1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Unit 6 Digital Literacy Study S3 Obj 2-2
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Threats To A Computer Network
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crimes.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
BUSINESS B1 Information Security.
© 2009 Prentice-Hall, Inc.1. 2 Technology in Action Technology in Focus: Protecting Your Computer and Backing Up Your Data.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
HI150 – Automation of Health Information Unit 2 Seminar.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
IT Security  .
Chapter 9 Securing Your System: Digital Data and Devices
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

2 Technology in Action Chapter 9 Digital Lifestyle: Protecting Digital Data and Devices Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

3 Computer Threats Cybercrimes are criminal acts conducted by cybercriminals through the use of computers Computer users need to protect themselves from becoming victims of cybercriminals Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

4 Types of Cybercrime Fraud-related (58 percent of cybercrime) – –Auction fraud – –Nondelivery of ordered items – –Credit and debit card fraud Non-fraud-related – –Computer intrusions – –Unsolicited – –Child pornography Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

5 Computer Threats: Viruses Virus: A program that attaches itself to another program and spreads itself to other computers Viruses are hidden within the code of a host program Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

6 What Viruses Do Replicate themselves (copy its code into as many other files as possible) – –Slow down networks Secondary objectives – side effects – –Display annoying messages – –Delete files on the hard drive – –Change computer settings Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

7 How Does a Computer Catch a Virus? Viruses copy themselves and infect a file on your computer Spread by – –Sharing disks or flash drives – –Opening an attachment – –Downloading infected audio or video files Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

8 Types of Viruses Boot-sector viruses – –Replicate themselves in the boot sector of the hard drive Logic bombs – –Activate when certain conditions are met (like opening a file) Time bombs – –Triggered by the passage of time or on a certain date Worms – –Travel between systems through networks Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

9 Prevent Instant Messaging Viruses Allow contact from Buddy or Friends List users only. Never automatically accept transfers of data. Avoid using instant messaging programs on public computers. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

10 Other Ways to Protect Your System Keep your antivirus and operating system (OS) software up to date Load security patches as soon as they are available Enable automatic updates Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

11Hackers Anyone who unlawfully accesses a computer system Types of hackers – –White hat – –Black hat – –Script kiddies Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

12 What Hackers Steal Hackers try to steal data stored on hard drives: – –Credit card numbers – –Bank account numbers Also can steal information through packet sniffing Use information to commit identity theft Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

13 How Hackers Gain Access Direct access – –Hacking software Indirect access – –Internet connection Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

14 Firewalls Software programs or hardware designed to close logical ports to invaders – –A software firewall is built into Windows 7 – –Other software firewalls are available from vendors Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

15 Passwords Create a strong password – –At least 14 characters, including numbers, symbols, and upper- and lowercase letters – –Not a single word or a word from a dictionary – –Not easily associated with you (birthday, name of pet, nickname) – –Use different passwords for different sites – –Do not tell anyone or write down password – –Change password regularly (every month) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

16 Biometric Authentication Devices Read unique personal characteristics – –Fingerprint – –Iris patterns – –Voice patterns – –Face patterns Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

17 Malware Software that has a malicious intent – –Adware and spyware are known as Grayware (nondestructive) and are intrusive, annoying, or objectionable online programs that are downloaded to your computer when you install or use other online content such as a freeware program, game, or utility. Adware – software that displays sponsored advertisements in a section of your browser window or as a pop-up and box an unwanted piggyback program that usually downloads with the software you want to install from the Internet and runs in the background of your system. Many spyware programs use tracking cookies to collect information, whereas others are disguised as benign programs that are really malicious programs (such as a computer virus). Some spyware programs (known as keystroke loggers) monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information. Spyware - an unwanted piggyback program that usually downloads with the software you want to install from the Internet and runs in the background of your system. Many spyware programs use tracking cookies to collect information, whereas others are disguised as benign programs that are really malicious programs (such as a computer virus). Some spyware programs (known as keystroke loggers) monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

18 SPAM or SPIM SPAM: Unwanted or junk – –To avoid SPAM Create free Web-based account for filling out online forms or making online purchases Use a spam filter Do not try to “unsubscribe” from spam s Use an forwarding service SPIM: Unsolicited instant messages Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

19 Cookies A Web site assigns an ID number to your computer, stored in a cookie file Each time you log in to the site, it notes the visit and keeps track of it in a database Provide info about browsing habits Identify user preferences Pose some privacy risks, but low security threat Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

20 Backing Up Your Data Backup – –A copy of a file that can be used to replace the original Types of files to back up – –Program – –Data Backup routine – –Frequency – –Changed files Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

21 Backing Up Your Data Store backups offsite Online backups – –Store backup files on Internet servers – –Fees for the service Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

22 Social Engineering Uses social skills to generate human interaction to entice individuals to reveal sensitive information – a telephone scam – –Usually does not use a computer or face-to- face interaction –involves creating a scenario that sounds legitimate enough that someone will trust you. –Pretexting - involves creating a scenario that sounds legitimate enough that someone will trust you. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

23 Phishing and Pharming Phishing – –Uses to lure user to fake Web sites – –Tricks user into revealing private data Pharming is when malicious code is planted on your computer that alters your browser’s ability to find Web addresses. Users are directed to bogus Web sites even when they enter the correct address of the real Web site or follow a bookmark that they previously had established for the Web site. So instead of ending up at your bank’s Web site when you type in its address, you would end up at a fake Web site that looks like your bank’s site but is expressly set up for the purpose of gathering information. Most Internet security packages can detect and prevent pharming attacks.is when malicious code is planted on your computer that alters your browser’s ability to find Web addresses. Users are directed to bogus Web sites even when they enter the correct address of the real Web site or follow a bookmark that they previously had established for the Web site. So instead of ending up at your bank’s Web site when you type in its address, you would end up at a fake Web site that looks like your bank’s site but is expressly set up for the purpose of gathering information. Most Internet security packages can detect and prevent pharming attacks. Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

24 Hoaxes An attempt to make someone believe something that is untrue – –Target large audiences – –Practical joke, agents of social change, or time wasters – –Mostly Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

25 Protect Physical Assets Environmental factors – –Avoid Sudden movement Excessive heat or cold Dust Food and liquids – –Use padded case for notebooks Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

26 Power Surges Occur when electrical current is supplied in excess of normal voltage (120 volts in the United States) Caused by: – –Old or faulty wiring – –Downed power lines – –Malfunctions at electric substations – –Lightning strikes Use surge protectors Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

27 Deterring Theft Alarms Locks and surrounds Software alerts Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall