SlideShare a Scribd company logo
Secure Use of IT
1
European Computer Driving Licence
9/26/2017
2
 Please check the spelling of your name (in accordance with
NRIC or Passport)
 Please set mobiles to silent
 No food and drinks (except bottle drinks with CAP)
 Training materials
 Washroom and emergency exits location
 AM Tea break: 10 – 10:15 am (15 minutes)
 Lunch break: 12-1pm (1 hour)
 PM Tea break: 3 – 3.15pm (15 minutes)
 Please scan your thumb drives for viruses
Points to Note
9/26/2017
3
 WSQ is a national credentials system developed and
managed by Singapore Workforce Development Agency (WDA)
 Aim to train, develop, assess and recognise adult workers for
competencies that companies need of their employees
What is ES WSQ
9/26/2017
4
 At end of lesson, you are required to take a summative
assessment using the online tools of International Computer
Driving Test (ICDL)
 To be assessed as competent you must attain:
 Minimum 75% attendance
 Minimum 75% pass for ICDL Test
Assessment
9/26/2017
5
 Secure Use of IT
 Security Concepts
 Malware
 Network Security
 Access Controls
 Secure Web Use
 Communications
 Secure Data Management
Course Outline
9/26/2017
Security Concepts
 1.1 Data Threats
 Common Terms
o What is Data?
o What is Information?
o Cybercrime
o Hacking
 Cloud Computing
o What is Cloud Computing?
o Vulnerabilities
• Session Hijacking
• Service Reliability
• Reliance on the Internet
o Threats
• Data Control
• Denial of Service
• Potential Loss of Privacy
• Malicious Insiders
• Loss of Data
69/26/2017
Security Concepts
 1.2 Value of Information
 Basic Characteristics
o Confidentiality
o Integrity
o Availability
 Protecting Personal Information
o Personal Privacy, Data theft
 Protecting Commercial Information
o Financial Statements, Customers Records
o Trade Secrets, New Products & Patents
 Data Privacy or Protection
o Data Protection Legislation
 Data Subjects and Data Controllers
 ICT Policies
79/26/2017
Security Concepts
 1.3 Personal Security
 Social Engineering
o Information Gathering (Illegally obtain sensitive data)
o Fraud (Faking identity to obtain confidential information)
o Computer System Access (Infiltrate 3rd Party Computer Systems)
 Methods of Social Engineering
o Phone Calls (Impersonating Person)
o Phishing (Fraud Email to Fraud Website)
o Shoulder Surfing (Looking Over Shoulder)
 Identity Thefts and Its Implications
 Methods of Identity Theft
o Information Driving (Look in Trash Bins for
Credit Card Statements)
o Skimming (Device attached to ATM to capture Victim's Cards)
o Pretexting (Inventing Scenario to engage Victim)
89/26/2017
Security Concepts
 1.4 File Security
 Enabling/Disabling Macro Security Settings
 Setting File Passwords
 Encrypt a Folder or Drive
 Advantages of Encryption
o Ensure Confidentiality of Data
o Prevents Unauthorised Person From Opening
and Reading Data
o Ensure Data Integrity and Prevent Unauthorised
Alteration of Data
o Verify Author of Document
99/26/2017
Security Concepts
 1.4 File Security
 Limitation of Encryption
o Cannot recover data if you forget your password
o Easy to crack password for older version of Words Document and Zip
archive
o Attract attention for encrypted files
o Cannot prevent deletion of data
109/26/2017
Security Concepts
 1.5 Review Exercise
1. The process of intentionally accessing a computer without
authorisation or exceeding authorised access is known as:
c. Hacking
2. Which of the following is not a basic characteristic of
information security?
b. Locality
3. Which of the following is an advantage of encryption?
b. Ensures data integrity
4. Which one of the following terms describe the
process of someone monitoring you keying in
your ATM pin with malicious intent?
a. Shoulder surfing
119/26/2017
MALWARE
 2.1 Types of Malware
 Definition of Malware
o Malware is malicious software designed to install and harm your computer
 Types of Infectious Malware
o Viruses
o Worms (WannaCry Ransomware)
o Trojan horses (pretends as harmless program that
collect you login info and password
o Rootkits
o Backdoor
 Types of Data Thefts
o Adware
o Spyware
o Botnet
o Keylogger
o Dialler
129/26/2017
MALWARE
 2.2 Protection
 Understanding Anti-Virus Software
o Identify and eliminate malware by scanning files in your computer
 Limitations
o Anti-virus software features
o Zero-day exploits
o Vulnerabilities
 Using an Anti-Virus Software
o Scanning
o Scanning Specific Drives
o Scheduling Scans
 Quarantine Files
 Updating Anti-Virus Software
139/26/2017
MALWARE
 2.3 Review Exercise
1. __________ is created and distributed for malicious purposes:
a. Malware
2. Which of the following is not a characteristic of spyware?
d. Call numbers without consent
3. A network of infected computers used to distribute malware is
known as:
b. Botnet
4. Which one of the following options is not a common option
when anti-virus software detects an infected file?
c. Open
5. Match the malware type on the left with the
description on the right?
149/26/2017
Network Security
 3.1 Networks And Connections
 Common Network Types
o LAN (Local Area Network)
o WAN (Wide Area Network)
o WLAN (Wireless Local Area Network)
o VPN (Virtual Private Network)
 Security Implications of Connecting to a Network
o Malware
o Unauthorised Data Access, Privacy
 Roles of the Network Administrator
 Functions of Firewall
 Limitation of Firewall
o Viruses
o Attacks
o Monitoring
159/26/2017
Network Security
 3.2 Wireless Security
 Potential Risks of Using Unprotected Wireless Network
o Eavesdroppers
o Network Hijacking
o Man in the Middle
 Types of Wireless Security
o Wired Equivalent Privacy (WEP)
o Wi-Fi Protected Access (WPA)
o Media Access Control (MAC) Address Filtering)
o Service Set Identifier (SSID) Hiding
 Using Personal Hotspots
 Enabling/Disabling a Personal Hotspot (Smartphone)
169/26/2017
Network Security
 3.3 Review Exercise
1. Which of the following is not a type of network?
b. WAP
2. Which of the following is not a feature of a firewall?
a. Encrypts information
3. List 2 security implications of connecting to a network.
Malware
Unauthorised data access
Privacy
4. In wireless security, WPA is:
d. Wi-Fi Protected Access
179/26/2017
Access Controls
 4.1 Methods
 Preventing Unauthorised Data Access
 Passwords
 PIN (Personal Identification Number)
 Encryption
 Multi-factor authentication
 One-Time Password
 Network Accounts
 Biometric Security Techniques
o Fingerprint Scanning
o Hand Geometry
o Facial Recognition
o Voice
189/26/2017
Access Controls
 4.2 Password Management
 Good Password Policies:
o Complex Password at least 8-12 Characters, include Upper & Lowercase,
Numbers and Special Characters
o Avoids Words Found in Dictionary
o Change Passwords Regularly
o Avoid Passwords that include your Name, Birthdate and Spouse Name
o Never Use Password such as “admin”, “root” or “password”
o Avoid Writing Your Password on Sticky Notes
o Do Not Use Same Password for Different Services
o Do Not Share Your Password with Anyone
 Password Management Software:
o Dashlane
o LastPass
o KeePass
199/26/2017
Access Controls
 4.3 Review Exercise
1. Which of the following is not a type of authentication?
d. Something I believe
2. When data has been encrypted, what does the recipient need
to read the data?
b. A key.
3. Which of the following is not a biometric security method?
c. One time password
4. Go to the following web page to test how secure your
password is:
http://howsecureismypassword.net/
209/26/2017
Secure Web Use
 5.1 Browser Settings
 Setting AutoComplete Options
 Clearing Private Data from Browser:
o Temporary Internet Files
o Cookies
o A History of the Websites You’ve Visited
o Information that You have Entered into
Websites or The Address Bar
o Saved Web Passwords
219/26/2017
Secure Web Use
 5.2 Secure Browsing
 Measures to Review a Website’s Safety:
o Content Quality and Currency
o Valid URL
o Company or Owner Information
o Check for Security Certificate and Validate Domain Owner
 Pharming
o Attacker targets DNS Service and changes IP Address of a Website.
o User Types the Website Address in Web Browser.
o User’s Computer Queries DNS Server for IP Address of Website.
o Because DNS Server has been ‘poisoned’ by the Attacker,
it returns the IP Address of the Fake Website to User’s
Computer.
o User has now been tricked into Visiting the Fake Website.
 Content-Control Software
o Client-side filters, Browser-based filters, Content-limited
(or filtered) ISPs
o Search-engines filters
229/26/2017
Secure Web Use
 5.3 Review Exercise
1. How do you identify a secure web site?
https:// and Secured Lock Icon
Check for Valid URL
Check for Company or Owner Information
Check Security Certificate and Validate Domain Owner
2. Open your browser and delete all temporary internet files.
b. In Internet Explorer, Click “Tools” -> “Delete Browsing History”
3. Go to the Web of Trust website at http://www.mywot.com/ and check
the reputation of the following websites:
c. www.amazon.com
d. Goldenpalace.com
e. Whitehouse.com
239/26/2017
Communications
 6.1 E-Mails
 Encrypting and Decrypting E-Mail
 Digital Signature
 Receiving Fraudulent and Unsolicited E-mail
 Phishing Attack:
o Planning
o Setup
o Attack
o Collection
o Identify Theft and Fraud
 E-mail and Malware
249/26/2017
Communications
 6.1 E-Mails
 Encrypting and Decrypting E-Mail
259/26/2017
Communications
 6.1 E-Mails
 Adding Digital Signature in Email
269/26/2017
Communications
 6.1 E-Mails
 Receiving Fraudulent E-mail (Phishing)
279/26/2017
Communications
 6.1 E-Mails
 What is Unsolicited Email (Spam)
289/26/2017
Communications
 6.2 Social Networking
 Potential Dangers:
o Cyber Bullying
o Cyber Grooming
o Misleading or Dangerous Information
o False Identities
o Fraudulent Links or Messages
 Sharing on Social Networks
 Privacy Setting
299/26/2017
Communications
 6.3 VoIP and Instant Messaging
 Security Considerations:
o Malware
o Backdoor Access
o Access to Files
o Eavesdropping
 Strategies to Ensure Confidentiality when
using IM and VoIP:
o Encryption
o Non-disclosure of important details
o Restrict files sharing
309/26/2017
Communications
 6.4 Mobile
 Risks of Using Mobile Apps from Unofficial Source:
o Mobile Malware
o Apps not fully tested and quality not approved.
Slow down you Mobile Device and other apps.
Result in Device Instability.
o Apps may also gain permission to access your
personal data such as Contacts, Images and Location.
 Emergency/Precautionary Measures if
You Mobile Devices is Lost/Stolen:
o Remote Disable
o Remote Wipe
o Locate Device
 Emergency Features (Android)
319/26/2017
Communications
 6.5 Review Exercise
1. An e-mail is sent out to mass recipients asking them to verify
their bank account details. This is an example of:
b. Phishing
2. Which one of the following details is considered unsafe to
share on a social networking site?
d. Home address
3. The process of re-directing users to a different website without
their knowledge is knowing as:
c. Pharming
4. A secure website can be identified by the
web address if it begins with:
b. https
329/26/2017
Communications
 6.5 Review Exercise
5. Consider the following questions:
a. What was your favourite holiday destination?
b. What is the name of your primary school?
c. What is my favourite pet’s name?
What would the potential security threats be by answering the
questions above?
339/26/2017
Secure Data Management
 7.1 Secure and Back Up Data
 Measures to Enhance Physical Security of Devices:
o Do Not Leave Unsecured Computers or Devices Unattended
o Record Details and Location of Items and Equipment
o Use Cable Locks to Secure Computers and Devices
o Works Areas Can Be Secured Using Access Control
Measures such as Swipe Cards or Biometric Scanning
 Backup Procedure:
o Schedule
o Compression
o Location
o Regularity
 Backing Up Data
 Cloud Back Up
349/26/2017
Secure Data Management
 7.2 Secure Deletion and Destruction
 Common Methods of Permanently Destroying Data:
o Shredding
o Degaussing
o Drive/Media Destruction
 Specific Destruction Techniques:
o Physically Breaking Media Apart, by Grinding, Shredding, etc
o Incineration
o Phase Transition (Liquefaction or Vaporisation of a Solid Disk)
o Application of Corrosive Chemicals, such as Acids, to Recording Surfaces.
 Using Data Destruction Utilities
 FREE Programs That Perform Secure Over-Writes:
o DBAN http://www.dban.org
o Eraser http://eraser.heidi.ie
359/26/2017
Secure Data Management
 7.2 Secure Deletion and Destruction
 Shredding Hard Drives
369/26/2017
Secure Data Management
 7.2 Secure Deletion and Destruction
 Shredding Optical Disks
379/26/2017
Secure Data Management
 7.2 Secure Deletion and Destruction
 Degaussing Hard Drives
389/26/2017
Secure Data Management
 7.3 Review Exercise
1. Which of the following is not a feature of a backup procedure?
c. Volume
2. Which one of the following is not used as a backup method?
b. Random access memory
3. Residual traces of deleted data that still remains is known as:
b. Data remanence
399/26/2017

More Related Content

What's hot

Cyber security
Cyber securityCyber security
Cyber security
Samsil Arefin
 
Information technology
Information technologyInformation technology
Information technology
thuvee_p
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
PrabhatChoudhary11
 
Cyber security
Cyber securityCyber security
Cyber security
SaurabhKaushik57
 
Computer network-and-network-topologies
Computer network-and-network-topologiesComputer network-and-network-topologies
Computer network-and-network-topologies
Rida Shad
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
APNIC
 
Monitor troubleshooting
Monitor troubleshootingMonitor troubleshooting
Monitor troubleshooting
Courtney Casper
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 
Cyber security
Cyber securityCyber security
Cyber security
Sapna Patil
 
Computer security
Computer securityComputer security
Computer security
Mahesh Singh Madai
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCUKhalid Rehan
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
Vivek Kumar Sinha
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
Anacrissa Soriano
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
Home
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
IGZ Software house
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
Ehsan Ullah Kakar
 

What's hot (20)

Cyber security
Cyber securityCyber security
Cyber security
 
Information technology
Information technologyInformation technology
Information technology
 
Computer security
Computer securityComputer security
Computer security
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer network-and-network-topologies
Computer network-and-network-topologiesComputer network-and-network-topologies
Computer network-and-network-topologies
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
Fundamentals of Network security
Fundamentals of Network securityFundamentals of Network security
Fundamentals of Network security
 
Monitor troubleshooting
Monitor troubleshootingMonitor troubleshooting
Monitor troubleshooting
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer security
Computer securityComputer security
Computer security
 
System Administration DCU
System Administration DCUSystem Administration DCU
System Administration DCU
 
Introduction of computer network
Introduction of computer networkIntroduction of computer network
Introduction of computer network
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Authentication techniques
Authentication techniquesAuthentication techniques
Authentication techniques
 
Networking basics PPT
Networking basics PPTNetworking basics PPT
Networking basics PPT
 

Similar to Secure Use of IT

It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
Deepak John
 
Internet Security
Internet SecurityInternet Security
Internet Security
JainamParikh3
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
Cyphort
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
Nikhil D
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
Cyberhunter Cyber Security
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
phanleson
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension Inc.
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
SheetalKamble39
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
Akiumi Hasegawa
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
Prathan Phongthiproek
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Impacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concernImpacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concern
deorwine infotech
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 

Similar to Secure Use of IT (20)

It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
The top 5 basics fundamentals of network security cyberhunter solutions
The top 5 basics fundamentals of network security    cyberhunter solutionsThe top 5 basics fundamentals of network security    cyberhunter solutions
The top 5 basics fundamentals of network security cyberhunter solutions
 
Ch04 Footprinting and Social Engineering
Ch04 Footprinting and Social EngineeringCh04 Footprinting and Social Engineering
Ch04 Footprinting and Social Engineering
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
shubhangi.pptx
shubhangi.pptxshubhangi.pptx
shubhangi.pptx
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
OWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-DiveOWASP Mobile Top 10 Deep-Dive
OWASP Mobile Top 10 Deep-Dive
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Impacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concernImpacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concern
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 

More from Michael Lew

Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Michael Lew
 
Big Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson ScheduleBig Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson Schedule
Michael Lew
 
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
Michael Lew
 
ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)
Michael Lew
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
Michael Lew
 
Online collaboration
Online collaborationOnline collaboration
Online collaboration
Michael Lew
 
Scenario (Evaluation)
Scenario (Evaluation)Scenario (Evaluation)
Scenario (Evaluation)
Michael Lew
 
Manage online information
Manage online informationManage online information
Manage online information
Michael Lew
 
CE Diagnostic answers
CE Diagnostic answersCE Diagnostic answers
CE Diagnostic answersMichael Lew
 
OE Diagnostic Test Questions
OE Diagnostic Test QuestionsOE Diagnostic Test Questions
OE Diagnostic Test Questions
Michael Lew
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
Michael Lew
 
ICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - TutorialICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - Tutorial
Michael Lew
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
Michael Lew
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
Michael Lew
 
ICT Blog1
ICT Blog1ICT Blog1
ICT Blog1
Michael Lew
 
Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 print
Michael Lew
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 print
Michael Lew
 
Ecdl v5 module 5 print
Ecdl v5 module 5 printEcdl v5 module 5 print
Ecdl v5 module 5 print
Michael Lew
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 print
Michael Lew
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 print
Michael Lew
 

More from Michael Lew (20)

Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
Data Mining & Predictive Analytics - Lesson 14 - Concepts Recapitulation and ...
 
Big Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson ScheduleBig Data & Text Analytics - Lesson Schedule
Big Data & Text Analytics - Lesson Schedule
 
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
ICDL Computer Fundamentals (MS Windows 10 & Office 2016)
 
ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)ICDL Image Editing (GIMP)
ICDL Image Editing (GIMP)
 
Web browsing and communication using Outlook
Web browsing and communication using OutlookWeb browsing and communication using Outlook
Web browsing and communication using Outlook
 
Online collaboration
Online collaborationOnline collaboration
Online collaboration
 
Scenario (Evaluation)
Scenario (Evaluation)Scenario (Evaluation)
Scenario (Evaluation)
 
Manage online information
Manage online informationManage online information
Manage online information
 
CE Diagnostic answers
CE Diagnostic answersCE Diagnostic answers
CE Diagnostic answers
 
OE Diagnostic Test Questions
OE Diagnostic Test QuestionsOE Diagnostic Test Questions
OE Diagnostic Test Questions
 
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
ICDL Module 2 - Using Computers & Managing Files (Windows XP) - Presentation ...
 
ICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - TutorialICDL Advanced Excel 2010 - Tutorial
ICDL Advanced Excel 2010 - Tutorial
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
ICDL Module 1 - Concepts of ICT (Information and Communication Technology) - ...
 
ICT Blog1
ICT Blog1ICT Blog1
ICT Blog1
 
Ecdl v5 module 7 print
Ecdl v5 module 7 printEcdl v5 module 7 print
Ecdl v5 module 7 print
 
Ecdl v5 module 6 print
Ecdl v5 module 6 printEcdl v5 module 6 print
Ecdl v5 module 6 print
 
Ecdl v5 module 5 print
Ecdl v5 module 5 printEcdl v5 module 5 print
Ecdl v5 module 5 print
 
Ecdl v5 module 4 print
Ecdl v5 module 4 printEcdl v5 module 4 print
Ecdl v5 module 4 print
 
Ecdl v5 module 3 print
Ecdl v5 module 3 printEcdl v5 module 3 print
Ecdl v5 module 3 print
 

Recently uploaded

Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
CIOWomenMagazine
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
nhiyenphan2005
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 

Recently uploaded (20)

Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
Internet of Things in Manufacturing: Revolutionizing Efficiency & Quality | C...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
Bài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docxBài tập unit 1 English in the world.docx
Bài tập unit 1 English in the world.docx
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 

Secure Use of IT

  • 1. Secure Use of IT 1 European Computer Driving Licence 9/26/2017
  • 2. 2  Please check the spelling of your name (in accordance with NRIC or Passport)  Please set mobiles to silent  No food and drinks (except bottle drinks with CAP)  Training materials  Washroom and emergency exits location  AM Tea break: 10 – 10:15 am (15 minutes)  Lunch break: 12-1pm (1 hour)  PM Tea break: 3 – 3.15pm (15 minutes)  Please scan your thumb drives for viruses Points to Note 9/26/2017
  • 3. 3  WSQ is a national credentials system developed and managed by Singapore Workforce Development Agency (WDA)  Aim to train, develop, assess and recognise adult workers for competencies that companies need of their employees What is ES WSQ 9/26/2017
  • 4. 4  At end of lesson, you are required to take a summative assessment using the online tools of International Computer Driving Test (ICDL)  To be assessed as competent you must attain:  Minimum 75% attendance  Minimum 75% pass for ICDL Test Assessment 9/26/2017
  • 5. 5  Secure Use of IT  Security Concepts  Malware  Network Security  Access Controls  Secure Web Use  Communications  Secure Data Management Course Outline 9/26/2017
  • 6. Security Concepts  1.1 Data Threats  Common Terms o What is Data? o What is Information? o Cybercrime o Hacking  Cloud Computing o What is Cloud Computing? o Vulnerabilities • Session Hijacking • Service Reliability • Reliance on the Internet o Threats • Data Control • Denial of Service • Potential Loss of Privacy • Malicious Insiders • Loss of Data 69/26/2017
  • 7. Security Concepts  1.2 Value of Information  Basic Characteristics o Confidentiality o Integrity o Availability  Protecting Personal Information o Personal Privacy, Data theft  Protecting Commercial Information o Financial Statements, Customers Records o Trade Secrets, New Products & Patents  Data Privacy or Protection o Data Protection Legislation  Data Subjects and Data Controllers  ICT Policies 79/26/2017
  • 8. Security Concepts  1.3 Personal Security  Social Engineering o Information Gathering (Illegally obtain sensitive data) o Fraud (Faking identity to obtain confidential information) o Computer System Access (Infiltrate 3rd Party Computer Systems)  Methods of Social Engineering o Phone Calls (Impersonating Person) o Phishing (Fraud Email to Fraud Website) o Shoulder Surfing (Looking Over Shoulder)  Identity Thefts and Its Implications  Methods of Identity Theft o Information Driving (Look in Trash Bins for Credit Card Statements) o Skimming (Device attached to ATM to capture Victim's Cards) o Pretexting (Inventing Scenario to engage Victim) 89/26/2017
  • 9. Security Concepts  1.4 File Security  Enabling/Disabling Macro Security Settings  Setting File Passwords  Encrypt a Folder or Drive  Advantages of Encryption o Ensure Confidentiality of Data o Prevents Unauthorised Person From Opening and Reading Data o Ensure Data Integrity and Prevent Unauthorised Alteration of Data o Verify Author of Document 99/26/2017
  • 10. Security Concepts  1.4 File Security  Limitation of Encryption o Cannot recover data if you forget your password o Easy to crack password for older version of Words Document and Zip archive o Attract attention for encrypted files o Cannot prevent deletion of data 109/26/2017
  • 11. Security Concepts  1.5 Review Exercise 1. The process of intentionally accessing a computer without authorisation or exceeding authorised access is known as: c. Hacking 2. Which of the following is not a basic characteristic of information security? b. Locality 3. Which of the following is an advantage of encryption? b. Ensures data integrity 4. Which one of the following terms describe the process of someone monitoring you keying in your ATM pin with malicious intent? a. Shoulder surfing 119/26/2017
  • 12. MALWARE  2.1 Types of Malware  Definition of Malware o Malware is malicious software designed to install and harm your computer  Types of Infectious Malware o Viruses o Worms (WannaCry Ransomware) o Trojan horses (pretends as harmless program that collect you login info and password o Rootkits o Backdoor  Types of Data Thefts o Adware o Spyware o Botnet o Keylogger o Dialler 129/26/2017
  • 13. MALWARE  2.2 Protection  Understanding Anti-Virus Software o Identify and eliminate malware by scanning files in your computer  Limitations o Anti-virus software features o Zero-day exploits o Vulnerabilities  Using an Anti-Virus Software o Scanning o Scanning Specific Drives o Scheduling Scans  Quarantine Files  Updating Anti-Virus Software 139/26/2017
  • 14. MALWARE  2.3 Review Exercise 1. __________ is created and distributed for malicious purposes: a. Malware 2. Which of the following is not a characteristic of spyware? d. Call numbers without consent 3. A network of infected computers used to distribute malware is known as: b. Botnet 4. Which one of the following options is not a common option when anti-virus software detects an infected file? c. Open 5. Match the malware type on the left with the description on the right? 149/26/2017
  • 15. Network Security  3.1 Networks And Connections  Common Network Types o LAN (Local Area Network) o WAN (Wide Area Network) o WLAN (Wireless Local Area Network) o VPN (Virtual Private Network)  Security Implications of Connecting to a Network o Malware o Unauthorised Data Access, Privacy  Roles of the Network Administrator  Functions of Firewall  Limitation of Firewall o Viruses o Attacks o Monitoring 159/26/2017
  • 16. Network Security  3.2 Wireless Security  Potential Risks of Using Unprotected Wireless Network o Eavesdroppers o Network Hijacking o Man in the Middle  Types of Wireless Security o Wired Equivalent Privacy (WEP) o Wi-Fi Protected Access (WPA) o Media Access Control (MAC) Address Filtering) o Service Set Identifier (SSID) Hiding  Using Personal Hotspots  Enabling/Disabling a Personal Hotspot (Smartphone) 169/26/2017
  • 17. Network Security  3.3 Review Exercise 1. Which of the following is not a type of network? b. WAP 2. Which of the following is not a feature of a firewall? a. Encrypts information 3. List 2 security implications of connecting to a network. Malware Unauthorised data access Privacy 4. In wireless security, WPA is: d. Wi-Fi Protected Access 179/26/2017
  • 18. Access Controls  4.1 Methods  Preventing Unauthorised Data Access  Passwords  PIN (Personal Identification Number)  Encryption  Multi-factor authentication  One-Time Password  Network Accounts  Biometric Security Techniques o Fingerprint Scanning o Hand Geometry o Facial Recognition o Voice 189/26/2017
  • 19. Access Controls  4.2 Password Management  Good Password Policies: o Complex Password at least 8-12 Characters, include Upper & Lowercase, Numbers and Special Characters o Avoids Words Found in Dictionary o Change Passwords Regularly o Avoid Passwords that include your Name, Birthdate and Spouse Name o Never Use Password such as “admin”, “root” or “password” o Avoid Writing Your Password on Sticky Notes o Do Not Use Same Password for Different Services o Do Not Share Your Password with Anyone  Password Management Software: o Dashlane o LastPass o KeePass 199/26/2017
  • 20. Access Controls  4.3 Review Exercise 1. Which of the following is not a type of authentication? d. Something I believe 2. When data has been encrypted, what does the recipient need to read the data? b. A key. 3. Which of the following is not a biometric security method? c. One time password 4. Go to the following web page to test how secure your password is: http://howsecureismypassword.net/ 209/26/2017
  • 21. Secure Web Use  5.1 Browser Settings  Setting AutoComplete Options  Clearing Private Data from Browser: o Temporary Internet Files o Cookies o A History of the Websites You’ve Visited o Information that You have Entered into Websites or The Address Bar o Saved Web Passwords 219/26/2017
  • 22. Secure Web Use  5.2 Secure Browsing  Measures to Review a Website’s Safety: o Content Quality and Currency o Valid URL o Company or Owner Information o Check for Security Certificate and Validate Domain Owner  Pharming o Attacker targets DNS Service and changes IP Address of a Website. o User Types the Website Address in Web Browser. o User’s Computer Queries DNS Server for IP Address of Website. o Because DNS Server has been ‘poisoned’ by the Attacker, it returns the IP Address of the Fake Website to User’s Computer. o User has now been tricked into Visiting the Fake Website.  Content-Control Software o Client-side filters, Browser-based filters, Content-limited (or filtered) ISPs o Search-engines filters 229/26/2017
  • 23. Secure Web Use  5.3 Review Exercise 1. How do you identify a secure web site? https:// and Secured Lock Icon Check for Valid URL Check for Company or Owner Information Check Security Certificate and Validate Domain Owner 2. Open your browser and delete all temporary internet files. b. In Internet Explorer, Click “Tools” -> “Delete Browsing History” 3. Go to the Web of Trust website at http://www.mywot.com/ and check the reputation of the following websites: c. www.amazon.com d. Goldenpalace.com e. Whitehouse.com 239/26/2017
  • 24. Communications  6.1 E-Mails  Encrypting and Decrypting E-Mail  Digital Signature  Receiving Fraudulent and Unsolicited E-mail  Phishing Attack: o Planning o Setup o Attack o Collection o Identify Theft and Fraud  E-mail and Malware 249/26/2017
  • 25. Communications  6.1 E-Mails  Encrypting and Decrypting E-Mail 259/26/2017
  • 26. Communications  6.1 E-Mails  Adding Digital Signature in Email 269/26/2017
  • 27. Communications  6.1 E-Mails  Receiving Fraudulent E-mail (Phishing) 279/26/2017
  • 28. Communications  6.1 E-Mails  What is Unsolicited Email (Spam) 289/26/2017
  • 29. Communications  6.2 Social Networking  Potential Dangers: o Cyber Bullying o Cyber Grooming o Misleading or Dangerous Information o False Identities o Fraudulent Links or Messages  Sharing on Social Networks  Privacy Setting 299/26/2017
  • 30. Communications  6.3 VoIP and Instant Messaging  Security Considerations: o Malware o Backdoor Access o Access to Files o Eavesdropping  Strategies to Ensure Confidentiality when using IM and VoIP: o Encryption o Non-disclosure of important details o Restrict files sharing 309/26/2017
  • 31. Communications  6.4 Mobile  Risks of Using Mobile Apps from Unofficial Source: o Mobile Malware o Apps not fully tested and quality not approved. Slow down you Mobile Device and other apps. Result in Device Instability. o Apps may also gain permission to access your personal data such as Contacts, Images and Location.  Emergency/Precautionary Measures if You Mobile Devices is Lost/Stolen: o Remote Disable o Remote Wipe o Locate Device  Emergency Features (Android) 319/26/2017
  • 32. Communications  6.5 Review Exercise 1. An e-mail is sent out to mass recipients asking them to verify their bank account details. This is an example of: b. Phishing 2. Which one of the following details is considered unsafe to share on a social networking site? d. Home address 3. The process of re-directing users to a different website without their knowledge is knowing as: c. Pharming 4. A secure website can be identified by the web address if it begins with: b. https 329/26/2017
  • 33. Communications  6.5 Review Exercise 5. Consider the following questions: a. What was your favourite holiday destination? b. What is the name of your primary school? c. What is my favourite pet’s name? What would the potential security threats be by answering the questions above? 339/26/2017
  • 34. Secure Data Management  7.1 Secure and Back Up Data  Measures to Enhance Physical Security of Devices: o Do Not Leave Unsecured Computers or Devices Unattended o Record Details and Location of Items and Equipment o Use Cable Locks to Secure Computers and Devices o Works Areas Can Be Secured Using Access Control Measures such as Swipe Cards or Biometric Scanning  Backup Procedure: o Schedule o Compression o Location o Regularity  Backing Up Data  Cloud Back Up 349/26/2017
  • 35. Secure Data Management  7.2 Secure Deletion and Destruction  Common Methods of Permanently Destroying Data: o Shredding o Degaussing o Drive/Media Destruction  Specific Destruction Techniques: o Physically Breaking Media Apart, by Grinding, Shredding, etc o Incineration o Phase Transition (Liquefaction or Vaporisation of a Solid Disk) o Application of Corrosive Chemicals, such as Acids, to Recording Surfaces.  Using Data Destruction Utilities  FREE Programs That Perform Secure Over-Writes: o DBAN http://www.dban.org o Eraser http://eraser.heidi.ie 359/26/2017
  • 36. Secure Data Management  7.2 Secure Deletion and Destruction  Shredding Hard Drives 369/26/2017
  • 37. Secure Data Management  7.2 Secure Deletion and Destruction  Shredding Optical Disks 379/26/2017
  • 38. Secure Data Management  7.2 Secure Deletion and Destruction  Degaussing Hard Drives 389/26/2017
  • 39. Secure Data Management  7.3 Review Exercise 1. Which of the following is not a feature of a backup procedure? c. Volume 2. Which one of the following is not used as a backup method? b. Random access memory 3. Residual traces of deleted data that still remains is known as: b. Data remanence 399/26/2017