1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
© 2009 Prentice-Hall, Inc.1. 2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computer Concepts – Illustrated 8th edition
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
HI150 – Automation of Health Information Unit 2 Seminar.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
IT Security  .
Chapter 9 Securing Your System: Digital Data and Devices
Computer Security.
Presentation transcript:

1

2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

3 Chapter Topics Computer virus types Protecting computers from viruses Hackers Firewalls Passwords and password management Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

4 Chapter Topics (cont.) Biometrics Spyware and spam Backup methods Protecting physical assets Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

5 Computer Threats Cybercrimes are criminal acts conducted by cybercriminals through the use of computers Computer users need to protect themselves from becoming victims of cybercriminals Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

6 Types of Cybercrime Fraud-related – –Nondelivery of ordered items – –Credit and debit card fraud – –Advanced fee scams Non-fraud-related – –Computer intrusions – –Unsolicited – –Child pornography Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

7 Computer Threats: Viruses Virus: A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program Any computing device can be infected with a virus Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

8 What Viruses Do Replicate themselves – –Slow down networks Secondary objectives – –Display annoying messages – –Delete files on the hard drive – –Change computer settings Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

9 How Does a Computer Catch a Virus? Viruses copy themselves and infect a file on your computer Spread by – –Sharing disks or flash drives – –Opening an attachment – –Downloading infected audio or video files Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

10 Types of Viruses Boot-sector viruses – –Replicate themselves in the boot sector of the hard drive Logic bombs – –Activate when certain conditions are met Time bombs – –Triggered by the passage of time or on a certain date Worms – –Travel between systems through networks Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

11 Types of Viruses (cont.) Script viruses – –Hidden on Web pages as miniprograms Macro viruses – –Attached to documents viruses – –Use address books to distribute themselves Encryption viruses – –Compress files using a complex encryption key Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

12 Virus Classifications Polymorphic viruses – –Periodically rewrite themselves to avoid detection Multipartite viruses – –Infect multiple file types Stealth viruses – –Erase their code from the hard drive and reside in the active memory Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

13 Antivirus Software Programs designed to detect viruses – –Scan files looking for virus signatures (unique code) – –Provide options for deleting or fixing infected files – –Inoculate files against further infection Needs to be updated frequently Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

14 Dealing with an Infected Computer 1. 1.Boot computer with antivirus installation disc Run directly from DVD/CD Allow software to delete or quarantine infected files Research viruses found to ensure further manual steps are not needed. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

15 Prevent Instant Messaging Viruses Allow contact from Buddy or Friends List users only. Never automatically accept transfers of data. Avoid using instant messaging programs on public computers. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

16 Other Ways to Protect Your System Keep your antivirus and operating system (OS) software up to date Load security patches as soon as they are available Enable automatic updates Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

17Hackers Anyone who unlawfully accesses a computer system Types of hackers – –White hat – –Black hat – –Script kiddies Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

18 What Hackers Steal Hackers try to steal data stored on hard drives: – –Credit card numbers – –Bank account numbers Also can steal information through packet sniffing or a keylogger Use information to purchase items illegally or to commit identity theft Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

19 How Computers Are Attacked Trojan horse Backdoor program – –Zombies Denial of service attacks (DoS) Distributed denial of service attacks (DDoS) Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

20 How Hackers Gain Access Direct access – –Hacking software Indirect access – –Internet connection – –Logical ports Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

21 Firewalls Software programs or hardware designed to close logical ports to invaders – –Most current operating systems include reliable firewalls – –Security suite often include firewalls – –Network routers can contain a hardware firewall Firewalls are critical if you have an always- on broadband connection Test your computer’s vulnerability Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

22 Bluetooth Attacks Bluesnarfing – –Exploits flaw in access software to steal information contained on the device Bluebugging – –Hacker takes control of the device Make your device invisible Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

23 Passwords Create a strong password – –At least 14 characters, including numbers, symbols, and upper- and lowercase letters – –Not a single word or a word from a dictionary – –Not easily associated with you (birthday, name of pet, nickname) – –Use different passwords for different sites – –Do not tell anyone or write down password – –Change password regularly (every month) Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

24 Wireless Networks on the Road Beware – –“Evil twins” – –Free Internet access in paid locations Protect yourself – –Check with authorized personnel for official name of hotspot – –Do not use free access from unknown sources Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

25 Password Managers Remember all your different passwords Built into – –Operating systems – –Web browsers – –Some security packages Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

26 Anonymous Web Surfing Public computers – –Shared computers risk subsequent user viewing your data – –Might already have viruses or hacking tools installed Portable privacy devices Linux OS on a flash drive Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

27 Biometric Authentication Devices Read unique personal characteristics – –Fingerprint – –Iris patterns – –Voice patterns – –Face patterns Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

28 Malware Software that has a malicious intent – –Grayware (nondestructive) Adware Spyware – –Viruses (destructive) Antispyware software – –Included in many Internet security suites – –Stand-alone spyware removal available Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

29 Spam or Spim Spam: Unwanted or junk – –To avoid SPAM Create free Web-based account for filling out online forms or making online purchases Use a spam filter Do not try to “unsubscribe” from spam s Use an forwarding service Spim: Unsolicited instant messages Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

30 Cookies A Web site assigns an ID number to your computer, stored in a cookie file Each time you log in to the site, it notes the visit and keeps track of it in a database Provide info about browsing habits Identify user preferences Pose some privacy risks, but low security threat Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

31 Protecting Your Personal Information Protect information from identity thieves – –Social Security number – –Phone number – –Street address Check privacy settings on social networking sites: Keep your information as private as possible Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

32 Backing Up Your Data Backup – –A copy of a file that can be used to replace the original Types of files to back up – –Program – –Data Backup routine – –Frequency – –Changed files Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

33 Backing Up Your Data (cont.) Software programs for easy backup – –Schedule automatic backups – –Can back up files, folders, or entire drives – –Back up to external hard drive, USB device, or DVD Entire system backup software – –Takes an image of the entire system – –Stores on a separate hard drive – –In case of failure, a new drive is inserted Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

34 Backing Up Your Data (cont.) Store backups offsite Online backups – –Store backup files on Internet servers – –Some services free Windows Live Sky Drive ADrive – –Fees for some services Network attached storage (NAS) devices Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

35 Social Engineering Uses social skills to generate human interaction to entice individuals to reveal sensitive information – –Usually does not use a computer or face-to- face interaction – –Pretexting Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

36 Phishing and Pharming Phishing – –Uses to lure user to fake Web sites – –Tricks user into revealing private data Pharming – –Malicious code changes Web browser’s ability to find Web addresses Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

37 Hoaxes An attempt to make someone believe something that is untrue – –Target large audiences – –Practical joke, agents of social change, or time wasters – –Mostly Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

38 Protect Physical Assets Environmental factors – –Avoid Sudden movement Excessive heat or cold Dust Food and liquids – –Use padded case for notebooks Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

39 Power Surges Occur when electrical current is supplied in excess of normal voltage (120 volts in the United States) Caused by: – –Old or faulty wiring – –Downed power lines – –Malfunctions at electric substations – –Lightning strikes Use surge protectors Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

40 Deterring Theft Alarms Locks Software alerts Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

41 Chapter 9 Summary Questions From which types of viruses do I need to protect my computer? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

42 Chapter 9 Summary Questions What can I do to protect my computer from viruses? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

43 Chapter 9 Summary Questions How can hackers attack my computing devices, and what harm can they cause? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

44 Chapter 9 Summary Questions What is a firewall, and how does it keep my computer safe from hackers? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

45 Chapter 9 Summary Questions How do I create secure passwords and manage all of my passwords? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

46 Chapter 9 Summary Questions How can I surf the Internet anonymously and use biometric authentication devices to protect my data? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

47 Chapter 9 Summary Questions How do I manage online annoyances such as spyware and spam? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

48 Chapter 9 Summary Questions What data do I need to back up, and what are the best methods for doing so? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

49 Chapter 9 Summary Questions What is social engineering, and how do I avoid falling prey to phishing and hoaxes? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

50 Chapter 9 Summary Questions How do I protect my physical computing assets from environmental hazards, power surges, and theft? Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1 Chapter 9 51 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2012 Pearson Education, Inc. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall