Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Chapter Nine Maintaining a Computer Part III: Malware.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security for Seniors SeniorNet Help Desk
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Security.
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Security, Social and Legal Issues Regarding Software and Internet.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security, Social and Legal Issues Regarding Software and Internet
3.6 Fundamentals of cyber security
IT Security  .
Understanding the Need for Security Measures
Lecture-16(B) Taking Protective Measures
Understanding the Need for Security Measures
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill Technology Education Chapter 14A Understanding the Need for Security Measures

14A-3 Basic Security Concepts Threats –Anything that can harm a computer –Vulnerabilities are weaknesses in security –Security attempts to neutralize threats

14A-4 Basic Security Concepts Degrees of harm –Level of potential damage –Include all parts of system Potential data loss Loss of privacy Inability to use hardware Inability to use software

14A-5 Basic Security Concepts Countermeasures –Steps taken to block a threat –Protect the data from theft –Protect the system from theft

14A-6 Threats To Users Identity Theft –Impersonation by private information Thief can ‘become’ the victim –Reported incidents rising –Methods of stealing information Shoulder surfing Snagging Dumpster diving Social engineering High-tech methods

14A-7 Threats To Users Loss of privacy –Personal information is stored electronically –Purchases are stored in a database Data is sold to other companies –Public records on the Internet –Internet use is monitored and logged –None of these techniques are illegal

14A-8 Threats to Users Cookies –Files delivered from a web site –Originally improved a site’s function –Cookies now track history and passwords –Browsers include cookie blocking tools

14A-9 Threats to Users Spyware –Software downloaded to a computer –Designed to record personal information –Typically undesired software –Hides from users –Several programs exist to eliminate

14A-10 Threats to Users Web bugs –Small programs embedded in gif images –Gets around cookie blocking tools –Companies use to track usage –Blocked with spyware killers

14A-11 Threats to Users Spam –Unsolicited commercial –Networks and PCs need a spam blocker Stop spam before reaching the inbox –Spammers acquire addresses using many methods –CAN-SPAM Act passed in 2003

14A-12 Threats to Hardware Affect the operation or reliability Power-related threats –Power fluctuations Power spikes or browns out –Power loss –Countermeasures Surge suppressors Line conditioners Uninterruptible power supplies Generators

14A-13 Threats to Hardware Theft and vandalism –Thieves steal the entire computer –Accidental or intentional damage –Countermeasures Keep the PC in a secure area Lock the computer to a desk Do not eat near the computer Watch equipment Chase away loiterers Handle equipment with care

14A-14 Threats to Hardware Natural disasters –Disasters differ by location –Typically result in total loss –Disaster planning Plan for recovery List potential disasters Plan for all eventualities Practice all plans

14A-15 Threats to Data The most serious threat –Data is the reason for computers –Data is very difficult to replace –Protection is difficult Data is intangible

14A-16 Threats to Data Viruses –Software that distributes and installs itself –Ranges from annoying to catastrophic –Countermeasures Anti-virus software Popup blockers Do not open unknown

14A-17 Threats to Data Trojan horses –Program that poses as beneficial software –User willingly installs the software –Countermeasures Anti-virus software Spyware blocker

14A-18 Threats to Data Cybercrime –Using a computer in an illegal act –Fraud and theft are common acts

14A-19 Threats to Data Internet fraud –Most common cybercrime –Fraudulent website –Have names similar to legitimate sites

14A-20 Threats to Data Hacking –Using a computer to enter another network –Cost users $1.3 trillion in 2003 –Hackers motivation Recreational hacking Financial hackers Grudge hacking –Hacking methods Sniffing Social engineering Spoofing

14A-21 Threats to Data Distributed denial of service attack –Attempt to stop a public server –Hackers plant the code on computers –Code is simultaneously launched –Too many requests stops the server

14A-22 Threats to Data Cyber terrorism –Attacks made at a nations information –Targets include power plants –Threat first realized in 1996 –Organizations combat cyber terrorism Computer Emergency Response Team (CERT) Department of Homeland Security

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 14A End of Chapter

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill Technology Education Chapter 14B Taking Protective Measures

14B-26 Avoiding Identity Theft Guard your papers –Shred unneeded papers –Pick up you mail quickly –Check statements immediately –Keep records for 3 years

14B-27 Avoiding Identity Theft Guard your personal information –Be wary giving out information –Avoid giving account numbers –Never give personal information in –Ensure online shopping is secure

14B-28 Avoiding Identity Theft Look at the big picture –Review your credit report yearly –Develop an efficient filing system –Know your liability limits

14B-29 Protecting Your Privacy Keep marketers at bay –Be wary filling out forms –Guard your primary address Have a ‘spam account’ for forms

14B-30 Protecting Your Privacy Know your legal rights –1966 Freedom of Information Act –1970 Fair Credit Reporting Act –Privacy Act of 1974 –1986 Electronic Communications Act –Financial Modernization Act of 1999 –2001 USA Patriot Act

14B-31 Managing Cookies and Spyware Dealing with cookies –Browsers provide settings to block cookies –No cookies to all cookies allowed –Without cookies some sites crash –Cookies can be deleted Browsers Spyware programs

14B-32 Managing Cookies and Spyware Cookie types –Session cookies Cookies for the current site –Persistent cookies Stored on hard drive until deleted –First-party cookies Installed by the current site –Third-party cookies Installed by an ad

14B-33 Deleting Cookies

14B-34 Managing Cookies and Spyware Removing web bugs and spyware –Install a spyware removal program None are 100% effective, use two –Install a pop-up blocker Are extremely effective

14B-35 Managing Cookies and Spyware Evading spam –Contact your ISP –Use mail program’s filters –Use an anti-spam program –Use an online account for purchasing

14B-36 Protection From Malware Viruses and worms –Purchase a good anti-virus product –Keep the product updated –Keep your OS up to date

14B-37 Protecting Your System Limit physical access –Easiest way to harm or steal data –Build an account for each user –Require a password for access Software and hardware password

14B-38 Protecting Your System Use a firewall –Protects from unauthorized remote use –Makes your computer invisible –Cost between $0 and $80

14B-39 Protecting Your System Backup often –Backup is a copy of a file –Restore replaces a file on disk –Organizations backup at least daily –Home users should backup weekly

14B-40 System Events OS generates messages for events Provides clues about computer health Can alert to potential problems Windows includes the Event Viewer

14B-41 Event Viewer

14B-42 Handling Storage Media Store media in the proper container –Floppy disks in a hard case –CD should be in a sleeve –Thumb disks should be closed

14B-43 Handling Storage Media Avoid magnetism –Magnets erase the contents of disks –Magnets found in Speakers Televisions and CRT monitors Radios

14B-44 Handling Storage Media Heat and cold –Avoid extreme temperatures Heat expands media Cold contracts media –Floppies and CD-ROMs are susceptible

14B-45 Handling Storage Media Moisture –Do not use wet media –CDs can be wiped off –Floppy disks must dry for days

14B-46 Handling Storage Media Dust, dirt, and fingerprints –Dirty or scratched media will fail –Handle media by the edge –Clean CDs with gentle strokes

14B-47 Storing Computer Equipment Never store near large electronics Store in dry, climate controlled rooms Plan for natural disasters Stack equipment safely

14B-48 Keeping Your Computer Clean Computers should be spotless Avoid eating or smoking at computer Clean the dust from inside the system Change the filters if present

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 14B End of Chapter