1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Viruses & Destructive Programs
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Copyright © 2010 Pearson.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
HI150 – Automation of Health Information Unit 2 Seminar.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Viruses & Destructive Programs
Managing Windows Security
Chapter 9 Securing Your System: Digital Data and Devices
Securing your system, protecting your digital data and devices.
Presentation transcript:

1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware Backup methods (optional) Protecting physical assets (skip) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

2 Types of Cybercrime Virus creation deployment Fraud-related (58 percent of cybercrime) – –Auction fraud – –Nondelivery of ordered items – –Credit and debit card fraud Non-fraud-related – –Computer intrusions – –Unsolicited – –Child pornography Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

3 Computer Threats: Viruses Virus: A program that attaches itself to another program (host) and spreads itself to other computers when files are exchanged Viruses hide within the code of a host program Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

4 What Viruses Do Replicate themselves – –Slow down networks Secondary objectives – –Display annoying messages – –Delete files on the hard drive – –Change computer settings – –Information theft Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

5 How Does a Computer Catch a Virus? Viruses copy themselves and infect a file on your computer Spread by – –Sharing disks or flash drives – –Opening attachment – –Downloading infected audio or video files Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

6 Types of Viruses Boot-sector viruses – –Replicate themselves in the master boot record of hard drive upon boot up Logic bombs – –Activate when certain conditions are met Time bombs – –Activate when certain passage of time occurs or certain date (March , Michelangelo birthday) Worms – –Travel between systems through networks Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

7 Types of Viruses Script viruses – –Hidden on Web pages as malicious scripts; – –Scripts are short programs such as the non- malicious script that checks that you completed a Web form Macro viruses - not required – –Attached to documents Encryption viruses – not required – –Compress files using a complex encryption key Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

8 Virus Classifications - not required Polymorphic viruses – –Periodically rewrite themselves to avoid detection Multipartite viruses – –Infect multiple file types Stealth viruses – –Erase their code from the hard drive and reside in the active memory Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

9 Antivirus Software Programs designed to detect viruses – –Scan files looking for virus signatures (unique code) – –Provide options for deleting or fixing infected files – –Inoculate files against further infection Needs to be updated frequently Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

10 Dealing with an Infected Computer 1. 1.Boot computer with antivirus DVD/CD in DVD drive Run directly from DVD/CD Allow software to delete or quarantine infected files; Quarantine is to put infected file in secure place on drive) 4. 4.Research viruses found to ensure further manual steps are not needed. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

11 Prevent Instant Messaging Viruses -not on test Allow contact from Buddy or Friends List users only. Never automatically accept transfers of data. Avoid using instant messaging programs on public computers. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

12 Other Ways to Protect Your System Keep your antivirus and operating system (OS) software up to date Load security patches (Windows) as soon as they are available Turn on Automatic Windows Updates!! (see next slide) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

13 Protect w/ Windows Updates Start > Control Panel > Sys and Security, click Windows Update link, change settings Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

14 Hackers Anyone who unlawfully accesses a computer system Types (all illegal) – –White hat – hack as a challenge; – –Black hat – do maliciously, for their gain, etc – –Script kiddies - use hacking tools; less experienced Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

15 What Hackers Steal Hackers try to steal data stored on hard drives: – –Credit card numbers – –Bank account numbers Also can steal information through packet sniffing Use information to commit identity theft Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

16 How Computers Are Attacked - not on test Trojan horse Backdoor program – –Zombies Denial of service attacks (DoS) Distributed denial of service attacks (DDoS) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

17 How Hackers Gain Access Direct access – –Hacking software Indirect access – –Internet connection – –Logical ports Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

18 Firewalls Software programs or hardware designed to close logical ports to invaders – –A software firewall is built into Windows 7 – –Other software firewalls are available from vendors – –Network routers can contain a hardware firewall Firewalls are critical if you have an always- on broadband connection Test your computer’s vulnerability Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

19 Wireless Networks on the Road Beware – –“Evil twins” – –Free Internet access in paid locations Protect yourself – –Check with authorized personnel for official name of hot spot – –Do not use free access from unknown sources Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

20 Passwords - not on test Create a strong password – –At least 14 characters, including numbers, symbols, and upper- and lowercase letters – –Not a single word or a word from a dictionary – –Not easily associated with you (birthday, name of pet, nickname) – –Use different passwords for different sites – –Do not tell anyone or write down password – –Change password regularly (every month) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

21 Anonymous Web Surfing -not on test Public computers – –Shared computers risk subsequent user viewing your data – –Might already have viruses or hacking tools installed Portable privacy devices Linux OS on a flash drive Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

22 Malware not on test Software that has a malicious intent – –Grayware (nondestructive) Adware Spyware – –Viruses (destructive) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

23 Cookies A Web site assigns an ID number to your computer, stored in a cookie file Each time you log in to the site, it notes the visit and keeps track of it in a database Provide info about browsing habits Identify user preferences Pose some privacy risks, but low security threat Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

24 Backing Up Data - not on test Backup – –A copy of a file that can be used to replace the original Types of files to back up – –Program – –Data Backup routine – –Frequency – –Changed files Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

25 Backing Up Data - not on test Software programs for easy backup – –Schedule automatic backups – –Can back up files, folders, or entire drives – –Back up to USB device, CD, or DVD Entire system backup software – –Takes an image of the entire system – –Stores on a separate hard drive – –In case of failure, a new drive is inserted Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

26 Backing Up Data - not on test Store backups offsite Online backups – –Store backup files on Internet servers – –Fees for the service Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

27 Deterring Theft - not on test Alarms Locks and surrounds Software alerts Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

Chapter 1 Chapter 9 28 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2011 Pearson Education, Inc. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall