Our Digital World Chapter 8 Digital Defense: Securing Your Data and Privacy © Paradigm Publishing, Inc. 1 This chapter will help you to: • • • • • Recognize risks of a networked computer. Explain types of malware and anti-malware tools. Identify a trusted online site. Understand security risks of mobile devices. Identify risks to hardware and software in the workplace. © Paradigm Publishing, Inc. 2 Main Topics • 8.1 The Role of Security and Privacy in Your Digital World • 8.2 When Security Gets Personal • 8.3 Mobile Security • 8.4 Security at Work • 8.5 Security Defenses Everybody Can Use © Paradigm Publishing, Inc. 3 Why Should You Care? • Digital information is valuable and at risk. • Antivirus software alone isn’t enough. • Save time and become less vulnerable. © Paradigm Publishing, Inc. 4 8.1 The Role of Security and Privacy in Your Digital World © Paradigm Publishing, Inc. 5 Understand Security Threats • Computer security protects your network and computers. • Data loss prevention plan reduces risk. • Various threats from malware. • Several sources for threats. © Paradigm Publishing, Inc. 6 The Secure PC © Paradigm Publishing, Inc. 7 Preparing for Cyber Attacks of the Future • What is a self-healing system? • How can individuals defend against cyber attacks? • What is an electromagnetic pulse? Spotlight on the Future © Paradigm Publishing, Inc. 8 Basic Tools of Computer Security • Authentication. • Technology. • User procedures. © Paradigm Publishing, Inc. 9 • • • • computer security data loss prevention (DLP) hacker authentication Terms to Know © Paradigm Publishing, Inc. 10 Ask Yourself… What aspect of computer security minimizes risk of loss or theft of data? a. damage loss plan b. data loss prevention c. requiring that all users log in with the same password d. None of the above © Paradigm Publishing, Inc. 11 8.2 When Security Gets Personal © Paradigm Publishing, Inc. 12 Protecting Home Networks • Unprotected networks are vulnerable. • Access point or router password protection. • Encryption codes data. © Paradigm Publishing, Inc. 13 Public Key Encryption © Paradigm Publishing, Inc. 14 Understanding Malware • Malicious software installs itself on your computer. • Results include pop-ups, viruses, or tracking. • Malware includes: – – – – – – Viruses Trojans Macro viruses and logic bombs Rootkits Spyware Adware © Paradigm Publishing, Inc. 15 Virus Attacks © Paradigm Publishing, Inc. 16 Worm Attacks © Paradigm Publishing, Inc. 17 Trojan Horse © Paradigm Publishing, Inc. 18 Spyware and Adware • Spyware spies on the activity of a computer users. • Adware delivers ads. © Paradigm Publishing, Inc. 19 How Malware Uses Botnets © Paradigm Publishing, Inc. 20 How Malware Is Spread • Opening an email attachment that contains an executable file. • Downloading a picture with a virus in it. • Visiting an infected website. • Sharing infected storage devices. • Connecting to an infected network. © Paradigm Publishing, Inc. 21 • Email chain letters are used to deliver malware. • Collect email addresses for spamming. Playing It Safe © Paradigm Publishing, Inc. 22 Recognizing Secure Sites • Familiarity and accreditations. • Transport Layer Security (TSL). • Site advisors. • Use of cookies. © Paradigm Publishing, Inc. 23 • Free offers really aren’t free. • Risks of clicking on links in advertisements. • Risks of clicking on email attachments. Defensive Browsing © Paradigm Publishing, Inc. 24 • • • • • • encryption public key private key public key encryption Wi-Fi Protected Access (WPA) Wired Equivalent Privacy (WEP) Terms to Know © Paradigm Publishing, Inc. 25 • • • • • • • malware spam virus worm Trojan horse macro virus logic bomb virus Terms to Know © Paradigm Publishing, Inc. 26 • • • • • • • rootkit botnet zombie spyware adware Transport Layer Security (TLS) cookie Terms to Know © Paradigm Publishing, Inc. 27 Ask Yourself… When looking for a trustworthy retailer, it is best to a. follow an email link from a retailer that has a free offer. b. follow links in an advertisement to locate retailers that provide the item at a good price. c. enter the URL for a brick-and-mortar retail store. d. All of the above © Paradigm Publishing, Inc. 28 8.3 Mobile Security © Paradigm Publishing, Inc. 29 Protecting a Laptop • Use a lock. • Use a fingerprint reader. • Activate password protection. • Company mobile computing policies. © Paradigm Publishing, Inc. 30 Using Public Wi-Fi Access • Public computers aren’t protected. • Avoid accessing financial accounts or making purchases. © Paradigm Publishing, Inc. 31 Cell Phone Safety • Cell phone theft. • Exposure when using Bluetooth. © Paradigm Publishing, Inc. 32 Ask Yourself… What can you do to protect your laptop? a. b. c. d. enable password protection. purchase a fingerprint reader use a cable and lock. All of the above © Paradigm Publishing, Inc. 33 8.4 Security at Work © Paradigm Publishing, Inc. 34 Corporate Security Tools • Intrusion Prevision System (IPS) • Honeypot • Symmetric encryption © Paradigm Publishing, Inc. 35 Symmetric Encryption © Paradigm Publishing, Inc. 36 Controlling Access • Physical security. • Authentication. • Employee training. © Paradigm Publishing, Inc. 37 Denial of Service Attacks © Paradigm Publishing, Inc. 38 Disaster Planning and Training • • • • Disaster recovery plan (DRP). Backing up. Uninterruptable power supply (UPS). Employee training. © Paradigm Publishing, Inc. 39 • Extracting evidence from computers. • Decrypting data. • Mobile forensics. Computers in Your Career © Paradigm Publishing, Inc. 40 • • • • • • symmetric encryption Intrusion Prevention System (IPS) honeypot social engineer biometrics spoofing Terms to Know © Paradigm Publishing, Inc. 41 • • • • • • denial-of-service (DoS) attack disaster recovery plan (DRP) cold server warm server hot server failover Terms to Know © Paradigm Publishing, Inc. 42 • • • • • • surge protector uninterruptible power supply (UPS) cyberforensics mobile forensics decryption digital rights management (DRM) Terms to Know © Paradigm Publishing, Inc. 43 Ask Yourself… What is the process of redirecting users to a hot server called? a. b. c. d. disaster recovery failsafe failover cold server fallback © Paradigm Publishing, Inc. 44 8.5 Security Defenses Everybody Can Use © Paradigm Publishing, Inc. 45 Security Defenses • Firewalls. • Antivirus/antispyware. • Using passwords effectively. © Paradigm Publishing, Inc. 46 • • • • • • antivirus software antispyware software virus definitions strong password digital certificate digital signature Terms to Know © Paradigm Publishing, Inc. 47 Ask Yourself… What do some forms of authentication rely on to a great extent? a. b. c. d. strong user passwords frequent software updates antivirus definitions firewalls © Paradigm Publishing, Inc. 48 Our Digital World © Paradigm Publishing, Inc. 49