1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from...

of 28 /28
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware Backup methods (optional) Protecting physical assets (skip) Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall

Embed Size (px)

Transcript of 1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from...

  • Slide 1
  • 1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware Backup methods (optional) Protecting physical assets (skip) Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 2
  • 2 Types of Cybercrime Virus creation deployment Fraud-related (58 percent of cybercrime) Auction fraud Nondelivery of ordered items Credit and debit card fraud Non-fraud-related Computer intrusions Unsolicited e-mail Child pornography Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 3
  • 3 Computer Threats: Viruses Virus: A program that attaches itself to another program (host) and spreads itself to other computers when files are exchanged Viruses hide within the code of a host program Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 4
  • 4 What Viruses Do Replicate themselves Slow down networks Secondary objectives Display annoying messages Delete files on the hard drive Change computer settings Information theft Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 5
  • 5 How Does a Computer Catch a Virus? Viruses copy themselves and infect a file on your computer Spread by Sharing disks or flash drives Opening e-mail attachment Downloading infected audio or video files Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 6
  • 6 Types of Viruses Boot-sector viruses Replicate themselves in the master boot record of hard drive upon boot up Logic bombs Activate when certain conditions are met Time bombs Activate when certain passage of time occurs or certain date (March 6 1992, Michelangelo birthday) Worms Travel between systems through networks Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 7
  • 7 Types of Viruses Script viruses Hidden on Web pages as malicious scripts; Scripts are short programs such as the non- malicious script that checks that you completed a Web form Macro viruses - not required Attached to documents Encryption viruses not required Compress files using a complex encryption key Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 8
  • 8 Virus Classifications - not required Polymorphic viruses Periodically rewrite themselves to avoid detection Multipartite viruses Infect multiple file types Stealth viruses Erase their code from the hard drive and reside in the active memory Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 9
  • 9 Antivirus Software Programs designed to detect viruses Scan files looking for virus signatures (unique code) Provide options for deleting or fixing infected files Inoculate files against further infection Needs to be updated frequently Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 10
  • 10 Dealing with an Infected Computer 1. 1.Boot computer with antivirus DVD/CD in DVD drive. 2. 2.Run directly from DVD/CD. 3. 3.Allow software to delete or quarantine infected files; Quarantine is to put infected file in secure place on drive) 4. 4.Research viruses found to ensure further manual steps are not needed. Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 11
  • 11 Prevent Instant Messaging Viruses -not on test Allow contact from Buddy or Friends List users only. Never automatically accept transfers of data. Avoid using instant messaging programs on public computers. Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 12
  • 12 Other Ways to Protect Your System Keep your antivirus and operating system (OS) software up to date Load security patches (Windows) as soon as they are available Turn on Automatic Windows Updates!! (see next slide) Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 13
  • 13 Protect w/ Windows Updates Start > Control Panel > Sys and Security, click Windows Update link, change settings Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 14
  • 14 Hackers Anyone who unlawfully accesses a computer system Types (all illegal) White hat hack as a challenge; Black hat do maliciously, for their gain, etc Script kiddies - use hacking tools; less experienced Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 15
  • 15 What Hackers Steal Hackers try to steal data stored on hard drives: Credit card numbers Bank account numbers Also can steal information through packet sniffing Use information to commit identity theft Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 16
  • 16 How Computers Are Attacked - not on test Trojan horse Backdoor program Zombies Denial of service attacks (DoS) Distributed denial of service attacks (DDoS) Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 17
  • 17 How Hackers Gain Access Direct access Hacking software Indirect access Internet connection Logical ports Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 18
  • 18 Firewalls Software programs or hardware designed to close logical ports to invaders A software firewall is built into Windows 7 Other software firewalls are available from vendors Network routers can contain a hardware firewall Firewalls are critical if you have an always- on broadband connection Test your computers vulnerability Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 19
  • 19 Wireless Networks on the Road Beware Evil twins Free Internet access in paid locations Protect yourself Check with authorized personnel for official name of hot spot Do not use free access from unknown sources Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 20
  • 20 Passwords - not on test Create a strong password At least 14 characters, including numbers, symbols, and upper- and lowercase letters Not a single word or a word from a dictionary Not easily associated with you (birthday, name of pet, nickname) Use different passwords for different sites Do not tell anyone or write down password Change password regularly (every month) Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 21
  • 21 Anonymous Web Surfing -not on test Public computers Shared computers risk subsequent user viewing your data Might already have viruses or hacking tools installed Portable privacy devices Linux OS on a flash drive Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 22
  • 22 Malware not on test Software that has a malicious intent Grayware (nondestructive) Adware Spyware Viruses (destructive) Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 23
  • 23 Cookies A Web site assigns an ID number to your computer, stored in a cookie file Each time you log in to the site, it notes the visit and keeps track of it in a database Provide info about browsing habits Identify user preferences Pose some privacy risks, but low security threat Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 24
  • 24 Backing Up Data - not on test Backup A copy of a file that can be used to replace the original Types of files to back up Program Data Backup routine Frequency Changed files Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 25
  • 25 Backing Up Data - not on test Software programs for easy backup Schedule automatic backups Can back up files, folders, or entire drives Back up to USB device, CD, or DVD Entire system backup software Takes an image of the entire system Stores on a separate hard drive In case of failure, a new drive is inserted Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 26
  • 26 Backing Up Data - not on test Store backups offsite Online backups Store backup files on Internet servers Fees for the service Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 27
  • 27 Deterring Theft - not on test Alarms Locks and surrounds Software alerts Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall
  • Slide 28
  • Chapter 1 Chapter 9 28 All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America. Copyright 2011 Pearson Education, Inc. Copyright 2011 Pearson Education, Inc. Publishing as Prentice Hall