Chapter 9 Terms

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What types of files do I need to back up? Two types of files need backups:

Data files include files you've created or purchased, such as research papers, spreadsheets, music and photo files, contact lists, address books, e-mail archives, and your Favorites list from your browser. 2.Program files include files used to install software. Most manufacturers allow you to re-download the installation files if you need to reinstall the program, but some don't or charge you an extra fee for that service. Making sure you have your own backup of your system protects you in either case.

Virtual private networks make it just as secure

True

Your social security number should never be shared on a website, in an email, or through messaging.

True

Antivirus software looks for ___________ to detect viruses in files

Virus signatures

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

Inoculation

When you are surfing the web anon

All of the abov

What types of backups can I perform? There are two important types of backups:

1.A full backup means that you create a copy of all your application and data files. This is followed by a schedule of incremental backups (or partial backups). These involve only backing up files that have changed or have been created since the last backup was performed. 2.An image backup (or system backup) means that all system files are backed up, not just the application and data files. An image backup ensures you capture a complete snapshot of everything that makes your computer run—the operating system, the applications, and the data. The idea of imaging is to make an exact copy of the setup of your computer so that in the event of a total hard drive failure, you can copy the image to a new hard drive and have your computer configured exactly the way it was before the crash.

boot-sector virus

A boot-sector virus replicates itself onto a hard drive's master boot record.

Backups

A hacker can gain access to your computer and steal your data, but a more likely scenario is that you'll lose your data unintentionally. You may accidentally delete files or have your flash drive suddenly stop working. You may drop your laptop on the ground, causing the hard drive to break and resulting in complete data loss. A virus from an e-mail attachment you opened may destroy your original file. Your house may catch fire and destroy your computer. Because many of these possibilities are beyond your control, you should have a strategy for backing up your files (see Figure 9.31). Backups are copies of files that you can use to replace the originals if they're lost or damaged.

The Windows _____________ helps keep you aware of potential security issues and other major events on your device

Action Center

Which of the following is NOT a major antivirus software company (as mentioned in this Sound Byte)?

Adobe

. Computer forensics Computer Forensics: How It Works On law enforcement TV shows, you often see computer technicians working on suspects' computers to assist detectives in solving crimes. It may look simple, but the science of computer forensics is a complex, step-by-step process that ensures evidence is collected within the confines of the law. Forensic means that something is suitable for use in a court of law. There are many branches of forensic science. For example, forensic pathologists provide evidence about the nature and manner of death in court cases involving deceased individuals. Computer forensics involves identifying, extracting, preserving, and documenting computer evidence. Computer forensics is performed by individuals known as computer forensic scientists, who rely primarily on specialized software to collect their evidence. Phase 1: Obtaining and Securing Computer Devices The first step in a computer forensics investigation is to seize the computer equipment that law enforcement officials believe contains pertinent evidence. Police are required to obtain a warrant to search an individual's home or place of business. Warrants must be very specific by spelling out exactly where detectives can search for evidence and exactly what type of evidence they're seeking. If a warrant indicates that the police may search an individual's home for his laptop computer, they can't then confiscate a tablet computer they notice in his car. It is important to specify in the warrant all types of storage devices where potential evidence might be stored, such as external hard drives, flash drives, and servers. Once permission to collect the computers and devices containing possible evidence has been obtained, law enforcement officials must exercise great care when collecting the equipment. They need to ensure that no unauthorized persons are able to access or alter the computers or storage devices. The police must make sure the data and equipment are safe; if the equipment is connected to the Internet, the connection must be severed without data loss or damage. It's also important for law enforcement officials to understand that they may not want to power off equipment because potential evidence contained in RAM may be lost. After the devices are collected and secured, the computer forensic scientists take over the next phase of the investigation. Phase 2: Cataloging and Analyzing the Data It's critical to preserve the data exactly as it was found, or attorneys may argue that the computer evidence was subject to tampering or altering. Because just opening a file can alter it, the first task is to make a copy of all computer systems and storage devices collected (see Figure 9.38). The investigators then work from the copies to ensure that the original data always remains preserved exactly as it was when it was collected.

After obtaining a copy to work from, forensics professionals attempt to find every file on the system, including deleted files. Files on a computer aren't actually deleted, even if you empty the Recycle Bin, until the section of the hard disk they're stored on is overwritten with new data. Therefore, using special forensic software tools such as SANS Investigative Forensic Toolkit (SIFT) the forensic scientists catalog all files found on the system or storage medium and recover as much information from deleted files as they can. Software like the Forensic Toolkit (FTK) can readily detect hidden files and perform procedures to crack encrypted files or access protected files and reveal their contents. The most important part of the process is documenting every step. Forensic scientists must clearly log every procedure performed because they may be required to provide proof in court that their investigations did not alter or damage information contained on the systems they examined. Detailed reports should list all files found, how the files were laid out on the system, which files were protected or encrypted, and the contents of each file. Finally, computer forensic professionals are often called on to present testimony in court during a trial. Criminals are getting more sophisticated and are now employing anti-forensics techniques to foil computer forensic investigators. Although techniques for hiding or encrypting data are popular, the most insidious anti-forensics techniques are programs designed to erase data if unauthorized persons (i.e., not the criminal) access a computer system or if the system detects forensics software in use. When computer forensic investigators detect these countermeasures, they must often use creative methods and custom-designed software programs to retrieve and preserve the data. Computer forensics is an invaluable tool to law enforcement in many criminal investigations, but only if the correct procedures are followed and the appropriate documentation is prepared.

Computer Viruses can be spread by

All

whole-house surge protector

All electronic devices in the home that have solid-state components, such as TVs, stereos, printers, and smartphones (when charging), should be connected to a surge protector. However, it can be inconvenient to use individual surge protectors on everything. A more practical method is to install a whole-house surge protector (see Figure 9.36). Whole-house surge protectors function like other surge protectors, but they protect all electrical devices in the house. Typically, you'll need an electrician to install a whole-house surge protector, which costs hundreds of dollars. my equipment 100% safe when plugged into a surge protector? No. Lightning strikes can generate such high voltages that they can overwhelm a surge protector. Unplugging electronic devices during an electrical storm is the only way to achieve absolute protection

Should I be concerned about surfing the Internet on shared, public, or work computers? If you use shared computers in public places such as libraries, coffee shops, or student unions, you never know what nefarious tools have been installed by hackers. When you browse the Internet, traces of your activity are left behind on that computer, often as temporary files. A wily hacker can glean sensitive information long after you've finished your surfing session. In addition, many employers routinely review the Internet browsing history of employees to ensure workers are spending their time on the Internet productively. What tools can I use to keep my browsing activities private when surfing the Internet? The current versions of Mozilla Firefox, Microsoft Edge, and Google Chrome include privacy tools (called Private Browsing, InPrivate, and Incognito, respectively) that help you surf the web anonymously (see Figure 9.28). When you choose to surf anonymously, all three browsers open special versions of their browser windows that are enhanced for privacy. When surfing in these windows, records of websites you visit and files you download don't appear in the web browser's history files. Furthermore, any temporary files generated in that browsing session are deleted when you exit the special window.

Are there any other tools I could use to protect my privacy? Portable privacy devices, such as the Kingston Personal Flash Drives (kingston.com), provide an even higher level of surfing privacy. Simply plug the device into an available USB port on the machine on which you'll be working. All sensitive Internet files, such as cookies, passwords, Internet history, and browser caches, will be stored on the privacy device, not on the computer you're using. Privacy devices such as these often come preloaded with software designed to shield your IP address from prying eyes, making it difficult (if not impossible) for hackers to tell where you're surfing on the Internet. These privacy devices also have password-management tools that store all of your login information and encrypt it so it will be safe if your privacy device falls into someone else's hands. Is there anything else I can do to keep my data safe on shared computers? Another free practical solution is to take the Linux OS with you on a flash drive and avoid using the public or work computer's OS. The interfaces of many Linux distros look almost exactly like Windows and are easy to use. There are several advantages to using a Linux-based OS on a public or work computer: •When you run software from your own storage medium, such as a flash drive, you avoid reading and writing to the hard disk of the computer. This significantly enhances your privacy because you don't leave traces of your activity behind. •Your risk of picking up viruses and other malicious programs is significantly reduced because booting a computer from a flash drive completely eliminates any interaction with the computer's OS. This, in turn, significantly reduces the chance that your flash drive will become infected by any malware running on the computer. •Virus and hacking attacks against Linux are far less likely than attacks against Windows. Because Windows has about 90% of the OS market, people who write malware tend to target Windows systems. Pendrivelinux (pendrivelinux.com) is an excellent resource that offers many different versions of Linux for download and includes step-by-step instructions on how to install them on your flash drive. If you're a Mac user, the Elementary OS Luna distro of Linux provides a close approximation of macOS, so you can feel right at hom

____ involve using a physical attribute such as a fingerprint

Biometrics

Viruses that load from USB drives left connected to computers when computers are turned on are known as

Boot sector viruses

What should users do if they get a popup threatening them that their system is at risk and that they need to buy a particular product to ensure its protection?

Close the popup and make sure your operating system and anti-virus software are up to date. Scan your entire system for viruses

Multi-factor authentication

Computer system security depends on authentication—proving users are who they say they are. There are three independent authentication factors: •Knowledge factor: something the user knows (password, PIN) •Possession factor: something the user has (ATM card, mobile phone) •Inherence factor: something only the user is (biometric characteristics, such as fingerprints or iris pattern) Multi-factor authentication requires two of the three above factors be demonstrated before authorization is granted (see Figure 9.29). At the bank's ATM machine, you present an ATM card (something you have) and then use a PIN code (something you know) to access your account. Multi-factor authentication requires two of the three above factors be demonstrated before authorization is granted (see Figure 9.29). At the bank's ATM machine, you present an ATM card (something you have) and then use a PIN code (something you know) to access your account. Diagram shows multifactor authentication with possession factor, knowledge factor, inherence factor and strong authentication along with the examples. Figure 9.29 Multi-Factor Authentication Figure Full Alternative Text Description For online access, multi-factor authentication often relies on the use of mobile phones. For instance, when you register a Google account, you supply your mobile phone number. If you then want to make changes to your account, you supply the password (something you know). The second step of authentication is Google sending an SMS message with a unique code to your mobile phone. Retrieving the code and entering it online proves you have the phone (something the user has) and serves as the second authentication step. Multi-factor authentication is much safer than single-factor authentication. So make use of it when it is offered to you to enhance your account security.

Password strength is solely determined by the length of the password.

False

What information should I never share on websites? A good rule of thumb is to reveal as little information as possible, especially if the information would be available to everyone. Figure 9.30 gives you some good guidelines. Your Social Security number, phone number, date of birth, and street address are four key pieces of information that identity thieves use to steal an identity. This information should never be shared in a public area on any website.

How can I tell who can see my information on a social network? Social networking sites like Facebook make privacy settings available in your profile settings. If you've never changed your default privacy settings in Facebook, you're probably sharing information more widely than you should. How can I protect my information on Facebook? To begin, you need to change your privacy settings in your profile from some of the default options. In general, it's a bad idea to make personal information available to the public, although this is a default setting for some items in Facebook. It's a good idea to set most of the options in your profile's Basic Information section to Friends or to Only Me because, presumably, these are personal details you should wish to share only with friends. In the Contact Information section, restricting this information only to friends or to yourself is imperative. You don't want scammers contacting you via e-mail or snail mail and trying to trick you into revealing sensitive information.

A backup of the files required to restore your operating system is known as a(n)

Image backup

denial-of-service (DoS) attack

In a denial-of-service (DoS) attack, legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie. A computer system can handle only a certain number of requests for information at one time. When it's flooded with requests in a DoS attack, it shuts down and refuses to answer any requests, even if the requests are from a legitimate user. Thus, the computer is so busy responding to the bogus requests for information that authorized users can't gain access.

Firewalls work by closing ___________ in your computer.

Logical Ports

Which of the following is not a major type of cybercrime

Malware fraud

Which of the following statements about Windows Defender is FALSE?

It prevents denial of service (DOS) attacks

Which of the following statements about pop-ups is FALSE?

Launching a denial of service attack

drive-by download

Many viruses exploit weaknesses in operating systems. Malicious websites can be set up to attack your computer by downloading harmful software onto your computer. According to research conducted by Google, this type of attack, known as a drive-by download, affects almost 1 in 1,000 web pages. To combat these threats, make sure your OS is up to date and contains the latest security patches

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

NOT PORT BLOCKING

Firewalls use a process of _____

Not packet filtering

A backup of all the data files on your computer can be managed easily using the Windows 10 _______ utility.

Not recovery

How do I create a backup of my data files? Use the Windows 10 File History utility (see Figure 9.33). You may want to connect an external hard drive to your computer or a NAS device (or home server) to your network to store your backup or you may just want to back up to a USB flash drive, depending on how much data you have to store. Once configured, your data files will be backed up as often as you indicate. You can also restore files that you've backed up from the File History utility. With a few clicks you can retrieve any file back to your system.

Objective 9.12 List the various types of backups you can perform on your computing devices, and explain the various places you can store backup files. How might I damage my data? A hacker can gain access to your computer and steal your data, but a more likely scenario is that you'll lose your data unintentionally. You may accidentally delete files or have your flash drive suddenly stop working. You may drop your laptop on the ground, causing the hard drive to break and resulting in complete data loss. A virus from an e-mail attachment you opened may destroy your original file. Your house may catch fire and destroy your computer. Because many of these possibilities are beyond your control, you should have a strategy for backing up your files (see Figure 9.31). Backups are copies of files that you can use to replace the originals if they're lost or damaged. Image shows an effective backup strategy with type of files to back up, types of back up and place where back up files are stored. Figure 9.31 An Effective Backup Strategy Figure Full Alternative Text Description What types of files do I need to back up? Two types of files need backups: 1.Data files include files you've created or purchased, such as research papers, spreadsheets, music and photo files, contact lists, address books, e-mail archives, and your Favorites list from your browser. 2.Program files include files used to install software. Most manufacturers allow you to re-download the installation files if you need to reinstall the program, but some don't or charge you an extra fee for that service. Making sure you have your own backup of your system protects you in either case. What types of backups can I perform? There are two important types of backups: 1.A full backup means that you create a copy of all your application and data files. This is followed by a schedule of incremental backups (or partial backups). These involve only backing up files that have changed or have been created since the last backup was performed. 2.An image backup (or system backup) means that all system files are backed up, not just the application and data files. An image backup ensures you capture a complete snapshot of everything that makes your computer run—the operating system, the applications, and the data. The idea of imaging is to make an exact copy of the setup of your computer so that in the event of a total hard drive failure, you can copy the image to a new hard drive and have your computer configured exactly the way it was before the crash. Where should I store my backups? You have three main choices for where to back up your files (see Figure 9.32): 1.Online (in the cloud): To be truly secure, backups should be stored online. Because the information is stored online, it's in a secure, remote location, so data isn't vulnerable to the disasters that could harm data stored in your home. Image backups may not fit within the storage limits offered for free by cloud providers. Look for a service that specifically provides mirror image backups, which will include a copy of your full operating system. For example, Carbonite (carbonite.com) offers certain plans that include online storage of a full system backup. 2.External hard drives: External hard drives, or even large-capacity flash drives, are popular backup options. Although convenient and inexpensive, using external hard drives for backups still presents the dilemma of keeping the hard drive in a safe location. Also, external hard drives can fail, possibly leading to loss of your backed-up data. Therefore, using an external hard drive for backups is best done in conjunction with an online backup strategy for added safety. 3.Network-attached storage (NAS) devices and home servers: NAS devices are essentially large hard drives connected to a network of computers instead of to just one computer, and they can be used to back up multiple computers simultaneously. Home servers also act as high-capacity NAS devices for automatically backing up data and sharing files. Table showing typical data backup locations and their comparison with pros and cons. Figure 9.32 A Comparison of Typical Data Backup Locations Source: Mipan/Fotolia, Prapass Wannapinij/Fotolia, Darkdesigns/Fotolia Description How do I create a backup of my data files? Use the Windows 10 File History utility (see Figure 9.33). You may want to connect an external hard drive to your computer or a NAS device (or home server) to your network to store your backup or you may just want to back up to a USB flash drive, depending on how much data you have to store. Once configured, your data files will be backed up as often as you indicate. You can also restore files that you've backed up from the File History utility. With a few clicks you can retrieve any file back to your system. Windows page showing file history utility to back up files and restore files from previous backup. Figure 9.33 You can use the Windows File History utility to back up files and restore files from a previous backup. > Access Settings, select Update & security, then click Backup. Source: Windows 10, Microsoft Corporation Figure Full Alternative Text Description How often should I back up my data files? File History can be set to automatically save files you've changed every ten minutes or every day, whatever you select. File History keeps previous versions of the file on the backup drive so you can revert to an older copy of the file if you need to do so. How do I create an image backup? Windows also includes the System Image backup utility, which provides a quick and easy way to perform image backups. You can access this utility from the Backup and Restore screen (see Figure 9.34a) by clicking Create a system image. Before starting this utility, make sure your external drive or NAS device is connected to your computer or network and is powered on. To create the image backup: 1.Click the Create a system image link. Select the location (drive) for your backup files and click Next to proceed. 2.On the second screen (see Figure 9.34b), you can select the drives (or partitions of drives) from your computer to be backed up. Notice that all the drives/partitions that are required for Windows to run are preselected for you. Windows will back up all data files and system files on all selected drives/partitions. Click Next to proceed. 3.On the third screen, click Start backup to start your system image. After the system image backup runs for the first time, you'll see the results of the last backup and the date of the next scheduled backup on the Backup and Restore (Windows 7) screen (see Figure 9.34a). If the scheduled backup time is not convenient for you, click the Change settings link to select an alternative time. From the Backup and Restore screen, you can also create a system repair disc. A system repair disc contains files that can be used to boot your computer in case of a serious Windows error.

Where should I store my backups? You have three main choices for where to back up your files

Online (in the cloud): To be truly secure, backups should be stored online. Because the information is stored online, it's in a secure, remote location, so data isn't vulnerable to the disasters that could harm data stored in your home. Image backups may not fit within the storage limits offered for free by cloud providers. Look for a service that specifically provides mirror image backups, which will include a copy of your full operating system. For example, Carbonite (carbonite.com) offers certain plans that include online storage of a full system backup. 2.External hard drives: External hard drives, or even large-capacity flash drives, are popular backup options. Although convenient and inexpensive, using external hard drives for backups still presents the dilemma of keeping the hard drive in a safe location. Also, external hard drives can fail, possibly leading to loss of your backed-up data. Therefore, using an external hard drive for backups is best done in conjunction with an online backup strategy for added safety. 3.Network-attached storage (NAS) devices and home servers: NAS devices are essentially large hard drives connected to a network of computers instead of to just one computer, and they can be used to back up multiple computers simultaneously. Home servers also act as high-capacity NAS devices for automatically backing up data and sharing files.

Pharming

Pharming is much more insidious than phishing. Phishing requires a positive action by the person being scammed, such as going to a website mentioned in an e-mail and typing in personal information. Pharming occurs when malicious code is planted on your computer, either by viruses or by your visiting malicious websites, which then alters your browser's ability to find web addresses. Users are directed to bogus websites even when they enter the correct address of the real website. You end up at a fake website that looks legitimate but is expressly set up for the purpose of gathering information.

A _____ is a program that takes complete control of your PC without your knowledge

Rootkit

A surge protector may look like just another power strip but it also can

Save your devic

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as

Scareware

A series of commands that are executed without your knowledge is a typical attribute of a __________ virus

Script

Sending e-mails to lure people into revealing personal information is a technique known as phishing.

True

How else are viruses classified?

Viruses can also be classified by the methods they take to avoid detection by antivirus software: •A polymorphic virus changes its own code or periodically rewrites itself to avoid detection. Most polymorphic viruses infect a particular type of file such as .EXE files, for example. •A multipartite virus is designed to infect multiple file types in an effort to fool the antivirus software that is looking for it. •Stealth viruses temporarily erase their code from the files where they reside and then hide in the active memory of the computer. This helps them avoid detection if only the hard drive is being searched for viruses. Fortunately, current antivirus software scans memory as well as the hard drive.

Cookies

What are cookies? Cookies are small text files that some websites automatically store on your hard drive when you visit them. When you log on to a website that uses cookies, a cookie file assigns an ID number to your computer. The unique ID is intended to make your return visit to a website more efficient and better geared to your interests. The next time you log on to that site, the site marks your visit and keeps track of it in its database.

hacker

What defines a hacker? Although there's a great deal of disagreement as to what a hacker actually is, especially among hackers themselves, a hacker is most commonly defined as anyone who unlawfully breaks into a computer system—either an individual computer or a network

surge protector

What is a power surge? Power surges occur when electric current is supplied in excess of normal voltage. Old or faulty wiring, downed power lines, malfunctions at electric company substations, and lightning strikes can all cause power surges. A surge protector is a device that protects your computer against power surges. Note that you should replace your surge protectors every two to three years. Also, after a major surge, the surge protector will no longer function and must be replaced. And it's wise to buy a surge protector that includes indicator lights, which illuminate when the surge protector is no longer functioning properly. Don't be fooled by old surge protectors—although they can still function as multiple-outlet power strips, they deliver power to your equipment without protecting it from surges.

What if my computing device is stolen? The theft of tablets, smartphones, notebook computers, and other portable computing devices is always a risk. The resale value for used electronic equipment is high, and the equipment can be easily sold online. And because they're portable, laptops, tablets, and phones are easy targets for thieves. The main security concerns with mobile devices are: 1.Keeping them from being stolen 2.Keeping data secure in case they are stolen 3.Finding a device if it is stolen

What type of alarm can I install on my mobile device? Motion alarm software is a good, inexpensive theft deterrent. Free software such as LAlarm (lalarm.com) is effective for laptops. Apps such as Motion Alarm and Alarmomatic help secure your iPad or iPhone. Alarm software either detects motion, as when your device is being picked up, or sounds near your device and then sets off an ear-piercing alarm until you enter the disable code. How can I secure the data on my mobile devices? The easiest way to keep the data secure is to make sure you have a login passcode set for your device. If your device supports biometrics like fingerprint detection for login, that's another way to make sure the contents are safe even if it's stolen. Even if somehow the thief gets entry into the device, you can protect the data from prying eyes. Encrypting the data on your mobile device can make it practically impossible for thieves to obtain the data. Encryption involves transforming your data using an algorithm that can only be unlocked by a secure passcode. Encrypted data can't be read unless it's decrypted, which requires the passcode. On both iOS and Android devices, the operating system offers a built-in encryption option. How can my device help me recover it when it is stolen? Software is available that lets your device report back its current location. For iOS devices, Apple offers the Find My iPhone service. Enabling this service provides you with numerous tools to assist you in recovering and protecting your mobile devices. Did you forget where you left your iPad? Just sign in with your Apple ID at the iCloud website to see a map showing the location of your iPad. You can send a message to your device, remotely password lock the device, or wipe all data from the device to completely protect your privacy. For Android devices, the Android Device Manager offers similar features. You can easily type "Find my phone" into the omnibox (the browser search bar) of Google Chrome, and a map with the location of your Android device will be shown (see Figure 9.37). And for Windows 10 devices, there is a similar Find My Device command located in the Update and Security section of Settings.

Virtual private networks (VPNs)

are secure networks that are established using the public Internet infrastructure. Using specialized software, servers, and data transmission protocols, VPNs are used to send information on the public Internet in such a manner that the data is as secure as sending it on a private network. VPNs used to be only used by businesses. But with public concerns about information security on the rise, many VPN software providers (such as Private Internet Access and NordVPN) are marketing affordable solutions to individuals. So if you routinely transmit sensitive information, you should consider a personal VPN solution. Make sure to use some (or all) of these methods to keep your activities from prying eyes and to restrict access to your digital information.

Authentican techniquies rely on personal biological traits are called

biometrics

What constitutes a strong password? Strong passwords are difficult for someone to guess. Follow these guidelines to create strong passwords (see Figure 9.24): •Don't use easily deduced components related to your life, such as parts of your name, your pet's name, your street address, or the name of the website or institution for which you're creating the password (e.g., don't use "Citibank" for your online banking password). •Use a password that's at least 14 characters long. Longer passwords are more difficult to deduce. Consider using a passphrase that is even longer. •Don't use words found in the dictionary. •Use a mix of upper- and lowercase letters, numbers, and symbols (such as # or %). •Never tell anyone your password or write it down in a place where others might see it, like in your wallet or a sticky note on your computer screen. •Change your passwords on a regular basis, such as monthly or quarterly. Your school or your employer probably requires you to change your password regularly. This is also a good idea for your personal passwords. •Don't use the same password for every account you have. •If you have trouble thinking of secure passwords, there are many password generators available for free, such as the Strong Password Generator (strongpasswordgenerator.com).

can I check the strength of my passwords? You can use online password strength testers, such as the Password Meter (passwordmeter.com), to evaluate your passwords. The Password Meter provides guidelines for good passwords and shows you how integrating various elements, such as symbols, affects the strength score of your password. How do I restrict access to my computer? Windows, macOS, and most other operating systems have built-in password (or passcode) protection for files as well as the entire desktop. After a certain period of idle time, your computer is automatically password locked, and your password (or PIN) must be entered to gain access to the computer. This provides excellent protection from casual snooping if you need to walk away from your computer for a period of time. If someone attempts to log on to your computer without your password, that person won't be able to gain access. It's an especially good idea to use passwords on laptop computers, smartphones, and tablets because this provides additional protection of your data if your device is lost or stolen. Windows allows you to use gesture passwords on touchscreen devices. You select a picture and then draw three gestures on it—either straight lines, circles, or taps. This combination then works as an additional method for accessing your computer. You can unlock your computer by repeating the gestures (see Figure 9.25). Biometric verification is beginning to appear now as well (discussed below).

biometric authentication device

is a device that reads a unique personal characteristic such as a fingerprint or the iris pattern in your eye and converts its pattern to a digital code. When you use the device, your pattern is read and compared to the one stored on the computer. Only users having an exact fingerprint or iris pattern match are allowed to access the computer. Because no two people have the same biometric characteristics (fingerprints and iris patterns are unique), these devices provide a high level of security. They also eliminate the human error that can occur in password protection. You might forget your password, but you won't forget to bring your fingerprints when you're working on your computer! Many smartphones now include fingerprint readers. Other biometric devices, including voice authentication and facial recognition systems, are now widely offered. Windows 10 offers facial recognition for login, called Hello, in laptops (see Figure 9.27), tablets, and smartphones.

A computer controlled by a hacker is called a __________.

zombie​

Phishing

(pronounced "fishing") lures Internet users to reveal personal information such as credit card numbers, Social Security numbers, or passwords that could lead to identity theft. The scammers send e-mail messages that look like they're from a legitimate business such as a bank. The e-mail usually states that the recipient needs to update or confirm his or her account information. When the recipient clicks on the provided link, they go to a website. The site looks like a legitimate site but is really a fraudulent copy that the scammer has created. Once the e-mail recipient enters his or her personal information, the scammers capture it and can begin using it.

zombie

A computer that a hacker controls in this manner is referred to as a zombie. Zombies are often used to launch denial-of-service attacks on other computers.

virus

A computer virus is a computer program that attaches itself to another computer program (known as the host program) and attempts to spread to other computers when files are exchanged. That behavior is very similar to how biological viruses spread, giving this type of threat its name.

What is a virus?

A computer virus is a computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged.

data breach

A data breach occurs when sensitive or confidential information is copied, transmitted, or viewed by an individual who isn't authorized to handle the data. Data breaches can be intentional or unintentional. Intentional data breaches occur when hackers break into digital systems to steal sensitive data. Unintentional data breaches occur when companies controlling data inadvertently allow it to be seen by unauthorized parties, usually due to some breakdown in security procedures or precautions. Unfortunately, data breaches appear to be quite common, as there always seems to be another one in the news. Thousands of data breaches a year are reported by U.S. companies. Over a hundred million records are exposed in a typical year. These breaches pose serious risks to the individuals whose data has been compromised, even if financial data is not involved. The data thieves now have the basis with which to launch targeted social engineering attacks even if they just have contact information, such as e-mail addresses. With regular phishing techniques, cybercriminals just send out e-mails to a wide list of e-mail addresses, whether they have a relationship with the company or not. For example, a criminal might send out a general phishing e-mail claiming that a person's Citibank checking account had been breached. People receiving this e-mail who don't have any accounts at Citibank should immediately realize this is a phishing attack and ignore the instructions to divulge sensitive data.

personal firewall

A firewall designed specifically for home networks is called a personal firewall. By using a personal firewall, you can close open logical ports and make your computer invisible to other computers on the Internet

firewall

A firewall is a software program or hardware device designed to protect computers from hackers. It's named after a housing construction feature that slows the spread of fires from house to house

But how will a firewall help if I'm not exchanging any valuable information over the Internet and don't have any important files on my computer?

A firewall protects your computer by screening data coming into the logical ports and confirming whether it's from a trusted source. Even if you don't store proprietary files on your computer, a hacker can steal personal information from your computer to commit identity theft.

logic bomb

A logic bomb is a virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times.

What are logical ports?

A logical port is a virtual communications gateway that allows a computer to organize requests for information from other networks or computers.

time bomb

A time bomb is a virus that is triggered by the passage of time or on a certain date. For example, the Michelangelo virus was a famous time bomb that was set to trigger every year on March 6, Michelangelo's birthday. The effects of logic bombs and time bombs range from the display of annoying messages on the screen to the reformatting of the hard drive, which causes complete data loss

botnet

Administrators of the victim computer often have a great deal of difficulty stopping the attack because it comes from so many computers. Often, the attacks are coordinated automatically by botnets. A botnet is a large group of software programs (called robots or bots) that runs autonomously on zombie computers. Some botnets have been known to span millions of computers. Because many commercial websites receive revenue from users, either directly (such as via subscriptions to online games) or indirectly (such as when web surfers click on advertisements), DDoS attacks can be financially distressing for the owners of the affected websites.

worm

Although often called a virus, a worm is subtly different. Viruses require human interaction to spread, whereas worms take advantage of file transport methods, such as e-mail or network connections, to spread on their own. A virus infects a host file and waits until that file is executed to replicate and infect a computer system. A worm, however, works independently of host file execution and is much more active in spreading itself. Some worms even attack peripheral devices such as routers. Worms can generate a lot of data traffic when trying to spread, which can slow down the Internet.

spam filter

Another way to avoid spam is to filter it. A spam filter is an option you can select in your e-mail account that places known or suspected spam messages into a special folder (called "Spam" or "Junk Mail"). Most e-mail services, such as Gmail and Outlook, offer spam filters

spear phishing

But when cybercriminals obtain data on individuals that includes information about which companies those individuals have a relationship with, they can engage in much more targeted attacks known as spear phishing (see Figure 9.15). Spear phishing e-mails are sent to people known to be customers of a company and have a much greater chance of successfully getting individuals to reveal sensitive data. If cybercriminals obtain a list of e-mail addresses of customers from Barclays Bank, for example, they can ensure that the spear phishing e-mails purport to come from Barclays and will include the customer's full name. This type of attack is much more likely to succeed in fooling people than just random e-mails sent out to thousands of people who might not have a relationship with the company mentioned in the phishing letter.

spam

Companies that send out spam—unwanted or junk e-mail—find your e-mail address either from a list they purchase or with software that looks for e-mail addresses on the Internet. Unsolicited instant messages are also a form of spam, called spim. If you've used your e-mail address to purchase anything online, open an online account, or participate in a social network such as Facebook, your e-mail address eventually will appear on one of the lists that spammers get. One way to avoid spam in your primary account is to create a secondary e-mail address that you use only when you fill out forms or buy items on the web. If your secondary e-mail account is saturated with spam, you can abandon that account with little inconvenience. It's much less convenient to abandon your primary e-mail address.

packet analyzer (sniffer

Data travels through the Internet in small pieces called packets. The packets are identified with an Internet Protocol (IP) address, in part to help identify the computer to which they are being sent. Once the packets reach their destination, they're reassembled into cohesive messages. A packet analyzer (sniffer) is a program deployed by hackers that examines each packet and can read its contents. A packet analyzer can grab all packets coming across a particular network—not just those addressed to a particular computer. For example, a hacker might sit in a coffee shop and run a packet sniffer to capture sensitive data (such as debit/credit card numbers) from patrons using the coffee shop's free wireless network. Wireless networks are vulnerable to this type of exploitation if encryption of data wasn't enabled when the networks were set up. (See Chapter 7 on how to use security protocols to set encryption on your network.)

How does antivirus software work? The main functions of antivirus software are as follows:

Detection: Antivirus software looks for virus signatures in files. A virus signature is a portion of the virus code that's unique to a particular computer virus. Antivirus software scans files for these signatures when they're opened or executed and identifies infected files and the type of virus infecting them. •Stopping virus execution: If the antivirus software detects a virus signature or suspicious activity, such as the launch of an unknown macro, it stops the execution of the file and virus and notifies you that it has detected a virus. It also places the virus in a secure area on your hard drive so that it won't spread to other files; this procedure is known as quarantining. Usually, the antivirus software then gives you the choice of deleting or repairing the infected file. Unfortunately, antivirus programs can't always fix infected files to make them usable again. You should keep backup copies of critical files so that you can restore them in case a virus damages them irreparably. •Prevention of future infection: Most antivirus software will also attempt to prevent infection by inoculating key files on your computer. In inoculation, the antivirus software records key attributes about your computer files, such as file size and date created, and keeps these statistics in a safe place on your hard drive. When scanning for viruses, the antivirus software compares the attributes of the files with the attributes it previously recorded to help detect attempts by virus programs to modify your files.

logical port blocking

Firewalls can also be configured to completely refuse requests from the Internet asking for access to specific ports. That process is referred to as logical port blocking. By using filtering and blocking, firewalls help keep hackers from accessing your computer

What else can hackers do?

Hackers can also launch an attack from your computer called a denial-of-service (DoS) attack. A DoS attack is actually a virus that attacks the hard drive, corrupting the files stored in your computer

How does a hacker gain access to a computer?

Hackers can gain access to computers directly or indirectly. Direct access involves sitting down at a computer and installing hacking software. It's unlikely that such an attack would occur in your home, but it's always a wise precaution to set up your computer so that it requires a password for a user to gain access.

Besides committing identity theft, what else can hackers do?

Hackers can use Trojan horses to gain control of your computer without your knowledge. A Trojan horse is a program that appears to be something useful or desirable, but at the same time does something malicious in the background without your knowledge

Trojan horse

Hackers often use individuals' computers as a staging area for mischief. To commit widespread computer attacks, for example, hackers need to control many computers at the same time. To this end, hackers often use Trojan horses to install other programs on computers. A Trojan horse is a program that appears to be something useful or desirable, like a game or a screen saver, but while it runs it does something malicious in the background without your knowledge. Figure 9.3 The term Trojan horse derives from Greek mythology and refers to the wooden horse that the Greeks used to sneak into the city of Troy and conquer it. Therefore, computer programs that contain a hidden, and usually dreadful, "surprise" are referred to as Trojan horses.

packet filtering

How do firewalls block access to your logical ports? Recall that logical ports are virtual communications paths that allow a computer to organize requests for information from other networks or computers. See Figure 9.17 for some logical port numbers and the services they are associated with. Table shows common logical ports having port numbers with their protocol. Figure 9.17 Common Logical Ports Figure Full Alternative Text Description Certain logical ports are very popular in hacker attacks. For example, logical port number 1337 is often used because it looks close to the word "leet," which is hacker talk for "elite," so hackers think it's fun to go after that port. To block access to logical ports, firewalls examine data packets that your computer sends and receives. Data packets contain the address of the sending and receiving computers and the logical port that the packet will use. Firewalls can be configured so that they filter out packets sent to specific logical ports in a process known as packet filtering

Cyberloafing (or cyberslacking

However, the Internet has led to a new type of productivity drain of concern to employers. Cyberloafing (or cyberslacking) means using your computer for nonwork activities while you're being paid to do your job. Examples of cyberloafing activities include playing games and using social networks. Some employees even do multiple nonwork tasks at the same time, which is known as multishirking. Estimates of business productivity losses due to cyberloafing top $50 billion annually. Do you have a right to privacy in the workplace? Laws such as the 1986 Electronic Communications Privacy Act (ECPA), which prohibits unauthorized monitoring of electronic communications, have been interpreted by the courts in favor of employers. The bottom line is that employers who pay for equipment and software have the legal right to monitor their usage So, is it ethical for employers to monitor their employees? Certainly, it seems fair that employers ensure they're not the victims of theft and that they're getting a fair day's work from their employees, just as employees have an obligation to provide a fair effort for a fair wage. The ethical issue is whether employees are adequately informed of monitoring policies. Employers have an ethical responsibility (and a legal one as well, depending on the jurisdiction) not to place monitoring devices in sensitive locations such as bathrooms and dressing areas. However, in many states, the employer does not legally need to inform employees in advance that they're being monitored. Conscientious employers include monitoring disclosures in published employee policies to avoid confusion and conflict. The bottom line? Because employers may have a legal right to monitor you in the workplace, operate under the assumption that everything you do on your work computer is subject to scrutiny and behave accordingly.

E-mail viruses

In addition to being a macro virus, the Melissa virus was the first practical example of an e-mail virus. E-mail viruses use the address book in the victim's e-mail system to distribute the virus. In the case of the Melissa virus, anyone opening an infected document triggered the virus, which infected other documents on the victim's computer. Once triggered, the Melissa virus sent itself to the first 50 people in the e-mail address book on the infected computer.

Exploit kits

Indirect access involves subtler methods. Many professional hackers use exploit kits. Exploit kits are software programs that run on servers and search for vulnerabilities of computers that visit the server. Exploit kits look for security holes in browsers and operating systems that haven't yet been patched by the users. When they detect a vulnerability, they can deliver spyware, bots, backdoor programs, or other malicious software to your computer. Fortunately, most exploit kits take advantage of known vulnerabilities, so if your antivirus software and operating system are up to date, you should be secure. We'll discuss both of these topics later in the chapter. Hackers also can access a computer indirectly through its Internet connection. Many people forget that their Internet connection is a two-way street. Not only can you access the Internet, but also people on the Internet can access your computer. Think of your computer as a house. Common sense tells you to lock your home's doors and windows to deter theft when you aren't there. Hooking your computer up to the Internet without protection is like leaving the front door to your house wide open. Your computer obviously doesn't have doors and windows, but it does have logical ports.

If a Microsoft Excel file is all garbled, could it have a virus?

It could be a virus, but it could also be another problem, such as a corrupt file.

Pretexting

Most social engineering schemes use a pretext to lure their victims. Pretexting involves creating a scenario that sounds legitimate enough that someone will trust you. For example, you might receive a phone call during which the caller says he is from your bank and that someone tried to use your account without authorization. The caller then tells you he needs to confirm a few personal details such as your birth date, Social Security number, bank account number, and whatever other information he can get out of you. The information he obtains can then be used to empty your bank account or commit some other form of fraud. The most common form of pretexting in cyberspace is phishing.

Is it safe to click on links that come in email from companies you know?

No, it is not safe. It is a better practice to go to the website yourself and login there

Is a virus the only way cyber criminals can steal a person's identity?

No, you need to protect yourself in many situations, such as when you use public Wi-Fi, when you respond to email and you should also have a strong anti-virus program installed and updated.

Backdoor programs

Often, the malicious activity perpetrated by a Trojan horse program is the installation of a backdoor program or a rootkit

keystroke logger (keylogger)

One type of spyware program known as a keystroke logger (keylogger) monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.

How do firewalls block access to your logical ports? Recall that logical ports are virtual communications paths that allow a computer to organize requests for information from other networks or computers. See Figure 9.17 for some logical port numbers and the services they are associated with.

Port Number- Protocol using Port 21 FTP(File Transfer Protocol) Control 23 Telnet (Unencrypted Text communications) 25 SMTP (Simple Mail transfer Protocol) 53 DNS (Domain name system) 80 HTTP (Hypertext Transfer Protocol) 443 HTTPS (HTTP with transport Layer Secrurity Encryption TLS)

After deletion (in Windows), your files are stored in the __________.

Recycle Bin​

Social engineering

Social engineering is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. Social engineering often doesn't involve the use of a computer or face-to-face interaction. For example, telephone scams are a common form of social engineering because it's often easier to manipulate someone when you don't have to look at them.

Once I download or buy the firewall software, how do I get it installed and tested?

Some people prefer professional help, but most home users can install and test their firewall by following the instructions provided in the user manual. You can test it by going to such sites as grc.com and running the ShieldsUP test to see if you're safe.

script

Some viruses are hidden on websites in the form of scripts. A script is a series of commands—actually, a miniprogram—that is executed without your knowledge. Scripts are often used to perform useful, legitimate functions on websites, such as collecting name and address information from customers. However, some scripts are malicious. For example, you might click a link to display a video on a website, which causes a script to run that infects your computer with a virus.

How can I tell if my computer is infected with a virus?

Sometimes it can be difficult to definitively tell whether your computer is infected with a virus. However, if your computer displays any of the following symptoms, it may be infected with a virus: •Existing program icons or files suddenly disappear. Viruses often delete specific file types or programs. •You start your browser and it takes you to an unusual home page (i.e., one you didn't set) or it has new toolbars. •Odd messages, pop-ups, or images are displayed on the screen, or strange music or sounds play. •Data files become corrupt. (However, note that files can become corrupt for reasons other than a virus infection.) •Programs stop working properly, which could be caused by either a corrupted file or a virus. •Your system shuts down unexpectedly, slows down, or takes a long time to boot up.

The __________ utility allows you to create a copy of your entire hard drive on an external hard drive.

System Image

To access the Windows Update screen, access Settings, select Update & security, then select Windows Update. Source: Windows 10, Microsoft Corporation Figure Full Alternative Text Description The Advanced Options screen for Windows Update provides a few other options (see Figure 9.22). The most notable is the ability to receive updates for other Microsoft products (like MS Office). (Note that the ability to defer upgrades is not available on the Windows 10 Home edition—you must install updates as they are delivered by Microsoft.)

The Windows Update Advanced Options screen provides a few more user controlled update options. > To access the Windows Update Advanced Options screen, click the Advanced options link near the bottom of the Windows Update screen

master boot record

The master boot record is a program that executes whenever a computer boots up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load. Boot-sector viruses are often transmitted by an infected flash drive left in a USB port. When the computer boots up with the flash drive connected, the computer tries to launch a master boot record from the flash drive, which is usually the trigger for the virus to infect the hard drive

cybercrime

The media is full of stories about malicious computer programs damaging computers, criminals stealing people's identities online, and attacks on corporate websites bringing major corporations to a standstill. These are examples of cybercrime—any criminal action perpetrated primarily through the use of a computer. Cybercriminals are individuals who use computers, networks, and the Internet to perpetrate crime. In this part of the chapter, we'll discuss the most serious types of cybercrime you need to worry about as well as some online annoyances to avoid.

Is it important to have a firewall on a home network?

To be safe, you should always have a firewall if you plan to connect to the Internet

Can I get a virus on my smartphone?

Viruses can indeed infect smartphones. Over half of users say they send confidential e-mails using their phones, and one-third of users access bank account or credit card information on their phones, so smartphones are the next most likely realm of attack by cybercriminals. Although viruses plaguing smartphones have not yet reached the volume of viruses attacking PC operating systems, with the proliferation of mobile devices, virus attacks are expected to increase. Kaspersky and McAfee are among the leading companies currently providing antivirus software for mobile devices. Products are designed for specific operating systems; for example, Kaspersky Mobile Security has versions for Android phones and tablets and Windows phones. Often, businesses will have their information technology department install and configure an antivirus solution like this for all the phones used in the organization. If no antivirus program is available for your phone's OS, the best precautions are commonsense ones. Check the phone manufacturer's website frequently to see whether your smartphone needs any software upgrades that could patch security holes. In addition, remember that you shouldn't download ring tones, games, or other software from unfamiliar websites.

Identity theft

What is identity theft? Identity theft occurs when a thief steals personal information such as your name, address, Social Security number, birth date, bank account number, and credit card information and poses as you in financial or legal transactions. Theft of personal data such as bank account numbers and credit/debit card numbers is of most concern to individuals because this information is usually used for fraudulent purposes. Many victims of identity theft spend months, or even years, trying to repair their credit and eliminate fraudulent debts.

Which is better, a software firewall or a hardware firewall? One type isn't better than the other. Both hardware and software firewalls will protect you from hackers. Although installing either a software or a hardware firewall on your home network is probably sufficient, you should consider installing both for maximum protection. This will provide you with additional safety. If you're using a security suite that includes a firewall, the suite should disable the firewall that came with your OS. Two firewalls running at the same time can conflict with each other and cause your computer to slow down or freeze up.

What software firewalls are there? Both Windows and macOS include reliable firewalls. The Windows Action Center is a good source of information about the security status of your computer. The status of your Windows Firewall is shown in the Windows Firewall dialog box (see Figure 9.16). Security suites such as Norton Security and Trend Micro Internet Security Suite also include firewall software. Although the firewalls that come with Windows and macOS will protect your computer, firewalls included in security suites often come with additional features such as monitoring systems that alert you if your computer is under attack. To view the Windows Firewall dialog box, access Settings, select Network & Internet, select Wi-Fi, and then click the Windows Firewall link.

encryption virusesc

When encryption viruses (also known as ransomware) infect your computer, they run a program that searches for common types of data files, such as Microsoft Word files, and compresses them using a complex encryption key that renders your files unusable. You then receive a message that asks you to send payment to an account if you want to receive the program to decrypt your files. The flaw with this type of virus, which keeps it from being widespread, is that law enforcement officials can trace the payments to an account and may possibly be able to catch the perpetrators. Figure 9.7 summarizes the major categories of viruses.

Are there different kinds of hackers? Some hackers are offended by being labeled as criminals and classify different types of hackers

White-hat hackers (or ethical hackers) break in to systems for nonmalicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses. They believe in making security vulnerabilities known either to the company that owns the system or software or to the general public, often to embarrass a company into fixing a problem. •Black-hat hackers break into systems to destroy information or for illegal gain. The terms white hat and black hat are references to old Western movies in which the heroes wore white hats and the outlaws wore black hats. •Grey-hat hackers are a bit of a cross between black and white—they often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches. The laws in the United States consider any unauthorized access to computer systems a

If your system becomes unstable, you can reset it to a configuration from a past date by using __________.

Windows System Restore

distributed denial-of-service (DDoS) attack

Yes, launching a DoS attack on a computer system from a single computer is easy to trace. Therefore, most savvy hackers use a distributed denial-of-service (DDoS) attack, which launches DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time. Figure 9.4 illustrates how a DDoS attack works. A hacker creates many zombies and coordinates them so that they begin sending bogus requests to the same computer at the same time.

Logical ports

You already know what physical ports are: You use them to attach peripherals, as when you plug your USB flash drive into a USB port. Logical ports are virtual—that is, not physical —communications paths. Unlike physical ports, you can't see or touch a logical port; it's part of a computer's internal organization. Logical ports allow a computer to organize requests for information. So all information arriving from another computer or network that's related to e-mail will be sent to the logical port associated with e-mail. Logical ports are numbered and assigned to specific services. For instance, logical port 80 is designated for hypertext transfer protocol (HTTP), the main communications protocol for the web. Thus, all requests for information from your browser to the web flow through logical port 80. Open logical ports, like open windows in a home, invite intruders, as illustrated in Figure 9.5. Unless you take precautions to restrict access to your logical ports, other people on the Internet may be able to access your computer through them. Fortunately, you can thwart most hacking problems by installing a firewall, which we discuss later in the chapter.

Are there different kinds of firewalls?

You can buy either a hardware firewall device or special firewall software designed to restrict access to your computer.

network address translation (NAT

Your IP address for your home network is assigned to your router by your Internet service provider (ISP). Then each device on your home network has its own IP address. Firewalls use a process called network address translation (NAT) to assign internal IP addresses on a network. The internal IP addresses are used only on the internal network and therefore can't be detected by hackers. For hackers to access your computer, they must know your computer's internal IP address. With a NAT-capable router/firewall installed on your network, hackers are unable to access the internal IP address assigned to your computer, so your computer is safe. Most routers sold for home use are configured as firewalls and feature NAT.

macro virus

a virus that attaches itself to a document that uses macros. A macro is a short series of commands that usually automates repetitive tasks. However, macro languages are now so sophisticated that viruses can be written with them. The Melissa virus became the first major macro virus to cause problems worldwide

rootkits

are programs (or sets of programs) that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. Using a backdoor program, hackers can access and delete all the files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer

Scareware

is a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware. Pop-ups, banners, or other annoying types of messages will flash on your screen, saying frightening things like "Your computer is infected with a virus ... immediate removal is required." You're then directed to a website where you can buy fake removal or antivirus tools that provide little or no value. Some scareware even goes so far as to encrypt your files and then demand that you pay to have them unencrypted, which is essentially extortion. In 2017, an international cyberattack like this hit hospitals and businesses in 99 countries at the same time. Scareware is a social engineering technique because it uses people's fear of computer viruses to convince them to part with their money. Scareware is often designed to be extremely difficult to remove from your computer and to interfere with the operation of legitimate security software. Scareware is usually downloaded onto your computer from infected websites or Trojan horse files.

Spyware

is an unwanted piggyback program that usually downloads with other software you install from the Internet and that runs in the background of your system. Without your knowledge, spyware transmits information about you, such as your Internet-surfing habits, to the owner of the program so that the information can be used for marketing purposes. Many spyware programs use tracking cookies (small text files stored on your computer) to collect information.

Adware

is software that displays sponsored advertisements in a section of your browser window or as a pop-up box. It's considered a legitimate, though sometimes annoying, means of generating revenue for those developers who don't charge for their software or information. Fortunately, because web browsers such as Safari, Chrome, and Edge have built-in pop-up blockers, the occurrence of annoying pop-ups has been greatly reduced. Some pop-ups, however, are legitimate and increase the functionality of the originating site. For example, your account balance may pop up on your bank's website. To control which sites to allow pop-ups on, you can access the pop-up blocker settings in your browser (see Figure 9.8) and add websites for which you allow pop-ups. Whenever a pop-up is blocked, the browser displays an information bar or plays a sound to alert you. If you feel the pop-up is legitimate, you can choose to accept it. Chrome allows you to customize how you manage popups. > To display the pop-up management in Chrome, click Settings, then click Advanced, then from the Privacy and security group, select Content settings, and customize the choices in Popups.

Malware

is software that has a malicious intent (hence the prefix mal). There are three primary forms of malware: adware, spyware, and viruses. Adware and spyware are not physically destructive like viruses and worms, which can destroy data. Known collectively as grayware, most malware consists of intrusive, annoying, or objectionable online programs that are downloaded to your computer when you install or use other online content such as a free program, game, or utility

Antivirus software

is specifically designed to detect viruses and protect your computer and files from harm. Symantec, Kaspersky, Trend Micro, and Avast are among the companies that offer highly rated antivirus software packages. Antivirus protection is also included in comprehensive Internet security packages such as Norton Security or Trend Micro Internet Security. These software packages also help protect you from threats other than computer viruses.

Updates that you can download to fix possible security issues are called software __________.

patches

What types of scams do identity thieves perpetrate? The nefarious acts cover a wide range:

•Counterfeiting your existing credit and debit cards •Requesting changes of address on your bank and credit card statements, which makes detecting fraudulent charges take longer •Opening new credit cards and bank accounts in your name and then writing bad checks and not paying off the credit card balances (ruining your credit rating in the process) •Obtaining medical services under your name, potentially causing you to later lose coverage if the thief's treatment exceeds the limits of your policy's covered services •Buying a home with a mortgage in your name, then reselling the house and absconding with the money (leaving you with the debt) Many people believe that the only way your identity can be stolen is by using a computer. However, the Federal Trade Commission (ftc.gov) has identified additional methods thieves use to obtain others' personal information: •Stealing purses and wallets, in which people often keep personal information such as their ATM PIN codes •Stealing mail or looking through trash for bank statements and credit card bills •Posing as bank or credit card company representatives and tricking people into revealing sensitive information over the phone •Installing skimming devices on ATM machines that record information, such as account numbers and passcodes Although foolproof protection methods don't exist, there are precautions that will help you minimize your risk, which we'll discuss later in this chapter.

What constitutes a strong password? Strong passwords are difficult for someone to guess. Follow these guidelines to create strong passwords

•Don't use easily deduced components related to your life, such as parts of your name, your pet's name, your street address, or the name of the website or institution for which you're creating the password (e.g., don't use "Citibank" for your online banking password). •Use a password that's at least 14 characters long. Longer passwords are more difficult to deduce. Consider using a passphrase that is even longer. •Don't use words found in the dictionary. •Use a mix of upper- and lowercase letters, numbers, and symbols (such as # or %). •Never tell anyone your password or write it down in a place where others might see it, like in your wallet or a sticky note on your computer screen. •Change your passwords on a regular basis, such as monthly or quarterly. Your school or your employer probably requires you to change your password regularly. This is also a good idea for your personal passwords. •Don't use the same password for every account you have. •If you have trouble thinking of secure passwords, there are many password generators available for free, such as the Strong Password Generator


Kaugnay na mga set ng pag-aaral

Continuum of Long-term Healthcare

View Set

POR Texas 2 unit 8 Property Management

View Set

Psychology Final Study Guide: Ch. 6 + Ch.7:

View Set