Podcast
Questions and Answers
What is the Internet?
What is the Internet?
A global network that allows devices connected to it to exchange information.
What are the two main Internet tools?
What are the two main Internet tools?
World Wide Web and email
What does WWW stand for?
What does WWW stand for?
What is HTML?
What is HTML?
Signup and view all the answers
HTTP is a secure protocol.
HTTP is a secure protocol.
Signup and view all the answers
The World Wide Web is a transfer-and-store process.
The World Wide Web is a transfer-and-store process.
Signup and view all the answers
Who developed the first email?
Who developed the first email?
Signup and view all the answers
Approximately how many emails are sent per day?
Approximately how many emails are sent per day?
Signup and view all the answers
Only 15% of emails sent daily are legitimate.
Only 15% of emails sent daily are legitimate.
Signup and view all the answers
What are the two TCP/IP protocols that an earlier email system uses?
What are the two TCP/IP protocols that an earlier email system uses?
Signup and view all the answers
Email remains on the email server and is not downloaded to the user's computer when using IMAP.
Email remains on the email server and is not downloaded to the user's computer when using IMAP.
Signup and view all the answers
Information is added to the email header as it is transferred from one MTA to another.
Information is added to the email header as it is transferred from one MTA to another.
Signup and view all the answers
What are documents attached to an email message called?
What are documents attached to an email message called?
Signup and view all the answers
What are the three major categories of Internet security risks?
What are the three major categories of Internet security risks?
Signup and view all the answers
In the early days of the web, users viewed static content.
In the early days of the web, users viewed static content.
Signup and view all the answers
Dynamic content changes over time.
Dynamic content changes over time.
Signup and view all the answers
What is the primary way dynamic content is created?
What is the primary way dynamic content is created?
Signup and view all the answers
Name two popular scripting languages.
Name two popular scripting languages.
Signup and view all the answers
A website that uses JavaScript automatically downloads the code onto the user's computer.
A website that uses JavaScript automatically downloads the code onto the user's computer.
Signup and view all the answers
An extension is a type of scripting code.
An extension is a type of scripting code.
Signup and view all the answers
Extensions generally have wider access privileges than JavaScript running in a webpage.
Extensions generally have wider access privileges than JavaScript running in a webpage.
Signup and view all the answers
Browser-dependent extensions work across different browsers.
Browser-dependent extensions work across different browsers.
Signup and view all the answers
Why are extensions attractive to attackers?
Why are extensions attractive to attackers?
Signup and view all the answers
Plug-ins were a popular way to add functionality to web browsers.
Plug-ins were a popular way to add functionality to web browsers.
Signup and view all the answers
Web browsers are now designed to support automatic plug-ins.
Web browsers are now designed to support automatic plug-ins.
Signup and view all the answers
Which of these is NOT a major email risk?
Which of these is NOT a major email risk?
Signup and view all the answers
Macros are often delivered through Microsoft Office files.
Macros are often delivered through Microsoft Office files.
Signup and view all the answers
Microsoft reports that 98% of Office-targeted threats are macro-based.
Microsoft reports that 98% of Office-targeted threats are macro-based.
Signup and view all the answers
Redirection from a malicious hyperlink is difficult to accomplish.
Redirection from a malicious hyperlink is difficult to accomplish.
Signup and view all the answers
Spam is considered a serious threat because it can be used to distribute malware.
Spam is considered a serious threat because it can be used to distribute malware.
Signup and view all the answers
Image spam uses text instead of images.
Image spam uses text instead of images.
Signup and view all the answers
What is malvertising?
What is malvertising?
Signup and view all the answers
Websites usually know when malware is being distributed through their ads.
Websites usually know when malware is being distributed through their ads.
Signup and view all the answers
What is a drive-by download?
What is a drive-by download?
Signup and view all the answers
Drive-by downloads rely on the user interacting with the website.
Drive-by downloads rely on the user interacting with the website.
Signup and view all the answers
The injected content is usually visible to the naked eye.
The injected content is usually visible to the naked eye.
Signup and view all the answers
How can attackers exploit websites that create dynamic content?
How can attackers exploit websites that create dynamic content?
Signup and view all the answers
Sanitizing user input can prevent XSS attacks.
Sanitizing user input can prevent XSS attacks.
Signup and view all the answers
CSRF attacks rely on a user submitting a request to a website they are not logged into.
CSRF attacks rely on a user submitting a request to a website they are not logged into.
Signup and view all the answers
CSRF attacks can be used to transfer funds.
CSRF attacks can be used to transfer funds.
Signup and view all the answers
Man-in-the-middle attacks are a form of network interception.
Man-in-the-middle attacks are a form of network interception.
Signup and view all the answers
Neither party involved in a MITM attack knows that a third party is involved.
Neither party involved in a MITM attack knows that a third party is involved.
Signup and view all the answers
What is the goal of a MITM attack?
What is the goal of a MITM attack?
Signup and view all the answers
A replay attack is a variation of a MITM attack.
A replay attack is a variation of a MITM attack.
Signup and view all the answers
Session replay is a simpler attack than replay attacks.
Session replay is a simpler attack than replay attacks.
Signup and view all the answers
A session ID changes with each visit to a website.
A session ID changes with each visit to a website.
Signup and view all the answers
Man-in-the-browser attacks intercept data between a browser and the computer it is running on.
Man-in-the-browser attacks intercept data between a browser and the computer it is running on.
Signup and view all the answers
MITB attacks typically start by installing Trojan malware on the computer.
MITB attacks typically start by installing Trojan malware on the computer.
Signup and view all the answers
MITB software resides exclusively within the web browser, making it difficult for anti-malware software to detect it.
MITB software resides exclusively within the web browser, making it difficult for anti-malware software to detect it.
Signup and view all the answers
The first step to defending against Internet-based attacks is to secure the device.
The first step to defending against Internet-based attacks is to secure the device.
Signup and view all the answers
HTTP uses secure cryptographic protocols to transfer data.
HTTP uses secure cryptographic protocols to transfer data.
Signup and view all the answers
Before installing a new browser extension, users should check to see if it is already available in the browser.
Before installing a new browser extension, users should check to see if it is already available in the browser.
Signup and view all the answers
Restricting attachments is an important email defense.
Restricting attachments is an important email defense.
Signup and view all the answers
Spam filters can be implemented at the user's computer or at the corporate level.
Spam filters can be implemented at the user's computer or at the corporate level.
Signup and view all the answers
A trusted document will open without a warning.
A trusted document will open without a warning.
Signup and view all the answers
Checking for unusual activity is a web email security consideration.
Checking for unusual activity is a web email security consideration.
Signup and view all the answers
JavaScript scripts are activated when reading messages in a reading pane.
JavaScript scripts are activated when reading messages in a reading pane.
Signup and view all the answers
Hyperlinks to images or sounds are considered a safe way to view content.
Hyperlinks to images or sounds are considered a safe way to view content.
Signup and view all the answers
Verifying general settings is a web email security consideration.
Verifying general settings is a web email security consideration.
Signup and view all the answers
Study Notes
Security Awareness, Module 4: Internet Security
- The Internet is a global network connecting devices for information exchange.
- It's an international computer network, not owned by any single entity.
- The World Wide Web (WWW) and email are the primary Internet tools.
Module Objectives
- Explain how the World Wide Web and email function.
- Identify risks associated with using a browser and email.
- Explain threats from web servers and transmissions.
- Describe securing a web browser.
- List email defenses.
How the Internet Works
- A global computer network allowing information exchange.
- Not owned by a single government or entity.
- Composed of interacting computer networks.
The World Wide Web (WWW)
- Better known as the web.
- Uses internet server computers to provide online information in a specific format (HTML).
- Hypertext Markup Language (HTML) combines text, images, audio, video, and hyperlinks to connect different parts of the web.
- HTML code forms web pages, which together make up a website.
The World Wide Web (1 of 5)
- Displays words, pictures, and other elements on a user's screen.
- Uses Hypertext Transport Protocol (HTTP) standards for server-client communication and data distribution.
- HTTP is part of Transmission Control Protocol/Internet Protocol (TCP/IP) standards. Data is sent to users' computers before being displayed by a browser.
The World Wide Web (2 of 5)
- Everyday online interactions involving websites, learning platforms, textbooks and digital tools.
The World Wide Web (3 of 5)
- HTML is interpreted by software on your device called a web browser.
- Includes web standards and protocols such as HTTP.
- The HTTP protocol transfers complete web documents to the user's computer in one piece, then the browser assembles them on the screen.
The World Wide Web (4 of 5)
- The WWW consists of computers that provide online information.
- The WWW works using specific standards so that devices can understand how to communicate.
The World Wide Web (5 of 5)
- Illustrated diagram showing the sequence of events in viewing a webpage.
- Includes steps from user input, request, transmission, and webpage display.
Email (1 of 6)
- The first email in 1971 by Ray Tomlinson.
- Over 400 billion emails are sent daily.
- Approximately 15% of emails are considered legitimate.
- Email communications involve two basic components:
- Mail User Agent (MUA)
- Software used to send and receive emails from devices like Outlook or Gmail.
- Mail Transfer Agent (MTA)
- Software that receives email messages from senders and delivers them to the recipient
- Mail User Agent (MUA)
Email (2 of 6)
- Two email protocols are TCP/IP protocols: - Simple Mail Transfer Protocol (SMTP) for outgoing mail. - Post Office Protocol (POP or POP3) for incoming mail.
Email (3 of 6)
- Email exists in an email server
- A recent email systems is IMAP
- Email data remains in the email server
- Users can organize emails into folders from any device
Email (4 of 6)
- Shown an example of an email header.
- Includes details about mail routing and transmission.
Email (5 of 6)
- Email headers contain analysis of email by MTA.
- Email attachments are encoded in special formats during transmission and conversion. The receiving computer reformats the attachment to its original format.
Email (6 of 6)
- Table with abbreviations and categories associated with Microsoft Office 365 email analysis.
Internet Security Risks
- User device threats (browsers, email).
- Threats from web servers (malvertising, drive-by downloads, XSS, CSRF).
- Transmission risks (man-in-the-middle, session replay, man-in-the-browser).
User Device Threats (1 of 13)
- Web pages changed over the years
- In the early days, web pages showed the same content.
- Now pages can change (animations, customized info.)
User Device Threats (2 of 13)
- Dynamic web content requires specific programming tools.
- Scripting code (e.g., JavaScript, PowerShell) and extensions provide this function.
User Device Threats (3 of 13)
- JavaScript embedded in HTML documents.
- JavaScript interacts with the Document Object Model (DOM).
- Interaction with scripting languages can occur with web pages already on the computer.
- Malicious content can be downloaded.
- Malicious scripts can cause harm without user knowledge or approval.
User Device Threats (4 of 13)
- PowerShell, a task automation framework for operating systems, is used for many admin tasks.
- PowerShell provides full system access that can be used for malware attack.
User Device Threats (5 of 13)
- Extensions expand browser capabilities.
- Usually written in JavaScript
- Have wider access privileges
- Can be unsafe and used for attack
User Device Threats (6 of 13)
- Plug-ins were popular for custom features (music, videos).
- Almost all modern browsers do not support these automatically due to security risks.
User Device Threats (7 of 13)
- Email malicious attachments
- The attacks are spread via Microsoft Office files with a macro.
- The macro is part of the file that runs the malicious actions
User Device Threats (8 of 13)
- Email malicious attachments
- The attacks are spread via Microsoft Office files with a macro.
- The macro is part of the file that runs the malicious actions
User Device Threats (9 of 13)
- Macros are commonly written using Visual Basic for Applications (VBA) and are built into many Microsoft Office applications.
- VBA scripts can adjust toolbars, menus, and forms, and dialog boxes.
- It is the most common cause for Office malware.
User Device Threats (10 of 13)
- Embedded hyperlinks are used for shortcut navigation.
- Redirecting to malicious hyperlinks is done by embedding links.
- The embedded links can redirect to harmful locations.
User Device Threats (11 of 13)
- Example of an embedded hyperlink with details about the situation.
User Device Threats (12 of 13)
- Unsolicited email, called spam, occurs in huge volumes.
- Spam is mostly sent through networks of attacker bots.
- The attacks use spam to distribute malicious software.
- Spam filters use keywords and other methods to block spam. Modern methods include image spam which is difficult to detect.
User Device Threats (13 of 13)
- Image spam example
- Shows an example of an image spam message.
Threats from Web Servers (1 of 7)
- Web servers provide content but pose risks.
- Risks include malvertising, drive-by downloads, XSS, and CSRF.
Threats from Web Servers (2 of 7)
- Attackers use reputable websites (e.g., major news organization) for advertisements which can hide malware.
Threats from Web Servers (3 of 7)
- Drive-by downloads infect users' computers through websites.
- Malicious content is embedded into normal websites.
Threats from Web Servers (4 of 7)
- Cross-site scripting (XSS) is an attack which involves inserting script on a legitimate site that is sent to the user.
- Websites with user input must validate data correctly to stop XSS attacks.
Threats from Web Servers (5 of 7)
- Screenshot of a typical web form.
Threats from Web Servers (6 of 7)
- Cross-site request forgery (CSRF) attacks utilize user data to perform actions in a legitimate site without user knowledge.
Threats from Web Servers (7 of 7)
- Diagram demonstrating the stages of a CSRF attack where user data is stolen.
Transmission Risks (1 of 4)
- Attacks can intercept network communications involving multiple parties (e.g., user laptops and web servers).
- Attacks use session replay and man-in-the-middle (MITM) tools.
Transmission Risks (2 of 4)
- MITM attacks can eavesdrop or impersonate one party in a communication.
- Attackers position themselves in the middle of communication to intercept and steal data.
Transmission Risks (3 of 4)
- Session Replay involves copying and replaying valid communications later.
- Session replay attacks use session IDs to impersonate the user in a site.
Transmission Risks (4 of 4)
- Man-in-the-browser (MITB) attacks focus on computer browsers.
- The attacks can manipulate data between the browser and the computer.
Internet Defenses
- Protecting devices is crucial for defending against internet attacks
- Managing security settings and employing anti-malware programs is essential. Data backups are also important.
Securing the Web Browser (1 of 9)
- Modern web browsers offer security features for users.
- Security-related indicators, settings, and managing browser extensions provide protection.
Securing the Web Browser (2 of 9)
- Security indicators such as padlocks show that a connection is secure.
Securing the Web Browser (3 of 9)
- Legacy web browsers used a green padlock to indicate security.
- Modern browsers may show a warning indicator of insecure connections to the user.
Securing the Web Browser (4 of 9)
- Secure connections need to be verified.
- Be wary of sites that display warnings.
Securing the Web Browser (5 of 9)
- Important to note the different warnings to understand what they mean.
Securing the Web Browser (6 of 9)
- Security settings in browsers allow customizing settings.
- Recommended to be in the highest security mode.
Securing the Web Browser (7 of 9)
- Diagram demonstrating different security modes in Microsoft Edge.
Securing the Web Browser (8 of 9)
- Diagram showing the security mode indicator in Microsoft Edge
Securing the Web Browser (9 of 9)
- Managing extensions is crucial due to potential threat.
- Minimizing risks involves checking, avoiding unnecessary extensions, using reputable sources, and removing unused extensions.
Email Defenses (1 of 5)
- Email security involves configuring defenses for email protection.
- Restricting attachments, spam filtering, setting security options, and securing attachments.
Email Defenses (2 of 5)
- Attachments can be opened without downloading full versions.
- Preview attachments to reduce risk.
- Microsoft Office has security options to protect from attacks.
- Protected View blocks macros and editing functions which reduces risk.
Email Defenses (3 of 5)
- Email clients can be set up to block spam and block senders, either using a blacklist of known bad sources or a whitelist of known good sources.
- Top level domains and regions can also be blocked.
Email Defenses (4 of 5)
- Email security settings in clients can help prevent attacks.
- Reading messages through a reading panel avoids malicious scripts.
- Blocking external content is important
Email Defenses (5 of 5)
- Important to know about unusual activity in your email accounts.
- Keeping your email security settings up to date is important.
Knowledge Check Activity 4-1
- Two correct statements from the Knowledge Check Activity about JavaScript and Extensions.
Knowledge Check Activity 4-2
- Two correct statements from the Knowledge Check Activity- Device security and extensions check before installation.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.