Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
Chapter 9: Privacy, Crime, and Security
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8: Protecting Yourself Online.
Computer Viruses.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Lesson 8: Protecting Yourself Online. Lesson 8 Objectives  Discuss "The Right to Be Forgotten"  Identify ways to minimize the spam you receive  Define.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Chapter Nine Maintaining a Computer Part III: Malware.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Data Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Internet Business Foundations © 2004 ProsoftTraining All rights reserved.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Types of Electronic Infection
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Security fundamentals Topic 9 Securing internet messaging.
Computer Skills and Applications Computer Security.
Jump to first page Internet Security in Perspective Yong Cao December 2000.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Security Management. Security Management is the organizational processes and relationships for managing risk – Policies, Procedures, Standards, Guidelines,
Network System Security - Task 2. Russell Johnston.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
Internet Business Associate v2.0
Presentation transcript:

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved The Right to Be Forgotten  You are ultimately responsible for protecting your image and personal information in the world of social networking  "The Right to Be Forgotten" – An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?"  You are ultimately responsible for protecting your image and personal information in the world of social networking  "The Right to Be Forgotten" – An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?"

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Spam  Some actions you can take to minimize the spam you receive include:  Avoid adding yourself to unwanted mailing lists  Conduct online transactions through secure Web sites  Do not assume that only the intended recipient will read your messages  Be selective when posting information to newsgroups  Some actions you can take to minimize the spam you receive include:  Avoid adding yourself to unwanted mailing lists  Conduct online transactions through secure Web sites  Do not assume that only the intended recipient will read your messages  Be selective when posting information to newsgroups

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Cookies  Cookie types:  persistent  session  first-party  third-party  You can control when and from whom cookies are accepted by specifying the level of privacy you want to maintain  You can view the file content of cookies to see information about the Web site that sent them to you  Cookie types:  persistent  session  first-party  third-party  You can control when and from whom cookies are accepted by specifying the level of privacy you want to maintain  You can view the file content of cookies to see information about the Web site that sent them to you

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Configuring Browser Security  You can configure your browser’s security settings to accept, reject or prompt before accepting:  ActiveX controls  JavaScript  To restrict these items in Internet Explorer or Mozilla Firefox, set safety levels accordingly  You can configure your browser’s security settings to accept, reject or prompt before accepting:  ActiveX controls  JavaScript  To restrict these items in Internet Explorer or Mozilla Firefox, set safety levels accordingly

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Authentication  Authentication – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data  General authentication types:  Anonymous logon – no user name or password are required, and authentication is handled transparently by the browser and server  Basic authentication – a user name and password are required, and that information is sent as plain text  Secure authentication – a user name and password are required, and they are encrypted before being sent across the Internet  Digital certificates – you must have the proper digital certificate to gain access  Authentication – the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data  General authentication types:  Anonymous logon – no user name or password are required, and authentication is handled transparently by the browser and server  Basic authentication – a user name and password are required, and that information is sent as plain text  Secure authentication – a user name and password are required, and they are encrypted before being sent across the Internet  Digital certificates – you must have the proper digital certificate to gain access

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Authentication (cont'd)  User names and passwords – used to log on to private and public networks, including the Internet  Digital certificates – attachments to electronic transmissions that supply a verifiable signature  Digital signatures – electronic signatures that verify the identity of the message sender  Non-repudiation – digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action  User names and passwords – used to log on to private and public networks, including the Internet  Digital certificates – attachments to electronic transmissions that supply a verifiable signature  Digital signatures – electronic signatures that verify the identity of the message sender  Non-repudiation – digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Encryption  Encryption – the process of converting data into an unreadable form of text  Decryption – the process of converting the encrypted data back to its original form  Encryption and decryption are performed using keys  Key – a mathematical algorithm  The more complex the encryption algorithm, the harder it is to decipher the encrypted message without access to the key  Encryption – the process of converting data into an unreadable form of text  Decryption – the process of converting the encrypted data back to its original form  Encryption and decryption are performed using keys  Key – a mathematical algorithm  The more complex the encryption algorithm, the harder it is to decipher the encrypted message without access to the key

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Encryption (cont'd)  Three types of encryption:  Symmetric (private-key) encryption – The same key is used to encrypt and decrypt messages  Asymmetric (public-key) encryption – Two keys are used to encrypt and decrypt messages: a public key and a private key  Hash (one-way) encryption – Uses hashes to verify the integrity of transmitted messages  Three types of encryption:  Symmetric (private-key) encryption – The same key is used to encrypt and decrypt messages  Asymmetric (public-key) encryption – Two keys are used to encrypt and decrypt messages: a public key and a private key  Hash (one-way) encryption – Uses hashes to verify the integrity of transmitted messages

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved SSL and TLS  Secure Sockets Layer (SSL) – a protocol for secure exchanges  Authenticates using digital certificates  Provides for data encryption  Transport Layer Security (TLS) – successor to SSL  Becoming more common  Based on SSL 3.0  Provides for encryption and authentication  Secure Sockets Layer (SSL) – a protocol for secure exchanges  Authenticates using digital certificates  Provides for data encryption  Transport Layer Security (TLS) – successor to SSL  Becoming more common  Based on SSL 3.0  Provides for encryption and authentication

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Malware (Malicious Software)  Virus – damages computers and networks, often alters files to damage or destroy data  Worm – resides in active memory and replicates itself until an entire disk is full  Trojan – appears to be harmless (such as a computer game) but produces harmful results  Illicit server – installs hidden services on systems  Client code – allows remote access to a computer by an attacker  Server code – infects destination computer and enables the attacker to control it  Virus – damages computers and networks, often alters files to damage or destroy data  Worm – resides in active memory and replicates itself until an entire disk is full  Trojan – appears to be harmless (such as a computer game) but produces harmful results  Illicit server – installs hidden services on systems  Client code – allows remote access to a computer by an attacker  Server code – infects destination computer and enables the attacker to control it

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Virus Detection and Prevention  Corporate IT departments are often the first line of defense against viruses  Common ways to contract viruses:  Receive infected disc/drive from colleague or friend  Download infected file  Download illicit server attachment  Copy to your hard disk a document infected with a macro virus  Corporate IT departments are often the first line of defense against viruses  Common ways to contract viruses:  Receive infected disc/drive from colleague or friend  Download infected file  Download illicit server attachment  Copy to your hard disk a document infected with a macro virus

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Virus Detection and Prevention (cont’d)  Common ways to protect against viruses:  Do not open or attachments from unknown senders  Configure browser and security to highest levels  Use anti-virus software  Keep anti-virus software current  Stay informed about the latest virus threats  Make backup copies of important files  Common ways to protect against viruses:  Do not open or attachments from unknown senders  Configure browser and security to highest levels  Use anti-virus software  Keep anti-virus software current  Stay informed about the latest virus threats  Make backup copies of important files

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Virus Detection and Prevention (cont’d)  If you receive an attachment you do not recognize:  Do not open the attachment  Contact the sender to determine whether the attachment is legitimate  If you cannot contact the sender, delete the attachment from the message  Delete the attachment from the Deleted Items folder  If you receive an attachment you do not recognize:  Do not open the attachment  Contact the sender to determine whether the attachment is legitimate  If you cannot contact the sender, delete the attachment from the message  Delete the attachment from the Deleted Items folder

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Virus Detection and Prevention (cont’d)  If you suspect a virus attack:  Use anti-virus software to remove the virus  If you cannot launch anti-virus software, reboot from a known clean system disk, then launch the anti-virus software  Remove virus from all disks, files and programs  If damage is too extensive, reformat hard disk, restore data and reinstall programs (last resort only)  If you suspect a virus attack:  Use anti-virus software to remove the virus  If you cannot launch anti-virus software, reboot from a known clean system disk, then launch the anti-virus software  Remove virus from all disks, files and programs  If damage is too extensive, reformat hard disk, restore data and reinstall programs (last resort only)

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Spyware and Virus Removal  Spyware – an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes  Also known as adware  Cookies are not spyware because:  The user is aware of their presence  The user has the option to disable outside access to cookie information  Use spyware detection applications to detect and eliminate spyware  Spyware – an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes  Also known as adware  Cookies are not spyware because:  The user is aware of their presence  The user has the option to disable outside access to cookie information  Use spyware detection applications to detect and eliminate spyware

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Updates and Patches  Update – a software upgrade that permanently fixes known bugs and improves software performance  Patch – a temporary bug fix  Virus update – files of virus signature profiles you use to keep your anti-virus software current  Update – a software upgrade that permanently fixes known bugs and improves software performance  Patch – a temporary bug fix  Virus update – files of virus signature profiles you use to keep your anti-virus software current

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Locking Your Computer  Screen saver – a utility program that displays images or animation on your monitor when your computer is idle  Used to hide your work while you are away from your desk  Specify screen saver and amount of time computer is idle before screen saver displays  Screen saver – a utility program that displays images or animation on your monitor when your computer is idle  Used to hide your work while you are away from your desk  Specify screen saver and amount of time computer is idle before screen saver displays

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Typosquatting  Typosquatting – registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser  Also known as URL hijacking  A typosquatter's Web address can be:  A common misspelling of the victim's site  A foreign language misspelling of the victim's site  A misspelling based on the transposition of letters  A plural version of a singular domain name, or vice versa  A different top-level domain  Typosquatting – registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser  Also known as URL hijacking  A typosquatter's Web address can be:  A common misspelling of the victim's site  A foreign language misspelling of the victim's site  A misspelling based on the transposition of letters  A plural version of a singular domain name, or vice versa  A different top-level domain

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Firewalls  Firewall – a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks  Use firewalls to:  Prevent unauthorized Internet users from accessing private networks  Retain control of proprietary information  Prevent unauthorized export of proprietary information  Firewalls may prevent access to external providers or external servers  Firewall – a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks  Use firewalls to:  Prevent unauthorized Internet users from accessing private networks  Retain control of proprietary information  Prevent unauthorized export of proprietary information  Firewalls may prevent access to external providers or external servers

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Security-Related Ethical and Legal Issues  Privacy concerns:  Your computer activities are no longer private  You may receive malware and spam  Organizations may monitor employee and restrict access to Internet sites  Network administrators may audit the contents of employee hard drives  Use home computer for personal communications and Internet searches  Privacy concerns:  Your computer activities are no longer private  You may receive malware and spam  Organizations may monitor employee and restrict access to Internet sites  Network administrators may audit the contents of employee hard drives  Use home computer for personal communications and Internet searches

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Security-Related Ethical and Legal Issues (cont’d)  Copyright issues:  Copyright laws extend to works of authorship on the Internet  There is no international copyright  You must obtain copyrights from the appropriate agency in your home country  Court cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permission  Copyright issues:  Copyright laws extend to works of authorship on the Internet  There is no international copyright  You must obtain copyrights from the appropriate agency in your home country  Court cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permission

Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Security-Related Ethical and Legal Issues (cont’d)  Licensing  To license copyright-protected material, you must obtain permission from the author  Trademarks  To register a trademark, you must contact the appropriate agency in your home country  Licensing  To license copyright-protected material, you must obtain permission from the author  Trademarks  To register a trademark, you must contact the appropriate agency in your home country