occurs when malicious code is planted on your computer. These guidelines help to avoid such schemes: Never reply directly to any e-mail asking for personal information. Don’t click on a link in an e-mail. Check with the company asking for information. Never give personal information over the Internet unless you know the site is secure. Use phishing filters. Use Internet security software that’s constantly being updated. Copyright © 2017 Pearson Education, Inc.

Online Annoyances and Social Engineering Scareware Type of malware Attempts to convince you something is wrong … and to pay money to fix it Scareware is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware. You’re then directed to a website where you can buy fake removal or antivirus tools that provide little or no value. Scareware is a social engineering technique because it uses people’s fear of computer viruses to convince them to part with their money. Copyright © 2017 Pearson Education, Inc.

Protecting Your Digital Property Restricting Access to Your Digital Assets Keeping Your Data Safe Protecting Your Physical Computing Assets In this section, several key concepts about mobile devices will be evaluated.

Restricting Access to Your Digital Assets Objectives 9.10 Explain what a firewall is and how a firewall protects your computer from hackers. 9.11 Explain how to protect your computer from virus infection. 9.12 Describe how passwords and biometric characteristics can be used for user authentication on computer systems. 9.13 Describe ways to surf the web anonymously. The four objectives involved in understanding how to restrict access to your digital assets are: Explain what a firewall is and how a firewall protects your computer from hackers. Explain how to protect your computer from virus infection. Describe how passwords and biometric characteristics can be used for user authentication on computer systems. Describe ways to surf the web anonymously. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Keeping Your Data Safe Objectives 9.14 Describe the types of information you should never share online. 9.15 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. The two objectives involved in understanding how to keep your digital data safe are: Describe the types of information you should never share online. List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. Copyright © 2017 Pearson Education, Inc.

Protecting Your Physical Computing Assets Objectives 9.16 Explain the negative effects environment and power surges can have on computing devices. 9.17 Describe the major concerns when a device is stolen and strategies for solving the problems. The two objectives involved in understanding how to protect your physical computing assets are: Explain the negative effects environment and power surges can have on computing devices. Describe the major concerns when a device is stolen and strategies for solving the problems. Copyright © 2017 Pearson Education, Inc.

Restricting Access to Your Digital Assets Firewalls Firewall—hardware or software Windows and OS X include firewalls Security suites include firewall software A firewall is a software program or hardware device designed to protect computers from hackers. Both Windows and OS X include reliable firewalls. The Windows Action Center is a good source of information about the security settings on your computer, including the status of your firewall. Security suites such as Norton Internet Security, McAfee Internet Security, and ZoneAlarm Internet Security Suite also include firewall software. Copyright © 2017 Pearson Education, Inc.

Restricting Access to Your Digital Assets Preventing Virus Infections Antivirus software Detects viruses and protects your computer Popular programs Symantec Kaspersky AVG McAfee Antivirus software is specifically designed to detect viruses and protect your computer and files from harm. Symantec, Kaspersky, AVG, and McAfee are among the companies that offer highly rated antivirus software packages. Antivirus protection is also included in comprehensive Internet security packages such as Norton Internet Security, Kaspersky Internet Security, and McAfee Total Protection. These software packages also help protect you from threats other than computer viruses. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Restricting Access to Your Digital Assets Authentication: Passwords and Biometrics Need strong passwords Password strength tests Operating systems have built-in password protection Strong passwords are difficult for someone to guess. There are many password generators available for free, such as the Strong Password Generator. You can use online password strength testers, such as the Password Meter, to evaluate your passwords. To restrict access to your computer, Windows, OS X, and most other operating systems have built-in password (or passcode) protection for files as well as the entire desktop. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Restricting Access to Your Digital Assets Authentication: Passwords and Biometrics Fingerprint Iris pattern in eye Voice authentication Face pattern recognition Provide a high level of security A biometric authentication device is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts it to a digital code. Because no two people have the same biometric characteristics, these devices provide a high level of security. Other biometric devices, including voice authentication and facial recognition systems, are now widely offered in notebook computers, tablets, and smartphones. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Keeping Your Data Safe Protect your personal Information Backups are copies of data Backup your data from: Unauthorized access Tampering Destruction The data on your computer faces three major threats: Unauthorized access Tampering Destruction Backups Copies of files that you can use to replace the originals if they’re lost or damaged Copyright © 2017 Pearson Education, Inc.

Keeping Your Data Safe Backing Up Your Data Here is a comparison of the three main locations that you can use to backup your data. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Protecting Your Physical Computing Assets Environmental Factors and Power Surges Power surges Old or faulty wiring Downed power lines Lightning strikes Malfunctions at electric company substations Surge protector Replace every 2–3 years Use with all devices that have solid-state components Power surges occur when an electrical current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges. A surge protector protects your computer. Replace surge protectors every 2–3 years or after a major surge. All electronic devices that have solid-state components, such as TVs, stereos, printers, and cell phones should be connected to a surge protector. Copyright © 2017 Pearson Education, Inc.

Copyright © 2017 Pearson Education, Inc. Protecting Your Physical Computing Assets Preventing and Handling Theft Four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device You have four main security concerns with mobile devices: Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device Copyright © 2017 Pearson Education, Inc.

? Questions

Copyright All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.