powerpoint presentationcbafaculty.org/visualizing_technology/vt5e_ppt_ch10.pptx · ppt file · web...
TRANSCRIPT
![Page 1: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/1.jpg)
PowerPoint Presentation to Accompany
Chapter 10
Security and Privacy
![Page 2: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/2.jpg)
Copyright © 2017 Pearson Education, Inc. 2
Objectives
1. Recognize Different Types of Cybercrime2. Differentiate between Various Types of Malware3. Explain How to Secure a Computer4. Practice Safe Computing5. Discuss Laws Related to Computer Security and
Privacy
![Page 3: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/3.jpg)
Copyright © 2017 Pearson Education, Inc. 3
Recognize Different Types of Cybercrime
O b j e c t i v e 1
![Page 4: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/4.jpg)
Copyright © 2017 Pearson Education, Inc. 4
Cybercrime: They Are Out to Get YouPersonal Cybercrime
HarassmentCyberbullying: between two minorsCyber-harassment: between adultsCyber-stalking:• More serious in nature• Stalker demonstrates a pattern of harassment• Poses a credible threat of harm
O b j e c t i v e 1
![Page 5: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/5.jpg)
Copyright © 2017 Pearson Education, Inc. 5
Cybercrime: They Are Out to Get YouPersonal Cybercrime
Phishing Email messages and IMs Appears to be from someone with
whom you do businessDesigned to trick you into providing
usernames and passwordsPharming
Redirects you to a phony website even if you type the URL
Hijacks a company’s domain nameO b j e c t i v e 1
![Page 6: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/6.jpg)
6
Cybercrime: They Are Out to Get YouSocial Network Attacks
Adware and other malwareSuspicious emails and notifications
Appear to be from a site administrator• Asking for your password• Threatening to suspend your account
Phishing and "Please send money" scams
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 1
![Page 7: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/7.jpg)
7
Cybercrime: They Are Out to Get YouSocial Network Attacks
ClickjackingClicking on a link allows this malware to post unwanted
links on your pageMalicious script scams
Copy and paste some text into your address barIt might execute a malicious script• Creates pages and events• Sends spam out to your friends
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 1
![Page 8: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/8.jpg)
Copyright © 2017 Pearson Education, Inc. 8
Cybercrime: They Are Out to Get YouSocial Network Attacks
Fraud Schemes that convince you to give money or property to a
personShill bidding is fake bidding to drive up the price of an item
O b j e c t i v e 1
![Page 9: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/9.jpg)
9
Cybercrime: They Are Out to Get YouSocial Network Attacks
Identity theftThe use of your name, Social Security number, bank, or
credit cards for financial gainKeyloggers• Programs or devices that
capture what is typed
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 1
![Page 10: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/10.jpg)
10
Cybercrime: They Are Out to Get YouCybercrime Against Organizations
HackingWhite-hat or “sneakers”• Attempt to find security holes in a system to prevent future
hackingBlack-hat or “cracker”• Malicious intent
Gray-hat• Illegal but not malicious intent
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 1
![Page 11: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/11.jpg)
11
Cybercrime: They Are Out to Get YouCybercrime Against Organizations
HacktivismHacking to make a political statement
Data breachSensitive data is stolen or viewed by someone not
authorizedCyber-terrorism
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 1
![Page 12: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/12.jpg)
12
Differentiate betweenVarious Types of Malware
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 2
![Page 13: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/13.jpg)
Copyright © 2017 Pearson Education, Inc. 13
Malware: Pick Your PoisonSpam and Cookies
Includes different types of programs designed to be harmful or maliciousSpamAdware and spywareVirusesWormsTrojan horsesRootkits
O b j e c t i v e 2
![Page 14: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/14.jpg)
Copyright © 2017 Pearson Education, Inc. 14
SpamSpamming is sending mass unsolicited emailsMessages are called spamOther forms:• Fax spam• IM spam• Text spam
Malware: Pick Your PoisonSpam and Cookies
O b j e c t i v e 2
![Page 15: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/15.jpg)
Copyright © 2017 Pearson Education, Inc. 15
CookiesInstalled without your
permissionHelp websites identify you
when you return• Track websites and pages
you visit to better target ads• May collect information you
don’t want to share
Malware: Pick Your PoisonSpam and Cookies
O b j e c t i v e 2
![Page 16: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/16.jpg)
Copyright © 2017 Pearson Education, Inc. 16
Malware: Pick Your PoisonAdware and Spyware
Adware Pop-ups or banner adsGenerate incomeUse CPU cycles and Internet bandwidthReduce PC performance
O b j e c t i v e 2
![Page 17: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/17.jpg)
Copyright © 2017 Pearson Education, Inc. 17
Malware: Pick Your PoisonAdware and Spyware
SpywareMalwareSecretly gathers personal informationUsually installed by accidentBrowser hijacker
O b j e c t i v e 2
![Page 18: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/18.jpg)
Copyright © 2017 Pearson Education, Inc. 18
Malware: Pick Your PoisonViruses, Worms, Trojans, and Rootkits
Virus - A program that replicates itself and infects computersNeeds a host fileMay use an email program to infect
other computersThe attack is called the payloadCheck to see if message is a hoax
O b j e c t i v e 2
![Page 19: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/19.jpg)
Copyright © 2017 Pearson Education, Inc. 19
Malware: Pick Your PoisonViruses, Worms, Trojans, and Rootkits
Logic BombBehaves like a virus Performs malicious actDoes not replicateAttacks when certain conditions are met
Time BombA logic bomb with a trigger that is a specific time or date• April Fool’s Day• Friday the 13th
O b j e c t i v e 2
![Page 20: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/20.jpg)
Copyright © 2017 Pearson Education, Inc. 20
Malware: Pick Your PoisonViruses, Worms, Trojans, and Rootkits
WormsSelf-replicatingDo not need a host to travelTravel over networks to infect other machinesConficker worm• First released in 2008• Reemerged in 2010 with new behaviors
O b j e c t i v e 2
![Page 21: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/21.jpg)
Copyright © 2017 Pearson Education, Inc. 21
Malware: Pick Your PoisonViruses, Worms, Trojans, and Rootkits
BotnetNetwork of computer zombies or bots controlled by a master Fake security notificationsDenial-of-service attacks
• Cripples a server or network by sending out excessive trafficTrojan horse
Appears to be legitimate program Actually maliciousMight install adware, toolbar, keylogger, or open a backdoor
O b j e c t i v e 2
![Page 22: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/22.jpg)
22
Malware: Pick Your PoisonViruses, Worms, Trojans, and Rootkits
RansomwareMalware that prevents you from using your computer until
you pay a fine or feeBitcoin is an anonymous, digital, encrypted currency
RootkitSet of programs Allows someone to gain control over system Hides the fact that the computer has been compromisedNearly impossible to detect Masks behavior of other malware
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 2
![Page 23: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/23.jpg)
23
Explain How to Secure a Computer
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 3
![Page 24: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/24.jpg)
Copyright © 2017 Pearson Education, Inc. 24
Shield’s UpSoftware
Drive-by downloadA visited website installs a program in the background
without your knowledgeFirewall
Hardware device that blocksaccess to your network
Software that blocks accessto an individual machine
O b j e c t i v e 3
![Page 25: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/25.jpg)
Copyright © 2017 Pearson Education, Inc. 25
Shield’s UpSoftware
Antivirus programProtects against viruses, Trojans, worms, spywareWindows 8 includes Windows Defender• An antispyware program that performs both real-time protection
and system scanningAntispyware software
Prevents adware and spyware from installingSecurity suite
Package of security softwareCombination of features
O b j e c t i v e 3
![Page 26: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/26.jpg)
Copyright © 2017 Pearson Education, Inc. 26
Shield’s UpHardware
RouterConnects two or more networks togetherHome router acts like firewall
Network address translation (NAT) Security feature of a router Shields devices on private network from public network
SSID (Service Set Identifier)Wireless network name
Wireless encryptionAdds security by encrypting transmitted dataWi-Fi Protected Setup (WPS) is one option
O b j e c t i v e 3
![Page 27: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/27.jpg)
Copyright © 2017 Pearson Education, Inc. 27
Shield’s UpOperating System
Most important piece ofsecurity software
Keep patched andup-to-date
O b j e c t i v e 3
![Page 28: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/28.jpg)
28
Practice Safe Computing
Copyright © 2017 Pearson Education, Inc.O b j e c t i v e 4
![Page 29: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/29.jpg)
Copyright © 2017 Pearson Education, Inc. 29
An Ounce of Prevention is Worth a Pound of Cure
User AccountsThree user account types:
StandardAdministratorGuest
User Account Control (UAC) notifies you prior to changes made to your computer Do not turn this feature off Always read message before clicking Yes
Malware tricks users into clicking fake Windows notifications
O b j e c t i v e 4
![Page 30: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/30.jpg)
Copyright © 2017 Pearson Education, Inc. 30
An Ounce of Prevention is Worth a Pound of Cure
Passwords
O b j e c t i v e 4
![Page 31: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/31.jpg)
Copyright © 2017 Pearson Education, Inc. 31
An Ounce of Prevention is Worth a Pound of Cure
EncryptionConverts plain text into ciphertext
Must have a key to decrypt it
O b j e c t i v e 4
![Page 32: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/32.jpg)
Copyright © 2017 Pearson Education, Inc. 32
An Ounce of Prevention is Worth a Pound of Cure
Safely Installing SoftwareCopies files to the computerAlters settings
O b j e c t i v e 4
![Page 33: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/33.jpg)
Copyright © 2017 Pearson Education, Inc. 33
An Ounce of Prevention is Worth a Pound of Cure
Updating and Installing SoftwareProtect yourself from downloading problems
Only download from reliable sourcesZero-day exploit
Attack that occurs on the day an exploit is discovered before the publisher can fix it
BugsFlaws in the programming of softwarePatch or hotfixService pack
O b j e c t i v e 4
![Page 34: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/34.jpg)
Copyright © 2017 Pearson Education, Inc. 34
An Ounce of Prevention is Worth a Pound of Cure
Acceptable Use Policies (AUP)Common in businesses and schools Rules for computer and network usersDepend on:
Type of business Type of information
Force users topractice safe computing
O b j e c t i v e 4
![Page 35: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/35.jpg)
Copyright © 2017 Pearson Education, Inc. 35
Discuss Laws Related toComputer Security and Privacy
O b j e c t i v e 5
![Page 36: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/36.jpg)
Copyright © 2017 Pearson Education, Inc. 36
No single authority responsible for investigating cybercrime
Internet Crime Complaint Center (IC3)Place for victims to report
cybercrimesic3.govReports processed and forwarded
to appropriate agency
The Law is on Your SideThe Enforcers
O b j e c t i v e 5
![Page 37: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/37.jpg)
Copyright © 2017 Pearson Education, Inc. 37
The Law is on Your SideCurrent Laws
Computer Fraud and Abuse ActMakes it a crime to access classified informationPassed in 1986; amendments between 1988 and 2002
added additional cybercrimesUSA Patriot Antiterrorism Legislation (2001) Cyber Security Enhancement Act (2002)
Provisions for fighting cybercrimeConvention on Cybercrime Treaty
Drafted by Council of EuropeSigned by more than 40 countries
O b j e c t i v e 5
![Page 38: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/38.jpg)
38
Questions
Copyright © 2017 Pearson Education, Inc.
![Page 39: PowerPoint Presentationcbafaculty.org/Visualizing_Technology/vt5e_ppt_ch10.pptx · PPT file · Web view2016-12-29 · The use of your name, Social Security number, ... such as theft](https://reader036.vdocument.in/reader036/viewer/2022081605/5b20b25e7f8b9a923d8b5531/html5/thumbnails/39.jpg)
39
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical,
photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.
Copyright © 2017 Pearson Education, Inc.