SlideShare a Scribd company logo
1 of 46
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Introductory Visualizing Technology
Sixth Edition
Chapter 10
Security and Privacy
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objectives
10.1 Recognize Different Types of Cybercrime
10.2 Differentiate between Various Types of Malware
10.3 Explain How to Secure a Computer
10.4 Practice Safe Computing
10.5 Discuss Laws Related to Computer Security and Privacy
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objective 10.1
Recognize Different Types of Cybercrime
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Recognize Different Types of Cybercrime
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Personal
Cybercrime (1 of 2)
• Harassment
✓Cyberbullying: between two minors
✓Cyber-harassment: between adults
✓Cyber-stalking:
• More serious in nature
• Stalker demonstrates a pattern of harassment
• Poses a credible threat of harm
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Personal
Cybercrime (2 of 2)
• Phishing
✓Email messages and IMs
✓Appear to be from someone with
whom you do business
✓Designed to trick you into providing
usernames and passwords
• Pharming
✓Redirects you to a phony website even if you type the URL
✓Hijacks a company’s domain name
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Social Network
Attacks (1 of 4)
• Adware and other malware
• Suspicious emails and notifications
Appear to be from a site administrator
• Asking for your password
• Threatening to suspend your account
• Phishing and "Please send money" scams
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Social Network
Attacks (2 of 4)
• Clickjacking
Clicking on a link allows this malware to post unwanted links
on your page
• Malicious script scams
You copy and paste some text into your address bar
It might execute a malicious script
 Creates pages and events
 Sends spam out to your friends
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Social Network
Attacks (3 of 4)
• Fraud
Schemes that convince you to give money or property to a
person
Shill bidding is fake bidding to drive up the price of an item
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Social Network
Attacks (4 of 4)
• Identity theft
The use of your name, Social Security number, or bank or credit
cards for financial gain
Keyloggers
• Programs or devices that
capture what is typed
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Cybercrime
Against Organizations (1 of 2)
• Hacking
White-hat or “sneakers”
• Attempt to find security holes in a system to prevent future hacking
Black-hat or “crackers”
• Malicious intent
Gray-hat
• Illegal but not malicious intent
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Cybercrime: They Are Out to Get You – Cybercrime
Against Organizations (2 of 2)
• Hacktivism
Hacking to make a political statement
• Data breach
Sensitive data is stolen or viewed by someone not authorized
• Cyber-terrorism
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objective 10.2
Differentiate between Various Types of Malware
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Differentiate between Various Types of Malware
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware:Pick Your Poison–Spam and Cookies (1 of 3)
• Includes different types of programs designed to be
harmful or malicious
Spam
Adware and spyware
Viruses
Worms
Trojan horses
Rootkits
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware:Pick Your Poison–Spam and Cookies (2 of 3)
• Spam
✓Spamming is sending mass unsolicited emails
✓Messages are called spam
✓Other forms:
• Fax spam
• IM spam
• Text spam
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware:Pick Your Poison–Spam and Cookies (3 of 3)
• Cookies
✓Installed without your
permission
✓Help websites identify you
when you return
 Track websites and pages
you visit to better target ads
 May collect information you don’t
want to share
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware:Pick Your Poison–Adware andSpyware(1of 2)
• Adware
✓Pop-ups or banner ads
✓Generate income
✓Use CPU cycles and Internet bandwidth
✓Reduce PC performance
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware:Pick Your Poison–Adware andSpyware(2of 2)
• Spyware
✓Malware
✓Secretly gathers personal information
✓Usually installed by accident
✓Browser hijacker
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware: Pick Your Poison – Viruses, Worms, Trojans,
and Rootkits (1 of 5)
• Virus - a program that replicates itself and infects
computers
Needs a host file
May use an email program to infect
other computers
The attack is called the payload
Check to see if message is a hoax
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware: Pick Your Poison – Viruses, Worms, Trojans,
and Rootkits (2 of 5)
• Logic Bomb
✓Behaves like a virus
✓Performs malicious act
✓Does not replicate
✓Attacks when certain conditions are met
• Time Bomb
✓A logic bomb with a trigger that is a specific time or date
 April Fool’s Day
 Friday the 13th
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware: Pick Your Poison – Viruses, Worms, Trojans,
and Rootkits (3 of 5)
• Worms
✓Self-replicating
✓Do not need a host to travel
✓Travel over networks to infect other machines
✓Conficker worm
 First released in 2008
 Reemerged in 2010 with new behaviors
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware: Pick Your Poison – Viruses, Worms, Trojans,
and Rootkits (4 of 5)
• Botnet
Network of computer zombies or bots controlled by a master
Fake security notifications
Denial-of-service attacks
• Cripple a server or network by sending out excessive traffic
• Trojan horse
Appears to be legitimate program
Actually malicious
Might install adware, a toolbar, a keylogger, or open a
backdoor
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Malware: Pick Your Poison – Viruses, Worms, Trojans,
and Rootkits (5 of 5)
• Ransomware
Malware that prevents you from using your computer until you
pay a fine or fee
Bitcoin is an anonymous, digital, encrypted currency
• Rootkit
Set of programs
Allows someone to gain control over system
Hides the fact that the computer has been compromised
Nearly impossible to detect
Masks behavior of other malware
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objective 10.3
Explain How to Secure a Computer
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Explain How to Secure a Computer
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Shield’s Up – Software (1 of 2)
• Drive-by download
A visited website installs a program in the background without
your knowledge
• Firewall
Hardware device that blocks
access to your network
Software that blocks access
to an individual machine
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Shield’s Up – Software (2 of 2)
• Antivirus program
Protects against viruses, Trojans, worms, spyware
Windows 10 includes Windows Defender
• An antispyware program that performs both real-time protection
and system scanning
• Antispyware software
Prevents adware and spyware from installing
• Security suite
Package of security software
Combination of features
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Shield’s Up – Hardware (1 of 2)
• Router
Connects two or more networks together
Home router acts like firewall
• Network address translation (NAT)
Security feature of a router
Shields devices on private network from
the public network
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Shield’s Up – Hardware (2 of 2)
• SSID (Service Set Identifier)
Wireless network name
• Wireless encryption
Adds security by encrypting transmitted data
Wi-Fi Protected Setup (WPS) is one option
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Shield’s Up – Operating System
• Most important piece of
security software
• Keep patched and
up-to-date
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objective 10.4
Practice Safe Computing
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Practice Safe Computing
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
An Ounce of Prevention is Worth a Pound of Cure –
User Accounts
• Three user account types
Standard
Administrator
Guest
• User Account Control (UAC) notifies you prior to changes
made to your computer
Do not turn this feature off
Always read message before clicking Yes
• Malware tricks users into clicking fake Windows
notifications
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
An Ounce of Prevention is Worth a Pound of Cure –
Passwords
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
An Ounce of Prevention is Worth a Pound of Cure –
Encryption
• Converts plain text into ciphertext
• Must have a key to decrypt it
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
An Ounce of Prevention is Worth a Pound of Cure –
Safely Installing Software
• Copies files to the computer
• Alters settings
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
An Ounce of Prevention is Worth a Pound of Cure –
Updating and Installing Software
• Protect yourself from downloading problems
Only download from reliable sources
• Zero-day exploit
Attack that occurs on the day an exploit is discovered
before the publisher can fix it
• Bugs
Flaws in the programming of software
Patch or hotfix
Service pack
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
An Ounce of Prevention is Worth a Pound of Cure –
Acceptable Use Policies (AUP)
• Common in businesses and schools
• Rules for computer and network users
• Depend on:
 Type of business
 Type of information
• Force users to practice safe
computing
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Learning Objective 10.5
Discuss Laws Related to Computer Security and Privacy
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Discuss Laws Related toComputer Security andPrivacy
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
The Law is on Your Side – The Enforcers
• No single authority responsible for
investigating cybercrime
• Internet Crime Complaint Center
(IC3)
Place for victims to report cybercrimes
ic3.gov
Reports processed and forwarded to
appropriate agency
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
The Law is on Your Side – Current Laws (1 of 2)
• Computer Fraud and Abuse Act
Makes it a crime to access classified information
Passed in 1986; amendments between 1988 and 2002
added additional cybercrimes
• USA PATRIOT Act antiterrorism legislation (2001)
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
The Law is on Your Side – Current Laws (2 of 2)
• Cyber Security Enhancement Act (2002)
Provisions for fighting cybercrime
• Convention on Cybercrime Treaty
Drafted by Council of Europe
Signed by more than 40 countries
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
Questions
Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved
All rights reserved. No part of this publication may be reproduced, stored in a
retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written
permission of the publisher. Printed in the United States of America.

More Related Content

What's hot

Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017imc-isec-comp
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Symantec
 
Threat landscape update: June to September 2017
Threat landscape update: June to September 2017Threat landscape update: June to September 2017
Threat landscape update: June to September 2017Symantec Security Response
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018CheapSSLsecurity
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexKanishka Ramyar
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptBushra22
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
 
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupDragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupSymantec Security Response
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAvinash Sinha
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security ReportBAKOTECH
 

What's hot (19)

Ransomware 2017: New threats emerge
Ransomware 2017: New threats emergeRansomware 2017: New threats emerge
Ransomware 2017: New threats emerge
 
Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017Hiroshima University Information Security & Compliance 2017
Hiroshima University Information Security & Compliance 2017
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks
 
Threat landscape update: June to September 2017
Threat landscape update: June to September 2017Threat landscape update: June to September 2017
Threat landscape update: June to September 2017
 
The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018The Top Five Cybersecurity Threats for 2018
The Top Five Cybersecurity Threats for 2018
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
The IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence IndexThe IBM X-Force 2016 Cyber Security Intelligence Index
The IBM X-Force 2016 Cyber Security Intelligence Index
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupDragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack group
 
Advanced Phishing The Art of Stealing
Advanced Phishing The Art of StealingAdvanced Phishing The Art of Stealing
Advanced Phishing The Art of Stealing
 
Data breach
Data breachData breach
Data breach
 
WatchGuard Internet Security Report
WatchGuard Internet Security ReportWatchGuard Internet Security Report
WatchGuard Internet Security Report
 

Similar to HACKING

Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017 Kevin Murphy
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitDawn Yankeelov
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101Travis Good
 
2017 Phshing Trends and Intelligence Report: Ransomware Explosion
2017 Phshing Trends and Intelligence Report: Ransomware Explosion2017 Phshing Trends and Intelligence Report: Ransomware Explosion
2017 Phshing Trends and Intelligence Report: Ransomware ExplosionPhishLabs
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017chrissanders88
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDFChetanmalviya8
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsusxenhalo561
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxsanap6
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxinstaeditz009
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017R-Style Lab
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk
 
Splunk Threat Hunting Workshop
Splunk Threat Hunting WorkshopSplunk Threat Hunting Workshop
Splunk Threat Hunting WorkshopSplunk
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxAfsanaMumal2
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceIBM Security
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet securityRahul Sah
 

Similar to HACKING (20)

Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Cyber Resilency VANCOUVER, BC Nov 2017
Cyber Resilency VANCOUVER, BC  Nov 2017  Cyber Resilency VANCOUVER, BC  Nov 2017
Cyber Resilency VANCOUVER, BC Nov 2017
 
The Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your ToolkitThe Case for EDR: What's In Your Toolkit
The Case for EDR: What's In Your Toolkit
 
Cyber security 101
Cyber security 101Cyber security 101
Cyber security 101
 
2017 Phshing Trends and Intelligence Report: Ransomware Explosion
2017 Phshing Trends and Intelligence Report: Ransomware Explosion2017 Phshing Trends and Intelligence Report: Ransomware Explosion
2017 Phshing Trends and Intelligence Report: Ransomware Explosion
 
Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets Threat Landscape Lessons from IoTs and Honeynets
Threat Landscape Lessons from IoTs and Honeynets
 
Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017Threats that Matter - Murray State University 2017
Threats that Matter - Murray State University 2017
 
Security and Privacy.PDF
Security and Privacy.PDFSecurity and Privacy.PDF
Security and Privacy.PDF
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
Understanding ransomware
Understanding ransomwareUnderstanding ransomware
Understanding ransomware
 
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsuswbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
wbushiwbisnisnisbsudhduhsubsuhsuhsusvudhuhsus
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Splunk workshop-Threat Hunting
Splunk workshop-Threat HuntingSplunk workshop-Threat Hunting
Splunk workshop-Threat Hunting
 
Splunk Threat Hunting Workshop
Splunk Threat Hunting WorkshopSplunk Threat Hunting Workshop
Splunk Threat Hunting Workshop
 
Cybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptxCybersecurity Awareness Overview.pptx
Cybersecurity Awareness Overview.pptx
 
Level Up Your Security with Threat Intelligence
Level Up Your Security with Threat IntelligenceLevel Up Your Security with Threat Intelligence
Level Up Your Security with Threat Intelligence
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

HACKING

  • 1. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Introductory Visualizing Technology Sixth Edition Chapter 10 Security and Privacy
  • 2. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Learning Objectives 10.1 Recognize Different Types of Cybercrime 10.2 Differentiate between Various Types of Malware 10.3 Explain How to Secure a Computer 10.4 Practice Safe Computing 10.5 Discuss Laws Related to Computer Security and Privacy
  • 3. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Learning Objective 10.1 Recognize Different Types of Cybercrime
  • 4. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Recognize Different Types of Cybercrime
  • 5. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Personal Cybercrime (1 of 2) • Harassment ✓Cyberbullying: between two minors ✓Cyber-harassment: between adults ✓Cyber-stalking: • More serious in nature • Stalker demonstrates a pattern of harassment • Poses a credible threat of harm
  • 6. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Personal Cybercrime (2 of 2) • Phishing ✓Email messages and IMs ✓Appear to be from someone with whom you do business ✓Designed to trick you into providing usernames and passwords • Pharming ✓Redirects you to a phony website even if you type the URL ✓Hijacks a company’s domain name
  • 7. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Social Network Attacks (1 of 4) • Adware and other malware • Suspicious emails and notifications Appear to be from a site administrator • Asking for your password • Threatening to suspend your account • Phishing and "Please send money" scams
  • 8. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Social Network Attacks (2 of 4) • Clickjacking Clicking on a link allows this malware to post unwanted links on your page • Malicious script scams You copy and paste some text into your address bar It might execute a malicious script  Creates pages and events  Sends spam out to your friends
  • 9. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Social Network Attacks (3 of 4) • Fraud Schemes that convince you to give money or property to a person Shill bidding is fake bidding to drive up the price of an item
  • 10. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Social Network Attacks (4 of 4) • Identity theft The use of your name, Social Security number, or bank or credit cards for financial gain Keyloggers • Programs or devices that capture what is typed
  • 11. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Cybercrime Against Organizations (1 of 2) • Hacking White-hat or “sneakers” • Attempt to find security holes in a system to prevent future hacking Black-hat or “crackers” • Malicious intent Gray-hat • Illegal but not malicious intent
  • 12. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Cybercrime: They Are Out to Get You – Cybercrime Against Organizations (2 of 2) • Hacktivism Hacking to make a political statement • Data breach Sensitive data is stolen or viewed by someone not authorized • Cyber-terrorism
  • 13. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Learning Objective 10.2 Differentiate between Various Types of Malware
  • 14. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Differentiate between Various Types of Malware
  • 15. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware:Pick Your Poison–Spam and Cookies (1 of 3) • Includes different types of programs designed to be harmful or malicious Spam Adware and spyware Viruses Worms Trojan horses Rootkits
  • 16. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware:Pick Your Poison–Spam and Cookies (2 of 3) • Spam ✓Spamming is sending mass unsolicited emails ✓Messages are called spam ✓Other forms: • Fax spam • IM spam • Text spam
  • 17. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware:Pick Your Poison–Spam and Cookies (3 of 3) • Cookies ✓Installed without your permission ✓Help websites identify you when you return  Track websites and pages you visit to better target ads  May collect information you don’t want to share
  • 18. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware:Pick Your Poison–Adware andSpyware(1of 2) • Adware ✓Pop-ups or banner ads ✓Generate income ✓Use CPU cycles and Internet bandwidth ✓Reduce PC performance
  • 19. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware:Pick Your Poison–Adware andSpyware(2of 2) • Spyware ✓Malware ✓Secretly gathers personal information ✓Usually installed by accident ✓Browser hijacker
  • 20. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware: Pick Your Poison – Viruses, Worms, Trojans, and Rootkits (1 of 5) • Virus - a program that replicates itself and infects computers Needs a host file May use an email program to infect other computers The attack is called the payload Check to see if message is a hoax
  • 21. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware: Pick Your Poison – Viruses, Worms, Trojans, and Rootkits (2 of 5) • Logic Bomb ✓Behaves like a virus ✓Performs malicious act ✓Does not replicate ✓Attacks when certain conditions are met • Time Bomb ✓A logic bomb with a trigger that is a specific time or date  April Fool’s Day  Friday the 13th
  • 22. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware: Pick Your Poison – Viruses, Worms, Trojans, and Rootkits (3 of 5) • Worms ✓Self-replicating ✓Do not need a host to travel ✓Travel over networks to infect other machines ✓Conficker worm  First released in 2008  Reemerged in 2010 with new behaviors
  • 23. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware: Pick Your Poison – Viruses, Worms, Trojans, and Rootkits (4 of 5) • Botnet Network of computer zombies or bots controlled by a master Fake security notifications Denial-of-service attacks • Cripple a server or network by sending out excessive traffic • Trojan horse Appears to be legitimate program Actually malicious Might install adware, a toolbar, a keylogger, or open a backdoor
  • 24. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Malware: Pick Your Poison – Viruses, Worms, Trojans, and Rootkits (5 of 5) • Ransomware Malware that prevents you from using your computer until you pay a fine or fee Bitcoin is an anonymous, digital, encrypted currency • Rootkit Set of programs Allows someone to gain control over system Hides the fact that the computer has been compromised Nearly impossible to detect Masks behavior of other malware
  • 25. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Learning Objective 10.3 Explain How to Secure a Computer
  • 26. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Explain How to Secure a Computer
  • 27. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Shield’s Up – Software (1 of 2) • Drive-by download A visited website installs a program in the background without your knowledge • Firewall Hardware device that blocks access to your network Software that blocks access to an individual machine
  • 28. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Shield’s Up – Software (2 of 2) • Antivirus program Protects against viruses, Trojans, worms, spyware Windows 10 includes Windows Defender • An antispyware program that performs both real-time protection and system scanning • Antispyware software Prevents adware and spyware from installing • Security suite Package of security software Combination of features
  • 29. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Shield’s Up – Hardware (1 of 2) • Router Connects two or more networks together Home router acts like firewall • Network address translation (NAT) Security feature of a router Shields devices on private network from the public network
  • 30. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Shield’s Up – Hardware (2 of 2) • SSID (Service Set Identifier) Wireless network name • Wireless encryption Adds security by encrypting transmitted data Wi-Fi Protected Setup (WPS) is one option
  • 31. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Shield’s Up – Operating System • Most important piece of security software • Keep patched and up-to-date
  • 32. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Learning Objective 10.4 Practice Safe Computing
  • 33. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Practice Safe Computing
  • 34. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved An Ounce of Prevention is Worth a Pound of Cure – User Accounts • Three user account types Standard Administrator Guest • User Account Control (UAC) notifies you prior to changes made to your computer Do not turn this feature off Always read message before clicking Yes • Malware tricks users into clicking fake Windows notifications
  • 35. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved An Ounce of Prevention is Worth a Pound of Cure – Passwords
  • 36. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved An Ounce of Prevention is Worth a Pound of Cure – Encryption • Converts plain text into ciphertext • Must have a key to decrypt it
  • 37. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved An Ounce of Prevention is Worth a Pound of Cure – Safely Installing Software • Copies files to the computer • Alters settings
  • 38. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved An Ounce of Prevention is Worth a Pound of Cure – Updating and Installing Software • Protect yourself from downloading problems Only download from reliable sources • Zero-day exploit Attack that occurs on the day an exploit is discovered before the publisher can fix it • Bugs Flaws in the programming of software Patch or hotfix Service pack
  • 39. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved An Ounce of Prevention is Worth a Pound of Cure – Acceptable Use Policies (AUP) • Common in businesses and schools • Rules for computer and network users • Depend on:  Type of business  Type of information • Force users to practice safe computing
  • 40. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Learning Objective 10.5 Discuss Laws Related to Computer Security and Privacy
  • 41. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Discuss Laws Related toComputer Security andPrivacy
  • 42. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved The Law is on Your Side – The Enforcers • No single authority responsible for investigating cybercrime • Internet Crime Complaint Center (IC3) Place for victims to report cybercrimes ic3.gov Reports processed and forwarded to appropriate agency
  • 43. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved The Law is on Your Side – Current Laws (1 of 2) • Computer Fraud and Abuse Act Makes it a crime to access classified information Passed in 1986; amendments between 1988 and 2002 added additional cybercrimes • USA PATRIOT Act antiterrorism legislation (2001)
  • 44. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved The Law is on Your Side – Current Laws (2 of 2) • Cyber Security Enhancement Act (2002) Provisions for fighting cybercrime • Convention on Cybercrime Treaty Drafted by Council of Europe Signed by more than 40 countries
  • 45. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved Questions
  • 46. Copyright © 2018, 2017, 2016 Pearson Education, Inc. All Rights Reserved All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Printed in the United States of America.

Editor's Notes

  1. Welcome to Chapter 10 of Visualizing Technology, sixth edition, by Debra Geoghan. This chapter discusses security and privacy.
  2. Chapter Ten objectives are: Recognize Different Types of Cybercrime Differentiate between Various Types of Malware Explain How to Secure a Computer Practice Safe Computing Discuss Laws Related to Computer Security and Privacy
  3. Objective 1 recognizes the different types of cybercrime, including harassment, phishing, pharming, fraud, identity theft, and hacking.
  4. Personal cybercrime is perpetrated against individuals, as opposed to businesses and other organizations. These are crimes that affect you directly and that you need to be aware of. Cyberbullying and cyber-stalking are two categories of harassment. When the exchange involves two minors, it is cyberbullying; when it involves adults, it is cyber-harassment. Cyber-stalking is more serious in nature, with the stalker demonstrating a pattern of harassment and posing a credible threat of harm.
  5. Phishing uses email messages and IMs that appear to be from a legitimate business. The intent of such a communication is to trick you into providing personal information. Pharming redirects you to a phony website even if you type the right address into your browser. They do this by hijacking a company’s domain name that has not been renewed or that has security-compromised web servers. Both phishing and pharming appear to be from legitimate sites.
  6. Social networks provide ways for cybercriminals to contact and scam you. Common threats include: Adware and other malware Suspicious emails and notifications Phishing and other “send money” scams
  7. Common threats include clickjacking, in which clicking on a link allows malware to post unwanted links on your page. In malicious script scams, you copy and paste some text into your address bar, which executes a malicious script that creates pages and events or sends spam to your friends.
  8. Computer fraud involves schemes that convince you to voluntarily and knowingly give money or property to a person.
  9. Identity theft occurs when someone uses your name, Social Security number, or bank or credit cards for financial gain. Keyloggers, programs or devices that capture what is typed on a keyboard, enable criminals to capture enough information to wreak havoc on your finances and life.
  10. Hacking is the act of gaining unauthorized access to a computer system or network. Hacking has three categories. White-hat hackers, or “sneakers,” find security holes in a system to prevent future hacking. They are often security experts who are paid to hack systems. Black-hat hackers, sometimes referred to as “crackers,” hack into systems for malicious purposes, such as theft or vandalism. Gray-hat hackers hack into systems illegally but not for malicious intent.
  11. Hacktivism, such as that committed by Anonymous, is hacking to make a political statement. A data breach occurs when sensitive data is stolen or viewed by someone who is not authorized to do so. An unlawful attack on computers or networks done to intimidate a government or its people for a political or social agenda is known as cyber-terrorism.
  12. Objective 2 differentiates between various types of malware.
  13. Malware is malicious software that includes spam, adware and spyware, viruses, worms, Trojan horses, and rootkits.
  14. Spam is a mass, unsolicited email. It is popular because it is easy and inexpensive to implement. Other forms include fax spam, IM spam, and text spam. The act of sending spam is called spamming.
  15. A cookie is a small text file that allows the website to recognize the user and personalize the site. Although they are useful, they could be used to collect information that you do not want to share.
  16. Adware shows you ads, usually in the form of pop-ups or banner ads in websites and in software. Ads generate income for the software developer. When these ads use CPU cycles and Internet bandwidth, it can reduce PC performance.
  17. Spyware is a form of malware that secretly gathers personal information about you. It is usually installed by accident when a user clicks on a pop-up or installs a freeware program that has a tracking feature.
  18. A virus is a program that replicates itself and infects computers. A computer virus needs a host file on which to travel, such as a game or email. The attack, also known as the payload, may corrupt or delete files, or it may even erase an entire disk. The virus uses the email program or game on the infected computer to send out copies of itself and infect other machines.
  19. A logic bomb performs a malicious act when certain conditions are met—for example, when an employee name is removed from a database. When the trigger is a specific time or date, such as April Fool’s Day, a logic bomb is called a time bomb.
  20. Like viruses, worms are self-replicating, but they do not need a host. Worms travel over networks, and once a network is infected, it seeks other network machines to infect.
  21. A botnet is a network of computer zombies or bots controlled by a master. Fake security notifications are the most common way to spread bots. A botnet could launch a denial-of-service attack, which cripples a server or network by sending out excessive traffic. A Trojan horse, or Trojan, is a program that appears to be legitimate but is actually malicious. Trojans might install adware, a toolbar, or a keylogger, or open a backdoor.
  22. Ransomware is malware that prevents you from using your computer until you pay a fee. Payment is usually requested in bitcoin, an anonymous, digital, encrypted currency. A rootkit is a set of programs that allows someone to gain control over a computer system while hiding the fact that the computer has been compromised. A rootkit is almost impossible to detect. It allows the machine to become further infected by masking behavior of other malware.
  23. Objective 3 explains how to secure a computer.
  24. One of the most common ways to get a malware infection on a computer is by downloading it. This could happen in a drive-by download. A drive-by download occurs when you visit a website that installs a program in the background without your knowledge. A firewall is designed to block unauthorized access to your network, but a software firewall blocks access to an individual machine.
  25. Antivirus programs protect against viruses, Trojans, worms, and spyware. Antispyware software prevents adware and spyware software from installing itself on your computer. Security suites are packages of security software that include a combination of features.
  26. A router is a device that connects two or more networks. A home router also acts like a firewall. Network address translation (NAT) is a router security feature that shields devices on a private network (home) from the public network, Internet.
  27. A wireless router provides a wireless access point to your network. Use the router setup utility to change the SSID, service set identifier, or wireless network name, and enable and configure wireless encryption.
  28. The operating system is the most important piece of security software. It is best to keep it patched and up-to-date. By default, Windows and OS X computers are configured to automatically install updates. The only way to try to be safe is to be proactive and diligent in protecting your computer system.
  29. Objective 4 discusses how to practice safe computing.
  30. There are three types of user accounts: Standard, Administrator, and Guest. User Account Control (UAC) will notify you before changes are made to your computer. Do not turn the UAC feature off and remember to always read the message before clicking Yes. Malware can trick users into clicking fake Windows notifications.
  31. There are many rules to use when creating strong passwords. Some basic guidelines include: using at least eight characters; mixing upper- and lowercase letters; using at least one number and, if allowed, a special character; and eliminating words in the dictionary or ones that are personally identifiable.
  32. Encryption converts unencrypted, plain text on a website into code called ciphertext. To read encrypted information, you must have a key to decrypt it. You also need to be sure it is a secure website. You can check for this by confirming the https protocol in the URL and a padlock in the address bar. Windows includes Encrypting File System (EFS), which enables you to encrypt individual files. OS X has a similar feature called FileVault.
  33. Installing software copies files to the computer; it may alter system settings.
  34. You should only download from reliable sources. An attack that occurs on the day an exploit is discovered, before the publisher can fix it, is called a zero-day exploit. Software publishers release updates. Updates can address security holes or bugs (flaws in the programming) or add new features. A patch or hotfix addresses individual problems; a service pack is a larger, planned update.
  35. Many businesses and schools have an acceptable use policy (AUP) by which computer and network users must abide. Restrictions depend on the type of business and type of information to which you need access. Although these policies can be restrictive and annoying, they force users to practice safe computing.
  36. Objective 5 discusses the laws related to computer security and privacy.
  37. Because crimes are varied, there is no single authority responsible for investigating cybercrime. The Internet Crime Complaint Center (IC3) is a place for victims to report cybercrimes. At its website, ic3.gov, a report is processed and forwarded to the appropriate agency. Agencies include the FBI, U.S. Secret Service, U.S. Immigration and Customs, U.S. Postal Inspection Service, and the Bureau of Alcohol, Tobacco, Firearms, and Explosives (ATF).
  38. In 1986, the Computer Fraud and Abuse Act was passed, making it a crime to access classified information. There were several amendments between 1988 and 2002 that added additional cybercrimes. The USA PATRIOT Act antiterrorism legislation in 2001 included provisions for fighting cybercrime.
  39. The Cyber Security Enhancement Act in 2002 also includes provisions for fighting cybercrime. The Convention on Cybercrime Treaty has been signed by more than 40 countries, including the United States, Canada, and Japan.
  40. Are there any questions?