opennowintroduction to computing module 16: information

28
1 OpenNow Introduction to Computing Module 16: Information Security Unit05 Technology Vulnerabilities

Upload: others

Post on 25-Dec-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: OpenNowIntroduction to Computing Module 16: Information

1

OpenNow Introduction to ComputingModule 16: Information Security

Unit05 Technology Vulnerabilities

Page 2: OpenNowIntroduction to Computing Module 16: Information

2

Introduction to Information Security

Information Security – refers to the protection of computers and other digital devices, information systems, data, and information against unauthorized access, use, manipulation, or destruction

In this module, you will learn about

•Data Loss Prevention

•Authentication

•Encryption

•Data Backup

•Network Security

•Permissions

• Interior Threats

•Network Usage Policy

•Wireless Security

• Internet Security

•Hacker

•Firewall

•Software Update

•Malware

•Antivirus Software

•Botnet

•Cyberwarfare

• Identity Theft

• Internet Fraud

•Digital Certificate

•Phishing Scam

• Information Security Laws

Page 3: OpenNowIntroduction to Computing Module 16: Information

Lesson 16.1

Data Loss Prevention

Page 4: OpenNowIntroduction to Computing Module 16: Information

4

Data Loss Prevention: Introduction

Machine-Level Security – refers to actions taken to protect information on a computer that may or may not be connected to a computer network or the Internet

•Information security is implemented at multiple levels, including• Individual machine level•Computer network level• Internet level

•The Internet level offers the greatest degree of exposure and risk

•Security precautions for individual PCs include•Limiting access •Using passwords

•Using encryption•Keeping backups

Page 5: OpenNowIntroduction to Computing Module 16: Information

5

Data Loss Prevention: AuthenticationAuthentication – a security process in which the identity of a person is verified

•Use of a username and password is the most common form of authentication

•Forms of authentication include

•Something you know (e.g., PIN, password)

•Something you have (e.g., smart card, badge)

- these are called authentication tokens

•Something about you (e.g. fingerprint, retinal scan)

-A retinal scan is a biometric technique that analyzes the blood vessels at the back of theeye

•Two-step verification requires a password and a verification code

•Password manager software can help deal with the large number of passwordsusers are not required to have.

Page 6: OpenNowIntroduction to Computing Module 16: Information

6

Data Loss Prevention: Encryption

Encryption – a security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the sender and recipient

•Data can be stolen

• If an electronic device is lost

• If an electronic device is accessed by a hacker

•While in transit over a computer network

•Encryption can protect data but not 100%

•Encryption and decryption tends to slow down a computer slightly

•HTTPS:// in the address bar identifies a secure connection

•Video: Asymmetric Encryption

Page 7: OpenNowIntroduction to Computing Module 16: Information

7

Data Loss Prevention: Data Backup

Data backup – a process in which copies of important computer files are stored in a safe place to guard against data loss

•Data loss can occur due to•Hardware failure•Human error•Software corruption•Hackers and malware

•Natural disasters

•Back up your data to protect it

•System recovery disk or rescue disk can be used to repair damaged system files. Operating systems typically provide a way for users to create a system recovery disk if not provided by the manufacturer.

Photo: Carbonite Web Site

Source: Carbonite/Fair Use

Page 8: OpenNowIntroduction to Computing Module 16: Information

Lesson 16.2

Network Security

Page 9: OpenNowIntroduction to Computing Module 16: Information

9

Network Security: Introduction

Network security – is concerned with addressing vulnerabilities and threats in computer networks that may or may not be connected to the Internet.

•Security risks increase one hundredfold when a computer is connected to a network because of an increased risk of unauthorized access

•Wireless networks are more vulnerable to security breaches

•System administrator decides who has access to which network resources

•There are tools available to help the system administrator protect the network

Page 10: OpenNowIntroduction to Computing Module 16: Information

10

Network Security: Permissions

Permissions – refers to the specific access privileges afforded to each network user and each system resource in terms of which files, folders, and drives each user can read, write, and execute

Multiuser systems present privacy and security issuessince resources are shared.

•Also called file system permissions

•Access policies must be defined for both the resources and the users

• The system administrator is responsible setting the access rights of users and for setting the permissions on system resources

•Permission policies are applied as each user logs on

Photo: Mac OS Folder Security Dialog

Source: Apple Inc./Fair Use

Page 11: OpenNowIntroduction to Computing Module 16: Information

11

Network Security: Interior Threats

Interior threats – network security threats that originate from within a network, typically from registered users (but not always)

•Can be intentional (e.g. disgruntled employees) or unintentional (mistakes)

•Types of mistakes include

•Data-entry errors• Errors in computer programming

• Improper installation and setup of computer systems

•Mishandling of computer output such as accidently sending a reply-all email response containing confidential information

•Uniformed dangerous computer activity

• Inadequate planning for and control of equipment malfunctions

• Inadequate planning for and control of electrical problems, humidity problems, and other environmental difficulties

Page 12: OpenNowIntroduction to Computing Module 16: Information

12

Network Security: Network Usage Policy

Network usage policy – a document, agreement, or contract that defines acceptable and unacceptable uses of computer and network resources for a business or organization

•Define what is permitted on a network

•Protects users from unintentionally using the network in a way that is unacceptable to the network owner

•Can be grounds for dismissal if not followed

•Users are often asked to agree to the terms of the policy and sign a contract stating the understand and agree

•Usage policies often address• Network and computer use – such as not using company computer for private business• Email use – such as restricting emails to company business• Internet use – such as restricting accessing peer-to-peer file sharing

Page 13: OpenNowIntroduction to Computing Module 16: Information

13

Network Security: Wireless Security

Wireless security – refers to the unique threats and defenses associated with wireless computer networks

•Wi-Fi networks use an access point

•Access points broadcast their presence by default

•Anyone within range can connect to the access point

•Protect a wireless network by changing the default password for the access point to a secure password

•Follow other security measures to protect your wireless network

•Common hacker trick is to set up a computer to masquerade as a free Wi-Fi network in a public space; this is called an evil twin

•Video: WiFi Hacking

Photo: Mac OS Network Screen

Source: Apple, Inc./Fair Use

Page 14: OpenNowIntroduction to Computing Module 16: Information

Lesson 16.3

Internet Security

Page 15: OpenNowIntroduction to Computing Module 16: Information

15

Internet Security: Introduction

Internet security – refers to the unique threats and defenses associated with computers connected to the Internet

•Your IP address is registered and known to others; every connected device has a unique IP address

•Attacks can be•Direct attacks by hackers (system penetration)•Through malware (e.g. worms and viruses)•Via spyware (e.g.•Through scams

•Four pillars of Internet security are

•Use a firewall (software and/or hardware) to block malicious contact

• Install software updates

•Use security software

•Practice safe online behavior

Page 16: OpenNowIntroduction to Computing Module 16: Information

16

Internet Security: Hacker

Hacker – an individual who subverts computer security without authorization; also called cracker, attacker, or intruder, with each term have a slightly different meaning

•Hacker collectives like Anonymous hack systems for perceived righteous causes

•Not all hackers are criminals; not all are unethical. Types of hackers include

•black-hat – use security vulnerabilities to gain unlawful access for unethical purposes

•white-hat – trying to call attention to flaws in security so they can be fixed

• gray-hat – a hacker of questionable ethics

• script kid (kiddie) – a nontechnical user following instructions of others to hack networks

• and hacktivist – hacks networks for a social cause or perceived greater good

•Most hacking exploits security flaws in Internet software

•Hacking tools include• Key-logging software• Packet-sniffing software• Post-scanning software

• Wireless network scanning software• Social engineering

Page 17: OpenNowIntroduction to Computing Module 16: Information

17

Internet Security: Firewall

Firewall – network hardware or software that examines data packets flowing in and sometimes out of a network or computer in order to filter out packets that are potentially dangerous •Can prevent infected computers from operating under the control of a hacker

•Protects all ports of a network or PC from intruders and guars against known methods of attack

•Network administrators can use a firewall to filter particular types of activities

Photo: “My Virus Infected Computer”

Source: koolkat_one/CC 2.0

Page 18: OpenNowIntroduction to Computing Module 16: Information

18

Internet Security: Software Update

Software update, also called a security patch – fixes bugs and flaws and is typically distributed to software users through online software updates

•Critical software flaws are holes that hackers can exploit

•Software updates help “fill” those holes

•Users can adjust settings to update automatically

•Be sure to update operating systems, web browsers, browser plug-ins, and othernetwork and Internet software Photo: “iPhone 1.1.1”

Source: mysistersabarista/CC 2.0

Page 19: OpenNowIntroduction to Computing Module 16: Information

19

Internet Security: Malware

Malware, short for malicious software – includes any software designed to damage, corrupt, or illegally manipulate computer resources

•Common forms include

•Viruses – attaches itself to a file, can also be delivered via a Trojan horse or backdoor Trojan that appears to be a harmless program

•Worms – does not attach itself to a file but replicates itself

•Spyware – usually installed without the users knowledge

•A computer that carries out actions (often malicious) under the control of a hacker is called a zombie

•Beware of scams to download illegitimate “virus protection” software

Page 20: OpenNowIntroduction to Computing Module 16: Information

20

Internet Security: Antivirus Software

Antivirus software, also known as virus protection software -- uses several techniques to find malware on a computer system; remove it if possible; and keep additional malware from infecting the system•Must be running continuously and updated automatically to be effective

•Often packaged with firewall and backup software, as well as other security tools

•In addition to using antivirus software, practice safe computing, e.g. scan email attachments to be sure they are not infected

Photo: Windows Defender

Source: Microsoft Corporation/Fair Use

Page 21: OpenNowIntroduction to Computing Module 16: Information

21

Internet Security: Botnet

Botnet, also called botnet army – refers to a collection of computers autonomously or automatically working together toward some goal; these zombie computers are often synchronized to perform illegal activities on the Internet

•Botnets harness the power of hundreds of thousands of compromised computers to carry out attacks over the Internet

•Devices (e.g., computers and devices on the Internet of Things) become soldiers in a botnet army when they are infected with malware

•The power of a botnet can surpass the power of a supercomputer, which means they can crack encryption codes and hack accounts through brute force

Page 22: OpenNowIntroduction to Computing Module 16: Information

22

Internet Security: Cyberwarfare

Cyberwarfare – extends traditional forms of warfare to the Internet and the web, including espionage, psychological warfare, and attacks

•Serious and a well-known threat to nations

•US-CERT established to monitor security of U.S. networks and the Internet, as well as respond to cyberwarfare and cyberterrorism

•Currently no global cybercrime laws so fighting cyberattacks internationally is difficult

•Video: The Future of Cyberwarfare

Photo: “67718”

Source: Catalyst Research Institute/CC PDM 1.0

Page 23: OpenNowIntroduction to Computing Module 16: Information

23

Internet Security: Identity Theft

Identity theft – the criminal act of stealing information about a person to assume that person’s identity in order to commit fraud or other crimes

•Methods used to steal identities include

•Dumpster diving (going through someone’s trash)

•Phishing (obtaining information via a fake website that looks like a reputable website)

•Social engineering (uses social interactions to obtain personal information)

•Purchasing personal information from other thieves

•To protect your personal information, always be cautious with it, such as keeping your social security number private

Page 24: OpenNowIntroduction to Computing Module 16: Information

24

Internet Security: Internet Fraud

Internet Fraud – the crime of deliberately deceiving a person over the Internet in order to damage them or to obtain property or services unlawfully

•Common types of Internet fraud include

• Internet auction fraud

•Non-delivery of merchandise

•Credit card and check fraud

•Phony loan and bank websites

•Nigerian letter fraud and other similar frauds

•Spoofing

•Social network sites are also major tools for fraudsters

Page 25: OpenNowIntroduction to Computing Module 16: Information

25

Internet Security: Digital Certificate

Digital certificate, also called SSL certificate – type of electronic business card that is attached to Internet transaction data to verify the sender of the data

•Used to identify businesses, organizations, or people are indeed who they say they are

•Obtained from certification authorities, such as Thawte

•A closed lock appears on a webpage when the connection to the webpage is secure

Photo: Certificate for mail.google.com

Source: Google Inc./Fair Use

Page 26: OpenNowIntroduction to Computing Module 16: Information

26

Internet Security: Phishing Scam

Phishing scam – combines fraudulent email with faked websites in order to trick a person into providing private information that can be used in identity theft

•Phishing tactics include

•Spoofing, which is the act of impersonating a person, business, or organization on the web or through email

•Spear fishing, which uses private or personal information to target a specific individual

•Pharming, uses a hijacked DNS server to redirect users from a legitimate website to a spoofed website

•To protect yourself from phishing type URLs instead of clicking links in emails

Page 27: OpenNowIntroduction to Computing Module 16: Information

27

Internet Security: Information Security Laws

Internet Security Laws – seek to protect the civil rights population from abuses of information systems and the Internet

•A number of U.S. laws have been created for the purpose of securing information and protecting privacy including•Consumer Internet Privacy Protection Act of 1997

•Children’s Online Privacy Protection Act of 2000

• Information Protection and Security Act of 2005

•Notification of Risk to Personal Data Act of 2003

• Identity Theft Protection Act of 2005

•And more

Page 28: OpenNowIntroduction to Computing Module 16: Information

28

Adaptation by Diana Schab of OpenNowIntroComputingMod16_InformationSecurity.pptx, Authored by Cengage Learning. Creative Commons Attribution 4.0 International (CC BY 4.0)

Attribution