SlideShare a Scribd company logo
1 of 20
Introduction to Computer Science
Security and Privacy
Lecture d
This material (Comp 4 Unit 7) was developed by Oregon Health & Science University, funded by the Department
of Health and Human Services, Office of the National Coordinator for Health Information Technology under
Award Number 90WT0001.
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International
License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
Security and Privacy
Learning Objectives - 1
• Define cybercrime and cybersecurity
(Lecture a)
• List common information technology (IT)
security and privacy concerns (Lecture a)
• List hardware components that are usually
attacked by the hackers (Lecture a)
• Explain some of the common methods of
attack (Lecture b)
2
Security and Privacy
Learning Objectives - 2
• Describe common types of malware
(Lecture b)
• Explain social engineering methods used
by cybercriminals (Lecture b)
• Describe methods and tools available for
protection against cyberattacks (Lecture c)
• Describe practices designed to minimize
the risk of successful cyberattack
(Lecture d)
3
Security and Privacy
Learning Objectives - 3
• Address specifics of wireless device
security (Lecture d)
• Explain security and privacy concerns
associated with EHRs (Lecture e)
• Describe security safeguards used for
health care applications (Lecture e)
• Provide the basics of ethical behavior
online (Lecture e)
4
Safe Practices
• Follow passwords guidelines
• Secure your operating system and files
• Install anti-malware software
• Promptly install security updates
• Engage in safe browsing
• Manage cookies
• Use a firewall
• Know who uses your computer
5
Password Guidelines - 1
• Don’t use something that can be easily
guessed (search for “most common
passwords” to see what NOT to use)
– Family or pet names
– Place or date of birth
• Complexity is good
– Minimum of 8 characters
– Combine uppercase and lowercase letters,
digits, and special characters
6
Password Guidelines - 2
• Protect it
– Never share it with anyone
– Never include it in an email or text
– Don’t write it down
– Don’t store it in an online document
• Use different passwords in different places
• Change passwords regularly; don’t re-use
old passwords
7
Secure Your Operating System
• Install critical operating system updates
– For Windows operating systems, critical
updates fix security flaws and should be
installed immediately
– Optional updates - install only if needed
• Install application software security
patches
8
Install Anti-Malware
(AM) Software
• Commercial AM software is more robust
than free AM software
• AM software works by recognizing
malware signatures databases
– Signature database should be updated daily
• If installing more than one AM, verify that
they are compatible
9
Engage in Safe Browsing
• Do not click a link within an email unless
absolutely sure it is coming from a trusted
source
• When surfing, never click on a pop-up
unless absolutely sure of its owner
• Do not click anywhere on or in the pop-up
window
• Press ALT+F4 to terminate pop-ups
10
Manage Cookies
• Cookie: A text file that a website puts on
your computer
• Cookies cannot harm a computer
• Websites and advertisers use cookies to
gather information about your online
activities
11
Types of Cookies
• First-Party Cookie
– Comes from site you are visiting
– Enables multi-item purchases in a single transaction
• Third-Party Cookie
– Comes from companies authorized by the website’s
owners
– Interested in where you go and what you do, not who
you are
– Visiting a single website can result in multiple third-
party cookies being placed on your computer
12
Use a Firewall
• Permit or deny the ability to connect to
another computer
• Disables ports that should not be open
and restricts use of ports to certain
programs
13
Know Who Uses Your Computer
• Require that all users have their own
account
– Track who has logged in and some of the things
they do while logged in
• Don’t log in using the administrator
account unless necessary
– As soon as you finish the task needing
administrator permission, log out of that account
• Don’t set up users as administrators
14
Additional Internet
Security Considerations
• Never use a public computer to conduct
personal business
• Always log out of any session before
leaving the computer
• Do not click on an email from an unknown
sender
• Do not open or save an email attachment
unless the sender is known and trusted
15
Security and Wireless Networking
• Wireless networks unsecure by their very
nature
– Home networks
– Hot spots
– Campus environments
• Wireless networks are everywhere in
medical environment
– Doctors and nurses move from room to room
constantly
16
Wireless Device Security
• Wireless Access Points (WAPs) must be
configured for security:
– Change default password
– Select unique SSID
– Do not broadcast SSID
– Require WPA2 authentication
– Restrict access to known devices
o Can program MAC addresses into WAP memory
17
Security and Privacy
Summary – Lecture d
• Described practices designed to minimize
the risk of successful cyberattack
• Addressed specifics of wireless device
security
18
Security and Privacy
References – Lecture d
References
SANS. Information Security Policy Templates. [Internet]. 2010 [cited 2011 Nov 07].
Available from: http://www.sans.org/security-resources/policies.
GIAC. The Basics of an IT Security Policy. [Internet]. 2010 [cited 2011 Nov 07]. Available
from: http://www.giac.org/certified_professionals/practicals/gsec/1863.php.
Wikipedia. Firewall (computing). [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Firewall_(computing).
Wikipedia. Antivirus software. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Antivirus_software.
Wikipedia. Malware. [Internet]. 2010 [cited 2011 Nov 07]. Available from:
http://en.wikipedia.org/wiki/Malware.
Wikipedia. Intrusion detection system. [Internet]. 2010 [cited 2011 Nov 07]. Available
from: http://en.wikipedia.org/wiki/Intrusion_detection_system.
IT Security. Create your own security audit. [Internet]. 2010 [cited 2011 Nov 07]. Available
from: http://www.itsecurity.com/features/it-security-audit-010407/.
19
Introduction to Computer Science
Security and Privacy
Lecture d
This material was developed by Oregon
Health & Science University, funded by the
Department of Health and Human Services,
Office of the National Coordinator for Health
Information Technology under Award
Number 90WT0001.
20

More Related Content

What's hot

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and TypesVikram Khanna
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network SecurityAditiPatni3
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniqueswaqasahmad1995
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measuresjoy grace bagui
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet SecurityGerard Lamusse
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeIkhtiar Khan Sohan
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
Network Security
Network SecurityNetwork Security
Network SecurityJoe Baker
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 

What's hot (20)

What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Presentation on Network Security
Presentation on Network SecurityPresentation on Network Security
Presentation on Network Security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 
Computer security
Computer securityComputer security
Computer security
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Network security
Network securityNetwork security
Network security
 
Computer security
Computer securityComputer security
Computer security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Understanding the need for security measures
Understanding the need for security measuresUnderstanding the need for security measures
Understanding the need for security measures
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Modern Network Security Issue and Challenge
Modern Network Security Issue and ChallengeModern Network Security Issue and Challenge
Modern Network Security Issue and Challenge
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Network Security
Network SecurityNetwork Security
Network Security
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
Internet
InternetInternet
Internet
 

Similar to Security & Privacy - Lecture D

Similar to Security & Privacy - Lecture D (20)

Security & Privacy - Lecture C
Security & Privacy - Lecture CSecurity & Privacy - Lecture C
Security & Privacy - Lecture C
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
Network security
Network securityNetwork security
Network security
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)Digital Self Defense (RRLC version)
Digital Self Defense (RRLC version)
 
Week 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptxWeek 5 Security Training Assignment.pptx
Week 5 Security Training Assignment.pptx
 
Securing Devices at Home
Securing Devices at HomeSecuring Devices at Home
Securing Devices at Home
 
Security Basics
Security BasicsSecurity Basics
Security Basics
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Sql securitytesting
Sql  securitytestingSql  securitytesting
Sql securitytesting
 
Firewalls
FirewallsFirewalls
Firewalls
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself CyberCrime in the Cloud and How to defend Yourself
CyberCrime in the Cloud and How to defend Yourself
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 

More from CMDLearning

What is Health Informatics - Lecture B
What is Health Informatics - Lecture BWhat is Health Informatics - Lecture B
What is Health Informatics - Lecture BCMDLearning
 
Evolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture DEvolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture DCMDLearning
 
Evolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture CEvolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture CCMDLearning
 
Evolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture BEvolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture BCMDLearning
 
Evolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture AEvolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture ACMDLearning
 
Public Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture CPublic Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture CCMDLearning
 
Public Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture BPublic Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture BCMDLearning
 
Public Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture APublic Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture ACMDLearning
 
Public Health (Part 1) Lecture C
Public Health (Part 1) Lecture CPublic Health (Part 1) Lecture C
Public Health (Part 1) Lecture CCMDLearning
 
Public Health (Part 1) Lecture B
Public Health (Part 1) Lecture BPublic Health (Part 1) Lecture B
Public Health (Part 1) Lecture BCMDLearning
 
Public Health (Part 1) Lecture A
Public Health (Part 1) Lecture APublic Health (Part 1) Lecture A
Public Health (Part 1) Lecture ACMDLearning
 
Regulating Healthcare - Lecture E
Regulating Healthcare - Lecture ERegulating Healthcare - Lecture E
Regulating Healthcare - Lecture ECMDLearning
 
Regulating Healthcare - Lecture D
Regulating Healthcare - Lecture DRegulating Healthcare - Lecture D
Regulating Healthcare - Lecture DCMDLearning
 
Regulating Healthcare - Lecture C
Regulating Healthcare - Lecture CRegulating Healthcare - Lecture C
Regulating Healthcare - Lecture CCMDLearning
 
Regulating Healthcare - Lecture A
Regulating Healthcare - Lecture ARegulating Healthcare - Lecture A
Regulating Healthcare - Lecture ACMDLearning
 
Regulating Healthcare - Lecture B
Regulating Healthcare - Lecture BRegulating Healthcare - Lecture B
Regulating Healthcare - Lecture BCMDLearning
 
Financing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture CFinancing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture CCMDLearning
 
Financing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture BFinancing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture BCMDLearning
 
Financing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture AFinancing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture ACMDLearning
 
Financing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture DFinancing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture DCMDLearning
 

More from CMDLearning (20)

What is Health Informatics - Lecture B
What is Health Informatics - Lecture BWhat is Health Informatics - Lecture B
What is Health Informatics - Lecture B
 
Evolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture DEvolution of and Trends in Health Care - Lecture D
Evolution of and Trends in Health Care - Lecture D
 
Evolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture CEvolution of and Trends in Health Care - Lecture C
Evolution of and Trends in Health Care - Lecture C
 
Evolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture BEvolution of and Trends in Health Care - Lecture B
Evolution of and Trends in Health Care - Lecture B
 
Evolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture AEvolution of and Trends in Health Care - Lecture A
Evolution of and Trends in Health Care - Lecture A
 
Public Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture CPublic Healthcare (Part 2) Lecture C
Public Healthcare (Part 2) Lecture C
 
Public Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture BPublic Healthcare (Part 2) Lecture B
Public Healthcare (Part 2) Lecture B
 
Public Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture APublic Healthcare (Part 2) Lecture A
Public Healthcare (Part 2) Lecture A
 
Public Health (Part 1) Lecture C
Public Health (Part 1) Lecture CPublic Health (Part 1) Lecture C
Public Health (Part 1) Lecture C
 
Public Health (Part 1) Lecture B
Public Health (Part 1) Lecture BPublic Health (Part 1) Lecture B
Public Health (Part 1) Lecture B
 
Public Health (Part 1) Lecture A
Public Health (Part 1) Lecture APublic Health (Part 1) Lecture A
Public Health (Part 1) Lecture A
 
Regulating Healthcare - Lecture E
Regulating Healthcare - Lecture ERegulating Healthcare - Lecture E
Regulating Healthcare - Lecture E
 
Regulating Healthcare - Lecture D
Regulating Healthcare - Lecture DRegulating Healthcare - Lecture D
Regulating Healthcare - Lecture D
 
Regulating Healthcare - Lecture C
Regulating Healthcare - Lecture CRegulating Healthcare - Lecture C
Regulating Healthcare - Lecture C
 
Regulating Healthcare - Lecture A
Regulating Healthcare - Lecture ARegulating Healthcare - Lecture A
Regulating Healthcare - Lecture A
 
Regulating Healthcare - Lecture B
Regulating Healthcare - Lecture BRegulating Healthcare - Lecture B
Regulating Healthcare - Lecture B
 
Financing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture CFinancing Healthcare (Part 2) Lecture C
Financing Healthcare (Part 2) Lecture C
 
Financing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture BFinancing Healthcare (Part 2) Lecture B
Financing Healthcare (Part 2) Lecture B
 
Financing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture AFinancing Healthcare (Part 2) Lecture A
Financing Healthcare (Part 2) Lecture A
 
Financing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture DFinancing Healthcare (Part 2) Lecture D
Financing Healthcare (Part 2) Lecture D
 

Recently uploaded

Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...gurkirankumar98700
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Niamh verma
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Call Girls Service Chandigarh Ayushi
 
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in FaridabadNepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabadgragteena
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591adityaroy0215
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171Call Girls Service Gurgaon
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Call Girls Noida
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...indiancallgirl4rent
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meetpriyashah722354
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...Gfnyt.com
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Vipesco
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhVip call girls In Chandigarh
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.ktanvi103
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girls Service Chandigarh Ayushi
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Niamh verma
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknowgragteena
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Memriyagarg453
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012Call Girls Service Gurgaon
 

Recently uploaded (20)

Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
Russian Call Girls Lucknow ₹7.5k Pick Up & Drop With Cash Payment 8923113531 ...
 
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
Call Girls Amritsar 💯Call Us 🔝 8725944379 🔝 💃 Independent Escort Service Amri...
 
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...Jalandhar  Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
Jalandhar Female Call Girls Contact Number 9053900678 💚Jalandhar Female Call...
 
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in FaridabadNepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
Nepali Escort Girl * 9999965857 Naughty Call Girls Service in Faridabad
 
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
VIP Call Girl Sector 25 Gurgaon Just Call Me 9899900591
 
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Kolkata Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171VIP Call Girl Sector 32 Noida Just Book Me 9711199171
VIP Call Girl Sector 32 Noida Just Book Me 9711199171
 
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
Vip sexy Call Girls Service In Sector 137,9999965857 Young Female Escorts Ser...
 
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetCall Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Call Girls Chandigarh 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
(Sonam Bajaj) Call Girl in Jaipur- 09257276172 Escorts Service 50% Off with C...
 
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real MeetChandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
Chandigarh Call Girls 👙 7001035870 👙 Genuine WhatsApp Number for Real Meet
 
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR   Call G...
❤️♀️@ Jaipur Call Girls ❤️♀️@ Meghna Jaipur Call Girls Number CRTHNR Call G...
 
Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510Krishnagiri call girls Tamil aunty 7877702510
Krishnagiri call girls Tamil aunty 7877702510
 
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In ChandigarhHot  Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
Hot Call Girl In Chandigarh 👅🥵 9053'900678 Call Girls Service In Chandigarh
 
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
Call Now ☎ 9999965857 !! Call Girls in Hauz Khas Escort Service Delhi N.C.R.
 
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar SumanCall Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
Call Girl Price Amritsar ❤️🍑 9053900678 Call Girls in Amritsar Suman
 
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
Call Girls Service Chandigarh Gori WhatsApp ❤7710465962 VIP Call Girls Chandi...
 
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in LucknowRussian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
Russian Escorts Aishbagh Road * 9548273370 Naughty Call Girls Service in Lucknow
 
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near MeVIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
VIP Call Girls Noida Jhanvi 9711199171 Best VIP Call Girls Near Me
 
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
VIP Call Girls Sector 67 Gurgaon Just Call Me 9711199012
 

Security & Privacy - Lecture D

  • 1. Introduction to Computer Science Security and Privacy Lecture d This material (Comp 4 Unit 7) was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/.
  • 2. Security and Privacy Learning Objectives - 1 • Define cybercrime and cybersecurity (Lecture a) • List common information technology (IT) security and privacy concerns (Lecture a) • List hardware components that are usually attacked by the hackers (Lecture a) • Explain some of the common methods of attack (Lecture b) 2
  • 3. Security and Privacy Learning Objectives - 2 • Describe common types of malware (Lecture b) • Explain social engineering methods used by cybercriminals (Lecture b) • Describe methods and tools available for protection against cyberattacks (Lecture c) • Describe practices designed to minimize the risk of successful cyberattack (Lecture d) 3
  • 4. Security and Privacy Learning Objectives - 3 • Address specifics of wireless device security (Lecture d) • Explain security and privacy concerns associated with EHRs (Lecture e) • Describe security safeguards used for health care applications (Lecture e) • Provide the basics of ethical behavior online (Lecture e) 4
  • 5. Safe Practices • Follow passwords guidelines • Secure your operating system and files • Install anti-malware software • Promptly install security updates • Engage in safe browsing • Manage cookies • Use a firewall • Know who uses your computer 5
  • 6. Password Guidelines - 1 • Don’t use something that can be easily guessed (search for “most common passwords” to see what NOT to use) – Family or pet names – Place or date of birth • Complexity is good – Minimum of 8 characters – Combine uppercase and lowercase letters, digits, and special characters 6
  • 7. Password Guidelines - 2 • Protect it – Never share it with anyone – Never include it in an email or text – Don’t write it down – Don’t store it in an online document • Use different passwords in different places • Change passwords regularly; don’t re-use old passwords 7
  • 8. Secure Your Operating System • Install critical operating system updates – For Windows operating systems, critical updates fix security flaws and should be installed immediately – Optional updates - install only if needed • Install application software security patches 8
  • 9. Install Anti-Malware (AM) Software • Commercial AM software is more robust than free AM software • AM software works by recognizing malware signatures databases – Signature database should be updated daily • If installing more than one AM, verify that they are compatible 9
  • 10. Engage in Safe Browsing • Do not click a link within an email unless absolutely sure it is coming from a trusted source • When surfing, never click on a pop-up unless absolutely sure of its owner • Do not click anywhere on or in the pop-up window • Press ALT+F4 to terminate pop-ups 10
  • 11. Manage Cookies • Cookie: A text file that a website puts on your computer • Cookies cannot harm a computer • Websites and advertisers use cookies to gather information about your online activities 11
  • 12. Types of Cookies • First-Party Cookie – Comes from site you are visiting – Enables multi-item purchases in a single transaction • Third-Party Cookie – Comes from companies authorized by the website’s owners – Interested in where you go and what you do, not who you are – Visiting a single website can result in multiple third- party cookies being placed on your computer 12
  • 13. Use a Firewall • Permit or deny the ability to connect to another computer • Disables ports that should not be open and restricts use of ports to certain programs 13
  • 14. Know Who Uses Your Computer • Require that all users have their own account – Track who has logged in and some of the things they do while logged in • Don’t log in using the administrator account unless necessary – As soon as you finish the task needing administrator permission, log out of that account • Don’t set up users as administrators 14
  • 15. Additional Internet Security Considerations • Never use a public computer to conduct personal business • Always log out of any session before leaving the computer • Do not click on an email from an unknown sender • Do not open or save an email attachment unless the sender is known and trusted 15
  • 16. Security and Wireless Networking • Wireless networks unsecure by their very nature – Home networks – Hot spots – Campus environments • Wireless networks are everywhere in medical environment – Doctors and nurses move from room to room constantly 16
  • 17. Wireless Device Security • Wireless Access Points (WAPs) must be configured for security: – Change default password – Select unique SSID – Do not broadcast SSID – Require WPA2 authentication – Restrict access to known devices o Can program MAC addresses into WAP memory 17
  • 18. Security and Privacy Summary – Lecture d • Described practices designed to minimize the risk of successful cyberattack • Addressed specifics of wireless device security 18
  • 19. Security and Privacy References – Lecture d References SANS. Information Security Policy Templates. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://www.sans.org/security-resources/policies. GIAC. The Basics of an IT Security Policy. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://www.giac.org/certified_professionals/practicals/gsec/1863.php. Wikipedia. Firewall (computing). [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Firewall_(computing). Wikipedia. Antivirus software. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Antivirus_software. Wikipedia. Malware. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Malware. Wikipedia. Intrusion detection system. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://en.wikipedia.org/wiki/Intrusion_detection_system. IT Security. Create your own security audit. [Internet]. 2010 [cited 2011 Nov 07]. Available from: http://www.itsecurity.com/features/it-security-audit-010407/. 19
  • 20. Introduction to Computer Science Security and Privacy Lecture d This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. 20

Editor's Notes

  1. Welcome to the Introduction to Computer Science: Security and Privacy. This is Lecture d. The component, Introduction to Computer Science, provides a basic overview of computer architecture; data organization, representation and structure; the structure of programming languages; and networking and data communication. It also includes the basic terminology of computing.
  2. The objectives for this unit, Security and Privacy, are to: Define cybercrime and cybersecurity List common information technology, or IT, security and privacy concerns List the hardware components that are usually attacked by hackers Explain some of the common methods of attack
  3. Describe common types of malware Explain social engineering methods used by cybercriminals Describe methods and tools available for protection against cyberattacks Describe practices designed to minimize the risk of successful cyberattack
  4. Address specifics of wireless device security Explain security and privacy concerns associated with Electronic Health Records, or EHRs Describe security safeguards used for health care applications And, provide the basics of ethical behavior online
  5. In this lecture, we will describe practices designed to minimize the risk of a successful cyberattack, and address the specifics of wireless device security. Everyone should follow these commonsense safe practices. Although these safe practices cannot eliminate the risk of a hacker penetrating your system or getting access to confidential data, following these practices will significantly reduce the risk. Each of these will be discussed in more detail in this presentation. Following password guidelines. Password guidelines are designed to make guessing or breaking your password more difficult. Securing your operating system and files. Installing anti-malware software. Installing security updates promptly for the operating system and application software. This is essential for eliminating newly-discovered security holes. Engaging in safe browsing. Managing cookies, this is important for your privacy. Using a firewall to minimize risk of intrusion. And, if you are not the only user of the computer system, knowing who else uses it and what administrative right they have.
  6. One safe practice is using passwords. A good rule of thumb is not to use as a password any words or numbers that could be easily guessed. Search the Internet for the most commonly used passwords then don’t use those passwords. - Avoid using your own name and names of family members or pets. - Avoid using your place and date of birth. Use complex passwords. - A complex password is usually at least eight characters in length, and includes at least one uppercase character, one lowercase character, one number, and one special character.
  7. Keep your password a secret. Never send it in an email or a text message. Don’t write it down or store it in an online document. Use different passwords for your different accounts. Hackers know that many people tend to use the same password for all of their online accounts. In addition, it is a good practice to change your password regularly. Many companies require employees to change their password every 30, 60, or 90 days and don’t allow password re-use.
  8. Another safe practice to help prevent becoming a victim of a cyberattack is to secure your computer’s operating system. This includes installing critical updates promptly. Critical updates fix security flaws and should be installed as soon as they are released. Optional updates should not be automatically installed. Install optional updates only if it provides some new functionality that you want or fixes a problem. For example, an optional update that relates to a printer that is not working properly should probably be installed. Sometimes there are releases of application software updates that are critical to computer security. An example is critical security patches from Oracle for its Java product. Always install software security patches right away.
  9. After securing the operating system, another safe practice is to secure your files by installing anti-malware, or AM, protection software. Commercially available AM software is more robust than free AM software. Commercial software will catch and quarantine almost all Trojan, virus, and worm attacks before they do any harm to a computer. AM software works by recognizing patterns and stopping what it considers to be bad behavior. These patterns are known as signatures and should be updated daily to protect computers against new attacks. Before installing more than one anti-malware protection program, verify that they will work together. Some AM software programs do not work well when installed on the same system. Most home systems do not require more than one AM protection software program.
  10. Another safe practice, and a way to protect your computer system, is to engage in safe browsing, which means: Do not click a link within an email unless you are absolutely sure the email is coming from a trusted source. When surfing the web, never click on pop-up windows unless you are absolutely sure of the owner. Some pop-ups may indicate that the computer is infected with a virus or a number of viruses and urge the user to click the pop-up to clean the system. This is a typical scare tactic and clicking such a pop-up will most likely install some form of malware on your computer. To close a pop-up safely, press the key combination ALT and F4. This closes the pop-up without clicking on it, which ensures that the pop-up cannot install any malware.
  11. Cookie management is an important safe practice, too. A cookie is simply a text file that a website stores on your computer. The cookie itself cannot harm your computer. Website owners and advertisers use cookies to track your online activities and preferences, document which web pages you visit, and, among other things, record purchases you make. That information is then used for various purposes, such as welcoming you back to a webpage on your next visit. This is known as personalizing your web experience. The information that cookies track can also be sold to advertisers who use the data to send you targeted ads based on your buying patterns. Have you ever done an Internet search for something and then noticed ads for that item start showing up everywhere you go online? You can thank a cookie for that behavior.
  12. Some people don’t mind having their online activities tracked. Others view it as an invasion of privacy. Users who do not want their actions tracked should not allow first-party cookies to be placed on their computers by website owners. A first-party cookie is a cookie created on your computer by the website you are visiting. These can be very handy, as they allow you to, for example, purchase multiple items from a website in one transaction. Without this ability, you could purchase only one item at a time. Another type of cookie is a third-party cookie. Third-party cookies are placed on your computer by companies authorized by the website owner. These cookies are often used to spy on your online activity—they track your clicks and then gather marketing data to sell to website owners. Note that the originators of third party cookies are usually interested in which sites you visit, not your personal identity. Visiting a single website can result in multiple third-party cookies being placed on your computer. Some experts recommend accepting first-party cookies, rejecting third-party cookies, and allowing session cookies. Session cookies are erased when you close your web browser and are not used to track your online activities.
  13. Using a firewall is another form of protection that secures a system. Firewalls permit or deny a computer’s ability to connect to another computer or network. The firewall may disable what are referred to as “ports” that should not be opened, and restrict the use of ports to certain programs.
  14. Another safe practice to thwart would-be attacks is to require that all computer users have their own user account and password. When each user has their own username and password, you can tell who is logged in to a computer and may be able to track some of the things they do while they are logged in. Do not log in to a computer using an administrator account except to perform some type of administrator task, such as installing software. And, as soon as you are finished with that task, log out of the administrator account. Don’t set up users as computer administrators unless absolutely needed.
  15. Additional Internet security considerations include the following: Never use a public computer to conduct personal business. For example, don’t use a kiosk to check your bank account. Instead, do your personal business from your personal computer that has commercial, up-to-date, AV software installed. ALWAYS log out of any session before leaving a computer. NEVER open an email from an unknown sender. Don’t even click on it. And, NEVER open or save email attachments unless the sender is known and trusted.
  16. Let’s move on to our next topic, security and wireless networking. Wireless networks are unsecure by their very nature; they are open, allowing anybody to connect. Wireless networks include homes, airports, coffee shops, hotels, city-wide wireless access points or WAPs, college campus environments, and hospitals. Wireless networks are ubiquitous in medical environments; doctors and nurses tend to move from room to room, constantly using wireless handheld devices.
  17. Wireless security starts with the configuration of a WAP. An example of a WAP is the wireless router that many computer users have in their homes. In terms of security, WAPs in a corporate environment are much more robust than those used at home. To configure a WAP for security requires changing the router’s default password and configuring the router’s Service Set Identifier, or SSID. Wireless routers are shipped with default passwords, meaning that anyone on the Internet can look up the default password for a router. Routers need to be configured so that they do not broadcast the device’s SSID, which will make it harder for others to find and connect to that wireless network. Good security requires Wi-Fi Protected Access version 2, or WPA2 authentication. Users may be familiar with the Wireless Equivalency Protocol, or WEP, an older technology that should no longer be used. WPA2 protection is a much better choice for restricting access to known devices. Administrators should program Media Access Control, or MAC, addresses into the access point’s configuration. All network interface cards, or NICs, have their own MAC address. Modern WAPs allow administrators to let only recorded MAC addresses authenticate themselves on the web and then communicate wirelessly.
  18. This concludes lecture d of Security and Privacy. In summary, this lecture: Described practices designed to minimize the risk of successful cyberattack And addressed specifics of wireless device security
  19. References slide. No audio.
  20. No audio.