SlideShare a Scribd company logo
1 of 33
S
Digital Security
Securing Your System:
Protecting Your Digital Data and Devices
CSC 103
Encryption - Decryption
 encryption: The process of scrambling
or hiding data or information so that it
cannot be understood without the key
necessary to view it in its original form.
 plaintext: An original, unencrypted
message or file.
Encryption - Decryption
 ciphertext: An encrypted message or file.
 decryption: The process of removing the
encryption to produce clear text.
 cryptographic key: A specific word,
number, or phrase that must be used to
encrypt or decrypt data.
Encryption - Decryption
Encryption - Decryption
 cryptographic
algorithm:
A specific procedure
for encrypting and
decrypting data.
One letter stands
for another
What can be encrypted?
 Data sent over wired and wifi networks
 Credit Card Info, Bank Account Info
 Personal Information
 Storage volumes
 Individual files
User Authentication
 The process of verifying the identity
of an entity that is attempting to
access a device, network, or web site.
 Examples: passwords, PIN’s,
fingerprint scans, facial recognition.
Two-factor Authentication
 verifying identity
based on two
devices, such as a
password (computer)
and a verification
code (phone).
Hacking Passwords
 Brute force attack: uses password-
cracking software to generate every
possible combination of letters, numerals,
and symbols.
 Dictionary attack: hackers guess your
password by stepping through a dictionary
containing word lists and common
mutations of words.
Password Protection
 Be smart and secure about your passwords.
 Use different passwords for different sites.
 Don’t use terms that people can find on
Social Media - birthdays, addresses,
anniversaries, kids names, pet names,
spouses, etc.
Most Popular Passwords
internethealthreport.org
Online Threats:
Malware
 Malware: malicious software.
 Can gather information though keystrokes.
 Can infect your registry, system files, etc. in
the form of viruses and worms.
 Can lead to extortion – holding your
computer ransom for money
Computer Viruses
 Computer program (malware) that attaches itself
to another computer program (host) and
attempts to spread/replicate itself to other
computers when files are exchanged.
 Requires human interaction to spread
 Some are less dangerous than others.
 Can be eradicated with anti-virus software as
long as anti-virus software is up to date.
Spreading Viruses
 Code Injection: is the process of
modifying an executable file or data
stream by adding additional commands.
 Side-loading: a process where an app
from an un-official app store is installed
on a device.
How to Catch a Virus
 Downloading infected audio & video
files from “free” sites.
 Downloading fake plug-ins (Flash).
 Email attachments (opening)
 Pop-ups or fake update pop-ups
Rootkit Viruses
 Code that is designed to hide the existence
of processes and privileges.
 By bypassing system privileges and
settings, hackers can become shadow
administrators with access to all data
on a device or network.
Worms
 Program that can self distribute
and replicate without any human
interaction.
 Types: mass-mailing worm, internet
worm and file-sharing worm
Script & Macro Viruses
 Script: list of commands (mini-programs
like JavaScript) that can be executed on a
computer without user interaction.
 Macros: a single instruction that expands
automatically into a set of
instructions/actions that perform a
particular task. (Excel, Word)
Trojan Horses
 Trojan Horse: appears to be something useful
or desirable (game or a screen saver), but works
maliciously in the background.
 Can install backdoor programs or rootkits
that Can hide in or modify system files.
 Can allow hackers access or take control of
computer without your knowledge - computer
becomes a zombie.
Virus Symptoms
 Strange icons appear
 Unusual home page
 Odd messages, pop-ups
or sounds
 Corrupt files
 Programs can’t launch
 Computer shuts down without warning
Anti-Virus Software
 Popular products:
Symantec, Kaspersky,
AVG, Avira, Avast
McAfee, Norton
 Run a scan once a week.
Keep updated.
Anti-Virus Software
How they Work:
 Detect: They look for a virus signature
(a portion of code unique to a virus)
 Stop Execution:
Quarantine the virus in a secure area.
 Prevention: Inoculates by recording key
attributes of files and by comparing files
when scanning.
Online Threats:
Spyware
 Spyware: malware that sits on your computer
and spies on you and can transmit information
about you.
 Adware: monitors web browsing activity to
supply data to generate targeted ads.
 Keyloggers can gather information though
keystrokes and browsing habits.
 Man-in-the-middle: Monitor communications
Online Threats:
Phishing & Spear Phishing
 Phishing: Encourages you to download or click
on links and provide personal info or bank
account numbers, etc. Can pose as real
company, representative – check URLs, links,
email addresses, etc.
 Spear phishing can be more targeted to a
specific individual or department.
 Spoofing: Pretend to be someone you’re not,
Altered MAC address or IP address.
Zero-Day Attacks
 Vulnerabilities that have not yet been
discovered.
 Hackers keep these vulnerabilities to
themselves.
 White Hat Hackers: Share these with
developers.
Denial of Service Attacks
 DoS: attack that occurs when legitimate users
are denied access to a computer system because
a hacker is repeatedly flooded by requests that
tie up its resources.
 Can be sent by botnet, (group of robot
programs) to run on network of zombie
computers.
Ransomware
 Your data files (docs, pictures, music,
videos, etc.) are encrypted (held hostage)
until you pay for decryption key (to
untraceable payment system.
 Your OS will still run.
 Huge problem if personal files are not
backed up.
Email & Encryption Viruses
 Email viruses: uses the address book in the
victim’s e-mail system to distribute itself.
 Encryption Viruses: (aka Ransomware)
malicious program that searches for common
data files and compresses them into a file
using a complex encryption key rendering
files unusable. You then receive a message to
send payment in order to fix.
Online: Cookies
 Cookies: small text file that some websites
automatically store on a client computer’s
hard drive when a user visits the site.
 Cookies are not malicious. Some sites may
not work without it. Helps fill in forms and
remember your status for shopping, etc. But
they will remember your browsing habits.
Hackers
 White hat:
Ethical, want to expose weaknesses
or flaws for various reasons
 Black hat:
Destructive, illegal pursuits
 Grey Hat:
Tow the line, may want
to sell services, land a job.
Hacker Tools
 Keylogger:
spyware program that monitors keystrokes in
order to steal passwords, login IDs, or credit
card information.
 Packet Analyzer (sniffer):
device or software program designed to
detect and record digital information being
transmitted over a network (packets).
Protecting Yourself
 Firewalls: help protect the ports of your
networks and computers and keep IP
addresses more secure.
 Mac OSX and Windows come with firewall
protection as do routers.
Protecting Yourself
 Be smart about what sites you visit.
If you visit questionable sites, clear your history,
cache, and your session cookies. If it doesn’t feel
right, or look right, get out.
 Backup Your Data: Cloud, external drives, flash
drives, etc.
 Run your Operating System Software updates –
many include security fixes.

More Related Content

What's hot

Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrimeRahul Sharma
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryrryrsyd
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayKevin Lim
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server SecurityJITENDRA KUMAR PATEL
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelineswebhostingguy
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 

What's hot (20)

System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Malware used in cybercrime
Malware used in cybercrimeMalware used in cybercrime
Malware used in cybercrime
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Computing safety ryr
Computing safety ryrComputing safety ryr
Computing safety ryr
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer virus
Computer virusComputer virus
Computer virus
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Computer security
Computer securityComputer security
Computer security
 
Phishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information HighwayPhishing, Pharming, and the latest potholes on the Information Highway
Phishing, Pharming, and the latest potholes on the Information Highway
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Security threats
Security threatsSecurity threats
Security threats
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Security communication
Security communicationSecurity communication
Security communication
 

Similar to CSC103 Digital Security

Similar to CSC103 Digital Security (20)

Computer security
Computer securityComputer security
Computer security
 
Internet security
Internet securityInternet security
Internet security
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Data security
Data securityData security
Data security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
ADM 316 Workshop 5 Slides
ADM 316 Workshop 5 SlidesADM 316 Workshop 5 Slides
ADM 316 Workshop 5 Slides
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
IT security awareness
IT security awarenessIT security awareness
IT security awareness
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 

More from Richard Homa

Programming 1: Compilers, Interpreters & Bytecode
Programming 1: Compilers, Interpreters & BytecodeProgramming 1: Compilers, Interpreters & Bytecode
Programming 1: Compilers, Interpreters & BytecodeRichard Homa
 
CSC 103 Databases Overview
CSC 103 Databases OverviewCSC 103 Databases Overview
CSC 103 Databases OverviewRichard Homa
 
CSC103 Intro to Programming
CSC103 Intro to ProgrammingCSC103 Intro to Programming
CSC103 Intro to ProgrammingRichard Homa
 
CSC103 Gaming Overview (for Everyone)
CSC103 Gaming Overview (for Everyone)CSC103 Gaming Overview (for Everyone)
CSC103 Gaming Overview (for Everyone)Richard Homa
 
CSC103 3D Software & Technology
CSC103 3D Software & TechnologyCSC103 3D Software & Technology
CSC103 3D Software & TechnologyRichard Homa
 
CSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster GraphicsCSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster GraphicsRichard Homa
 
CSC103 Bits, Bytes & Binary
CSC103 Bits, Bytes & BinaryCSC103 Bits, Bytes & Binary
CSC103 Bits, Bytes & BinaryRichard Homa
 
CSC103 Web Technologies: HTML, CSS, JS
CSC103 Web Technologies: HTML, CSS, JSCSC103 Web Technologies: HTML, CSS, JS
CSC103 Web Technologies: HTML, CSS, JSRichard Homa
 
CSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageCSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageRichard Homa
 
CSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsCSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsRichard Homa
 
CCS103 Bits, Bytes, Binary
CCS103 Bits, Bytes, BinaryCCS103 Bits, Bytes, Binary
CCS103 Bits, Bytes, BinaryRichard Homa
 
CSC103 Digital Images, Pixels, RGB Colors
CSC103 Digital Images, Pixels, RGB ColorsCSC103 Digital Images, Pixels, RGB Colors
CSC103 Digital Images, Pixels, RGB ColorsRichard Homa
 
CSC102 Excel Basics
CSC102 Excel BasicsCSC102 Excel Basics
CSC102 Excel BasicsRichard Homa
 
CSC102 Word Paragraph Formatting
CSC102 Word Paragraph FormattingCSC102 Word Paragraph Formatting
CSC102 Word Paragraph FormattingRichard Homa
 
CSC102 Computer Software
CSC102 Computer SoftwareCSC102 Computer Software
CSC102 Computer SoftwareRichard Homa
 
CSC102 Computer Connectivity
CSC102 Computer ConnectivityCSC102 Computer Connectivity
CSC102 Computer ConnectivityRichard Homa
 
CSC 102 Computer Intro
CSC 102 Computer IntroCSC 102 Computer Intro
CSC 102 Computer IntroRichard Homa
 
Creating Immersive Technology Experiences with Web-based Software & Resources
Creating Immersive Technology Experiences with Web-based Software & ResourcesCreating Immersive Technology Experiences with Web-based Software & Resources
Creating Immersive Technology Experiences with Web-based Software & ResourcesRichard Homa
 

More from Richard Homa (20)

Programming 1: Compilers, Interpreters & Bytecode
Programming 1: Compilers, Interpreters & BytecodeProgramming 1: Compilers, Interpreters & Bytecode
Programming 1: Compilers, Interpreters & Bytecode
 
CSC 103 Databases Overview
CSC 103 Databases OverviewCSC 103 Databases Overview
CSC 103 Databases Overview
 
CSC103 Intro to Programming
CSC103 Intro to ProgrammingCSC103 Intro to Programming
CSC103 Intro to Programming
 
CSC103 Gaming Overview (for Everyone)
CSC103 Gaming Overview (for Everyone)CSC103 Gaming Overview (for Everyone)
CSC103 Gaming Overview (for Everyone)
 
CSC103 3D Software & Technology
CSC103 3D Software & TechnologyCSC103 3D Software & Technology
CSC103 3D Software & Technology
 
CSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster GraphicsCSC103 Vector vs Raster Graphics
CSC103 Vector vs Raster Graphics
 
CSC103 Bits, Bytes & Binary
CSC103 Bits, Bytes & BinaryCSC103 Bits, Bytes & Binary
CSC103 Bits, Bytes & Binary
 
CSC103 Web Technologies: HTML, CSS, JS
CSC103 Web Technologies: HTML, CSS, JSCSC103 Web Technologies: HTML, CSS, JS
CSC103 Web Technologies: HTML, CSS, JS
 
CSC103 Processing, Memory & Storage
CSC103 Processing, Memory & StorageCSC103 Processing, Memory & Storage
CSC103 Processing, Memory & Storage
 
CSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device BasicsCSC103 Digital Devices: Device Basics
CSC103 Digital Devices: Device Basics
 
CSC103 Internet
CSC103 InternetCSC103 Internet
CSC103 Internet
 
CCS103 Bits, Bytes, Binary
CCS103 Bits, Bytes, BinaryCCS103 Bits, Bytes, Binary
CCS103 Bits, Bytes, Binary
 
CSC103 Digital Images, Pixels, RGB Colors
CSC103 Digital Images, Pixels, RGB ColorsCSC103 Digital Images, Pixels, RGB Colors
CSC103 Digital Images, Pixels, RGB Colors
 
Excel Review Quiz
Excel Review QuizExcel Review Quiz
Excel Review Quiz
 
CSC102 Excel Basics
CSC102 Excel BasicsCSC102 Excel Basics
CSC102 Excel Basics
 
CSC102 Word Paragraph Formatting
CSC102 Word Paragraph FormattingCSC102 Word Paragraph Formatting
CSC102 Word Paragraph Formatting
 
CSC102 Computer Software
CSC102 Computer SoftwareCSC102 Computer Software
CSC102 Computer Software
 
CSC102 Computer Connectivity
CSC102 Computer ConnectivityCSC102 Computer Connectivity
CSC102 Computer Connectivity
 
CSC 102 Computer Intro
CSC 102 Computer IntroCSC 102 Computer Intro
CSC 102 Computer Intro
 
Creating Immersive Technology Experiences with Web-based Software & Resources
Creating Immersive Technology Experiences with Web-based Software & ResourcesCreating Immersive Technology Experiences with Web-based Software & Resources
Creating Immersive Technology Experiences with Web-based Software & Resources
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 

CSC103 Digital Security

  • 1. S Digital Security Securing Your System: Protecting Your Digital Data and Devices CSC 103
  • 2. Encryption - Decryption  encryption: The process of scrambling or hiding data or information so that it cannot be understood without the key necessary to view it in its original form.  plaintext: An original, unencrypted message or file.
  • 3. Encryption - Decryption  ciphertext: An encrypted message or file.  decryption: The process of removing the encryption to produce clear text.  cryptographic key: A specific word, number, or phrase that must be used to encrypt or decrypt data.
  • 5. Encryption - Decryption  cryptographic algorithm: A specific procedure for encrypting and decrypting data. One letter stands for another
  • 6. What can be encrypted?  Data sent over wired and wifi networks  Credit Card Info, Bank Account Info  Personal Information  Storage volumes  Individual files
  • 7. User Authentication  The process of verifying the identity of an entity that is attempting to access a device, network, or web site.  Examples: passwords, PIN’s, fingerprint scans, facial recognition.
  • 8. Two-factor Authentication  verifying identity based on two devices, such as a password (computer) and a verification code (phone).
  • 9. Hacking Passwords  Brute force attack: uses password- cracking software to generate every possible combination of letters, numerals, and symbols.  Dictionary attack: hackers guess your password by stepping through a dictionary containing word lists and common mutations of words.
  • 10. Password Protection  Be smart and secure about your passwords.  Use different passwords for different sites.  Don’t use terms that people can find on Social Media - birthdays, addresses, anniversaries, kids names, pet names, spouses, etc.
  • 12. Online Threats: Malware  Malware: malicious software.  Can gather information though keystrokes.  Can infect your registry, system files, etc. in the form of viruses and worms.  Can lead to extortion – holding your computer ransom for money
  • 13. Computer Viruses  Computer program (malware) that attaches itself to another computer program (host) and attempts to spread/replicate itself to other computers when files are exchanged.  Requires human interaction to spread  Some are less dangerous than others.  Can be eradicated with anti-virus software as long as anti-virus software is up to date.
  • 14. Spreading Viruses  Code Injection: is the process of modifying an executable file or data stream by adding additional commands.  Side-loading: a process where an app from an un-official app store is installed on a device.
  • 15. How to Catch a Virus  Downloading infected audio & video files from “free” sites.  Downloading fake plug-ins (Flash).  Email attachments (opening)  Pop-ups or fake update pop-ups
  • 16. Rootkit Viruses  Code that is designed to hide the existence of processes and privileges.  By bypassing system privileges and settings, hackers can become shadow administrators with access to all data on a device or network.
  • 17. Worms  Program that can self distribute and replicate without any human interaction.  Types: mass-mailing worm, internet worm and file-sharing worm
  • 18. Script & Macro Viruses  Script: list of commands (mini-programs like JavaScript) that can be executed on a computer without user interaction.  Macros: a single instruction that expands automatically into a set of instructions/actions that perform a particular task. (Excel, Word)
  • 19. Trojan Horses  Trojan Horse: appears to be something useful or desirable (game or a screen saver), but works maliciously in the background.  Can install backdoor programs or rootkits that Can hide in or modify system files.  Can allow hackers access or take control of computer without your knowledge - computer becomes a zombie.
  • 20. Virus Symptoms  Strange icons appear  Unusual home page  Odd messages, pop-ups or sounds  Corrupt files  Programs can’t launch  Computer shuts down without warning
  • 21. Anti-Virus Software  Popular products: Symantec, Kaspersky, AVG, Avira, Avast McAfee, Norton  Run a scan once a week. Keep updated.
  • 22. Anti-Virus Software How they Work:  Detect: They look for a virus signature (a portion of code unique to a virus)  Stop Execution: Quarantine the virus in a secure area.  Prevention: Inoculates by recording key attributes of files and by comparing files when scanning.
  • 23. Online Threats: Spyware  Spyware: malware that sits on your computer and spies on you and can transmit information about you.  Adware: monitors web browsing activity to supply data to generate targeted ads.  Keyloggers can gather information though keystrokes and browsing habits.  Man-in-the-middle: Monitor communications
  • 24. Online Threats: Phishing & Spear Phishing  Phishing: Encourages you to download or click on links and provide personal info or bank account numbers, etc. Can pose as real company, representative – check URLs, links, email addresses, etc.  Spear phishing can be more targeted to a specific individual or department.  Spoofing: Pretend to be someone you’re not, Altered MAC address or IP address.
  • 25. Zero-Day Attacks  Vulnerabilities that have not yet been discovered.  Hackers keep these vulnerabilities to themselves.  White Hat Hackers: Share these with developers.
  • 26. Denial of Service Attacks  DoS: attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly flooded by requests that tie up its resources.  Can be sent by botnet, (group of robot programs) to run on network of zombie computers.
  • 27. Ransomware  Your data files (docs, pictures, music, videos, etc.) are encrypted (held hostage) until you pay for decryption key (to untraceable payment system.  Your OS will still run.  Huge problem if personal files are not backed up.
  • 28. Email & Encryption Viruses  Email viruses: uses the address book in the victim’s e-mail system to distribute itself.  Encryption Viruses: (aka Ransomware) malicious program that searches for common data files and compresses them into a file using a complex encryption key rendering files unusable. You then receive a message to send payment in order to fix.
  • 29. Online: Cookies  Cookies: small text file that some websites automatically store on a client computer’s hard drive when a user visits the site.  Cookies are not malicious. Some sites may not work without it. Helps fill in forms and remember your status for shopping, etc. But they will remember your browsing habits.
  • 30. Hackers  White hat: Ethical, want to expose weaknesses or flaws for various reasons  Black hat: Destructive, illegal pursuits  Grey Hat: Tow the line, may want to sell services, land a job.
  • 31. Hacker Tools  Keylogger: spyware program that monitors keystrokes in order to steal passwords, login IDs, or credit card information.  Packet Analyzer (sniffer): device or software program designed to detect and record digital information being transmitted over a network (packets).
  • 32. Protecting Yourself  Firewalls: help protect the ports of your networks and computers and keep IP addresses more secure.  Mac OSX and Windows come with firewall protection as do routers.
  • 33. Protecting Yourself  Be smart about what sites you visit. If you visit questionable sites, clear your history, cache, and your session cookies. If it doesn’t feel right, or look right, get out.  Backup Your Data: Cloud, external drives, flash drives, etc.  Run your Operating System Software updates – many include security fixes.