Week 12: Protecting Digital Data & Devices PDF

Summary

This document discusses cybercrime, types of hackers, data travels through the internet in packets, and data security. It also covers identity theft, denial-of-service attacks, and computer viruses.

Full Transcript

Protecting Digital Data and Devices Cybercrime: Any criminal action perpetrated Hacker : Anyone who unlawfully breaks into primarily through the use a computer system of a computer - Programs damaging computers Types of hackers - Stealing identities onl...

Protecting Digital Data and Devices Cybercrime: Any criminal action perpetrated Hacker : Anyone who unlawfully breaks into primarily through the use a computer system of a computer - Programs damaging computers Types of hackers - Stealing identities online - White-hat or ethical hackers - break in to - Attacking corporate websites systems for nonmalicious reasons - Black-hat hackers - break into systems to Cybercriminals: Individuals who use destroy information or for illegal gain computers, networks, and the Internet to - Grey-hat hackers - break into systems perpetrate crime. merely to flaunt their expertise - Steal credit and debit card information Top categories of complaints from hard drives - FBI-related scams - Break into sites that contain credit card - Identity theft information - Nonauction/non-delivery of merchandise - Capture login ID and password using - Advance fee fraud packet analyzer or keylogger Complaints not related to fraud - Computer intrusions Data travels through the Internet in - Child pornography packets ; Identified with IP address - Blackmail Packet analyzer (sniffer): Program deployed by hackers that looks at each packet Once a hacker has your debit or credit card information they can start purchasing or sell the information to someone else Trojan Horses and Rootkits A Trojan horse appears to be useful but while it runs it does something malicious in background Rootkits are programs (or sets of programs) that allow hackers to gain Identity theft: Occurs when a thief steals access to your computer and take control personal information such as your name, without your knowledge address, Social Security number, birth date, A zombie is a computer controlled by a bank account, and credit card information and hacker runs up debt in your name Types of scams - Counterfeiting credit and debit cards - Requesting changes of address - Opening new credit cards - Obtaining medical services - Buying a home Denial-of-Service Attacks If a computer is exposed to an infected file, the virus will try to copy itself and infect a In a denial-of-service (DoS) attack, users are file on your computer denied access to a computer system because a hacker is making repeated requests Sources of virus infection When flooded with requests, the system Downloading infected audio and video files shuts down Shared flash drives Launches attacks from more than one Downloading or executing a file attached to zombie computer e-mail Botnet is a large group of software programs that runs autonomously on zombie computers Viruses can be grouped into six categories based on behavior and method of How computer gain computer access? transmission Direct access Installing hacking software Viruses can also be classified by methods they take to avoid detection Indirect access Polymorphic viruses Through Internet connection Periodically rewrite themselves to avoid Logical ports are virtual detection communications gateways or paths that Multipartite viruses allow a computer to organize requests for Infect multiple file types information Stealth viruses Erase their code from the hard drive Computer Viruses and reside in active memory A program that attaches itself to another computer program Attempts to spread to other computers when files are exchanged One of the most widespread types of cybercrimes Main purpose Replicate themselves and copy code to as many other files a possible Secondary objectives Slow down networks Display annoying messages Destroy files or contents of hard drive Online Annoyances and Social Engineering COOKIES Cookies: Small text files that some Spyware: An unwanted piggyback program websites automatically store on your hard that usually downloads with other software drive you install form the Internet and runs in Provide websites with information about the background your browsing habits Transmits information about you Cookies don't search for personal Use tracking cookies information Keystroke logger: Monitors keystrokes to Only collect personal information you steal passwords, login IDs, supply when filling out forms or credit card information Some sites sell the information cookies Anti-spyware software: Detects unwanted collect programs and allows you to delete them Cookies pose no security threat It's a good idea to install one or two Social engineering: Any technique that uses additional stand-alone anti-spyware social skills to generate human interaction program that entices individuals to reveal sensitive information Often doesn't involve computers or face- Windows Defender: Windows program that to-face interaction scans your system for spyware and other Most use pretexting, creating a scenario unwanted software that sounds legitimate Phishing: Lures Internet users to reveal personal information such as credit card numbers, Social Security numbers, or other sensitive information Scammers send e-mails Pharming: Malicious code is planted on your computer, either by viruses or by visiting malicious websites Alters browser's ability to find web SPAM addresses Spam: Unwanted or junk e-mail Spim: Unsolicited instant messages Guidelines to avoid schemes Create a free e-mail address you use only Never reply directly to e-mails asking for when you fill out forms or buy items on the personal information web Don't click on links in e-mails to go to a website Other ways to prevent spam Never give personal information over the Read website privacy policies and don't Internet unless the site is secure give the site permission Use phishing filters to pass on your e-mail address Use Internet security software Don't reply to spam Internet security packages can detect and Spam filter: An option you can select in prevent pharming attacks your e-mail account that places spam into McAfee or Norton a special folder Scareware: Malware that's downloaded onto your computer and tries to convince you that your computer is infected with a virus or other malware Directed to website to buy fake removal or antivirus tools with little or no value Uses people's fear Usually downloaded onto your computer Most Internet security suites, antivirus, and anti-malware packages now detect and prevent the installation of scareware Firewall Antivirus Antivirus software is designed to detect Firewall: Software program or hardware viruses and protect your computer device designed to protect computers from hackers Popular antivirus software companies Personal firewall: Specifically designed for Symantec home networks Kaspersky Both Windows and macOS include AVG firewalls McAfee Security suites also include firewall software Comprehensive Internet security You can also buy and configure hardware packages protect you from other threats firewall devices Run an active virus scan on entire system once a week If you suspect a problem, scan immediately Main functions of antivirus software Detection: Looks for virus signatures in files - Virus signature is a portion of the virus code that's unique to a particular virus Stopping virus execution - Quarantining places the virus in a secure area of your hard drive so it won't spread Preventing future infection - In inoculation, the antivirus software records key attributes about Firewalls protect in two major ways your computer files and keeps these stats - Blocking access to logical ports in a safe place - Keeping computer's network address To combat unknown viruses, programs secure search for suspicious virus-like Packet filtering is a process of configuring activities and virus signatures a firewall to filter out packets sent to logical Keep your antivirus software up to date ports Smartphones and other mobile devices Logical port blocking: Firewalls are are susceptible to viruses configured to ignore requests that originate Antivirus software designed for mobile from the Internet asking for access to devices certain ports 360 Security and Avast! Mobile Security for Android Software Updates Drive-by download is a type of attack that exploits weaknesses in operating systems Make sure antivirus software and your operating system are up to date and contain latest security patches - Windows updating system has automatic update utility called - macOS has similar utility Authentication: Passwords and Biometric Guidelines to create strong passwords: Portable privacy devices provide an even Don't use easily deduced components higher level of surfing privacy related to your life, such as parts of your Imation Personal Flash Drive name, your pet's name, your street address, Store sensitive Internet files or the name of the website or institution for Preload Linux OS on a flash drive to which you are creating the password (i.e., avoid using the public or work don't use "Wells Fargo" for your online computer's OS banking password). Use a password that is at least 14 characters long. Longer passwords are keeping data safe more difficult to deduce. Protecting personal information Don't use words found in the dictionary. Reveal as little information as possible Use a mix of upper- and lowercase In Facebook change your privacy letters and symbols settings Never tell anyone or write down password Change password regularly (every month) Use different passwords for different websites Biometric authentication Read unique personal characteristics Fingerprint Backing Up Data Iris pattern in eye Data on your computer faces three major Voice authentication threats Face pattern recognition Unauthorized access Provide high level of security Tampering Eliminate human error Destruction Backups are copies of files that you can use to replace the originals If they're lost or damaged Two main options for backing up files Incremental backup (partial backup): Backing up only files that have changed or been created since the last backup - More efficient Hiding from Prying Eyes Image backup (system backup): All Current versions of Google Chrome, system, application, and data Firefox, and Internet Explorer include files are backed up privacy tools that help you surf the web - Makes an exact copy of the setup anonymously Backups must be stored away Incognito from where your computer is Private Browsing located and InPrivate should be stored in at least two different Three places main to be truly secure choices Online (in the cloud) External hard drives Network-attached storage (NAS) Protecting Physical computing assets Checklist guide to ensure security Environmental Factors and Power Surges Computers, tablets, and phones aren't useful if damaged Protect them from environmental factors, power surges, and theft Power surges: Electrical current is supplied in excess of normal voltage - Old or faulty wiring - Downed power lines - Malfunctions at electric company substations - Lightning strikes Surge protector: Device that protects your computer against power surges - Replace every two to three years - Use with all devices that have solid-state components Preventing and Handling Theft The main security concerns with mobile devices - Keeping them from being stolen - Keeping data secure in case they are stolen - Finding a device if it is stolen Motion alarm software: Good inexpensive theft deterrent - LAlarm: Free software for laptops (https://www.lalarm.com/) - SuperAlarm and Alarmomatic secure iPad or iPhone (https://alarmomatic-ios.soft112.com/) - Detects motion and sets off an alarm Apple offers Find My iPhone service

Use Quizgecko on...
Browser
Browser