Our Digital World Chapter 8 Digital Defense: Securing Your Data and Privacy © Paradigm Publishing,...

download Our Digital World Chapter 8 Digital Defense: Securing Your Data and Privacy © Paradigm Publishing, Inc.1.

If you can't read please download the document

Transcript of Our Digital World Chapter 8 Digital Defense: Securing Your Data and Privacy © Paradigm Publishing,...

  • Slide 1
  • Our Digital World Chapter 8 Digital Defense: Securing Your Data and Privacy Paradigm Publishing, Inc.1
  • Slide 2
  • This chapter will help you to: Recognize risks of a networked computer. Explain types of malware and anti-malware tools. Identify a trusted online site. Understand security risks of mobile devices. Identify risks to hardware and software in the workplace. Paradigm Publishing, Inc.2
  • Slide 3
  • Main Topics 8.1 The Role of Security and Privacy in Your Digital World 8.1 The Role of Security and Privacy in Your Digital World 8.2 When Security Gets Personal 8.3 Mobile Security 8.4 Security at Work 8.5 Security Defenses Everybody Can Use Paradigm Publishing, Inc.3
  • Slide 4
  • Why Should You Care? Digital information is valuable and at risk. Antivirus software alone isnt enough. Save time and become less vulnerable. Paradigm Publishing, Inc.4
  • Slide 5
  • 8.1 The Role of Security and Privacy in Your Digital World Paradigm Publishing, Inc.5
  • Slide 6
  • Understand Security Threats Computer security protects your network and computers. Data loss prevention plan reduces risk. Various threats from malware. Several sources for threats. Paradigm Publishing, Inc.6
  • Slide 7
  • The Secure PC Paradigm Publishing, Inc.7
  • Slide 8
  • Spotlight on the Future What is a self-healing system? How can individuals defend against cyber attacks? What is an electromagnetic pulse? Paradigm Publishing, Inc.8 Preparing for Cyber Attacks of the Future
  • Slide 9
  • Basic Tools of Computer Security Authentication. Technology. User procedures. Paradigm Publishing, Inc.9
  • Slide 10
  • Terms to Know computer security data loss prevention (DLP) hacker authentication Paradigm Publishing, Inc.10
  • Slide 11
  • Ask Yourself What aspect of computer security minimizes risk of loss or theft of data? a.damage loss plan b.data loss prevention c.requiring that all users log in with the same password d.None of the above Paradigm Publishing, Inc.11
  • Slide 12
  • 8.2 When Security Gets Personal Paradigm Publishing, Inc.12
  • Slide 13
  • Protecting Home Networks Unprotected networks are vulnerable. Access point or router password protection. Encryption codes data. Paradigm Publishing, Inc.13
  • Slide 14
  • Public Key Encryption Paradigm Publishing, Inc.14
  • Slide 15
  • Understanding Malware Malicious software installs itself on your computer. Results include pop-ups, viruses, or tracking. Malware includes: Viruses Trojans Macro viruses and logic bombs Rootkits Spyware Adware Paradigm Publishing, Inc.15
  • Slide 16
  • Virus Attacks Paradigm Publishing, Inc.16
  • Slide 17
  • Worm Attacks Paradigm Publishing, Inc.17
  • Slide 18
  • Trojan Horse Paradigm Publishing, Inc.18
  • Slide 19
  • Spyware and Adware Spyware spies on the activity of a computer users. Adware delivers ads. Paradigm Publishing, Inc.19
  • Slide 20
  • How Malware Uses Botnets Paradigm Publishing, Inc.20
  • Slide 21
  • How Malware Is Spread Opening an email attachment that contains an executable file. Downloading a picture with a virus in it. Visiting an infected website. Sharing infected storage devices. Connecting to an infected network. Paradigm Publishing, Inc.21
  • Slide 22
  • Playing It Safe Email chain letters are used to deliver malware. Collect email addresses for spamming. Paradigm Publishing, Inc.22
  • Slide 23
  • Recognizing Secure Sites Familiarity and accreditations. Transport Layer Security (TSL). Site advisors. Use of cookies. Paradigm Publishing, Inc.23
  • Slide 24
  • Defensive Browsing Free offers really arent free. Risks of clicking on links in advertisements. Risks of clicking on email attachments. Paradigm Publishing, Inc.24
  • Slide 25
  • Terms to Know encryption public key private key public key encryption Wi-Fi Protected Access (WPA) Wired Equivalent Privacy (WEP) Paradigm Publishing, Inc.25
  • Slide 26
  • Terms to Know malware spam virus worm Trojan horse macro virus logic bomb virus Paradigm Publishing, Inc.26
  • Slide 27
  • Terms to Know rootkit botnet zombie spyware adware Transport Layer Security (TLS) cookie Paradigm Publishing, Inc.27
  • Slide 28
  • Ask Yourself When looking for a trustworthy retailer, it is best to a.follow an email link from a retailer that has a free offer. b.follow links in an advertisement to locate retailers that provide the item at a good price. c.enter the URL for a brick-and-mortar retail store. d.All of the above Paradigm Publishing, Inc.28
  • Slide 29
  • 8.3 Mobile Security Paradigm Publishing, Inc.29
  • Slide 30
  • Protecting a Laptop Use a lock. Use a fingerprint reader. Activate password protection. Company mobile computing policies. Paradigm Publishing, Inc.30
  • Slide 31
  • Using Public Wi-Fi Access Public computers arent protected. Avoid accessing financial accounts or making purchases. Paradigm Publishing, Inc.31
  • Slide 32
  • Cell Phone Safety Cell phone theft. Exposure when using Bluetooth. Paradigm Publishing, Inc.32
  • Slide 33
  • Ask Yourself What can you do to protect your laptop? a.enable password protection. b.purchase a fingerprint reader c.use a cable and lock. d.All of the above Paradigm Publishing, Inc.33
  • Slide 34
  • 8.4 Security at Work Paradigm Publishing, Inc.34
  • Slide 35
  • Corporate Security Tools Intrusion Prevision System (IPS) Honeypot Symmetric encryption Paradigm Publishing, Inc.35
  • Slide 36
  • Symmetric Encryption Paradigm Publishing, Inc.36
  • Slide 37
  • Controlling Access Physical security. Authentication. Employee training. Paradigm Publishing, Inc.37
  • Slide 38
  • Denial of Service Attacks Paradigm Publishing, Inc.38
  • Slide 39
  • Disaster Planning and Training Disaster recovery plan (DRP). Backing up. Uninterruptable power supply (UPS). Employee training. Paradigm Publishing, Inc.39
  • Slide 40
  • Computers in Your Career Extracting evidence from computers. Decrypting data. Mobile forensics. Paradigm Publishing, Inc.40
  • Slide 41
  • Terms to Know symmetric encryption Intrusion Prevention System (IPS) honeypot social engineer biometrics spoofing Paradigm Publishing, Inc.41
  • Slide 42
  • Terms to Know denial-of-service (DoS) attack disaster recovery plan (DRP) cold server warm server hot server failover Paradigm Publishing, Inc.42
  • Slide 43
  • Terms to Know surge protector uninterruptible power supply (UPS) cyberforensics mobile forensics decryption digital rights management (DRM) Paradigm Publishing, Inc.43
  • Slide 44
  • Ask Yourself What is the process of redirecting users to a hot server called? a.disaster recovery b.failsafe c.failover d.cold server fallback Paradigm Publishing, Inc.44
  • Slide 45
  • 8.5 Security Defenses Everybody Can Use Paradigm Publishing, Inc.45
  • Slide 46
  • Security Defenses Firewalls. Antivirus/antispyware. Using passwords effectively. Paradigm Publishing, Inc.46
  • Slide 47
  • Terms to Know antivirus software antispyware software virus definitions strong password digital certificate digital signature Paradigm Publishing, Inc.47
  • Slide 48
  • Ask Yourself What do some forms of authentication rely on to a great extent? a.strong user passwords b.frequent software updates c.antivirus definitions d.firewalls Paradigm Publishing, Inc.48
  • Slide 49
  • Our Digital World Paradigm Publishing, Inc.49