PowerPoint Presentation to Accompany Chapter 10 Security and

PowerPoint Presentation to Accompany Chapter 10 Security and

PowerPoint Presentation to Accompany Chapter 10 Security and Privacy Objectives 1. Recognize Different Types of Cybercrime 2. Differentiate between Various Types of Malware 3. Explain How to Secure a Computer 4. Practice Safe Computing 5. Discuss Laws Related to Computer Security and Privacy Copyright 2017 Pearson Education, Inc.

2 Recognize Different Types of Cybercrime Objective 1 Copyright 2017 Pearson Education, Inc. 3 Cybercrime: They Are Out to Get You Personal Cybercrime Harassment Cyberbullying: between two minors

Cyber-harassment: between adults Cyber-stalking: More serious in nature Stalker demonstrates a pattern of harassment Poses a credible threat of harm Objective 1 Copyright 2017 Pearson Education, Inc. 4 Cybercrime: They Are Out to Get You Personal Cybercrime Phishing

Email messages and IMs Appears to be from someone with whom you do business Designed to trick you into providing usernames and passwords Pharming Redirects you to a phony website even if you type the URL Hijacks a companys domain name Objective 1 Copyright 2017 Pearson Education, Inc. 5

Cybercrime: They Are Out to Get You Social Network Attacks Adware and other malware Suspicious emails and notifications Appear to be from a site administrator Asking for your password Threatening to suspend your account Phishing and "Please send money" scams Objective 1 Copyright 2017 Pearson Education, Inc. 6

Cybercrime: They Are Out to Get You Social Network Attacks Clickjacking Clicking on a link allows this malware to post unwanted links on your page Malicious script scams Copy and paste some text into your address bar It might execute a malicious script Creates pages and events Sends spam out to your friends Objective 1

Copyright 2017 Pearson Education, Inc. 7 Cybercrime: They Are Out to Get You Social Network Attacks Fraud Schemes that convince you to give money or property to a person Shill bidding is fake bidding to drive up the price of an item Objective 1 Copyright 2017 Pearson Education, Inc. 8

Cybercrime: They Are Out to Get You Social Network Attacks Identity theft The use of your name, Social Security number, bank, or credit cards for financial gain Keyloggers Programs or devices that capture what is typed Objective 1 Copyright 2017 Pearson Education, Inc. 9

Cybercrime: They Are Out to Get You Cybercrime Against Organizations Hacking White-hat or sneakers Attempt to find security holes in a system to prevent future hacking Black-hat or cracker Malicious intent Gray-hat Illegal but not malicious intent Objective 1

Copyright 2017 Pearson Education, Inc. 10 Cybercrime: They Are Out to Get You Cybercrime Against Organizations Hacktivism Hacking to make a political statement Data breach Sensitive data is stolen or viewed by someone not authorized Cyber-terrorism

Objective 1 Copyright 2017 Pearson Education, Inc. 11 Differentiate between Various Types of Malware Objective 2 Copyright 2017 Pearson Education, Inc. 12 Malware: Pick Your Poison

Spam and Cookies Includes different types of programs designed to be harmful or malicious Spam Adware and spyware Viruses Worms Trojan horses Rootkits Objective 2 Copyright 2017 Pearson Education, Inc. 13

Malware: Pick Your Poison Spam and Cookies Spam Spamming is sending mass unsolicited emails Messages are called spam Other forms: Fax spam IM spam Text spam Objective 2 Copyright 2017 Pearson Education, Inc. 14

Malware: Pick Your Poison Spam and Cookies Cookies Installed without your permission Help websites identify you when you return Track websites and pages you visit to better target ads May collect information you dont want to share Objective 2

Copyright 2017 Pearson Education, Inc. 15 Malware: Pick Your Poison Adware and Spyware Adware Pop-ups or banner ads Generate income Use CPU cycles and Internet bandwidth Reduce PC performance Objective 2 Copyright 2017 Pearson Education, Inc.

16 Malware: Pick Your Poison Adware and Spyware Spyware Malware Secretly gathers personal information Usually installed by accident Browser hijacker Objective 2 Copyright 2017 Pearson Education, Inc.

17 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Virus - A program that replicates itself and infects computers Needs a host file May use an email program to infect other computers The attack is called the payload Check to see if message is a hoax Objective 2 Copyright 2017 Pearson Education, Inc.

18 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Logic Bomb Behaves like a virus Performs malicious act Does not replicate Attacks when certain conditions are met Time Bomb A logic bomb with a trigger that is a specific time or date April Fools Day Friday the 13th

Objective 2 Copyright 2017 Pearson Education, Inc. 19 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Worms Self-replicating Do not need a host to travel Travel over networks to infect other machines Conficker worm First released in 2008 Reemerged in 2010 with new behaviors

Objective 2 Copyright 2017 Pearson Education, Inc. 20 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Botnet Network of computer zombies or bots controlled by a master Fake security notifications Denial-of-service attacks Cripples a server or network by sending out excessive traffic

Trojan horse Appears to be legitimate program Actually malicious Might install adware, toolbar, keylogger, or open a backdoor Objective 2 Copyright 2017 Pearson Education, Inc. 21 Malware: Pick Your Poison Viruses, Worms, Trojans, and Rootkits Ransomware Malware that prevents you from using your computer until you pay a fine or fee

Bitcoin is an anonymous, digital, encrypted currency Rootkit Set of programs Allows someone to gain control over system Hides the fact that the computer has been compromised Nearly impossible to detect Masks behavior of other malware Objective 2 Copyright 2017 Pearson Education, Inc. 22 Explain How to Secure a Computer

Objective 3 Copyright 2017 Pearson Education, Inc. 23 Shields Up Software Drive-by download A visited website installs a program in the background without your knowledge Firewall Hardware device that blocks access to your network

Software that blocks access to an individual machine Objective 3 Copyright 2017 Pearson Education, Inc. 24 Shields Up Software Antivirus program Protects against viruses, Trojans, worms, spyware Windows 8 includes Windows Defender An antispyware program that performs both real-time protection

and system scanning Antispyware software Prevents adware and spyware from installing Security suite Package of security software Combination of features Objective 3 Copyright 2017 Pearson Education, Inc. 25 Shields Up

Hardware Router Connects two or more networks together Home router acts like firewall Network address translation (NAT) Security feature of a router Shields devices on private network from public network SSID (Service Set Identifier) Wireless network name Wireless encryption Adds security by encrypting transmitted data Wi-Fi Protected Setup (WPS) is one option

Objective 3 Copyright 2017 Pearson Education, Inc. 26 Shields Up Operating System Most important piece of security software Keep patched and up-to-date Objective 3

Copyright 2017 Pearson Education, Inc. 27 Practice Safe Computing Objective 4 Copyright 2017 Pearson Education, Inc. 28 An Ounce of Prevention is Worth a Pound of Cure User Accounts

Three user account types: Standard Administrator Guest User Account Control (UAC) notifies you prior to changes made to your computer Do not turn this feature off Always read message before clicking Yes Malware tricks users into clicking fake Windows notifications Objective 4

Copyright 2017 Pearson Education, Inc. 29 An Ounce of Prevention is Worth a Pound of Cure Passwords Objective 4 Copyright 2017 Pearson Education, Inc. 30 An Ounce of Prevention is Worth a Pound of

Cure Encryption Converts plain text into ciphertext Must have a key to decrypt it Objective 4 Copyright 2017 Pearson Education, Inc. 31

An Ounce of Prevention is Worth a Pound of Cure Safely Installing Software Copies files to the computer Alters settings Objective 4 Copyright 2017 Pearson Education, Inc. 32 An Ounce of Prevention is Worth a Pound of Cure

Updating and Installing Software Protect yourself from downloading problems Only download from reliable sources Zero-day exploit Attack that occurs on the day an exploit is discovered before the publisher can fix it Bugs Flaws in the programming of software Patch or hotfix Service pack Objective 4

Copyright 2017 Pearson Education, Inc. 33 An Ounce of Prevention is Worth a Pound of Cure Acceptable Use Policies (AUP) Common in businesses and schools Rules for computer and network users Depend on: Type of business Type of information Force users to

practice safe computing Objective 4 Copyright 2017 Pearson Education, Inc. 34 Discuss Laws Related to Computer Security and Privacy Objective 5 Copyright 2017 Pearson Education, Inc.

35 The Law is on Your Side The Enforcers No single authority responsible for investigating cybercrime Internet Crime Complaint Center (IC3) Place for victims to report cybercrimes ic3.gov Reports processed and forwarded to appropriate agency Objective 5

Copyright 2017 Pearson Education, Inc. 36 The Law is on Your Side Current Laws Computer Fraud and Abuse Act Makes it a crime to access classified information Passed in 1986; amendments between 1988 and 2002 added additional cybercrimes USA Patriot Antiterrorism Legislation (2001) Cyber Security Enhancement Act (2002) Provisions for fighting cybercrime

Convention on Cybercrime Treaty Drafted by Council of Europe Signed by more than 40 countries Objective 5 Copyright 2017 Pearson Education, Inc. 37 Questions Copyright 2017 Pearson Education, Inc. 38

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright 2017 Pearson Education, Inc. 39

Recently Viewed Presentations

  • Diapositive 1 - University of Adelaide

    Diapositive 1 - University of Adelaide

    Workshop in Honour of Tony Thomas's 60th Birthday Adelaide, February 2010 G. Chanfray, IPN Lyon, IN2P3/CNRS, Université Lyon 1 M. Ericson, IPN Lyon, IN2P3/CNRS, Université Lyon 1 and Theory division, CERN Scalar response of the nucleon, Chiral symmetry and nuclear...
  • Protecting your clients/clients information James Partridge CEO and

    Protecting your clients/clients information James Partridge CEO and

    1997 Caldicott Report. The Caldicott Guardian. Follow the Caldicott Principles to ensure Patient/Client Confidentiality. Justify the purpose of disclosing confidential information. Only disclose it when absolutely necessary. Use the minimum info required.
  • Negative Campaigns - Western Washington University

    Negative Campaigns - Western Washington University

    Negative Campaigns Recent examples McCain 2008 Obama 2008 Negative Campaigns What lessons Some on winning side, some on losing side Potential to define a candidate Goldwater, Dukakis, Kerry Potential to de-mobilize (this may be goal) Potential for blowback Clinton '08...
  • Miss Cooks Class Iowa Park High School 2018

    Miss Cooks Class Iowa Park High School 2018

    Students will be taught to properly cite sources and should confer with the teacher about any uncertainty. Making a note of sites that were used does not mean things can be copied word for word off the internet. A student...
  • Diapositiva 1

    Diapositiva 1

    No progression on induction chemotherapy - What are differences in role of LCT between oligometastases vs. oligorecurrence vs. oligoprogression vs. oligoresidual? Treatment Regimens. Broad range of induction regimens - What is effect of LCT in specific patient cohorts or regimens?...
  • "Credit Frictions and Optimal Monetary Policy" by Vasco ...

    "Credit Frictions and Optimal Monetary Policy" by Vasco ...

    "Credit Frictions and Optimal Monetary Policy" by Vasco Cúrdia and Michael Woodford Discussion by Miles Kimball May 28, 2008 Bank of Japan Conference Six Conclusions of the Paper Financial frictions and financial shocks can be assimilated smoothly into the Basic...
  • Schema Summarization cong Yu Department of EECS University

    Schema Summarization cong Yu Department of EECS University

    Example :ER Schema Example: Hierarchical and Relational schema Introduction Consider both schema structure and data distribution define a schema summary. introduce summary importance and summary coverage as desirable properties for a good schema summary. develop algorithms to automatically generate schema...
  • 02/23/2020 HCF, LCM, product of prime factors L.O.

    02/23/2020 HCF, LCM, product of prime factors L.O.

    Using the product of prime factors and a VENN diagram. You can also put your products of prime factors in a Venn diagram, and use that to help you to calculate the HCF and LCM… HCF - multiply only the...