Chapter 4 Personal Security

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 4 Personal Security
PART THREE E-commerce in Action Norton University E-commerce in Action.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Your Information Assets
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Viruses & Destructive Programs
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Chapter 4 Personal Security Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 4 Personal Security

Objectives Define spyware and tell how it is used List and describe spyware tools Explain how to use personal security defense mechanisms Security Awareness: Applying Practical Security in Your World, 2e

What is Spyware? Spyware The Antispyware Coalition defines spyware as Software that violates user’s personal security The Antispyware Coalition defines spyware as Technologies implemented in ways that impair user’s control over Use of system resources The collection, use, and distribution of personal or otherwise sensitive information Material changes that affect user’s experience, privacy, or system security Security Awareness: Applying Practical Security in Your World, 2e

What is Spyware? (continued) Characteristics of spyware Creators are motivated by money More intrusive than viruses Harder to detect Harder to remove Harmful spyware is not always easy to identify Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

What is Spyware? (continued) Identity theft Use of someone’s personal information to impersonate with intent to commit fraud Once identity thieves have personal information they can Change the mailing address on a credit card account Establish phone or wireless service in the person’s name File for bankruptcy under the person’s name Security Awareness: Applying Practical Security in Your World, 2e

What is Spyware? (continued) Computer might be infected with spyware if Pop-up advertisements appear even when user is not on the Web Browser settings have changed without user’s consent New toolbar unexpectedly appears and is difficult to remove Computer takes longer than usual to complete common tasks Computer crashes frequently Security Awareness: Applying Practical Security in Your World, 2e

Spyware Tools Adware Most users frown on adware because Delivers advertising content in a manner or context that is unexpected and unwanted by user Most users frown on adware because Unwanted advertisements can be a nuisance Repeated pop-up ads can impair productivity Adware may display objectionable content Advertisements can slow a computer down or cause crashes and the loss of data Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Phishing Sending an e-mail or displaying a Web announcement that Falsely claims to be from a legitimate enterprise Attempts to trick a user into surrendering private information Both the e-mails and the fake Web sites appear legitimate Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Phishing (continued) Variations on phishing attacks Spear phishing Targets specific users Pharming Automatically redirects user to fake site Google phishing Phishers set up their own search engines to direct traffic to illegitimate sites Security Awareness: Applying Practical Security in Your World, 2e

Keyloggers Hardware device or small program that monitors each keystroke a user types Small plug located between keyboard connector and computer keyboard port Software keyloggers Silently capture what a user types, including passwords and sensitive information Can elude detection by Windows Task Manager Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Configuration Changers Type of spyware that change settings on computer without user’s knowledge or permission Configuration changers can Change operating system or software security settings Disable antivirus or other security software Initiate an outbound Internet connection Change startup procedures or security settings Security Awareness: Applying Practical Security in Your World, 2e

Dialers Change settings of a computer that uses a dial-up telephone line to connect to Internet Not affected by dialers Users with broadband connections Security Awareness: Applying Practical Security in Your World, 2e

Backdoors Provide unauthorized way of gaining access to a program Enable the remote malicious user to Upload files to the computer Start programs Reboot computer Log off current user Display message boxes Play sounds through the speakers Security Awareness: Applying Practical Security in Your World, 2e

Personal Security Defenses Antispyware software Helps prevent computers from becoming infected by different types of spyware Must be regularly updated Can be set to Provide continuous real-time monitoring Perform a complete scan of the entire computer system Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Antispyware Software Additional tools System explorers Tracks Eraser Expose configuration information that are normally difficult to access Tracks Eraser Automatically removes cookies, browser history, record of which programs have been recently opened Browser Restore Allows user to restore specific browser settings if spyware infects the Web browser Security Awareness: Applying Practical Security in Your World, 2e

Recognize Phishing Common elements in messages that could be phishing attacks Deceptive Web links E-mails that look like Web sites Fake sender’s address Generic greeting Pop-up boxes and attachments Unsafe Web sites Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Legislation and Procedures Fair and Accurate Credit Transactions Act (FACTA) of 2003 Grants consumers the right to Request one free credit report from each national credit-reporting firms every twelve months If consumers find a problem on their credit reports They must first send a letter to the credit-reporting agency Security Awareness: Applying Practical Security in Your World, 2e

Security Awareness: Applying Practical Security in Your World, 2e

Fair and Accurate Credit Transactions Act (FACTA) of 2003 FACTA Disposal Rule Proper destruction of data relating to personal information Extends to Employers, landlords, automobile dealers Private investigators, debt collectors Anyone who obtains credit reports on prospective contractors Security Awareness: Applying Practical Security in Your World, 2e

Payment Card Industry Data Security Standard (PCI-DSS) Established by Visa and Mastercard Safeguards cardholder data and prevents identity theft based on stolen credit card information Composed of 12 discrete requirements that force merchants to develop a secure network Security Awareness: Applying Practical Security in Your World, 2e

Proposed Federal Legislation Several bills proposed in the U.S. Congress to address spyware and identity theft Microsoft Has teamed up with the FBI Has brought charges against over 100 suspected phishers Security Awareness: Applying Practical Security in Your World, 2e

Summary Spyware Adware Phishing Term used to describe software that violates user’s personal security Adware Delivers advertising content in a manner that is unexpected and unwanted by user Phishing Sending e-mail or displaying Web announcement that falsely claims to be from a legitimate enterprise Security Awareness: Applying Practical Security in Your World, 2e

Summary (continued) Keylogger or keystroke logger Antispyware program Hardware device or software that monitors and collects each keystroke a user types Antispyware program One of the best defenses against spyware Legislation Addresses protection of personal data Security Awareness: Applying Practical Security in Your World, 2e