Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.

Slides:



Advertisements
Similar presentations
1 Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall. by Mary Anne Poatsy, Keith Mulbery, Eric Cameron, Jason Davidson, Rebecca Lawson,
Advertisements

Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Tenth Edition Copyright © 2014 Pearson Education, Inc. Publishing as Prentice Hall.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Ninth Edition Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
CHAPTER OVERVIEW SECTION 4.1 – Ethics
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Chapter 10 Privacy and Security McGraw-Hill
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Copyright © 2015 Pearson Education, Inc.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
CHAPTER FOUR ETHICS AND INFORMATION SECURITY MIS BUSINESS CONCERNS
Our Digital World Second Edition
1. 2 Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2012 Pearson Education, Inc. Publishing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall.
Protecting People and Information: Threats and Safeguards
Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin CHAPTER FOUR ETHICS AND INFORMATION SECURITY: MIS BUSINESS CONCERNS.
CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Your Interactive Guide to the Digital World Discovering Computers 2012.
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computer Concepts – Illustrated 8th edition
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
GO! All In One 2/E By: Shelley Gaskin, Nancy Graviett, Debra Geoghan Chapter 12 Networks, Security, and Privacy Copyright © 2015 Pearson Education, Inc.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
 Introduction to Computing  Computer Programming  Terrorisom.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Privacy, Security and Ethics
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition.
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
TECHNOLOGY IN ACTION.
TECHNOLOGY IN ACTION Chapter 9
Chapter 9 Securing Your System: Digital Data and Devices
Presentation transcript:

Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition

Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices

Major Threats to Your Digital Assets Cybercrime and Identity Theft Protecting Yourself from Computer Viruses Protecting Digital Assets from Hackers Copyright © 2016 Pearson Education, Inc. 9-2

Cybercrime and Identity Theft Objective 1.What is cybercrime, and who perpetrates it? Copyright © 2016 Pearson Education, Inc. 9-3

Protecting Yourself from Computer Viruses Objectives 2.What are the types of viruses from which I need to protect my computer? 3.What can I do to protect my computer from viruses? Copyright © 2016 Pearson Education, Inc. 9-4

Protecting Digital Assets from Hackers Objectives 4.How can hackers attack my computing devices, and what harm can they cause? 5.What is a firewall, and how does it keep my computer safe from hackers? 6.How do I create secure passwords and manage all of my passwords? 7.How can I surf the Internet anonymously and use biometric authentication devices to protect my data? Copyright © 2016 Pearson Education, Inc. 9-5

Cybercrime and Identity Theft Cybercrime Cybercriminals Common types of cybercrimes Copyright © 2016 Pearson Education, Inc. 9-6

Computer Viruses Not limited to computers  Smartphones, tablets Widespread cybercrime: Spreading viruses Main purpose Secondary objectives Sources of virus infection Copyright © 2016 Pearson Education, Inc. 9-7

Computer Viruses Copyright © 2016 Pearson Education, Inc. 9-8 Major Categories of Viruses

Computer Viruses Additional Virus Classifications Classified by methods used to avoid detection  Polymorphic viruses  Multipartite viruses  Stealth viruses Copyright © 2016 Pearson Education, Inc. 9-9

Preventing Virus Infections Antivirus software  Detects viruses and protects your computer Popular programs  Symantec  Kaspersky  AVG  McAfee Copyright © 2016 Pearson Education, Inc. 9-10

Understanding Hackers Types of hackers  White-hat or ethical hackers  Black-hat hackers  Grey-hat hackers Copyright © 2016 Pearson Education, Inc. 9-11

Understanding Hackers Trojan Horses and Rootkits Trojan horses—Appear to be useful Rootkits Zombies Copyright © 2016 Pearson Education, Inc. 9-12

Understanding Hackers Denial-of-Service Attacks Legitimate users are denied access to a computer system System shuts down Copyright © 2016 Pearson Education, Inc. 9-13

Restricting Access to Your Digital Assets Firewalls Firewall—hardware or software Windows and OS X include firewalls Security suites include firewall software Copyright © 2016 Pearson Education, Inc. 9-14

Restricting Access to Your Digital Assets Creating Passwords Need strong passwords Password strength tests Operating systems have built-in password protection Copyright © 2016 Pearson Education, Inc. 9-15

Restricting Access to Your Digital Assets Biometric Authentication Devices Fingerprint Iris pattern in eye Voice authentication Face pattern recognition Provide high level of security Copyright © 2016 Pearson Education, Inc. 9-16

Protecting Your Digital Property from Yourself Managing Online Annoyances Keeping Your Data Safe Protecting Your Physical Computing Assets Copyright © 2016 Pearson Education, Inc. 9-17

Managing Online Annoyances Objective 8.How do I manage online annoyances such as spyware and spam? Copyright © 2016 Pearson Education, Inc. 9-18

Keeping Your Data Safe Objectives 9.What data do I need to back up, and what are the best methods for doing so? 10.What is social engineering, and how do I avoid falling prey to phishing? Copyright © 2016 Pearson Education, Inc. 9-19

Protecting Your Physical Computing Assets Objective 11.How do I protect my physical computing assets from environmental hazards, power surges, and theft? Copyright © 2016 Pearson Education, Inc. 9-20

Managing Online Annoyances Malware: Adware and Spyware Spyware  Transmits information  Tracking cookies  Keystroke logger Windows Defender  Installs one or two additional standalone anti-spyware programs Many antispyware packages are available Copyright © 2016 Pearson Education, Inc. 9-21

Managing Online Annoyances Spam Spam—junk Spim—unwanted instant messages Tactics to minimize spam Copyright © 2016 Pearson Education, Inc. 9-22

Keeping Your Data Safe Backing Up Your Data How might I lose data?  Unauthorized access  Tampering  Destruction Backups  Copies of data used to replace originals Copyright © 2016 Pearson Education, Inc. 9-23

Social Engineering Phishing and Pharming Phishing  Luring people into revealing information Pharming  Malicious code planted on your computer to gather information Guidelines to avoid schemes Copyright © 2016 Pearson Education, Inc. 9-24

Social Engineering Scareware Type of malware Attempts to convince you something is wrong … and to pay money to fix it Copyright © 2016 Pearson Education, Inc. 9-25

Protecting Your Physical Computing Assets Power Surges Power surges  Old or faulty wiring  Downed power lines  Lightning strikes  Malfunctions at electric company substations Surge protector  Replace every 2–3 years  Use with all devices that have solid-state components Copyright © 2016 Pearson Education, Inc. 9-26

Check Your Understanding 1.What is cybercrime, and who perpetrates it? 2.What are the types of viruses from which I need to protect my computer? 3.What can I do to protect my computer from viruses? 4.How can hackers attack my computing devices, and what harm can they cause? Copyright © 2016 Pearson Education, Inc. 9-27

Check Your Understanding 5.What is a firewall, and how does it keep my computer safe from hackers? 6.How do I create secure passwords and manage all of my passwords? 7.How can I surf the Internet anonymously and use biometric authentication devices to protect my data? 8.How do I manage online annoyances such as spyware and spam? Copyright © 2016 Pearson Education, Inc. 9-28

Check Your Understanding 9.What data do I need to back up, and what are the best methods for doing so? 10.What is social engineering, and how do I avoid falling prey to phishing? 11.How do I protect my physical computing assets from environmental hazards, power surges, and theft? Copyright © 2016 Pearson Education, Inc. 9-29

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2016 Pearson Education, Inc.