Internet Business Foundations © 2004 ProsoftTraining All rights reserved.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8: Protecting Yourself Online.
Computer Viruses.
Security+ Guide to Network Security Fundamentals
Lesson 8: Protecting Yourself Online. Lesson 8 Objectives  Discuss "The Right to Be Forgotten"  Identify ways to minimize the spam you receive  Define.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter Nine Maintaining a Computer Part III: Malware.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
© 2005 Prentice-Hall, Inc.1 Practical Computing by Lynn Hogan.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 1 This material was developed by Oregon Health & Science University,
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Data Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Defining Security Issues
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
BUSINESS B1 Information Security.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
 a crime committed on a computer network, esp. the Internet.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Security Management. Security Management is the organizational processes and relationships for managing risk – Policies, Procedures, Standards, Guidelines,
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Security Issues in Information Technology
Chapter 40 Internet Security.
Internet Business Associate v2.0
Managing Windows Security
Presentation transcript:

Internet Business Foundations © 2004 ProsoftTraining All rights reserved

Lesson 7: Internet Security

Objectives Identify the three types of encryption Identify the three types of encryption Identify ways that authentication provides Web security Identify ways that authentication provides Web security Identify ways that firewalls provide Web security Identify ways that firewalls provide Web security Identify malware (malicious software) Identify malware (malicious software) Identify ways to detect and prevent virus attacks Identify ways to detect and prevent virus attacks Define spyware Define spyware Define patches and updates Define patches and updates Identify ways that screen savers provide workstation security Identify ways that screen savers provide workstation security Define list servers and listserve groups Define list servers and listserve groups Identify security-related ethical and legal issues faced by IT professionals Identify security-related ethical and legal issues faced by IT professionals

Encryption Encryption – encoding or scrambling information using specific algorithms Encryption – encoding or scrambling information using specific algorithms Three types of encryption: Three types of encryption: Symmetric-key (secret-key) encryption – the same key is used to encrypt and decrypt messagesSymmetric-key (secret-key) encryption – the same key is used to encrypt and decrypt messages Asymmetric-key (public-key) encryption – two keys are used to encrypt and decrypt messages: a public key and a private keyAsymmetric-key (public-key) encryption – two keys are used to encrypt and decrypt messages: a public key and a private key Hash (one-way) encryption – uses hashes to verify the integrity of transmitted messagesHash (one-way) encryption – uses hashes to verify the integrity of transmitted messages

Authentication User names and passwords – use to log on to private and public networks, including the Internet User names and passwords – use to log on to private and public networks, including the Internet Digital certificates – attachments to electronic transmissions that supply a verifiable signature Digital certificates – attachments to electronic transmissions that supply a verifiable signature Digital signatures – electronic signatures that verify the identity of the message senderDigital signatures – electronic signatures that verify the identity of the message sender Non-repudiation – digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action Non-repudiation – digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action

Firewalls Firewall – a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks Firewall – a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks Use firewalls to: Use firewalls to: Prevent unauthorized Internet users from accessing private networksPrevent unauthorized Internet users from accessing private networks Retain control of proprietary informationRetain control of proprietary information Prevent unauthorized export of proprietary informationPrevent unauthorized export of proprietary information Firewalls may prevent access to external providers or external servers Firewalls may prevent access to external providers or external servers

Malware (Malicious Software) Virus – damages computers and networks, often alters files to damage or destroy data Virus – damages computers and networks, often alters files to damage or destroy data Worm – resides in active memory and replicates itself until an entire disk is full Worm – resides in active memory and replicates itself until an entire disk is full Trojan horse – appears to be harmless (such as a computer game) but produces harmful results Trojan horse – appears to be harmless (such as a computer game) but produces harmful results Illicit server – installs hidden services on systems Illicit server – installs hidden services on systems Client code – allows remote access to a computer by an attackerClient code – allows remote access to a computer by an attacker Server code – infects destination computer and enables the attacker to control itServer code – infects destination computer and enables the attacker to control it

Virus Detection and Prevention Corporate IT departments are often the first line of defense against viruses Corporate IT departments are often the first line of defense against viruses Common ways to contract viruses: Common ways to contract viruses: Receive infected disk from colleague or friendReceive infected disk from colleague or friend Download infected fileDownload infected file Download illicit server attachmentDownload illicit server attachment Copy to your hard disk a document infected with a macro virusCopy to your hard disk a document infected with a macro virus

Virus Detection and Prevention (cont’d) Common ways to protect against viruses: Common ways to protect against viruses: Do not open or attachments from unknown sendersDo not open or attachments from unknown senders Configure browser and security to highest levelsConfigure browser and security to highest levels Use antivirus softwareUse antivirus software Keep antivirus software currentKeep antivirus software current Stay informed about the latest virus threatsStay informed about the latest virus threats Make backup copies of important filesMake backup copies of important files

Virus Detection and Prevention (cont’d) If you receive an attachment you do not recognize: If you receive an attachment you do not recognize: Do not open the attachmentDo not open the attachment Contact the sender to determine whether the attachment is legitimateContact the sender to determine whether the attachment is legitimate If you cannot contact the sender, delete the attachment from the messageIf you cannot contact the sender, delete the attachment from the message Delete the attachment from the Deleted Items folderDelete the attachment from the Deleted Items folder

Virus Detection and Prevention (cont’d) If you suspect a virus attack: If you suspect a virus attack: Use antivirus software to remove the virusUse antivirus software to remove the virus If you cannot launch antivirus software, reboot from a known clean system disk, then launch the antivirus softwareIf you cannot launch antivirus software, reboot from a known clean system disk, then launch the antivirus software Remove virus from all disks, files and programsRemove virus from all disks, files and programs If damage is too extensive, reformat hard disk, restore data and reinstall programs (last resort only)If damage is too extensive, reformat hard disk, restore data and reinstall programs (last resort only)

Spyware Spyware – an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes Spyware – an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes Also known as adware Also known as adware Cookies are not spyware because: Cookies are not spyware because: The user is aware of their presenceThe user is aware of their presence The user has the option to disable outside access to cookie informationThe user has the option to disable outside access to cookie information Use spyware detection applications to detect and eliminate spyware Use spyware detection applications to detect and eliminate spyware

Updates and Patches Update – a software upgrade that permanently fixes known bugs and improves software performance Update – a software upgrade that permanently fixes known bugs and improves software performance Patch – a temporary bug fix Patch – a temporary bug fix Virus update – files of virus signature profiles you use to keep your antivirus software current Virus update – files of virus signature profiles you use to keep your antivirus software current

Screen Savers Screen saver – a utility program that displays images or animation on your monitor when your computer is idle Screen saver – a utility program that displays images or animation on your monitor when your computer is idle Use to hide your work while you are away from your desk Use to hide your work while you are away from your desk Specify screen saver and amount of time computer is idle before screen saver displays Specify screen saver and amount of time computer is idle before screen saver displays

List Servers and Listserve Groups List server – collects and distributes information to and from listserve groups List server – collects and distributes information to and from listserve groups List servers: List servers: LISTSERV ( ( Majordomo ( ( Lyris ( ( Listserve group – Participants who subscribe to a mailing list through a list server Listserve group – Participants who subscribe to a mailing list through a list server Mailing list Web sites (not list servers): Mailing list Web sites (not list servers): Topica (lists.topica.com)Topica (lists.topica.com) Yahoo! Groups ( Groups (

Security-Related Ethical and Legal Issues Privacy concerns: Privacy concerns: Your computer activities are no longer privateYour computer activities are no longer private You may receive malware and spamYou may receive malware and spam Organizations may monitor employee and restrict access to Internet sitesOrganizations may monitor employee and restrict access to Internet sites Network administrators may audit the contents of employee hard drivesNetwork administrators may audit the contents of employee hard drives Use home computer for personal communications and Internet searches Use home computer for personal communications and Internet searches

Security-Related Ethical and Legal Issues (cont’d) Copyright issues: Copyright issues: Copyright laws extend to works of authorship on the InternetCopyright laws extend to works of authorship on the Internet There is no international copyrightThere is no international copyright You must obtain copyrights from the appropriate agency in your home countryYou must obtain copyrights from the appropriate agency in your home country Court cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permissionCourt cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permission

Security-Related Ethical and Legal Issues (cont’d) Licensing: Licensing: To license copyright-protected material, you must obtain permission from the authorTo license copyright-protected material, you must obtain permission from the author Trademarks: Trademarks: To register a trademark, you must contact the appropriate agency in your home countryTo register a trademark, you must contact the appropriate agency in your home country Encryption policies: Encryption policies: Determine the risk of transmitting or ing unencrypted proprietary or sensitive dataDetermine the risk of transmitting or ing unencrypted proprietary or sensitive data