Presentation is loading. Please wait.

Presentation is loading. Please wait.

ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

Similar presentations


Presentation on theme: "ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,"— Presentation transcript:

1 ONLINE SAFETY AND SECURITY Computer Basics 1.5

2 INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network, including entire movies. Target: Data was compromised on 40 million customer credit and debit cards and 70 million phone numbers and addresses. Home Depot: 56 million credit cards and 53 million email addresses were exposed. J.P. Morgan Chase: Phone numbers and email addresses for 76 million households and 7 million small businesses were compromised.

3 SECTION SKILL OVERVIEW Configure Windows Firewall for different networks Configure privacy settings in Internet Explorer Clear the browser history within Internet Explorer Configure the Internet Explorer pop-up blocker Evaluate email messages to determine if they are safe or if they represent a possible social engineering attack

4 KEY TERMS Anti-malware Software CookieEmailFirewall Netiquette Pop-up Blocker Social Engineering Web Browser Web Browser Cache

5 KEY DEFINITIONS Anti-malware Software: Software that detects and removes malicious computer programs that are designed to gain unauthorized access to computer systems and information. Cookie: A small text file that a website sends to a web browser to store on a user's computer. The cookie contains information about the user's previous browsing sessions on the website, which the website accesses the next time the user visits. Email: Electronic messages that are sent or received over a network, using a computing device. Usually, the Internet is the network used to send and receive email.

6 KEY DEFINITIONS (CONTINUED) Firewall: A security instrument that controls network communication and user access to computers and networks. Firewalls can be either software or hardware based. Netiquette: Rules of etiquette that should be observed while using computer networks, such as the Internet. Pop-up Blocker: A software program or browser option that prevents pop- up advertisements from launching in a web browser.

7 KEY DEFINITIONS (CONTINUED) Social Engineering: Techniques used by threat agents to obtain personal information that can be used to access secure data and computer assets or to circumvent security policies and procedures. Web Browser: A software application that processes HTML web pages so that a user can interact with websites. Common web browsers include Chrome, Internet Explorer, Safari, and Firefox. Web Browser Cache: A temporary storage area that contains a record of the websites visited by a user and the associated website data stored by the browser.

8 SOCIAL ENGINEERING TechniqueDescription ReconnaissanceGathering sensitive information about a potential victim through: Shoulder surfing Eavesdropping Dumpster diving PretextingTricking a victim to reveal information under false pretenses through: Intimidation Familiarity Social validation

9 SOCIAL ENGINEERING (CONTINUED) TechniqueDescription Email AttacksExploiting a victim using email messages: Phishing Spear phishing Nigerian scams Email hoaxes Browser AttacksTricking a victim to reveal information in a browser window: Pharming Rogue antivirus

10 IN-CLASS PRACTICE Complete the first lab in this section, Applied Lab 1.5.10 – Configure Windows Firewall. Let me know if you need help on a task.

11 CLASS DISCUSSION What are the most common types of computer security risks? What can you do to protect yourself against Internet security risks? What are some ethical principles that encourage responsibility and trust in working with computers?

12 CLASS ACTIVITIES Write down a list of “netiquette” rules that you and your friends try to follow when texting, emailing, and using the Internet. Examples include: Not being a “troll” who creates conflict among online users Avoiding using all capital letters when communicating Open a Web browser other than Internet Explorer. Do the following: Clear the browser’s cache (including browsing history and cookies) Find the browser’s popup blocker settings Find the browser’s privacy settings

13 SUMMARY Network firewalls Anti-malware packages Web browser privacy and security settings Netiquette Social engineering exploits

14 Complete the labs in this section: Applied Lab 1.5.10 – Configure Windows Firewall Applied Lab 1.5.11 – Configure Privacy Settings in IE Applied Lab 1.5.12 – Clear the Browser Cache Applied Lab 1.5.13 – Respond to Social Engineering Applied Lab 1.5.14 – Configure the IE Popup Blocker Prepare for the next class: Video 1.6.1 – Office Application Features: The Ribbon Video 1.6.2 – Office Application Features: Beyond the Ribbon Video 1.6.5 – Windows Printing Features HOMEWORK ASSIGNMENTS


Download ppt "ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,"

Similar presentations


Ads by Google