Podcast
Questions and Answers
What is the purpose of InPrivate browsing in MS Edge?
What is the purpose of InPrivate browsing in MS Edge?
What is a common characteristic of unwanted pop-ups?
What is a common characteristic of unwanted pop-ups?
How can the SmartScreen Filter in MS Edge help users?
How can the SmartScreen Filter in MS Edge help users?
To enable ActiveX filtering in web browsers, what should users be cautious about?
To enable ActiveX filtering in web browsers, what should users be cautious about?
Signup and view all the answers
Which menu option allows you to access the Clear browsing data feature in MS Edge?
Which menu option allows you to access the Clear browsing data feature in MS Edge?
Signup and view all the answers
What is a primary function of pop-up blockers in web browsers?
What is a primary function of pop-up blockers in web browsers?
Signup and view all the answers
What must be selected to open an InPrivate window in MS Edge?
What must be selected to open an InPrivate window in MS Edge?
Signup and view all the answers
Which feature in Microsoft Edge specifically detects phishing websites?
Which feature in Microsoft Edge specifically detects phishing websites?
Signup and view all the answers
What happens to cookies and files after ending an InPrivate browsing session?
What happens to cookies and files after ending an InPrivate browsing session?
Signup and view all the answers
What is the main purpose of enabling ActiveX filtering in Internet Explorer 11?
What is the main purpose of enabling ActiveX filtering in Internet Explorer 11?
Signup and view all the answers
What action is recommended to enhance security in AutoPlay settings?
What action is recommended to enhance security in AutoPlay settings?
Signup and view all the answers
What is the main difference between AutoRun and AutoPlay?
What is the main difference between AutoRun and AutoPlay?
Signup and view all the answers
How can you disable AutoPlay on a Windows system?
How can you disable AutoPlay on a Windows system?
Signup and view all the answers
What does a service pack usually contain?
What does a service pack usually contain?
Signup and view all the answers
What happens when ActiveX filtering is turned on for a website?
What happens when ActiveX filtering is turned on for a website?
Signup and view all the answers
What is the key reason for applying security patches and OS updates?
What is the key reason for applying security patches and OS updates?
Signup and view all the answers
What is the primary function of email filters?
What is the primary function of email filters?
Signup and view all the answers
Which action is NOT recommended when encountering a suspicious warning window?
Which action is NOT recommended when encountering a suspicious warning window?
Signup and view all the answers
What method do Linux users use to prevent installation of untrusted software?
What method do Linux users use to prevent installation of untrusted software?
Signup and view all the answers
What is a potential risk of installing software from untrusted sources?
What is a potential risk of installing software from untrusted sources?
Signup and view all the answers
What is the role of User Account Control (UAC) in preventing malware installation on Windows?
What is the role of User Account Control (UAC) in preventing malware installation on Windows?
Signup and view all the answers
Which feature helps users detect rogue antivirus products while browsing?
Which feature helps users detect rogue antivirus products while browsing?
Signup and view all the answers
Which mobile OS model helps prevent the installation of untrusted software?
Which mobile OS model helps prevent the installation of untrusted software?
Signup and view all the answers
What regular action is necessary to ensure anti-malware software remains effective?
What regular action is necessary to ensure anti-malware software remains effective?
Signup and view all the answers
What should users do if a suspicious tab or warning does not close normally?
What should users do if a suspicious tab or warning does not close normally?
Signup and view all the answers
Study Notes
Chapter 13: Security
- Attacks threaten computer security and data, including physical equipment (servers, switches, wiring) and data (access, theft, loss).
- Malware is a significant threat, encompassing viruses, Trojans, adware, ransomware, rootkits, spyware, and worms.
- Common attacks include TCP/IP attacks (DoS, spoofing, syn flood, man-in-the-middle), and social engineering (phishing, pretexting, baiting, dumpster diving).
- Security policy defines the objectives for protecting network, data, and computers within an organization. It specifies authorized users, password requirements, and acceptable network usage, along with incident response procedures for remote users.
- Host-based firewalls, like Windows Defender, manage access to programs and ports.
- Wireless security configuration is critical for protecting networks.
- Troubleshooting security problems involves six documented steps.
- Malware is malicious software designed by cybercriminals to disrupt systems and networks.
- Malware is typically installed secretly and, once active, can modify computer settings, delete files, and corrupt hard drives.
Malware Types
- Viruses: Self-replicating programs that attach to code, software, or documents. They can alter files, corrupt applications, and send sensitive information.
- Trojan Horses: Disguised as legitimate software, they give attackers unauthorized access to a system.
- Adware: Software that displays advertisements.
- Ransomware: Software that encrypts files and demands a ransom for decryption keys.
- Rootkit: A specialized type of software that gives the perpetrator administrator account-level access.
- Spyware: Software that gathers information without user consent.
- Worms: Self-replicating programs that use network vulnerabilities to spread. Attackers may use these programs to slow or disrupt network operations.
How Malware Infects
- Users visiting infected websites
- Outdated antivirus software
- Vulnerable web browsers
- Downloading "free" programs
- Opening unsolicited email
- Exchanging files on file-sharing sites
- Infected computers sharing files
- USB devices found in public areas
- Opening attachments from instant messaging or social media
- Non-compliant systems (lacking updates and security software) are particularly susceptible.
Malware Removal
- Identify and research symptoms.
- Quarantine infected systems.
- Disable system restore in Windows.
- Remediate infected systems.
- Run scheduled scans and updates.
- Enable System Restore and create restore points.
- Educate the end user.
Anti-Malware Programs
- Anti-malware programs (antivirus) continuously scan for known malware signatures and behaviors.
- Anti-malware programs should be up to date to provide the latest protection against the newest viruses
- Using several anti-malware packages in combination slows down the computer.
- Anti-malware programs may automatically quarantine or delete detected threats, or prompt the user.
Protecting Against Social Engineering
- Train users to recognize social engineering tactics (phishing, pretexting, baiting, dumpster diving).
- Implement a security policy outlining acceptable use, password rules, and response to security incidents.
- Install firewalls and security software.
- Use strong passwords.
- Lock or sign out of computers when unattended.
Physical Security
- Secure entrances and restricted areas to prevent tailgating, and shoulder surfing.
- Use security systems like mantraps to limit entry points.
- Secure network equipment to prevent tampering and theft.
- Limit access to sensitive data.
Data Protection
- Backups are important because of potential security issues and data loss.
- Security for backup data is important.
- Implement encryption, access controls, and secure storage for backup data.
- Regularly validate backups to ensure accuracy and usability.
Common Security Policies
- Acceptable Use Policies: Define acceptable network resource uses.
- Remote Access Policies: Specify how remote users can access the network.
- Network Maintenance Policies: Outline procedures for network device management.
- Incident Handling Policies: Outline security response actions upon incident discovery.
- Identification & Authentication Policies: Identify authorized users with outlined verification procedures.
- Password Policies: Enforce password length, complexity, and regular changes.
Wireless Security
- Secure Wi-Fi networks using strong passwords.
- Change default passwords for networks.
- Do not broadcast the Wi-Fi network name.
System Configurations
- Review Windows Firewall settings.
- Configure security policies in Windows.
- Use the Windows Firewall with Advanced Security tool as necessary.
Cryptography
- Hash encoding verifies message integrity.
- Asymmetric encryption relies on two keys, with public key available.
- Symmetric encryption uses a single key.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the various threats to computer security, including malware and common attack methods such as TCP/IP attacks and social engineering tactics. This chapter also outlines the importance of security policies and troubleshooting steps necessary for protecting networks and data. Dive into the critical measures needed to ensure wireless security configurations are in place.