Cisco Module 3: Protecting your privacy & data

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

To protect your data and safeguard your account, you should:

-always read the Terms of Service when registering for a new service and decide whether the service is worth waiving your rights to your data for -select your privacy settings rather than accepting the default -limit the group of people you share content with -review the service provider's security policy to understand what they are doing to protect your data -change your passwords periodically, use a complex password and two factor authentication to secure your account.

home network

Storing your data locally means that you have total control of it.

Public Wi-Fi Risks

it is best not to access or send any personal information when using public Wi-Fi. You should always verify that your device isn't configured with file and media sharing and that it requires user authentication with encryption. You should also use an encrypted VPN service to prevent others from intercepting your information

Open Authorization (OAuth)

open standard protocol that allows you to use your credentials to access third-party applications without exposing your password

Back up your data

ou will need an additional storage location for the data and you must copy the data to that location regularly.

Data Use Policy

outlines how the service provider will collect, use and share your data.

two-factor authentication

requires a second token to verify your identity. This may be a: -physical object such as a credit card, mobile phone or fob -biometric scan such as a fingerprint or facial and voice recognition -verification code sent via SMS or email.

You decide to update your new job position on your social networks. When doing so, one of the sites asks you to update your profile information to ensure you receive the content that you really don't want to miss! You take a look at the missing fields. Which ones do you fill in? Remember, answering correctly will improve your privacy settings, so think carefully about the information you want to share online. Select the two correct answers A.Your colleagues' names and contact information B.Your manager's name and contact information C.Mobile phone number D.Your profile picture E.Name of the organization F.Email address G.Date of birth

D & E

How do you delete your data permantely?

-To erase data so that it is no longer recoverable, it must be overwritten with ones and zeroes multiple times, using tools specifically designed to do just that. SDelete from Microsoft claims to have the ability to remove sensitive files completely. Shred for Linux and Secure Empty Trash for Mac OS X claim to provide a similar service. -The only way to be certain that data or files are not recoverable is to physically destroy the hard drive or storage device. Many criminals have taken advantage of files thought to be impenetrable or irrecoverable!

Protecting Your Computing Devices

-Turn firewall on: You should use at least one type of firewall (either a software firewall or a hardware firewall on a router) to protect your device from unauthorized access. The firewall should be turned on and constantly updated to prevent hackers from accessing your personal or organization data. -install antivirus & antispyware: Malicious software, such as viruses and spyware, are designed to gain unauthorized access to your computer and your data. Once installed, viruses can destroy your data and slow down your computer. They can even take over your computer and broadcast spam emails using your account. Spyware can monitor your online activities, collect your personal information or produce unwanted pop-up ads on your web browser while you are online. To prevent this, you should only ever download software from trusted websites. However, you should always use antivirus software to provide another layer of protection. This software, which often includes antispyware, is designed to scan your computer and incoming email for viruses and delete them. Keeping your software up to date will protect your computer from any new malicious software that emerges. -manage your OS & browser: Hackers are always trying to take advantage of vulnerabilities that may exist in your operating system (such as Microsoft Windows or macOS) or web browser (such as Google Chrome or Apple Safari). Therefore, to protect your computer and your data, you should set the security settings on your computer and browser to medium level or higher. You should also regularly update your computer's operating system, including your web browser, and download and install the latest software patches and security updates from the vendors. -set up password protection: All of your computing devices, including PCs, laptops, tablets and smartphones, should be password protected to prevent unauthorized access. Any stored information, especially sensitive or confidential data, should be encrypted. You should only store necessary information on your mobile device, in case it is stolen or lost. Remember, if any one of your devices is compromised, the criminals may be able to access all of your data through your cloud storage service provider, such as iCloud or Google Drive.

How do you encrypt data?

1. Select one or more files or folders. 2.Right click the selected data and go to 'Properties.' 3.Find and click 'Advanced.' 4.Select the 'Encrypt contents to secure data' check box. 5.Files and folders that have been encrypted with EFS are displayed in green as shown here.

A strong password

1. do not use dictionary words or names in any language 2. do not use common misspelling of dictionary words 3. if possible, use special characters such as ! @ # $ % 4. do not use computer names/acct names 5. use a password with more than 10 characters

A designer at @Apollo needs to install some image manipulation software. The mainstream application is really expensive, and it's only needed for one small piece of a one-off project. The Design Manager says this would not be a cost-effective purchase and says to install an alternative free application instead — the manager doesn't mind if it's from an untrusted source as they feels the risks are low. Should the designer take the manager's advice? A.No, the designer should check with a member of the IT team before installing any applications from a non-trusted source. B.Yes, the Design Manager feels the risk is low so that must be right! C.No, the designer should purchase the trusted application from the mainstream software provider and pay for it using their own money. D.Of course, the designer has been given an instruction by their manager so it's fine to install the free application. It will save the company some money!

A

As you didn't set the privacy settings before you accepted the terms, default settings were applied.Which of the following do you think is more likely? A. No one will be able to see information about you and access your profile until you change the preferences in privacy settings B.Anyone will be able to see information about you and access your profile until you change the privacy settings

B

The data use policy of the company you used to set up the account states that for any content you publish: "you grant us a non-exclusive, transferable, sub-licensable, royalty-free, and worldwide license to host, use, distribute, modify, run, copy, publicly perform or display, translate, and create derivative works of your content (consistent with your privacy and application settings)". What does this statement really mean? A. You no longer own your content and the photo sharing company can re-use any of your content but only in specific circumstances B. You own your content but the photo sharing company can re-use any of your content for any purposes C.You own your content and the photo sharing company has to get permission to re-use your content

B

You have just signed a Terms of Service agreement. But do you know what this is? Consider the following options and choose the one you think best describes a Terms of Service agreement. A. A contract outlining the services that you expect to receive from the service provider and how you will use their service B.An informal arrangement that sets out the rules of the relationship between you, the service provider and others who use the service C.A legally binding contract that governs the rules of the relationship between you, the service provider and others who use the service

C

@Apollo's Sales Manager is traveling to meet a client. She forgot to download the contract from @Apollo's server to bring to the meeting with her. The train has an open Wi-Fi network. She contacts you to ask what she should do. What would you advise? A. She should forget about the contract for the meeting and catch up on other online work using the train's open Wi-Fi to access the https websites she needs. B.She should wait until she arrives at the client's office and ask for the access code to their Wi-Fi network, then access @Apollo's service directly on her work laptop. C.She should use the 4G connection on her phone to find an alternative open Wi-Fi network. D. She should access the train's open Wi-Fi network and connect to the @Apollo servers using the VPN connection on her work laptop.

D

You've logged into your laptop but it contains some photos belonging to the previous user, who no longer works at @Apollo. Your line manager asks you to delete them. You drag the photos into the recycle bin, open the recycle bin, select them and click 'Delete' once again. That should do it! Do you think the photos are really gone from the laptop? A. Yes B. No

No. When you move a file to the recycle bin and delete it permanently, the file is only inaccessible from the operating system. Anyone with the right forensic tools could still recover the file due to a magnetic trace left on the hard drive.

KRACKs

This vulnerability can be exploited by key reinstallation attacks (KRACKs) by intruders. In simple terms, attackers break the encryption between a wireless router and a wireless device, giving them access to network data. This flaw affects all modern, protected Wi-Fi networks. To mitigate this situation, you should: -update all wireless capable devices such as routers, laptops and mobile devices, as soon as security updates become available -use a wired connection for any devices with a wired network interface card (NIC) -use a trusted virtual private network (VPN) service when accessing a wireless network.

You've just been issued with a new laptop at @Apollo and are getting ready to set it up. What steps would you take to secure it before use?

To make your device safe and secure, you should: -turn the firewall on -install antivirus and antispyware -manage your operating system and browser -set up password protection.

secondary location

You could copy all of your data to a network attached storage device (NAS), a simple external hard drive or maybe even back up important folders on thumb drives, CDs, DVDs or tapes. In this scenario, you are the owner of the data and you are totally responsible for the cost and maintenance of the storage device equipment.

The cloud

You could subscribe to a cloud storage service, like Amazon Web Services (AWS). The cost of this service will depend on the amount of storage space you need, so you may need to be more selective about what data you back up. You will have access to your backup data as long as you have access to your account. One of the benefits of using a cloud storage service is that your data is safe in the event of a storage device failure or if you experience an extreme situation such as a fire or theft.

Wireless networks

allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the network by way of a preset network identifier, known as the service set identifier (SSID)

privacy settings

allow you to control who sees information about you and who can access your profile or account data.

Email and Web Browser Privacy

enabling the in-private browsing mode on your web browser. Many of the most commonly used web browsers have their own name for private browser mode: -Microsoft Internet Explorer: InPrivate -Google Chrome: Incognito -Mozilla Firefox: Private tab or private window -Safari: Private browsing

security policy

outlines what the company is doing to secure the data it obtains from you.

Encryption

process of converting information into a form in which unauthorized parties cannot read it. Only a trusted, authorized person with the secret key or password can decrypt the data and access it in its original form.

Password manager application

protect passwords by saving them in a secure encrypted form. They enable random passwords to be generated and managed easily, averting the need for users to have the same password for multiple accounts, which presents a security risk.

Using a passphrase

takes the form of a sentence ('Acat th@tlov3sd0gs.'), making it easier for you to remember. And because it's longer than a typical password, it's less vulnerable to dictionary or brute-force attacks.


संबंधित स्टडी सेट्स

Lecture 3 Exam: TRUE / FALSE QUESTIONS

View Set

Information Security Framework, Infrastructure & Architecture

View Set

Health - Group Accident And Health Insurance - Quiz

View Set

Corporate Financial Management Exam 1

View Set