Computer Concepts – Illustrated 8th edition

Download Report

Transcript Computer Concepts – Illustrated 8th edition

Computer Concepts – Illustrated
8th edition
Unit F: Data Security
Objectives
Know what can go wrong
Protect computer systems
Understand authentication
Explore security threats and malware
Avoid security threats and malware
Computer Concepts – Illustrated 8th Edition
2
Objectives (continued)
Examine network and Internet access
security
Explore Web and email security
Understand backups
Computer Concepts – Illustrated 8th Edition
3
Knowing What Can Go Wrong
Risk management in computer systems
 Identify potential threats to equipment and
data
 Implement plans to avoid threats
 Develop steps to recover from unavoidable
disasters
Possible problems with electricity
 Power failure
 Power spikes (or voltage spikes)
 Power surges
Computer Concepts – Illustrated 8th Edition
4
Knowing What Can Go Wrong
(continued)
Hardware failures
Software failures
Human error
Computer viruses
Safe Mode: a limited version of Windows
that is used to troubleshoot some problems
Cyberterrorism: terrorist acts committed
via the Internet
Computer Concepts – Illustrated 8th Edition
5
Figure F-3: Troubleshooting guidelines
Computer Concepts – Illustrated 8th Edition
6
Protecting Computer Systems
To reduce likelihood of computer theft:
 Use common sense
 Use locking devices
 Use security plates
Tracking and recovery software
 Used to track a computer if stolen
Ways to protect data if computer is stolen
 Software that deletes data if computer is
stolen
 Use of a password to access computer
Computer Concepts – Illustrated 8th Edition
7
Figure F-4: A locking device
Computer Concepts – Illustrated 8th Edition
Figure F-5: A security plate
8
Protecting Computer Systems
(continued)
Protection from power problems
 UPS (uninterruptible power supply)
• Offers the best protection against power
problems
• Provides a continuous supply of power
 Surge strip
• Protects against power surges and voltage
spikes
Most computers have a fan
 Allow for ventilation around the computer
Computer Concepts – Illustrated 8th Edition
9
Understanding Authentication
Authentication protocols
 Used to confirm a person’s identity when he
or she tries to use a computer system
Three common ways to authenticate a user:
 Using something a person carries
 Using something a person knows
 Using a unique physical characteristic
Biometrics: identification on some physical
trait, such as a fingerprint, handprint, etc.
Computer Concepts – Illustrated 8th Edition
10
Figure F-9: Retinal scans are a form of biometric authentication
Computer Concepts – Illustrated 8th Edition
11
Understanding Authentication
(continued)
Two-factor authentication: verifies identity
using two independent elements of
confirmation
User ID: a user’s unique identifier on a
computer or Web page; typically public
Password: verifies a user ID and
guarantees that the user is the person he or
she claims to be
User rights: rules that limit the directories
and files that each user can access
Computer Concepts – Illustrated 8th Edition
12
Exploring Security Threats and
Malware
Malicious code or malware
 Created by hackers, crackers, black hats,
or cybercriminals
Computer virus (or virus)
 Set of program instructions that attaches
itself to a file, reproduces itself, and spreads
to other files on the same computer
Computer worm (or worm)
 Self-copying program that carries out some
unauthorized activity on a victim’s computer
Computer Concepts – Illustrated 8th Edition
13
Figure F-13: A simulated worm attack
Computer Concepts – Illustrated 8th Edition
14
Exploring Security Threats and
Malware (continued)
Trojan horse (or Trojan)
 A program that seems to perform one
function while actually doing something else
Intelligent agent (or bot)
 Software that can automate a task or
autonomously execute a task
 Bad bots are used by hackers for
unauthorized or destructive tasks
Spyware
 A program that secretly gathers personal
information, usually for commercial purposes
Computer Concepts – Illustrated 8th Edition
15
Exploring Security Threats and
Malware (continued)
Malware can:
 Create network traffic jam
 Initiate a denial-of-Service (DoS) attack
 Reconfigure a browser
 Delete and modify files
 Access confidential information
 Disable antivirus and firewall software
 Control your computer
 Degrade performance
Computer Concepts – Illustrated 8th Edition
16
Avoiding Security Threats and
Malware
Some guidelines to avoid threats:
 Install and activate security software
 Keep software and operating system
updated
 Do not open suspicious email attachments
 Obtain software only from reliable sources
 Use security software to scan for malware
 Do not click pop-up ads
 Avoid unsavory Web sites
 Disable the option Hide extensions for
known file types in Windows
Computer Concepts – Illustrated 8th Edition
17
Avoiding Security Threats and
Malware (continued)
Security suite
 Typically includes antivirus, firewall, and
anti-spyware modules
Antivirus software
 Utility software that looks for and removes
viruses, Trojan horses, worms, and bots
 Virus signature
• A section of code that can be used to identify
a known malicious program
Computer Concepts – Illustrated 8th Edition
18
Avoiding Security Threats and
Malware (continued)
Virus definitions
 Contains information that antivirus software
uses to identify and remove malware
 Needs to be updated regularly
Make regular backups of your data
Computer Concepts – Illustrated 8th Edition
19
Examining Network and Internet
Access Security
Wireless networks
 Susceptible to unauthorized access and
use, especially if unsecured
LANjacking or war driving
 Hackers can intercept signals with a Wi-Fi
enabled notebook computer
Wireless encryption
 WEP (Wired Equivalent Privacy)
 WPA (Wi-Fi Protected Access)
 WPA2
Computer Concepts – Illustrated 8th Edition
20
Examining Network and Internet
Access Security (continued)
Wireless network key
 The basis for scrambling and unscrambling
data transmitted between wireless devices
Encryption
 Transforms a message so that its contents
are hidden from unauthorized readers
Firewall
 Software or hardware that filters out
suspicious packets attempting to enter or
leave a computer
Computer Concepts – Illustrated 8th Edition
21
Figure F-20: Windows Firewall settings
Computer Concepts – Illustrated 8th Edition
22
Exploring Web and Email Security
Cookie
 Contains information about the user
 Stored on the user’s hard drive
 Ad-serving cookie
InPrivate feature of Internet Explorer
 No user data is stored after a browsing
session
Antispyware
 Security software designed to identify and
neutralize spyware
Computer Concepts – Illustrated 8th Edition
23
Figure F-23: Anti-Spyware software
Computer Concepts – Illustrated 8th Edition
24
Exploring Web and Email Security
(continued)
Phishing
 Email-based or IM scam that persuades
users to reveal confidential information
Pharming
 Redirects users to fake sites by poisoning a
domain name server with a false IP address
Spam
 Unwanted electronic junk mail
 Techniques to combat spam:
• Email authentication techniques
• Spam filter
Computer Concepts – Illustrated 8th Edition
25
Understanding Backups
Backup: a copy made in case the original
files become damaged
 Full backup (or full-system backup)
 Differential backup
 Incremental backup
Backup storage media include:
 Writable CDs, DVDs, BDs, solid-state
storage cards, tapes, and USB flash drives
Can back up data to a network server
Some Web sites offer Web-based storage
Computer Concepts – Illustrated 8th Edition
26
Understanding Backups (continued)
Backup software is designed to back up
and restore files
Boot disk
 A removable storage medium containing the
operating system files needed to boot a
computer
Recovery CD (or recovery disk)
 A bootable CD, DVD, or other media that
contains a complete copy of a computer’s
hard drive, as it existed when shipped from
the manufacturer
Computer Concepts – Illustrated 8th Edition
27
Talking Points: Prosecuting
Computer Crime
Traditional laws do not cover the range of
possibilities for computer crimes
Computer crime laws
 Many countries have laws that specifically
define computer data and software as
personal property
Computer Concepts – Illustrated 8th Edition
28
Talking Points: Prosecuting
Computer Crime (continued)
Computer crimes include:
 Data diddling
 Identity theft
 Salami shaving
 Denial of service
 Information theft
 Virus distribution
 Vandalism
Are hackers dangerous cyberterrorists or
harmless pranksters?
Computer Concepts – Illustrated 8th Edition
29
Summary
This chapter introduced:
 Potential threats to computer equipment and
data
 Ways to protect computer system hardware
 Authentication
 How to use software to protect or recover
computer data
 How to back up data
 Network and Internet access security
 Different positions on prosecuting computer
crime
Computer Concepts – Illustrated 8th Edition
30