ODW_Ch8_PPT_without_Audio

Report
Our Digital World
Chapter 8
Digital Defense:
Securing Your Data and Privacy
© Paradigm Publishing, Inc.
1
This chapter will help you to:
•
•
•
•
•
Recognize risks of a networked computer.
Explain types of malware and anti-malware tools.
Identify a trusted online site.
Understand security risks of mobile devices.
Identify risks to hardware and software in the
workplace.
© Paradigm Publishing, Inc.
2
Main Topics
• 8.1 The Role of Security and Privacy in Your
Digital World
• 8.2 When Security Gets Personal
• 8.3 Mobile Security
• 8.4 Security at Work
• 8.5 Security Defenses Everybody Can Use
© Paradigm Publishing, Inc.
3
Why Should You Care?
• Digital information is valuable and at risk.
• Antivirus software alone isn’t enough.
• Save time and become less vulnerable.
© Paradigm Publishing, Inc.
4
8.1 The Role of Security and
Privacy in Your Digital World
© Paradigm Publishing, Inc.
5
Understand Security Threats
• Computer security protects your network and
computers.
• Data loss prevention plan reduces risk.
• Various threats from malware.
• Several sources for threats.
© Paradigm Publishing, Inc.
6
The Secure PC
© Paradigm Publishing, Inc.
7
Preparing for Cyber Attacks of the
Future
• What is a self-healing system?
• How can individuals defend against
cyber attacks?
• What is an electromagnetic pulse?
Spotlight on the Future
© Paradigm Publishing, Inc.
8
Basic Tools of Computer Security
• Authentication.
• Technology.
• User procedures.
© Paradigm Publishing, Inc.
9
•
•
•
•
computer security
data loss prevention (DLP)
hacker
authentication
Terms to Know
© Paradigm Publishing, Inc.
10
Ask Yourself…
What aspect of computer security minimizes risk
of loss or theft of data?
a. damage loss plan
b. data loss prevention
c. requiring that all users log in with the same
password
d. None of the above
© Paradigm Publishing, Inc.
11
8.2 When Security Gets Personal
© Paradigm Publishing, Inc.
12
Protecting Home Networks
• Unprotected networks are vulnerable.
• Access point or router password protection.
• Encryption codes data.
© Paradigm Publishing, Inc.
13
Public Key Encryption
© Paradigm Publishing, Inc.
14
Understanding Malware
• Malicious software installs itself on your
computer.
• Results include pop-ups, viruses, or tracking.
• Malware includes:
–
–
–
–
–
–
Viruses
Trojans
Macro viruses and logic bombs
Rootkits
Spyware
Adware
© Paradigm Publishing, Inc.
15
Virus Attacks
© Paradigm Publishing, Inc.
16
Worm Attacks
© Paradigm Publishing, Inc.
17
Trojan Horse
© Paradigm Publishing, Inc.
18
Spyware and Adware
• Spyware spies on the activity of a computer
users.
• Adware delivers ads.
© Paradigm Publishing, Inc.
19
How Malware Uses Botnets
© Paradigm Publishing, Inc.
20
How Malware Is Spread
• Opening an email attachment that contains an
executable file.
• Downloading a picture with a virus in it.
• Visiting an infected website.
• Sharing infected storage devices.
• Connecting to an infected network.
© Paradigm Publishing, Inc.
21
• Email chain letters are used to deliver
malware.
• Collect email addresses for spamming.
Playing It Safe
© Paradigm Publishing, Inc.
22
Recognizing Secure Sites
• Familiarity and
accreditations.
• Transport Layer
Security (TSL).
• Site advisors.
• Use of cookies.
© Paradigm Publishing, Inc.
23
• Free offers really aren’t free.
• Risks of clicking on links in
advertisements.
• Risks of clicking on email attachments.
Defensive Browsing
© Paradigm Publishing, Inc.
24
•
•
•
•
•
•
encryption
public key
private key
public key encryption
Wi-Fi Protected Access (WPA)
Wired Equivalent Privacy (WEP)
Terms to Know
© Paradigm Publishing, Inc.
25
•
•
•
•
•
•
•
malware
spam
virus
worm
Trojan horse
macro virus
logic bomb virus
Terms to Know
© Paradigm Publishing, Inc.
26
•
•
•
•
•
•
•
rootkit
botnet
zombie
spyware
adware
Transport Layer Security (TLS)
cookie
Terms to Know
© Paradigm Publishing, Inc.
27
Ask Yourself…
When looking for a trustworthy retailer, it is best
to
a. follow an email link from a retailer that has a free
offer.
b. follow links in an advertisement to locate retailers
that provide the item at a good price.
c. enter the URL for a brick-and-mortar retail store.
d. All of the above
© Paradigm Publishing, Inc.
28
8.3 Mobile Security
© Paradigm Publishing, Inc.
29
Protecting a Laptop
• Use a lock.
• Use a fingerprint
reader.
• Activate password
protection.
• Company mobile
computing policies.
© Paradigm Publishing, Inc.
30
Using Public Wi-Fi Access
• Public computers aren’t
protected.
• Avoid accessing
financial accounts or
making purchases.
© Paradigm Publishing, Inc.
31
Cell Phone Safety
• Cell phone theft.
• Exposure when using Bluetooth.
© Paradigm Publishing, Inc.
32
Ask Yourself…
What can you do to protect your laptop?
a.
b.
c.
d.
enable password protection.
purchase a fingerprint reader
use a cable and lock.
All of the above
© Paradigm Publishing, Inc.
33
8.4 Security at Work
© Paradigm Publishing, Inc.
34
Corporate Security Tools
• Intrusion Prevision System (IPS)
• Honeypot
• Symmetric encryption
© Paradigm Publishing, Inc.
35
Symmetric Encryption
© Paradigm Publishing, Inc.
36
Controlling Access
• Physical security.
• Authentication.
• Employee training.
© Paradigm Publishing, Inc.
37
Denial of Service Attacks
© Paradigm Publishing, Inc.
38
Disaster Planning and Training
•
•
•
•
Disaster recovery plan (DRP).
Backing up.
Uninterruptable power supply (UPS).
Employee training.
© Paradigm Publishing, Inc.
39
• Extracting evidence from computers.
• Decrypting data.
• Mobile forensics.
Computers in Your Career
© Paradigm Publishing, Inc.
40
•
•
•
•
•
•
symmetric encryption
Intrusion Prevention System (IPS)
honeypot
social engineer
biometrics
spoofing
Terms to Know
© Paradigm Publishing, Inc.
41
•
•
•
•
•
•
denial-of-service (DoS) attack
disaster recovery plan (DRP)
cold server
warm server
hot server
failover
Terms to Know
© Paradigm Publishing, Inc.
42
•
•
•
•
•
•
surge protector
uninterruptible power supply (UPS)
cyberforensics
mobile forensics
decryption
digital rights management (DRM)
Terms to Know
© Paradigm Publishing, Inc.
43
Ask Yourself…
What is the process of redirecting users to a hot
server called?
a.
b.
c.
d.
disaster recovery
failsafe
failover
cold server fallback
© Paradigm Publishing, Inc.
44
8.5 Security Defenses
Everybody Can Use
© Paradigm Publishing, Inc.
45
Security Defenses
• Firewalls.
• Antivirus/antispyware.
• Using passwords
effectively.
© Paradigm Publishing, Inc.
46
•
•
•
•
•
•
antivirus software
antispyware software
virus definitions
strong password
digital certificate
digital signature
Terms to Know
© Paradigm Publishing, Inc.
47
Ask Yourself…
What do some forms of authentication rely on to
a great extent?
a.
b.
c.
d.
strong user passwords
frequent software updates
antivirus definitions
firewalls
© Paradigm Publishing, Inc.
48
Our Digital World
© Paradigm Publishing, Inc.
49

similar documents