PowerPoint Presentation to Accompany Chapter 10 Security and

PowerPoint Presentation to Accompany Chapter 10 Security and

PowerPoint Presentation to Accompany Chapter 10 Security and Privacy Objectives 1. Recognize Different Types of Cybercrime 2. Differentiate between Various Types of Malware 3. Explain How to Secure a Computer 4. Practice Safe Computing 5. Discuss Laws Related to Computer Security and Privacy Copyright 2017 Pearson Education, Inc.

2 Recognize Different Types of Cybercrime Objective 1 Copyright 2017 Pearson Education, Inc. 3 Cybercrime: They Are Out to Get You Personal Cybercrime Harassment Cyberbullying: between two minors

Cyber-harassment: between adults Cyber-stalking: More serious in nature Stalker demonstrates a pattern of harassment Poses a credible threat of harm Objective 1 Copyright 2017 Pearson Education, Inc. 4 Cybercrime: They Are Out to Get You Personal Cybercrime Phishing

Email messages and IMs Appears to be from someone with whom you do business Designed to trick you into providing usernames and passwords Pharming Redirects you to a phony website even if you type the URL Hijacks a companys domain name Objective 1 Copyright 2017 Pearson Education, Inc. 5

Cybercrime: They Are Out to Get You Social Network Attacks Adware and other malware Suspicious emails and notifications Appear to be from a site administrator Asking for your password Threatening to suspend your account Phishing and "Please send money" scams Objective 1 Copyright 2017 Pearson Education, Inc. 6

Cybercrime: They Are Out to Get You Social Network Attacks Clickjacking Clicking on a link allows this malware to post unwanted links on your page Malicious script scams Copy and paste some text into your address bar It might execute a malicious script Creates pages and events Sends spam out to your friends Objective 1

Copyright 2017 Pearson Education, Inc. 7 Cybercrime: They Are Out to Get You Social Network Attacks Fraud Schemes that convince you to give money or property to a person Shill bidding is fake bidding to drive up the price of an item Objective 1 Copyright 2017 Pearson Education, Inc. 8

Cybercrime: They Are Out to Get You Social Network Attacks Identity theft The use of your name, Social Security number, bank, or credit cards for financial gain Keyloggers Programs or devices that capture what is typed Objective 1 Copyright 2017 Pearson Education, Inc. 9

Cybercrime: They Are Out to Get You Cybercrime Against Organizations Hacking White-hat or sneakers Attempt to find security holes in a system to prevent future hacking Black-hat or cracker Malicious intent Gray-hat Illegal but not malicious intent Objective 1

Copyright 2017 Pearson Education, Inc. 10 Cybercrime: They Are Out to Get You Cybercrime Against Organizations Hacktivism Hacking to make a political statement Data breach Sensitive data is stolen or viewed by someone not authorized Cyber-terrorism

Objective 1 Copyright 2017 Pearson Education, Inc. 11 Differentiate between Various Types of Malware Objective 2 Copyright 2017 Pearson Education, Inc. 12 Malware: Pick Your Poison

Spam and Cookies Includes different types of programs designed to be harmful or malicious Spam Adware and spyware Viruses Worms Trojan horses Rootkits Objective 2 Copyright 2017 Pearson Education, Inc. 13

Malware: Pick Your Poison Spam and Cookies Spam Spamming is sending mass unsolicited emails Messages are called spam Other forms: Fax spam IM spam Text spam Objective 2 Copyright 2017 Pearson Education, Inc. 14

Malware: Pick Your Poison Spam and Cookies Cookies Installed without your permission Help websites identify you when you return Track websites and pages you visit to better target ads May collect information you dont want to share Objective 2

Copyright 2017 Pearson Education, Inc. 15 Malware: Pick Your Poison Adware and Spyware Adware Pop-ups or banner ads Generate income Use CPU cycles and Internet bandwidth Reduce PC performance Objective 2 Copyright 2017 Pearson Education, Inc.

16 Malware: Pick Your Poison Adware and Spyware Spyware Malware Secretly gathers personal information Usually installed by accident Browser hijacker Objective 2 Copyright 2017 Pearson Education, Inc.

17 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Virus - A program that replicates itself and infects computers Needs a host file May use an email program to infect other computers The attack is called the payload Check to see if message is a hoax Objective 2 Copyright 2017 Pearson Education, Inc.

18 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Logic Bomb Behaves like a virus Performs malicious act Does not replicate Attacks when certain conditions are met Time Bomb A logic bomb with a trigger that is a specific time or date April Fools Day Friday the 13th

Objective 2 Copyright 2017 Pearson Education, Inc. 19 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Worms Self-replicating Do not need a host to travel Travel over networks to infect other machines Conficker worm First released in 2008 Reemerged in 2010 with new behaviors

Objective 2 Copyright 2017 Pearson Education, Inc. 20 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Botnet Network of computer zombies or bots controlled by a master Fake security notifications Denial-of-service attacks Cripples a server or network by sending out excessive traffic

Trojan horse Appears to be legitimate program Actually malicious Might install adware, toolbar, keylogger, or open a backdoor Objective 2 Copyright 2017 Pearson Education, Inc. 21 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Ransomware Malware that prevents you from using your computer until you pay a fine or fee

Bitcoin is an anonymous, digital, encrypted currency Rootkit Set of programs Allows someone to gain control over system Hides the fact that the computer has been compromised Nearly impossible to detect Masks behavior of other malware Objective 2 Copyright 2017 Pearson Education, Inc. 22 Explain How to Secure a Computer

Objective 3 Copyright 2017 Pearson Education, Inc. 23 Shields Up Software Drive-by download A visited website installs a program in the background without your knowledge Firewall Hardware device that blocks access to your network

Software that blocks access to an individual machine Objective 3 Copyright 2017 Pearson Education, Inc. 24 Shields Up Software Antivirus program Protects against viruses, Trojans, worms, spyware Windows 8 includes Windows Defender An antispyware program that performs both real-time protection

and system scanning Antispyware software Prevents adware and spyware from installing Security suite Package of security software Combination of features Objective 3 Copyright 2017 Pearson Education, Inc. 25 Shields Up

Hardware Router Connects two or more networks together Home router acts like firewall Network address translation (NAT) Security feature of a router Shields devices on private network from public network SSID (Service Set Identifier) Wireless network name Wireless encryption Adds security by encrypting transmitted data Wi-Fi Protected Setup (WPS) is one option

Objective 3 Copyright 2017 Pearson Education, Inc. 26 Shields Up Operating System Most important piece of security software Keep patched and up-to-date Objective 3

Copyright 2017 Pearson Education, Inc. 27 Practice Safe Computing Objective 4 Copyright 2017 Pearson Education, Inc. 28 An Ounce of Prevention is Worth a Pound of Cure User Accounts

Three user account types: Standard Administrator Guest User Account Control (UAC) notifies you prior to changes made to your computer Do not turn this feature off Always read message before clicking Yes Malware tricks users into clicking fake Windows notifications Objective 4

Copyright 2017 Pearson Education, Inc. 29 An Ounce of Prevention is Worth a Pound of Cure Passwords Objective 4 Copyright 2017 Pearson Education, Inc. 30 An Ounce of Prevention is Worth a Pound of

Cure Encryption Converts plain text into ciphertext Must have a key to decrypt it Objective 4 Copyright 2017 Pearson Education, Inc. 31

An Ounce of Prevention is Worth a Pound of Cure Safely Installing Software Copies files to the computer Alters settings Objective 4 Copyright 2017 Pearson Education, Inc. 32 An Ounce of Prevention is Worth a Pound of Cure

Updating and Installing Software Protect yourself from downloading problems Only download from reliable sources Zero-day exploit Attack that occurs on the day an exploit is discovered before the publisher can fix it Bugs Flaws in the programming of software Patch or hotfix Service pack Objective 4

Copyright 2017 Pearson Education, Inc. 33 An Ounce of Prevention is Worth a Pound of Cure Acceptable Use Policies (AUP) Common in businesses and schools Rules for computer and network users Depend on: Type of business Type of information Force users to

practice safe computing Objective 4 Copyright 2017 Pearson Education, Inc. 34 Discuss Laws Related to Computer Security and Privacy Objective 5 Copyright 2017 Pearson Education, Inc.

35 The Law is on Your Side The Enforcers No single authority responsible for investigating cybercrime Internet Crime Complaint Center (IC3) Place for victims to report cybercrimes ic3.gov Reports processed and forwarded to appropriate agency Objective 5

Copyright 2017 Pearson Education, Inc. 36 The Law is on Your Side Current Laws Computer Fraud and Abuse Act Makes it a crime to access classified information Passed in 1986; amendments between 1988 and 2002 added additional cybercrimes USA Patriot Antiterrorism Legislation (2001) Cyber Security Enhancement Act (2002) Provisions for fighting cybercrime

Convention on Cybercrime Treaty Drafted by Council of Europe Signed by more than 40 countries Objective 5 Copyright 2017 Pearson Education, Inc. 37 Questions Copyright 2017 Pearson Education, Inc. 38

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright 2017 Pearson Education, Inc. 39

Recently Viewed Presentations

  • Invasive Species - cgcsd.org

    Invasive Species - cgcsd.org

    An invasive species is a plant, fungus, or animal species that is not native to a specific location (an introduced species), and which has a tendency to spread to a degree believed to cause damage to the environment, human economy...
  • MS Ignite 101

    MS Ignite 101

    Andy's Top 10 Ignite Tips. Don't try and catch every Breakout session (They're Recorded) Don't be Late to Sessions! Please remember, your feedback helps make the event better. Solve Problems by chatting to the MS Boothbabes. Get Certified & Save...
  • Nat Turner - 1831 Nat Turner Why was

    Nat Turner - 1831 Nat Turner Why was

    Nickname given to the fighting between pro-slavery and anti-slavery settlers in Kansas that resulted in many deaths. ... Southern Uniforms were Gray. Flags were variations of the rebel flag. Weapons Used in the Civil War. Weapons Used in the Civil...
  • Mktg_Kickoff_Commercial_Launch_Plan_Tmpl

    Mktg_Kickoff_Commercial_Launch_Plan_Tmpl

    Mktg QualLds Needed. 364. Template Explanation: To communicate at an executive level the state of the launch. This is a high-level overview with critical milestones and call outs to risks that our leadership team should know about.
  • An Experiential "Look" at Streets and Spaces: ADA from a ...

    An Experiential "Look" at Streets and Spaces: ADA from a ...

    An Experiential "Look" at Streets and Spaces: ADA from a Blind Pedestrian's Perspective. Christopher Meyer. ... Christopher is passionate about empowering blind and visually impaired people like himself to become more mobile and independent. He uses 3-dimensional printing to design...
  • Regular and Effective Contact - ASCCC

    Regular and Effective Contact - ASCCC

    REGULAR AND EFFECTIVE CONTACT Dolores Davison, Foothill College Michael Heumann, Imperial Valley College Michelle Grimes-Hillman, Mt. San Antonio College Hybrid A blend of online and traditional instruction Web Enhanced Online activities are included as part of a traditional class. No...
  • Title Of Presentation

    Title Of Presentation

    Template: Mary Feil-Jacobs (maryjf), Heather Tall, Slidework LLC, Claire Hoover, Silverfox Productions Formatting: Event Date: June 2-6, 2008 Event Location: Orlando ...
  • Diaporama 'AEP' - UNECE

    Diaporama 'AEP' - UNECE

    Impact pour le service parfois plusieurs % (de 0,5 à 5%) Dépend de la structure des abonnés, Mise en place de prêts relais, etc.. Dérive possible : de l'économiquement faible …au mauvais payeur (voire fraudeur) Provisions pour créances douteuses.