Transcript Topics
2
Paradigm Publishing, Inc.
Computer Concepts
Topics
3
7.1
Unauthorized Access and Unauthorized Use of Computer Resources
7.2
Botnets and Denial of Service Attacks
7.3
Malware Infections
7.4
Phishing, Pharming, and Clickjacking Threats
7.5
Information Privacy
7.6
Mobile Device Security
Chapter Summary
Paradigm Publishing, Inc.
Computer Concepts
Topics
4
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources
Connecting to a network at home,
at work, or at school has many
advantages that include sharing
access to the Internet and its
resources, storage, and software
These advantages do not come
without risk
network attacks at business and
government organizations occur often
Paradigm Publishing, Inc.
Computer Concepts
Topics
5
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Unauthorized access: using a computer, network, or other
resource without permission
Hacker: an individual who accesses a network without
permission
hacking: activities involved in gaining unauthorized entry into a
network’s resources
white hats: hackers with good intentions that attempt to pinpoint
weaknesses in network security
black hats: hackers who gain unauthorized access with malicious
intent to steal data or for other personal gain
Paradigm Publishing, Inc.
Computer Concepts
Topics
6
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
War driving: an individual with a
portable computing device who
drives around trying to connect to
someone else’s unsecured wireless
network
Piggybacking: connecting to
someone else’s wireless network
without the network owner’s intent
or consent to provide access
Paradigm Publishing, Inc.
Computer Concepts
Topics
7
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Unauthorized use: using a computer, network, or other
resource for purposes other than the intended uses
Unauthorized use can occur when an employee uses the
employer’s computer for activities such as:
personal emails
personal printing
personal online shopping
Paradigm Publishing, Inc.
Computer Concepts
Topics
8
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Strong password: a password that is difficult to hack by
humans or password detection software programs
A strong password meets the following criteria:
is a minimum of eight characters
uses a combination of uppercase letters, lowercase letters, numbers,
and symbols
does not contain any dictionary words or words spelled backward
does not contain consecutive or repeated numbers or letters
has no personal information such as a birthdate
Paradigm Publishing, Inc.
Computer Concepts
Topics
9
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Biometric devices: authenticate a person’s identity using
physical characteristics such as a fingerprint, iris scan, or voice
recognition
Paradigm Publishing, Inc.
Computer Concepts
Topics
10
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Firewall: hardware,
software, or a
combination of hardware
and software that blocks
unwanted access to your
network
Paradigm Publishing, Inc.
Computer Concepts
Topics
11
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Encryption: scrambles communications between devices so
that the data is not readable
Wi-Fi Protected Access (WPA) and WPA2: more recent
security standards that authenticate users and employ
sophisticated encryption techniques
Intrusion detection software: analyzes network traffic for
suspicious data and alerts network administrators to possible
system threats
Paradigm Publishing, Inc.
Computer Concepts
Topics
12
7.1 Unauthorized Access and Unauthorized
Use of Computer Resources…continued
Acceptable use policy (AUP): a
written policy that describes for
employees, students, or other
network users the permitted uses for
computing equipment and networks
Paradigm Publishing, Inc.
Computer Concepts
Topics
13
7.2 Botnets and Denial of Service Attacks
Botnet: a collection of zombie computers that work together
to conduct an attack on another network
zombie computer: a computer that is connected to the Internet and is
controlled by a hacker or other cybercriminal without the owner’s
knowledge
Paradigm Publishing, Inc.
Computer Concepts
Topics
14
7.2 Botnets and Denial of Service
Attacks…continued
Generally, the infection happens from one of the following
events:
the individual clicks a link in an email or opens an email attachment
that contains the malicious program code, which is then installed on
the computer
the individual downloads a video, image, or program from a website
without realizing the file is a cover for the malicious program code
the individual simply visits a website without realizing that the
malicious code is being downloaded in the background
Paradigm Publishing, Inc.
Computer Concepts
Topics
15
7.2 Botnets and Denial of Service
Attacks…continued
Once the target computer is infected, it joins the botnet
Paradigm Publishing, Inc.
Computer Concepts
Topics
16
7.2 Botnets and Denial of Service
Attacks…continued
Paradigm Publishing, Inc.
Computer Concepts
Topics
17
7.2 Botnets and Denial of Service
Attacks…continued
Denial of service attack (DoS):
when a network or web server is
overwhelmed with network traffic
in the form of a constant stream
of bogus emails or other
messages to the point that the
server’s response time becomes
slow or shuts down completely
Paradigm Publishing, Inc.
Computer Concepts
Topics
18
CHECK YOUR UNDERSTANDING 1
1.
A type of hacker that breaks into a computer
network to pinpoint network weaknesses is
known as a ___________.
a.
b.
c.
d.
2.
Piggybacker
Black hat
White hat
War logger
4.
War driver
Firewall
Encrypter
White hat
Paradigm Publishing, Inc.
This term refers to a computer that is
controlled by a hacker without the owner’s
knowledge.
a.
b.
c.
d.
Hardware or software that blocks unwanted
access to a network is a(n) _____________.
a.
b.
c.
d.
3.
This type of attack overwhelms a network
server with the intent of slowing or shutting
down the server.
a.
b.
c.
d.
Computer Concepts
Botnet
DoS
Bot
Zombie
Denial of service
Bot attack
Piggybacking
War driving
Topics
19
7.3 Malware Infections
Malware: any type of malicious software program that is
designed to damage, disable, or steal data
Malware programs can:
delete files
damage files
steal personal data
track your activities
display pop-up windows or messages
turn your computer into a zombie
Paradigm Publishing, Inc.
Computer Concepts
Topics
20
7.3 Malware Infections…continued
Virus: a form of malware that
can replicate itself and spread
to other media on the infected
computer and to other
computers on the network
macro virus: a type of virus that
is embedded in a document and
infects the computer when the
user opens the document and
enables a macro
Paradigm Publishing, Inc.
Computer Concepts
Topics
21
7.3 Malware Infections…continued
Worm: a self-replicating program that requires no action on
the part of the user to copy itself to another computer on a
network
Paradigm Publishing, Inc.
Computer Concepts
Topics
22
7.3 Malware Infections…continued
Trojan horse: a program that disguises
itself as a useful program but then
infects your computer with malware
when you run the application
Paradigm Publishing, Inc.
Computer Concepts
Topics
23
7.3 Malware Infections…continued
Rootkit: a program hides on the
infected computer and provides a back
door for a hacker or other cybercriminal
to remotely monitor or take over
control of the PC
back door: way to bypass computer
security
Using the remote access, the hacker or
cybercriminal can run damaging
programs or steal personal information
Paradigm Publishing, Inc.
Computer Concepts
Topics
24
7.3 Malware Infections…continued
Antivirus program: programs
that allow you to schedule
automatic scans to run on a
regular basis
most programs are also set to scan
all incoming emails automatically
Paradigm Publishing, Inc.
Computer Concepts
Topics
25
7.3 Malware Infections…continued
Paradigm Publishing, Inc.
Computer Concepts
Topics
26
7.4 Phishing, Pharming, and Clickjacking
Threats
Identity theft: occurs when an individual’s personal
information is obtained by a criminal who then uses the
information to buy products or services under the victim’s
name or otherwise pose as the victim for financial gain
a growing area of cybercrime
Paradigm Publishing, Inc.
Computer Concepts
Topics
27
7.4 Phishing, Pharming, and Clickjacking
Threats…continued
Phishing: activities that appear
to be initiated by a legitimate
organization (such as one’s bank)
in an attempt to obtain personal
information that can be used in
fraud, theft, or identity theft
Paradigm Publishing, Inc.
Computer Concepts
Topics
28
7.4 Phishing, Pharming, and Clickjacking
Threats…continued
Pharming: the individual is tricked into
entering personal information at a phony
website that appears to be the real
website
spoofing: a sender’s email address is altered
to a phony address that appears legitimate to
the email recipient, or an IP address is altered
to appear to be a trusted source
Paradigm Publishing, Inc.
Computer Concepts
Topics
29
7.4 Phishing, Pharming, and Clickjacking
Threats…continued
Clickjacking: a button, graphic, or
link on a web page appears to be real
but, when clicked, causes malicious
software to run
some clickjacks are used to download a
virus onto a computer
Paradigm Publishing, Inc.
Computer Concepts
Topics
30
CHECK YOUR UNDERSTANDING 2
1.
This type of virus is often embedded in a
Microsoft Office document.
a.
b.
c.
d.
2.
Rootkit virus
Worm virus
Trojan horse virus
Macro virus
4.
Rootkit virus
Worm virus
Macro virus
Logic bomb virus
Paradigm Publishing, Inc.
This term describes activities that appear to
be from legitimate organizations but that
have malicious intent.
a.
b.
c.
d.
This type of virus is hidden from the owner
and allows the computer to be controlled
remotely.
a.
b.
c.
d.
3.
Computer Concepts
Rootkit virus
Logic bomb virus
Phishing
War driving
A phony button, graphic, or link on a website
is used for ______________.
a.
b.
c.
d.
Phishing
Pharming
Spoofing
Clickjacking
Topics
31
7.5 Information Privacy
Information privacy: the right of individuals or
organizations to control the information that is collected about
them
consider all of the websites at which you have set up accounts and the
personal information you provided at each site
consider that some websites track the pages you visit and store
information about you
software may be installed on your computer that is tracking everything
you do
Paradigm Publishing, Inc.
Computer Concepts
Topics
32
7.5 Information Privacy…continued
Cookie: a small text file sent
by a web server to be stored
on your computer’s hard disk
that contains data about you
such as your user name and
the pages you visited
Paradigm Publishing, Inc.
Computer Concepts
Topics
33
7.5 Information Privacy…continued
Spyware: software programs that exist
on your computer without your
knowledge and track your activities
keystroke logger (or keylogger): may be
activated as part of a rootkit or Trojan horse
that records every keystroke you type and
sends it back to a cybercriminal
Adware: software programs responsible
for pop-up ads that appear on your
desktop or while viewing web pages
Paradigm Publishing, Inc.
Computer Concepts
Topics
34
7.5 Information Privacy…continued
Spam: electronic junk mail—
unsolicited emails sent to a large
group of people at the same time
Twitter bots: software
programmed to follow people
based on popular keywords
Paradigm Publishing, Inc.
Computer Concepts
Topics
35
7.5 Information Privacy…continued
To be safe, never post files at a cloud
provider that contains sensitive
information, such as your birthdate
and social security number
At social networks such as Facebook
and Twitter, make sure you review
and change privacy settings so that
only the information you want public
is viewable by anyone
Paradigm Publishing, Inc.
Computer Concepts
Topics
36
7.5 Information Privacy…continued
When shopping online or conducting other business that
requires a financial transaction, make sure the URL at the
website begins with https and that you see a small closed
padlock next to the address bar or in the Status bar of the
browser window
Transport Layer Security (TLS): encrypts transmitted data
so that the data is unreadable if intercepted
Paradigm Publishing, Inc.
Computer Concepts
Topics
37
7.5 Information Privacy…continued
Paradigm Publishing, Inc.
Computer Concepts
Topics
38
7.6 Mobile Device Security
Mobile malware: viruses designed for
mobile devices
Make sure all mobile devices, including
tablets and smartphones, have mobile
security software to prevent malware
infections
Paradigm Publishing, Inc.
Computer Concepts
Topics
39
7.6 Mobile Device Security…continued
The following tools assist with securing mobile devices and data:
physical locks with cables that attach a notebook to a table or desk in a public
place are a deterrent to thieves looking for an easy target
many devices now come equipped with fingerprint readers that restrict access to
the authenticated user only
technology for remote wiping, locking, and tracking of a lost or stolen mobile
device allows the owner to wipe the device clean of data and track the device’s
location
a strong password or passcode for access to the data should be enabled on all
devices; should the device be stolen or lost, the password/passcode may provide
enough time to employ remote wiping utilities
regular backups of data stored on mobile devices should be mandatory
Paradigm Publishing, Inc.
Computer Concepts
Topics
40
7.6 Mobile Device Security…continued
Bluetooth technology, which
wirelessly connects and exchanges
data between two devices in close
proximity, is subject to risk from
intrusion from others within range
Bluetooth range is approximately 30 feet
a risk exists that someone else can
connect to your device and send you a
virus or access personal data
Paradigm Publishing, Inc.
Computer Concepts
Topics
41
CHECK YOUR UNDERSTANDING 3
1.
This is a small text file placed on your hard
drive after visiting a website.
a.
b.
c.
d.
2.
4.
Adware
Spam
Cookie
Keylogger
Paradigm Publishing, Inc.
Bluetooth range is approximately _____ feet.
a.
b.
c.
d.
Spyware
Cookie
Adware
Spam
This type of spyware records everything you
type.
a.
b.
c.
d.
3.
10
20
30
40
Viruses designed for a notebook, tablet, or
smartphone are referred to by this term.
a.
b.
c.
d.
Computer Concepts
Mobile
Mobile
Mobile
Mobile
malware
mania
risk
software
Topics
42
Chapter Summary
After successfully completing this chapter, you are now able to:
Explain various types of network risks that occur when computers are
connected to a network or the Internet
Describe techniques used to protect against network and Internet intrusions
Distinguish various types of malware and methods to prevent malware
Recognize privacy concerns when using the Internet and strategies for
safeguarding personal information
Identify mobile device security risks and techniques for minimizing risk
Paradigm Publishing, Inc.
Computer Concepts
Topics