Chapter 9 Securing Your System: Protecting Your Digital Data

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Viruses.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
What they are and how to protect against them
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
TECHNOLOGY IN ACTION.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Lesson 2- Protecting Yourself Online
STOP. THINK. CONNECT. Online Safety Quiz.
Cybersecurity Awareness
Risk of the Internet At Home
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chapter 9 Securing Your System: Digital Data and Devices
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
Securing your system, protecting your digital data and devices.
Lesson 2- Protecting Yourself Online
Presentation transcript:

Chapter 9 Securing Your System: Protecting Your Digital Data Amber Hanks By: Amber Hanks

Cybercrime Is any criminal action perpetrated primarily through the use of a computer Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime. Identity theft occurs when a thief steals personal information such as your name , address, Social Security number, birth date, bank account number, and credit card information. Even thought the theft of computer equipment is not classified as cybercrime, the theft of tablets, smartphones, notebook computers, and other portable computing devices is on the rise. When opening up things such as spam, people did it simply out of curiosity to see what was in there, which in many cases tricked you into giving away very personal and sensitive information that may be important to you. Amber Hanks

Computer viruses Virus: is a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged. Viruses are threatening because they are engineered to evade detection. Your computer can catch a virus by: downloading infected audio and video files Shared flash drives Downloading and running a file that’s attached to the e-mail Amber Hanks

#1. What do computer viruses do? Main purpose is to replicate itself and copy its code into as many other host files as possible. This gives the virus a greater chance of being copied to another computer system so that it can spread infection. Amber Hanks

#2. Name and describe a minimum of 6 different viruses. 1. boot- sector viruses: execute when a computer boots up 2. Logic bombs/time bombs: execute when certain conditions or dates are reached 3. worms: spread on their own with no common human interaction needed 4. Script & macro viruses: series of commands with malicious intent 5. Email viruses: spread as attachments to e-mail, often using address books 6. encryption viruses: hold files “hostage” by encrypting them; ask for ransom to unlock them 1. boot- sector viruses: whenever a computer boots up it ensures that the virus will be loaded into memory immediately, and possibly even before some virus protection programs can load. 2. Logic bombs/time bombs: the effects of logic bombs and time bombs range from the display of annoying messages on the screen to the reformatting of the hard drive, which causes complete data loss. 3. worms: worms take advantage of file transport methods, such as e-mail or network connections, to spread on their own 4. Script & macro viruses: a script it a series of commands or miniprogram that is executed without your knowledge 5. Email viruses: uses the address book in the victim’s e-mail to distribute the virus 6. encryption viruses: they run a program that searches for common types of date files, such as Microsoft Word files and compresses them using a complex encryption key that renders your files unusable Amber Hanks

Preventing virus Infections Antivirus software: designed to detect viruses and protect your computer and files from harm. Detection  Stopping virus execution prevention of future infection Antivirus software catches the known viruses, but new ones are being written all the time. New computers come with preinstalled software for this and also most programs update every time you go online. If you think your computer has a virus, boot the computer up with the antivirus installation disc. Antiviruses: you should run a scan on your entire at least once a week Above is the process of how antivirus software works Detection: antivirus software looks for a virus signature in files and detects what type of virus is infecting them Stopping virus execution: it stops the execution of the files and virus and notifies you that it has detected a virus. It then notifies you about the virus and places it in a secure area on your hard drive so that it won’t spread to other files. prevention of future infection You can protect your phone by downloading an anti virus app for your specific phone. Amber Hanks

Understanding Hackers White-hate hackers: break into systems for nonmalicious reasons, such as to test system security. Black-hat hackers: breaks into systems to destroy information or for illegal gain. Grey-hat hackers: break into systems merely to flaunt their expertise Pact analyzer: is a program developed that looks at each packet that travels on the internet. Once they have your card information, they use it to but illegal good or the sell the information to other people. A hacker is someone who unlawfully breaks into a computer system (this can be an individual system or a network) Hackers could break into computers or websites that contain credit card information and could access your credit card or bank information This can happen if you shop online a lot Pact analyzer: for example this person may sit in coffee shop and run a packet sniffer to capture sensitive data from the people using the coffee shop wifi Amber Hanks

3. What are distributed denial-of-service (DDOS) attacks? Legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. These attacks are easy to trace Hackers can gain access to computers directly or indirectly Direct involves sitting down at a computer and installing hacking software. Indirectly is hacking through the internet connection Botnet: is a large group of software programs that runs on autonomously on zombie computers Logical ports: virtual– that is, not physical– communications gateway or paths that allow a computer to organize requests for information, such as e-mail routing. Amber Hanks

4.What is a firewall? Which is better, software firewall or a hardware firewall? Firewall is a software program or hardware device designed to protect computers from hackers. Both hardware and software firewalls will protect you from hackers. One type isn’t better than the other. Amber Hanks

Digital Assets Firewalls protect you by blocking access to logical ports and by keeping your computer’s network address secure To block access to logical ports, firewalls examine data packets that your computer sends and receives. Every computer connected to the internet has a unique address called an Internet Protocol address Firewalls use a process called network address translation(NAT) to assign internal IP addresses on a network. You can visit websites that offer free services that test your computers vulnerability. Amber Hanks

Passwords: If the testing program detects potential vulnerabilities and you don’t have firewall, you should install one as soon as possible. Password protection: Creating difficult passwords, is an essential piece of security that people sometimes overlook. You can use online password strength testers, such as the Password Meter The easiest way to remember passwords to click the tab in the corner of your screen that says “remember password” Be selective when doing this because things such as a bank password are things you may not want your computer to remember Tips for strong passwords: Don’t use things that are related to your life. Like pet names, street address, etc. Use a password that is at least 14 characters long. The longer the password the more difficult it is to guess it Don’t use words found in the dictionary Use a mix of upper and lowercase letters and symbols Never tell anyone your passwords Change your password on a regular basis Don’t use the same password for every account Amber Hanks

Prying eyes: If you use public computers, you never know what is being placed on that computer. Also pieces of your are left behind when you are done surfing the web. Google Chrome, Firefox, and Internet Explorer include privacy tools that help you surf the web anonymously. Flash drives also provide a higher level of surfing privacy Another way to avoid prying eyes to avoid using using the public computers. - Tablets and iPads run their own proprietary operating systems that differ from the operating systems deployed on laptop and desktop computers Amber Hanks

Managing online annoyances: Malware: is software that has a malicious intent adware: is software that displays sponsored advertisements in a section of your browser window or  as a pop-up box spyware: is an unwanted piggyback program that usually downloads with other software you install from the Internet and that runs in the background of your system. anti-spyware software detects unwanted programs and allows you to delete the offending software easily. Avoiding spam- spam filter is an option you can select n your e-mail account that places known or suspected spam messages into a speacial folder. Amber Hanks

keeping data safe a good rule of thumb is to reveal as little information as possible, especially if the information would be a available to everyone. social networking sites like Facebook make privacy settings available in your profile settings. the data on your computer faces 3 major threats: 1. unauthorized access 2. tampering 3. destruction 2 types of files you should back up are program files and data files. The types of backups you can perform are incremental backup which involves backing up only files that have changed or have been created since the last backup was performed. Also an image backup which means that all system, application, and data files are backed up, not just the files that changed. You should back files up every time you make changes to them. Files on your school network are normally backed up regularly. Amber Hanks

Social Engineering Social engineering is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information Most social engineering schemes is a pretext to lure their victims Phishing: lures internet users to reveal personal information such as credit card numbers. Pharming: occurs when malicious code is planted on your computer, either by viruses or by your browser’s ability to find web addresses Scareware: is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware Pretexting involves creating a scenario that sounds legitimate enough that someone will trust you. Most internet security suites, antivirus, and anti-malware software packages now detect and prevent the installation of scareware Amber Hanks

Protecting your physical computing assets: Computers delicate devices and can be damaged by the adverse effects of abuse or a poor environment. A fall can damage your computing devices internal components Power surges occur when electrical current is supplied in excess of normal voltage. A surge protector is a device that protects your computer against power surges. Should replace your surge protectors every 2-3 years Amber Hanks

All electronic devices at home that have solid-state components, should be connected to a surge protector A more practical method is to install a whole- house surge protector, which could cost $300- $500 Lightening strikes can generate such high voltages that they can overwhelm a surge protector. Amber Hanks

What should you worry about computing device is stolen? 1. keeping them from being stolen 2. Keeping data secure in case they are stolen 3. finding a device if it is stolen 4. remotely recovering and wiping data shown of stolen device Motion alarm software is a good, inexpensive theft deterrent. These detect motion, like your tablet being picked up or sounds near your device and then sets off an ear-piercing alarm until you enter the disable code Amber Hanks

Keeping mobile device data secure Encrypting the data on your mobile device can make it extremely difficult, if not possible, for thieves to obtain sensitive data from your stolen equipment. Software alerts and data wipes Tracking software enables your computer to alert authorities to the computer’s location if it is stolen To enable your mobile device to help with its own recovery, you install the tracking software on your device. Amber Hanks

#5 Describe a concern of employers about the new type of productivity drain referred to as cyberloafing or cyberslacking. Amber Hanks

End!!!! Amber Hanks