Download presentation
Presentation is loading. Please wait.
Published byCecily Blankenship Modified over 9 years ago
1
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition
2
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices
3
Major Threats to Your Digital Assets Cybercrime and Identity Theft Protecting Yourself from Computer Viruses Protecting Digital Assets from Hackers Copyright © 2016 Pearson Education, Inc. 9-2
4
Cybercrime and Identity Theft Objective 1.What is cybercrime, and who perpetrates it? Copyright © 2016 Pearson Education, Inc. 9-3
5
Protecting Yourself from Computer Viruses Objectives 2.What are the types of viruses from which I need to protect my computer? 3.What can I do to protect my computer from viruses? Copyright © 2016 Pearson Education, Inc. 9-4
6
Protecting Digital Assets from Hackers Objectives 4.How can hackers attack my computing devices, and what harm can they cause? 5.What is a firewall, and how does it keep my computer safe from hackers? 6.How do I create secure passwords and manage all of my passwords? 7.How can I surf the Internet anonymously and use biometric authentication devices to protect my data? Copyright © 2016 Pearson Education, Inc. 9-5
7
Cybercrime and Identity Theft Cybercrime Cybercriminals Common types of cybercrimes Copyright © 2016 Pearson Education, Inc. 9-6
8
Computer Viruses Not limited to computers Smartphones, tablets Widespread cybercrime: Spreading viruses Main purpose Secondary objectives Sources of virus infection Copyright © 2016 Pearson Education, Inc. 9-7
9
Computer Viruses Copyright © 2016 Pearson Education, Inc. 9-8 Major Categories of Viruses
10
Computer Viruses Additional Virus Classifications Classified by methods used to avoid detection Polymorphic viruses Multipartite viruses Stealth viruses Copyright © 2016 Pearson Education, Inc. 9-9
11
Preventing Virus Infections Antivirus software Detects viruses and protects your computer Popular programs Symantec Kaspersky AVG McAfee Copyright © 2016 Pearson Education, Inc. 9-10
12
Understanding Hackers Types of hackers White-hat or ethical hackers Black-hat hackers Grey-hat hackers Copyright © 2016 Pearson Education, Inc. 9-11
13
Understanding Hackers Trojan Horses and Rootkits Trojan horses—Appear to be useful Rootkits Zombies Copyright © 2016 Pearson Education, Inc. 9-12
14
Understanding Hackers Denial-of-Service Attacks Legitimate users are denied access to a computer system System shuts down Copyright © 2016 Pearson Education, Inc. 9-13
15
Restricting Access to Your Digital Assets Firewalls Firewall—hardware or software Windows and OS X include firewalls Security suites include firewall software Copyright © 2016 Pearson Education, Inc. 9-14
16
Restricting Access to Your Digital Assets Creating Passwords Need strong passwords Password strength tests Operating systems have built-in password protection Copyright © 2016 Pearson Education, Inc. 9-15
17
Restricting Access to Your Digital Assets Biometric Authentication Devices Fingerprint Iris pattern in eye Voice authentication Face pattern recognition Provide high level of security Copyright © 2016 Pearson Education, Inc. 9-16
18
Protecting Your Digital Property from Yourself Managing Online Annoyances Keeping Your Data Safe Protecting Your Physical Computing Assets Copyright © 2016 Pearson Education, Inc. 9-17
19
Managing Online Annoyances Objective 8.How do I manage online annoyances such as spyware and spam? Copyright © 2016 Pearson Education, Inc. 9-18
20
Keeping Your Data Safe Objectives 9.What data do I need to back up, and what are the best methods for doing so? 10.What is social engineering, and how do I avoid falling prey to phishing? Copyright © 2016 Pearson Education, Inc. 9-19
21
Protecting Your Physical Computing Assets Objective 11.How do I protect my physical computing assets from environmental hazards, power surges, and theft? Copyright © 2016 Pearson Education, Inc. 9-20
22
Managing Online Annoyances Malware: Adware and Spyware Spyware Transmits information Tracking cookies Keystroke logger Windows Defender Installs one or two additional standalone anti-spyware programs Many antispyware packages are available Copyright © 2016 Pearson Education, Inc. 9-21
23
Managing Online Annoyances Spam Spam—junk e-mail Spim—unwanted instant messages Tactics to minimize spam Copyright © 2016 Pearson Education, Inc. 9-22
24
Keeping Your Data Safe Backing Up Your Data How might I lose data? Unauthorized access Tampering Destruction Backups Copies of data used to replace originals Copyright © 2016 Pearson Education, Inc. 9-23
25
Social Engineering Phishing and Pharming Phishing Luring people into revealing information Pharming Malicious code planted on your computer to gather information Guidelines to avoid schemes Copyright © 2016 Pearson Education, Inc. 9-24
26
Social Engineering Scareware Type of malware Attempts to convince you something is wrong … and to pay money to fix it Copyright © 2016 Pearson Education, Inc. 9-25
27
Protecting Your Physical Computing Assets Power Surges Power surges Old or faulty wiring Downed power lines Lightning strikes Malfunctions at electric company substations Surge protector Replace every 2–3 years Use with all devices that have solid-state components Copyright © 2016 Pearson Education, Inc. 9-26
28
Check Your Understanding 1.What is cybercrime, and who perpetrates it? 2.What are the types of viruses from which I need to protect my computer? 3.What can I do to protect my computer from viruses? 4.How can hackers attack my computing devices, and what harm can they cause? Copyright © 2016 Pearson Education, Inc. 9-27
29
Check Your Understanding 5.What is a firewall, and how does it keep my computer safe from hackers? 6.How do I create secure passwords and manage all of my passwords? 7.How can I surf the Internet anonymously and use biometric authentication devices to protect my data? 8.How do I manage online annoyances such as spyware and spam? Copyright © 2016 Pearson Education, Inc. 9-28
30
Check Your Understanding 9.What data do I need to back up, and what are the best methods for doing so? 10.What is social engineering, and how do I avoid falling prey to phishing? 11.How do I protect my physical computing assets from environmental hazards, power surges, and theft? Copyright © 2016 Pearson Education, Inc. 9-29
31
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright © 2016 Pearson Education, Inc.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.