Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
W elcome to our Presentation. Presentation Topic Virus.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
HI150 – Automation of Health Information Unit 2 Seminar.
Computer Security Keeping you and your computer safe in the digital world.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 9 Securing Your System: Protecting Your Digital Data
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Malware and Computer Maintenance
Hotspot Shield Protect Your Online Identity
3.6 Fundamentals of cyber security
IT Security  .
Instructor Materials Chapter 7 Network Security
Computer Security Std XI– Chapter 8.
TECHNOLOGY IN ACTION.
TECHNOLOGY IN ACTION Chapter 9
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chapter 9 Securing Your System: Digital Data and Devices
HOW DO I KEEP MY COMPUTER SAFE?
How to keep the bad guys out and your data safe
Securing your system, protecting your digital data and devices.
Presentation transcript:

Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition

Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices

Chapter Topics Cybercrime and Identity Theft Protecting Yourself from Computer Viruses Protecting Digital Assets from Hackers Managing Online Annoyances Keeping Your Data Safe Protecting Your Physical Computing Assets

Cybercrime and Identity Theft Cybercrime –Any criminal action perpetrated primarily through the use of a computer –Must take precautions to protect ourselves Cybercriminals –Individuals who use computers, networks, and the Internet to perpetrate crime

Cybercrime and Identity Theft (cont.)

Identity theft –Acts perpetrated by identity thieves –Occurs when a thief steals personal information and runs up debt in your name Counterfeiting existing credit and debit cards Opening new credit cards and bank accounts in your name Obtaining medical services under your name Buying a home with a mortgage in your name, then reselling the house and absconding with the money

Cybercrime and Identity Theft (cont.) Other methods to obtain personal information –Stealing purses and wallets –Stealing mail or looking through trash –Posing as bank or credit card company representative –Skimming devices

Cybercrime and Identity Theft (cont.) Theft of computer equipment: Larceny Theft of tablets, cell phones, notebook computers, and other portable computing devices is on the rise Resale value is high Equipment sold online

Computer Viruses A computer virus is a program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged Not just limited to computer –Smartphones, tablets, other devices One of the most widespread types of cybercrimes

Computer Viruses (cont.) Main purpose –Replicate themselves and copy Secondary objectives –Slow down networks –Display annoying messages –Destroy files or contents of hard drive

Computer Viruses (cont.) Sources of virus infection –Downloading infected audio and video files –Shared flash drives –Downloading or executing attachments

Computer Viruses (cont.)

Computer Viruses: Boot-Sector Viruses Replicates onto hard drive’s master boot record –Executes whenever a computer boots Often transmitted by a flash drive

Computer Viruses: Logic Bombs and Time Bombs Logic bomb –Virus that is triggered when certain conditions occur Time bomb –Virus that is triggered by the passage of time or on a certain date

Computer Viruses: Worms Worms take advantage of file transport methods ( e.g., or network connections ) to spread on their own Independent of host file Much more active in spreading itself

Computer Viruses: Script and Macro Viruses Script –Series of commands that is executed without your knowledge Macro viruses –Macro is a series of commands that usually automates repetitive tasks –Attaches itself to a document that uses macros ( eg: Word, Excel )

Computer Viruses: Viruses Melissa virus –One of the first practical viruses Use your address book to replicate

Computer Viruses: Encryption Viruses When infected, common data files are encrypted –Become unusable –Need to send money to decrypt your files

Computer Viruses: Additional Virus Classifications Classified by methods used to avoid detection –Polymorphic viruses: changes its code to avoid detection –Multipartite viruses: infect multiple file types in an effort to fool the antivirus software –Stealth viruses: temporarily erase their code from disk and reside in active memory

Computer Viruses: Virus Symptoms Existing program icons or files suddenly disappear Unusual home page New toolbars Odd messages, pop-ups, or images Data files become corrupt Programs stop working properly System slows down or takes a long time to boot up

Preventing Virus Infections Antivirus software –Detects viruses and protects your computer Popular antivirus programs –Free AVG Avast –Cost: Symantec ( Norton ) Kaspersky McAfee

Preventing Virus Infections: Antivirus Software

Preventing Virus Infections: Antivirus Software (cont.) Main functions of antivirus software –Detection of viruses Look for virus signatures –Stop virus execution Quarantining –Prevent future infection Inoculation

Preventing Virus Infections: Antivirus Software (cont.) If computer is infected –Boot up using antivirus installation disc If a virus is detected –Research it –Websites contain archives on viruses

Preventing Virus Infections: Antivirus Software (cont.) Smartphones and other mobile devices are susceptible to viruses Antivirus software for mobile devices –Trend Micro’s Mobile Security for Android

Preventing Virus Infections: Software Updates Many viruses exploit weaknesses in operating systems Some web sites can be used to infect Windows operating system –Automatic update utility: Windows Update Mac OS / iOS Linux

Preventing Virus Infections: Software Updates (cont.) Default option in Windows –Receive updates automatically Other options available

Hackers Types of hackers –White-hat or ethical hackers Break in for non-malicious reasons –Black-hat hackers Break in for illegal gain / destroy information –Grey-hat hackers Flaunt their expertise Regardless of reason, many countries consider it a crime

Hackers: Problems Hackers Can Cause Steal credit and debit card information Break into sites Capture login ID and password Packet analyzer ( sniffer )

Hackers: Problems Hackers Can Cause (cont.) To protect yourself –Firewall –Data encryption, especially on a wireless network

Hackers: Trojan Horses and Rootkits Trojan Horses can appear to be useful Rootkits Zombie

Hackers: Denial-of-Service Attacks Users are denied access to a computer system System shuts down or refuses to answer questions for information

Hackers: Denial-of-Service Attacks (cont.)

Hackers: How Hackers Gain Computer Access Direct access –Actually, sit down at your machine Indirect access –Try to get your to install –Internet connection Logical ports –Virtual communication gateways –Ports can vary from 0 – 65,535 – P_port_numbershttp://en.wikipedia.org/wiki/List_of_TCP_and_UD P_port_numbers

Restricting Access to Your Digital Assets Keep hackers out –Prevent them from accessing computer –Protect your digital information –Hide activities from prying eyes

Restricting Access to Your Digital Assets: Firewalls Firewall Personal firewall Windows and OS X include firewalls Security suites include firewall software

Restricting Access to Your Digital Assets: Firewalls (cont.)

Restricting Access to Your Digital Assets: How Firewalls Work Protect in two major ways –Blocking access to logical ports –Keeping computer’s network address secure Packet filtering Logical port blocking

Restricting Access to Your Digital Assets: How Firewalls Work (cont.)

Internet Protocol address ( IP address ) –Every computer on the Internet has an IP address –Internal IP addresses can only be used on an internal network Network address translation ( NAT ) –Hides internal addresses from Internet

Restricting Access to Your Digital Assets: Knowing Your Computer Is Secure Websites test computer’s vulnerability –Gibson Research ShieldsUP LeakTest If vulnerabilities are detected: –Install a firewall –Close or restrict access to ports

Restricting Access to Your Digital Assets: Knowing Your Computer Is Secure (cont.)

Restricting Access to Your Digital Assets: Creating Passwords (cont.)

Password strength tests –Password Meter Operating systems have built-in password protection Windows 8 –Picture passwords

Restricting Access to Your Digital Assets: Managing Your Passwords (cont.) Password management software Security suites and web browsers provide password management tools

Restricting Access to Your Digital Assets: Anonymous Web Surfing: Hiding from Prying Eyes Privacy tools to surf the web anonymously –Incognito –Private Browsing –InPrivate

Restricting Access to Your Digital Assets: Anonymous Web Surfing: Hiding from Prying Eyes (cont.) Portable privacy devices –Ironkey Personal Flash Drive –Store sensitive Internet files –Preload Linux OS on a flash drive

Restricting Access to Your Digital Assets: Anonymous Web Surfing: Hiding from Prying Eyes (cont.) Third-party software developers offer apps to enhance tablet security –IPVanish

Restricting Access to Your Digital Assets: Biometric Authentication Devices Fingerprint Iris pattern in eye Voice authentication Face pattern recognition Provide high level of security

Managing Online Annoyances: Malware: Adware and Spyware Malware Three primary forms –Adware –Spyware –Viruses

Managing Online Annoyances: Malware: Adware and Spyware (cont.) Spyware –Transmits information –Tracking cookies –Keystroke logger Anti-spyware software Install one or two additional standalone anti-spyware programs

Managing Online Annoyances: Malware: Adware and Spyware (cont.) Windows Defender Malwarebytes Anti-Malware, Ad-Aware, and Spybot

Managing Online Annoyances: Spam Spam: unwanted / junk Spim: unsolicited instant messages Use a free address

Managing Online Annoyances: Spam (cont.) Spam filter Third-party programs available SPAMfighter

Managing Online Annoyances: Spam (cont.) Other ways to prevent spam –Read website privacy policies –Don’t give the site permission to pass on your address –Don’t reply to spam –Subscribe to an forwarding service

Managing Online Annoyances: Cookies Provide websites with information about browsing habits Don’t search for personal information Only collect information you supply when filling out forms Some sites sell the information Pose no security threat

Keeping Your Data Safe: Protecting Your Personal Information

Keeping Your Data Safe: Backing Up Your Data Unauthorized access Tampering Destruction Backups

Keeping Your Data Safe: Backing Up Your Data (cont.)

Options for backing up files –Incremental backup (partial backup) –Image backup (system backup)

Keeping Your Data Safe: Backing Up Your Data (cont.)

Windows 8 includes the Windows 7 File Recovery utility

Social Engineering Human interaction to learn information Pretexting –Fake phone call

Social Engineering: Phishing and Pharming Phishing –Look like from legitimate businesses –Try to get you to reveal information –Looks like a link to a legitimate site Pharming –Try to corrupt your browser’s ability to find web addresses

Social Engineering: Phishing and Pharming (cont.) Guidelines to avoid schemes –Never reply directly to s asking for personal information –Don’t click on links in s –Never give personal information over the Internet unless the site is secure –Use phishing filters –Use Internet security software

Social Engineering: Scareware Type of malware –Scareware: tries to convince you your computer is infected –Social engineering at its finest Pop-ups Banners Annoying types of messages

Protecting Your Physical Computing Assets: Environmental Factors Level surface Protective case Don’t leave in a car in extreme temperatures Chill mats Keep intake vent unblocked Keep room clean Don’t eat or drink near your computer

Protecting Your Physical Computing Assets: Power Surges Power surges –Old or faulty wiring –Downed power lines –Malfunctions at electric company substations –Lightning strikes Surge protector –Replace every two – three years –Use with all devices that have solid-state components

Protecting Your Physical Computing Assets: Deterring Theft Security concerns with mobile devices –Keeping them from being stolen –Keeping data secure in case they are stolen –Finding a device if it is stolen –Remotely recovering and wiping data off a stolen device

Protecting Your Physical Computing Assets: Keep Them Safe: Alarms Motion alarm software –LAlarm: free software for laptops –SuperAlarm and Alarmomatic

Protecting Your Physical Computing Assets: Keeping Mobile Device Data Secure Encrypt data on your mobile device –Transform data using an algorithm that can only be unlocked by a secure code (or key) –Safe: an app that provides 256-bit encryption –SensiGuard and SafeHouse

Protecting Your Physical Computing Assets: Software Alerts and Data Wipes Theft-tracking software –Computrace LoJack for Laptops –PC PhoneHome –MacPhoneHome Remote recovery and deletion of files –LoJack for Laptops

Protecting Your Physical Computing Assets: Software Alerts and Data Wipes (cont.)

The End