Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Similar documents
Technology in Action

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Ethics and Information Security. 10 주차 - 경영정보론 Spring 2014

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

How To Remove Personal Antivirus Security Pro Virus Manually

Course Outline (version 2)

INTERNET SAFETY IS IMPORTANT

Online Security and Safety Protect Your Computer - and Yourself!

Discovering Computers Living in a Digital World

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

CERTIFIED SECURE COMPUTER USER COURSE OUTLINE

ECDL / ICDL IT Security. Syllabus Version 2.0

Computer Security. Assoc. Prof. Pannipa Phaiboonnimit. Adapted for English Section by Kittipitch Kuptavanich and Prakarn Unachak

Accounting Information Systems

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

DEFENDING THE MOBILE WORKFORCE Karim Toubba-Vice President Product Marketing and Strategy-Security Business Unit

How To Remove Virus From Computer Without Using Antivirus In Windows Xp

Security Awareness. Presented by OSU Institute of Technology

SECURE USE OF IT Syllabus Version 2.0

Identity Theft, Fraud & You. PrePare. Protect. Prevent.

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Security Essentials

SUMMARIES OF INTERACTIVE MULTIMEDIA

Chapter 6 Network and Internet Security and Privacy

Quick Heal Total Security

A Review Paper on Network Security Attacks and Defences

Quick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.

Chapter 12. Information Security Management

Network Security Fundamentals

User Guide. This user guide explains how to use and update Max Secure Anti Virus Enterprise Client.

Quick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page

User s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.

Quick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.

4 Information Security

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Contents. Introduction 5. McAfee SecurityCenter 7. McAfee QuickClean 39. McAfee Shredder 45

Unit 2 Assignment 2. Software Utilities?

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

Cybersecurity For The Small Business & Home User ( Geared toward Windows, but relevant to Apple )

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

Quick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.

2018 By: RemoveVirus.net. Remove A Virus From Your PC In 5 Simple Steps

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Chapter 10: Security and Ethical Challenges of E-Business

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Online Threats. This include human using them!

How To Remove Personal Antivirus Security Pro Virus Windows 8

Quick Heal AntiVirus Pro. Tough on malware, light on your PC.

INDEX. browser-hijacking adware programs, 29 brute-force spam, business, impact of spam, business issues, C

CHAPTER 3. Information Systems: Ethics, Privacy, and Security

CS System Security Mid-Semester Review

e-commerce Study Guide Test 2. Security Chapter 10

Systems and Principles Unit Syllabus

MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations

How To Remove Personal Antivirus Security Pro Virus

Cyber Security Basics. Presented by Darrel Karbginsky

Security Issues When Preparing for Disasters

Free antivirus software download

Available Instructor Resources Resource File Name Found

Cyber Security Practice Questions. Varying Difficulty

Copyright 2006 Prentice-Hall. All rights reserved. 1

CHAPTER 8 SECURING INFORMATION SYSTEMS

Securing the SMB Cloud Generation

How To Removing Personal Antivirus Security Pro From Windows 8

GCIH. GIAC Certified Incident Handler.

Securing Information Systems

Quick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.

Start the Security Walkthrough

F-Secure Mobile Security

Chapter 9 Security and Privacy

The process by which a user can associate specific permissions to each username.

Elementary Computing CSC 100. M. Cheng, Computer Science

ACS / Computer Security And Privacy. Fall 2018 Mid-Term Review

Securing Information Systems

CS System Security 2nd-Half Semester Review

How To Remove A Virus Manually Windows 7 Without Antivirus Security Pro

Discovering Computers Fundamentals, 2011 Edition. Living in a Digital World

Ethical Hacking and Prevention

3.5 SECURITY. How can you reduce the risk of getting a virus?

McAfee Internet Security Suite Quick-Start Guide

Seqrite Antivirus for Server

Prevx 3.0 v Product Overview - Core Functionality. April, includes overviews of. MyPrevx, Prevx 3.0 Enterprise,

Quick Heal Mobile Security. Free protection for your Android phone against virus attacks, unwanted calls, and theft.

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

Viruses and antiviruses

The best for everyday PC users

ANTIVIRUS SITE PROTECTION (by SiteGuarding.com)

2008 CAMS-ii Users Conference

Retail/Consumer Client Internet Banking Awareness and Education Program

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Introduction to Information Security Dr. Rick Jerz

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 5 Host, Application, and Data Security

Guidelines for Use of IT Devices On Government Network

Protection Against Malware. Alan German Ottawa PC Users Group

Securing Information Systems

Manual Removal Norton Internet Security Won't Open Or

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

Get Max Internet Security where to buy software for students ]

Airtel PC Secure Trouble Shooting Guide

On the Internet What You Don t Know Can Hurt You!

Transcription:

Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright 2015 Pearson Education, Inc. Copyright 2015 Pearson Education, Inc. Chapter Topics Cybercrime and Identity Theft Protecting Yourself from Computer Viruses Protecting Digital Assets from Hackers Managing Online Annoyances Keeping Your Data Safe Protecting Your Physical Computing Assets Cybercrime and Identity Theft Cybercrime Cybercriminals Copyright 2015 Pearson Education, Inc. 2 Copyright 2015 Pearson Education, Inc. 3 Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Identity theft Acts perpetrated by identity thieves Copyright 2015 Pearson Education, Inc. 4 Copyright 2015 Pearson Education, Inc. 5 1

Cybercrime and Identity Theft (cont.) Other methods to obtain personal information Stealing purses and wallets Stealing mail or looking through trash Posing as bank or credit card company representative Skimming devices Cybercrime and Identity Theft (cont.) Theft of computer equipment Larceny Resale value is high Equipment sold online Copyright 2015 Pearson Education, Inc. 6 Copyright 2015 Pearson Education, Inc. 7 Computer Viruses Not just limited to computer One of the most widespread types of cybercrimes Computer Viruses (cont.) Main purpose Replicate themselves and copy Secondary objectives Slow down networks Display annoying messages Destroy files or contents of hard drive Copyright 2015 Pearson Education, Inc. 8 Copyright 2015 Pearson Education, Inc. 9 Computer Viruses (cont.) Computer Viruses (cont.) Sources of virus infection Downloading infected audio and video files Shared flash drives Downloading or executing e-mail attachments Copyright 2015 Pearson Education, Inc. 10 Copyright 2015 Pearson Education, Inc. 11 2

Computer Viruses (cont.) Computer Viruses: Boot-Sector Viruses Replicates onto hard drive s master boot record Often transmitted by a flash drive Copyright 2015 Pearson Education, Inc. 12 Copyright 2015 Pearson Education, Inc. 13 Computer Viruses: Logic Bombs and Time Bombs Logic bomb Time bomb Computer Viruses: Worms File transport methods Independent of host file Copyright 2015 Pearson Education, Inc. 14 Copyright 2015 Pearson Education, Inc. 15 Computer Viruses: Script and Macro Viruses Script Macro viruses Computer Viruses: E-Mail Viruses Melissa virus Distribute using address book Copyright 2015 Pearson Education, Inc. 16 Copyright 2015 Pearson Education, Inc. 17 3

Computer Viruses: Encryption Viruses Data files Become unusable Computer Viruses: Additional Virus Classifications Classified by methods used to avoid detection Polymorphic viruses Multipartite viruses Stealth viruses Copyright 2015 Pearson Education, Inc. 18 Copyright 2015 Pearson Education, Inc. 19 Computer Viruses: Virus Symptoms Existing program icons or files suddenly disappear Unusual home page New toolbars Odd messages, pop-ups, or images Data files become corrupt Programs stop working properly System slows down or takes a long time to boot up Preventing Virus Infections Antivirus software Detects viruses and protects your computer Popular antivirus Symantec Kaspersky AVG McAfee Copyright 2015 Pearson Education, Inc. 20 Copyright 2015 Pearson Education, Inc. 21 Preventing Virus Infections: Antivirus Software Preventing Virus Infections: Antivirus Software (cont.) Main functions of antivirus software Detection Stopping virus execution Preventing future infection Copyright 2015 Pearson Education, Inc. 22 Copyright 2015 Pearson Education, Inc. 23 4

Preventing Virus Infections: Antivirus Software (cont.) Preventing Virus Infections: Antivirus Software (cont.) If computer is infected Boot up using antivirus installation disc Virus is detected Research it Websites contain archives on viruses Copyright 2015 Pearson Education, Inc. 24 Copyright 2015 Pearson Education, Inc. 25 Preventing Virus Infections: Antivirus Software (cont.) Smartphones and other mobile devices are susceptible to viruses Antivirus software for mobile devices Trend Micro s Mobile Security for Android Preventing Virus Infections: Software Updates Drive-by download Windows operating system Automatic update utility: Windows Update Copyright 2015 Pearson Education, Inc. 26 Copyright 2015 Pearson Education, Inc. 27 Preventing Virus Infections: Software Updates (cont.) Preventing Virus Infections: Software Updates (cont.) Default option in Windows Receive updates automatically Other options available Copyright 2015 Pearson Education, Inc. 28 Copyright 2015 Pearson Education, Inc. 29 5

Hackers Types of hackers White-hat or ethical hackers Black-hat hackers Grey-hat hackers Hackers: Problems Hackers Can Cause Steal credit and debit card information Break into sites Capture login ID and password Copyright 2015 Pearson Education, Inc. 30 Copyright 2015 Pearson Education, Inc. 31 Hackers: Problems Hackers Can Cause (cont.) Packet analyzer (sniffer) Firewall Data encryption Hackers: Trojan Horses and Rootkits Trojan Horses appear to be useful Rootkits Zombie Copyright 2015 Pearson Education, Inc. 32 Copyright 2015 Pearson Education, Inc. 33 Hackers: Denial-of-Service Attacks Users are denied access to a computer system System shuts down Hackers: Denial-of-Service Attacks (cont.) Copyright 2015 Pearson Education, Inc. 34 Copyright 2015 Pearson Education, Inc. 35 6

Hackers: How Hackers Gain Computer Access Direct access Indirect access Logical ports Restricting Access to Your Digital Assets Keep hackers out Prevent them from accessing computer Protect your digital information Hide activities from prying eyes Copyright 2015 Pearson Education, Inc. 36 Copyright 2015 Pearson Education, Inc. 37 Firewalls Firewall Personal firewall Windows and OS X include firewalls Security suites include firewall software Firewalls (cont.) Copyright 2015 Pearson Education, Inc. 38 Copyright 2015 Pearson Education, Inc. 39 How Firewalls Work Protect in two major ways Blocking access to logical ports Keeping computer s network address secure Packet filtering Logical port blocking How Firewalls Work (cont.) Copyright 2015 Pearson Education, Inc. 40 Copyright 2015 Pearson Education, Inc. 41 7

How Firewalls Work (cont.) Internet Protocol address (IP address) Network address translation (NAT) Knowing Your Computer Is Secure Websites test computer s vulnerability Gibson Research ShieldsUP LeakTest If vulnerabilities are detected: Install a firewall Close or restrict access to ports Copyright 2015 Pearson Education, Inc. 42 Copyright 2015 Pearson Education, Inc. 43 Knowing Your Computer Is Secure (cont.) Creating Passwords (cont.) Copyright 2015 Pearson Education, Inc. 44 Copyright 2015 Pearson Education, Inc. 45 Creating Passwords (cont.) Password strength tests Password Meter Operating systems have built-in password protection Windows 8 Picture passwords Managing Your Passwords (cont.) Password management software Security suites and web browsers provide password management tools Copyright 2015 Pearson Education, Inc. 46 Copyright 2015 Pearson Education, Inc. 47 8

Anonymous Web Surfing: Hiding from Prying Eyes Anonymous Web Surfing: Hiding from Prying Eyes (cont.) Privacy tools to surf the web anonymously Incognito Private Browsing InPrivate Portable privacy devices Ironkey Personal Flash Drive Store sensitive Internet files Preload Linux OS on a flash drive Copyright 2015 Pearson Education, Inc. 48 Copyright 2015 Pearson Education, Inc. 49 Anonymous Web Surfing: Hiding from Prying Eyes (cont.) Third-party software developers offer apps to enhance tablet security IPVanish Biometric Authentication Devices Fingerprint Iris pattern in eye Voice authentication Face pattern recognition Provide high level of security Copyright 2015 Pearson Education, Inc. 50 Copyright 2015 Pearson Education, Inc. 51 Managing Online Annoyances: Malware: Adware and Spyware Malware Three primary forms Adware Spyware Viruses Managing Online Annoyances: Malware: Adware and Spyware (cont.) Spyware Transmits information Tracking cookies Keystroke logger Anti-spyware software Install one or two additional standalone anti-spyware programs Copyright 2015 Pearson Education, Inc. 52 Copyright 2015 Pearson Education, Inc. 53 9

Managing Online Annoyances: Malware: Adware and Spyware (cont.) Windows Defender Malwarebytes Anti-Malware, Ad-Aware, and Spybot Managing Online Annoyances: Spam Spam Spim Use a free e-mail address Copyright 2015 Pearson Education, Inc. 54 Copyright 2015 Pearson Education, Inc. 55 Managing Online Annoyances: Spam (cont.) Spam filter Third-party programs available SPAMfighter Managing Online Annoyances: Spam (cont.) Other ways to prevent spam Read website privacy policies Don t give the site permission to pass on your e-mail address Don t reply to spam Subscribe to an e-mail forwarding service Copyright 2015 Pearson Education, Inc. 56 Copyright 2015 Pearson Education, Inc. 57 Managing Online Annoyances: Cookies Provide websites with information about browsing habits Don t search for personal information Only collect information you supply when filling out forms Some sites sell the information Pose no security threat Keeping Your Data Safe: Protecting Your Personal Information Copyright 2015 Pearson Education, Inc. 58 Copyright 2015 Pearson Education, Inc. 59 10

Keeping Your Data Safe: Backing Up Your Data Unauthorized access Tampering Destruction Backups Keeping Your Data Safe: Backing Up Your Data (cont.) Copyright 2015 Pearson Education, Inc. 60 Copyright 2015 Pearson Education, Inc. 61 Keeping Your Data Safe: Backing Up Your Data (cont.) Options for backing up files Incremental backup (partial backup) Image backup (system backup) Keeping Your Data Safe: Backing Up Your Data (cont.) Copyright 2015 Pearson Education, Inc. 62 Copyright 2015 Pearson Education, Inc. 63 Keeping Your Data Safe: Backing Up Your Data (cont.) Keeping Your Data Safe: Backing Up Your Data (cont.) Windows 8 includes the Windows 7 File Recovery utility Copyright 2015 Pearson Education, Inc. 64 Copyright 2015 Pearson Education, Inc. 65 11

Social Engineering Human interaction to learn information Pretexting Fake phone call Social Engineering: Phishing and Pharming Phishing Pharming Copyright 2015 Pearson Education, Inc. 66 Copyright 2015 Pearson Education, Inc. 67 Social Engineering: Phishing and Pharming (cont.) Guidelines to avoid schemes Never reply directly to e-mails asking for personal information Don t click on links in e-mails Never give personal information over the Internet unless the site is secure Use phishing filters Use Internet security software Social Engineering: Phishing and Pharming (cont.) Copyright 2015 Pearson Education, Inc. 68 Copyright 2015 Pearson Education, Inc. 69 Social Engineering: Scareware Type of malware Pop-ups Banners Annoying types of messages Protecting Your Physical Computing Assets: Environmental Factors Level surface Protective case Don t leave in a car in extreme temperatures Chill mats Keep intake vent unblocked Keep room clean Don t eat or drink near your computer Copyright 2015 Pearson Education, Inc. 70 Copyright 2015 Pearson Education, Inc. 71 12

Protecting Your Physical Computing Assets: Power Surges Power surges Old or faulty wiring Downed power lines Malfunctions at electric company substations Lightning strikes Surge protector Replace every two three years Use with all devices that have solid-state components Protecting Your Physical Computing Assets: Deterring Theft Security concerns with mobile devices Keeping them from being stolen Keeping data secure in case they are stolen Finding a device if it is stolen Remotely recovering and wiping data off a stolen device Copyright 2015 Pearson Education, Inc. 72 Copyright 2015 Pearson Education, Inc. 73 Protecting Your Physical Computing Assets: Keep Them Safe: Alarms Motion alarm software LAlarm: free software for laptops SuperAlarm and Alarmomatic Protecting Your Physical Computing Assets: Keeping Mobile Device Data Secure Encrypt data on your mobile device Transform data using an algorithm that can only be unlocked by a secure code (or key) Safe: an app that provides 256-bit encryption SensiGuard and SafeHouse Copyright 2015 Pearson Education, Inc. 74 Copyright 2015 Pearson Education, Inc. 75 Protecting Your Physical Computing Assets: Software Alerts and Data Wipes Theft-tracking software Computrace LoJack for Laptops PC PhoneHome MacPhoneHome Remote recovery and deletion of files LoJack for Laptops Protecting Your Physical Computing Assets: Software Alerts and Data Wipes (cont.) Copyright 2015 Pearson Education, Inc. 76 Copyright 2015 Pearson Education, Inc. 77 13

Protecting Your Physical Computing Assets: Software Alerts and Data Wipes (cont.) 1. What is cybercrime and who perpetrates it? Copyright 2015 Pearson Education, Inc. 78 Copyright 2015 Pearson Education, Inc. 79 2. What are the types of viruses from which I need to protect my computer? 3. What can I do to protect my computer from viruses? Copyright 2015 Pearson Education, Inc. 80 Copyright 2015 Pearson Education, Inc. 81 4. How can hackers attack my computing devices, and what harm can they cause? 5. What is a firewall, and how does it keep my computer safe from hackers? Copyright 2015 Pearson Education, Inc. 82 Copyright 2015 Pearson Education, Inc. 83 14

6. How do I create secure passwords and manage all of my passwords? 7. How can I surf the Internet anonymously and use biometric authentication devices to protect my data? Copyright 2015 Pearson Education, Inc. 84 Copyright 2015 Pearson Education, Inc. 85 8. How do I manage online annoyances such as spyware and spam? 9. What data do I need to back up, and what are the best methods for doing so? Copyright 2015 Pearson Education, Inc. 86 Copyright 2015 Pearson Education, Inc. 87 10. What is social engineering, and how do I avoid falling prey to phishing? 11. How do I protect my physical computing assets from environmental hazards, power surges, and theft? Copyright 2015 Pearson Education, Inc. 88 Copyright 2015 Pearson Education, Inc. 89 15

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright 2015 Pearson Education, Inc. 16