Ch. 7 ITEC

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

How to Diagnose a Hacked System

Digital device hacking has become so common that almost everyone has to deal with it at least once in their lives. Some signs of a system or device that has been hacked are as follows: • Fake antivirus messages—If you notice these messages, power down your computer and reboot it in safe mode. In safe mode, run your antivirus program. • Unwanted browser toolbars. • Frequent random pop-ups. • Fake e-mails or social media messages from your account. Smartphones and tablets can be hacked, so make sure to protect these types of devices.

What Is a Cookie?

A cookie is a small text file of information created by a website that is stored by the web browser on the computer's hard disk. When you revisit a website that uses cookies, your browser will send the cookie to the web server, which uses this information to customize and optimize your experience. First-party cookies are created by a website you visit. They keep track of your personal preferences and the current web browsing session. Third-party cookies are created by a website other than the one you are currently visiting and are used to track your surfing habits. Third-party cookies are considered an invasion of privacy

Cyberattacks

A cyberattack is a deliberate misuse of computers and networks via the Internet. Cyberattacks are launched from one or multiple computers against a single computer, multiple computers, or computer networks. Cyberattacks are of the two following types: • Attacks where the goal is to disable the target computer or disrupt network activity. • Attacks where the goal is to get unauthorized access to the target computer's data.

Cyberterrorists

A cyberterrorist uses computers and the Internet to launch attacks against computer systems for political or ideological reasons. According to the U.S. Federal Bureau of Investigation, cyberterrorism is any premeditated, politically motivated attack against information, computer systems, computer programs, and data that results in violence against noncombatant targets by subnational groups or clandestine agents. • Attacks include the disruption of e-commerce and government sites. • The power grid and public utilities have also been targeted.

DoS and DDoS Attacks

A denial of service (DoS) attack on a network is designed to interrupt or stop network traffic by flooding it with too many requests. A distributed denial of service (DDoS) attack launches a virus on a computer. Once the computers are infected, they act as zombies and work together to send out legitimate messages, creating huge volumes of network traffic and resulting in a network crash.

What Is a Firewall?

A firewall is hardware or software used to protect a computer from outside threats such as hackers and viruses. Firewalls allow or block Internet traffic in and out of a network or computer. The most ideal firewall configuration consists of both hardware and software. Personal software firewalls are typically included with the operating system and can be configured based on user preferences. Hardware-based firewalls can be purchased as a stand-alone product but are often also included in broadband routers.

How to Avoid Viruses

Some of the ways to help avoid a computer virus include: • Installing the latest antivirus software and update frequently. • Installing a firewall. • Downloading software from trusted sites. • Visiting only trusted sites. • Surfing the web and download content safely. • Removing any universal serial bus (USB) drives and digital versatile discs (DVDs) before booting your computer. • Purchasing a new router every other year to ensure you have the latest firewall protections. • Adjusting your web browser's security settings to allow browsing only on trusted sites. • Never bypassing your browser's built-in security features.

Windows Firewall

You can customize four settings for each type of network location in Windows Firewall. Settings you can adjust include: Change notification settings, Turn Windows Defender Firewall on or off, and update your firewall settings. To turn Windows Defender Firewall On: 1. Select the Start button > Settings > Update & Security > Windows Security and then Firewall & network protection. Open Windows Security settings. 2. Select a network profile. 3. Under Windows Defender Firewall, switch the setting to On. If your device is connected to a network, network policy settings might prevent you from completing these steps. For more information, contact your administrator.

Spam Filters

A spam filter is computer software that is designed to prevent spam messages from entering a user's e-mail inbox. Spam filters are also known as spam blockers or anti-spam utilities. These filters search for spam by watching for keywords and by monitoring suspicious word patterns and frequencies.

Set Restrictions in Mac OS X

According to Apple, the preferred method to set restrictions is as follows: 1. Choose Apple menu > System Preferences, and then click Parental Controls. 2. Click the lock icon to unlock it and then enter an administrator name and password. 3. Select a user and then click on the tabs along the top: • Apps • Web • People • Time Limits • Other

Macro Viruses

A macro virus is a virus that is written in a macro language and placed within a document or spreadsheet. When the virus-infected document or spreadsheet is opened, the macro is executed and commands in the macro language set off the destructive events that the virus was designed to cause. These types of viruses can be avoided by not downloading or opening unknown or untrusted file attachments containing Microsoft Office files.

What is a Password

A password is secret code used to help prevent unauthorized access to data and user accounts. It can be used to secure computers, networks, software, personal accounts, and digital devices. Passwords identify only the authenticity of the password, not the user. Due to this, other security measures, such as biometrics, are used to verify the authenticity of a user. The terms passcode and key code are synonymous for password. Passwords and passcodes are often generated by the user. Keys are often generated by encryption software or by the vendor who produced the software.

Cyberbullying

Cyberbullying is harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner. Cyberbullies use Internet service and mobile technologies such as web pages and discussion groups as well as instant messaging and text messaging, with the intention of harming another person. Cyberstalking is a form of cyberbullying and often involves disturbed obsessions. Nearly all states have bullying laws in place, many with cyberbullying or electronic harassment provisions.

Online Nuisances

Online nuisances are annoying software programs that can slow down the operations of a computer, clog e-mail inboxes, and lead to the theft of information and money. Online nuisances can be downloaded from content found on the Internet, linked to corrupt websites, and found on illegitimate websites. Online nuisances include: • Spam • Spyware • Trolling and spoofing • Phishing and pharming

How to Diagnose a Computer That is Impacted by Online Nuisances

Online nuisances include spam, ads, pop-ups, online scams, and other activities. Signs your computer may be affected by an online nuisance include: • Receiving spam e-mails and bounced back e-mail. • Frequent pop-ups while searching the web or working in programs. • Pop-ups start appearing after visiting unfamiliar sites. • Pop-up ads are targeted based on recent Internet searches.

Password Security

Password tips and techniques: • Change your passwords frequently—The longer you use a password, the higher the risk. • Use generic passwords—Do not use persons, places, or things that can be identified with you. • Keep your password private—Do not share your passwords with others. • Use a combination of letters, symbols, and numbers—The more characters you use, the more secure your password will be. • Check your accounts—Regularly check your accounts to ensure they have not been tampered with.

Persistent Cookies

Persistent cookies, which are small text files, are stored on the hard drive and are not lost when the web browser is closed. Persistent cookies are only lost if they are designed with an expiration date. Persistent cookies collect the following information: • User preferences • Password and username information • Internet protocol (IP) address • Data on web surfing behavior

How Do Computer Viruses Work?

A computer virus attacks a digital device using a series of actions: • First, the virus arrives via e-mail attachment, file download, or by visiting a website that has been infected. • An action such as running or opening a file activates the virus. • Once activated, the virus copies itself into files and other locations on a computer. • Next, the infection spreads to other computers via infected e-mail, files, or contact with infected websites. • Finally, the payload, or the component of a virus that executes the malicious activity, hits the computer and other infected devices. These actions are repeated over and over, resulting in a full-blown virus attack.

Rootkits

A rootkit is a type of malware that hides in the operating system (OS) and is triggered each time you boot your computer. A rootkit allows a remote user to: • Install rogue files. • Use and take control of the computer by creating a "backdoor" that bypasses security. • Delete files. A rootkit allows someone, either legitimately or maliciously, to gain and maintain command over the computer system without the computer system user knowing about it. This means that the owner of the rootkit is capable of executing files and changing system configurations on the target machine, as well as accessing log files or monitoring activity to covertly spy on the user's computer usage.

What Is Antivirus Software?

Antivirus software is a computer program used to scan files to identify and remove computer viruses and other malicious programs. Antivirus programs use a variety of techniques to identify and remove viruses and malware. Two of the most common techniques are signature-based detection and heuristic-based detection. • Signature-based detection—Viruses are created with a specific set of data and instructions that constitute its signature. Antivirus programs look for these signatures in order to find and remove the virus. • Heuristic-based detection—New malware is detected by examining files for suspicious characteristics without an exact signature match. Other techniques include behavioral detection and cloud-based detection.

Cybercrime

In cybercrime a computer is used to commit a criminal offense. Cyber criminals use computer technology to access personal information, discover trade secrets, or use the Internet for a variety of exploitative or malicious purposes. The two common types of cybercrime are as follows: • Single event—Victims endure a single-event cybercrime while unknowingly downloading a Trojan horse virus or installing a keystroke logger; or from phishing, theft or manipulation of data via hacking; or from viruses, identity theft, and e-commerce fraud. • Ongoing series of events—This is more serious than the single event and includes cyberstalking, child predation, extortion, blackmail, and terrorist activities.

Malware

Malware is a contraction of the terms malicious and software. Malware is any software that is written with the intent to damage devices, steal data, or disrupt networks. Viruses, Trojans, spyware, and ransomware are among the different types of malware. These nuisances are often created by hackers who are looking to make money either by spreading the malware themselves or by selling it on the Dark Web. Malware is designed for the following: • To steal information • To destroy data • To incapacitate a computer or network • To frustrate the user Common types of malware are as follows: • Viruses • Worms • Trojan horses

Packet Sniffers

Packet sniffers (also referred to as packet analyzers) are specialized hardware or software that captures packets transmitted over a network. Legitimate sniffers are used for routine examination and detection. Unauthorized sniffers are used to steal information. Packet sniffers can be very difficult to detect. Detection often requires specialized software. Packet sniffers can be configured in the following two ways: 1. Unfiltered sniffers—These sniffers capture all packets possible and store them on a hard drive for future inspection. 2. Filtered packet sniffers—These sniffers use analyzers that capture only packets containing specific elements of the data being transmitted.

Session Cookies

Session cookies are small text files that are stored in temporary memory. Session cookies are lost when the web browser is closed. Session cookies collect the following types of information: • They determine the start and end of a session. • They analyze and measure traffic on a web page. • They determine the web browser being used.

Spam

Spam is an unsolicited e-mail message, typically received from an unknown sender. • Spam messages are sometimes called unsolicited bulk e-mail (UBE) and are used for a variety of marketing purposes, including selling products and services. • Messages also may contain a variety of malicious programs. • It is estimated that there are 293.6 billion e-mails sent every day. Of these messages, 50 percent are considered spam.

Spyware

Spyware is software that collects information about your Internet surfing habits and behaviors. The information collected by spyware includes keystrokes, passwords, account numbers, and other confidential information. Spyware is often installed via free downloads or by visiting certain illegitimate websites.

How to Manage Cookies in Google Chrome

There are a variety of cookie settings that can be adjusted in Google Chrome, including: • Blocking/allowing cookies by default • Deleting cookies • Making exceptions for cookies from specific websites or domains

How To Set Up an Internet Filter in Windows 10

You can block inappropriate websites on Windows 10, Xbox One, and Android devices by running Microsoft Launcher when you use Internet Explorer and Microsoft Edge browsers. To turn web browsing limits on, go to family. microsoft.com and sign in with your Microsoft account. Then: • Find your child's name and select Content restrictions. • Scroll down to Web browsing and switch Block inappropriate websites from Off to On. • If you want to always block specific sites, add their uniform resource locators (URLs) under Always blocked. • If you want your child to see only websites you have explicitly allowed, check the box next to Only allow these websites.

How To Set Up an internet Filter in Mac OS X

According to Apple, the preferred method to turn on parental controls is as follows: • On your Mac, choose Apple menu > System Preferences, then click Parental Controls. • If you see a check box labeled Manage parental controls from another computer, you have already added a user account. If this is the case, turn on parental controls for a child with an existing account on your Mac. • Select Create a new user account with parental controls, and then click Continue. • Enter an administrator name and password (or if your Mac has Touch ID, use Touch ID). • Click the Age pop-up menu and choose an age. This setting determines the default restrictions for the account. For example, each age bracket has age-appropriate rating restrictions for movies, TV shows, and apps from the iTunes Store and App Store. You can set different restrictions after creating the account. • Fill in the name and password information, then click Create User

Cookies in Mozilla Firefox

According to Mozilla, cookies can store a wide range of information including personally identifiable information such as your name, home address, e-mail address, or telephone number. This information can be stored only if you provide it; websites cannot gain access information you did not provide to them. By default, the activities of storing and sending cookies are invisible to you.

Adjusting Cookie Settings in Microsoft Edge

Adjusting cookie settings in Microsoft Edge: 1. Open Microsoft Edge. 2. Press the three-dot Settings and More button on the top right. 3. Select Settings from the menu that shows up and then tap or click Clear browsing data. 4. Select Choose what to clear. It is recommended to select Cookies and website data. 5. Click Clear. There is also an option to clear your cookies each time you close Microsoft Edge.

What to Do if you Get a Phishing Message

Banks and credit card companies will never ask you to provide personal information via e-mail messages. Never give personal information out through e-mail messages or over the phone. If you receive a suspicious message, contact the institution that the message was allegedly sent from. You should also contact the U.S. Computer Emergency Readiness Team (US-CERT). You can contact US-CERT using the following preferred methods: • In Outlook, you can create a new message and drag and drop the phishing e-mail into the new message. Send the message to [email protected]. • If you cannot forward the e-mail message, at least send the URL of the phishing website to US-CERT. You can also call the number on the US-CERT website.

How to Delete Cookies in Google Chrome

Best practices for deleting cookies according to Google: 1. Click the Customize and control Google Chrome menu on the browser toolbar (right upper corner of the screen). 2. Select History. 3. Click Clear browsing data. 4. A list of selections will appear including Cookies and other site data and Cached images and files. 5. Make your selections and then select Clear data.

Black Hat Hackers

Black hat hackers access computer systems with the intent of causing damage or stealing data. Black hat hackers are also known as hackers or crackers. Generally their main motivation is personal or financial gain. They can also be involved in cyber espionage, protest, or may simply be addicted to the thrill of hacking devices. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.

Protecting a Digital Device from Power Surges

Electrical power surges can severely damage digital devices. You should minimize risk of damage by power surges using a few simple steps: Surge protector: You should use a surge protector when charging a digital device. The circuit breaker in the surge protector cuts off power in case of a short circuit or power surge. Uninterruptible power supply (UPS): A UPS includes surge suppression and a battery power backup that will keep devices running in the event of a power failure. This helps to minimize data loss. Voltage differences when traveling: If you travel abroad it is important to note that the United States uses 110 volts, whereas many other countries use 220 volts. You should purchase a voltage converter if you plan to use your computer in a foreign country.

Removing Stored Data and Cookies in Safari

In the Safari app on your Mac, choose Safari, click Preferences, click Privacy, and then do any of the following: • Prevent trackers from using cookies and website data to track you: Select Prevent cross-site tracking. Cookies and website data get deleted unless you visit and interact with the trackers' websites. • Always block cookies: Select Block all cookies. Websites, third parties, and advertisers cannot store cookies and other data on your Mac. This may prevent some websites from working properly.• Remove stored cookies and data: Click Manage Website Data, select one or more websites, then click Remove or Remove All. Removing the data may reduce tracking, but may also log you out of websites or change website behavior. • See which websites store cookies or data: Click Manage Website Data.

Spectre and Meltdown

It is critically important that computer application software does not make changes to a computer's operating system (OS). Computer scientists have uncovered vulnerabilities that impacts many Intel-, AMD-, and ARM-based processors. This means that virtually every digital device is at risk. Meltdown and Spectre exploit hardware vulnerability of microprocessors. These vulnerabilities allow for unauthorized reading of anything located on a processor's memory, and could potentially allow hackers to use application software to change a computer's operating system. No single patch can fix these vulnerabilities, so users should expect to install a number of updates as required. Initially, the U.S. Computer Emergency Response Team (US-CERT) determined that Meltdown and Spectre vulnerabilities would necessitate replacing the impacted chips, but in January 2018 Google developed Retpoline, a strategy to mitigate the Meltdown and Spectre vulnerabilities.

How to Manage Cookies

Managing cookies is an important part of safe and efficient web browsing. Cookies can be managed by determining which cookie settings should be considered. Be aware that cookie settings must be adjusted in each browser you use. Cookie settings in web browsers are as follows: • Delete cookies. • Block/customize cookies. • Allow cookies.

NAT

Network Address Translation (NAT) was developed by Cisco. It is used by firewalls, routers, and computers that are connected to the Internet. It is used in firewalls to provide protection from outside network intrusions by hiding Internet protocol (IP) addresses. NAT can be used to prevent many types of network attacks. In order to maximize security, it must be used in conjunction with the firewall built into the router or the firewall provided by the operating system (OS).

How Antivirus Software Works

One popular technique that antivirus software uses to detect viruses is to look for a virus signature. A virus signature (also called a virus definition) is the software code of a particular computer virus. The antivirus program compares its database of known virus signatures with the files on a digital device and on removable media. The antivirus software companies are constantly searching for and updating their database of known virus signatures. It is important to make sure your antivirus program is on a regular update schedule. Once the virus is identified, the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file, it will send the file to an isolated area on the hard drive called a quarantine. Quarantined files will remain on your computer until you delete or restore them.

Password Management Options

Password security is one of the most important issues for today's computer users. The best way to keep your Internet logins safe is to use a strong password and to never use the same password twice. This would be very difficult to do on your own, so experts suggest using password management software to keep your passwords safe. A typical password manager installs as a browser plug-in to handle password seizure and repeat. When you log in to a secure site, the password management software offers to save your identification. When you return to that site, it will automatically complete the login using your saved information but will generate a new password for the next login. Two popular password management options are Dashlane and LastPass.

Factors That Damage Computer Hardware

There are many factors to consider to help protect the hardware of your digital device. • Protecting a digital device from power surges: Lightning or other large electrical input can destroy electronics. Use a surge suppressor and unplug electronics when violent thunderstorms are imminent. • Protecting a digital device from overheating: Heat can severely damage a digital device. It is important to ensure that air can properly circulate through the system unit of a device. Phones and tablets should not be left out in the sun or in hot spaces. • Protecting a digital device from humidity: Humidity can negatively impact the performance of a digital device. It is a good idea to let a digital device acclimate to an environment before turning it on. • Protecting a digital device from magnetic fields: Magnetic fields can influence the flow of electricity in a digital device and impact a computer's hard drive. Minimize the exposure of your digital device to magnetic fields.

Where to Download Free Antivirus Software

There are many sites on the web where you can download free antivirus software. If you know the name of the software vendor you can download the software directly from their website. A popular option for free antivirus software is www.download.cnet.com. This website is part of the CNET family. When downloading software from from any site, it is important to think before you click. Many software-downloading sites have links to other areas and sites.

How Do Firewalls Work?

Typical firewall programs or hardware devices filter all information coming through the Internet to your network or computer system. A variety of techniques can be used to minimize the risk of harmful intrusions into a computer or network including: Packet filters—A packet filter inspects each packet leaving or entering a network and either accepts or rejects a packet based on a predetermined set of rules. Proxy server—A proxy server intercepts all messages between client and server and helps avert a hacker or other intruder from attacking a network.

Virus Symptoms

Viruses are very harmful to your computer. There are many symptoms a computer may exhibit when it has been infected with a virus. Some symptoms may include the following: • The operating system (OS) may not launch properly, and the computer user may need to reboot and restart the computer frequently to ensure all programs are starting and working fine. • Critical files may get deleted automatically, which can happen periodically or all at once. • Error messages will become prevalent. It may become difficult to save documents, and the computer may be running slower than usual. • If a system or network is infected severely, it may even black out or not launch the startup process.

Trojans

A Trojan is a program that appears legitimate but executes an unwanted activity when activated. It is commonly used by cyberthieves and hackers to gain unauthorized access to a user's device or system. Trojans are often used to find passwords, destroy data, or bypass firewalls. Trojans are similar to viruses but do not replicate themselves and are often attached to free downloads and apps. Trojans can be used to: • Delete, block, copy, and modify data. • Disrupt computer performance.

Computer viruses

A computer virus is software that infects computers and is created using computer code. Computer viruses typically must be "run" to attack and do damage. Viruses can destroy programs or alter the operations of a computer or network. Computer viruses, much like a biological flu virus, are designed to spread in hosts and have the ability to replicate themselves. Computer viruses cannot reproduce and spread without proper programming such as that contained in a file or document.

Firewall Options

A firewall application executes tasks different from those executed by antivirus or anti-malware apps. Firewalls help protect against worms and hackers; antivirus apps help protect against viruses; and anti-malware apps help protect against malware. You need all three applications in order to be fully protected. You need one firewall app on your personal computer (PC). Having more than one firewall app on your PC can cause conflicts and problems. Microsoft Windows and Mac OS X operating systems include firewall software.

Hackers

A hacker attempts to gain unauthorized access to networks via hacking. Hacking refers to activities that seek to compromise the security of digital devices such as laptop computers, smartphones, tablets, and entire networks. Most hackers are involved in unlawful activities (cybercrimes) and are motivated by financial gain, protest, information gathering (spying), and even just for the challenge of hacking a system.

Keystroke Loggers

A keystroke logger, sometimes called a key logger or system monitor, is a form of spyware/ surveillance technology that records all actions typed on a keyboard. • Keystroke loggers can be used on smartphones, tablets, and laptop computers. • Keystroke loggers can be hardware devices and software applications. • Software-based keystroke loggers are often Trojans that are installed without the user's knowledge. • Keystroke loggers can record passwords and confidential information.

How a Virus Infects Computers

Viruses can infect a digital device in a number of ways, including: • By opening an infected e-mail attachment. • By downloading an infected file from the Internet. • By sharing an infected file. • By visiting a contaminated website. • Disguised as images, audio, or video files • By inserting or connecting an infected disc or drive. • By not running or maintaining your antivirus program.

Worms

A worm is a destructive program that replicates itself throughout a single computer or across a network. Common characteristics of a worm include the following: • It is a destructive program that automatically reproduces itself. • It is a program that is designed to attack both wired and wireless networks. • Worm replication exhausts network bandwidth or available storage. In July 2010 the first computer worm used as a cyber weapon was discovered by security researchers after a long string of incidents in Iran. The worm, named "Stuxnet," was being used to attack an Iranian power plant, with the ultimate goal of sabotaging nuclear weapon production. Although the attack ultimately failed, this computer worm is still active on the threat landscape today.

Zombies

A zombie is a computer that has been secretly taken over by an outsider, typically using a rootkit, and subsequently programmed to perform a variety of damaging tasks. Millions of PCs around the world have been taken over by third parties and transmit messages without the user's knowledge. A group of compromised computers controlled by a hacker is called a botnet or a zombie army. Zombies are used to transmit spam messages from many different Internet protocol (IP) addresses, thus avoiding detection. Zombies are widely used to relay spam so that messages come from thousands of different IP addresses, avoiding detection and expanding volume at the same time.

Deleting Cookies in Mozilla Firefox

According to Mozilla, the fastest way to clear cookies in Firefox is: 1. Click the menu button. 2. Click Options. 3. Select how much history you want to clear: Click the drop-down menu next to Time range to choose how much of your history Firefox will clear (the last hour, the last 2 hours, the last 4 hours, the current day, or everything). Use the check boxes to select what information you want to clear from your history. 4. Click the Clear Now button. The window will close and the items you have selected will be cleared from your history.

Adware

Adware is software that collects the user's web browsing history. These programs are designed to display advertisements on your computer, redirect your search requests to advertising websites, and collect marketing-type data about you. Adware tracks the types of websites you visit and serves up customized ads based on your browsing behavior. • Data are collected to create unsolicited targeted pop-up advertisements. • Adware often accompanies downloaded programs.

Internet Filters

An Internet filter is firewall software used for blocking a user's access to specific Internet content. Filters can be used by organizations, parents, and businesses to restrict access to file transfers, websites, or Internet downloads. The software can reside on a router, a user's computer, or on a network. Internet and web filters are often called parental controls.

What is an E-mail Virus?

An e-mail virus is attached in a file and sent via e-mail message. When that infected file is opened, the virus infects the computer. There are three common types: • Phishing—This tricks users into revealing usernames and passwords by appearing legitimate. • Ransomware—When activated, this encrypts files on the user's hard drive and then sells a decryption program. • Keystroke logging Trojan—When activated, it saves all keystrokes for subsequent transmission to the virus creator.

The CiA Triad: Confidentiality, Integrity, and Data Availability

Confidentiality in the CIA Triad In the confidentiality, integrity, and availability (CIA) triad, confidentiality is roughly equivalent to privacy and refers to avoiding the unauthorized disclosure of information. It involves the protection of data, providing access for those who are allowed to see it while disallowing others from learning anything about its content. It prevents essential information from reaching the wrong people while making sure that the right people can get it. Data encryption is a good example of ensuring confidentiality. The tools to ensure confidentiality include encryption, access control, authentication, authorization, and physical security. Integrity in the CIA Triad In the CIA triad, integrity refers to the methods used to ensure that data are real, accurate, and safeguarded from unauthorized user modification. It is important that information has not been altered in an unauthorized way, and that the source of the information is genuine. Tools that can be used to ensure data integrity include data backup, CheckSums, data correction codes, and availability of information. Data Availability in the CIA Triad In the CIA triad, availability refers to ensuring that data and systems are available when needed. This is best achieved by rigorously maintaining all hardware, performing necessary hardware repairs immediately, and maintaining a correctly functioning operating system environment that is free of software conflicts. It is also important to keep current with all necessary system upgrades. Providing adequate communication bandwidth and preventing the occurrence of bottlenecks are equally important. Redundancy, failover, and maintaining a redundant array of independent disks (RAID) can mitigate serious consequences when hardware issues do occur.

What Are the privacy Risks Associated with Cookies?

Cookies pose many potential privacy risks. It is important to understand the types of cookies used and what types of information they collect. Websites that use cookies can collect information about surfing habits and sell that information to a variety of third parties. Websites can use cookies to track your surfing behavior and use this information to create specific user profiles. Corporate and government entities can use cookies to monitor your surfing behavior.

Pharming

Pharming is a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer. The malicious software redirects the user to a phony web page, even when the correct web address is used. When users go to the fake web page, they are encouraged to enter their username, password, and other sensitive personal information. Pharming attacks are launched in one of two ways. 1. A hacker installs a virus or Trojan on a user's computer that changes the computer's Hosts file to direct traffic away from its intended target and toward a fake website instead. 2. The hacker may poison a DNS server, causing multiple users to inadvertently visit the fake site. The fake website can be used to install viruses or Trojans on the users' computers, or it may attempt to collect personal and financial information for use in identity theft.

Phishing

Phishing is the illegitimate use of an e-mail message that appears to be from an established organization such as a bank, financial institution, or insurance company. In order to appear legitimate, the message often contains the company's logo and identifying information. Phishing uses legitimate-looking e-mail messages to con a user into giving up private information such as account numbers, Social Security numbers, and personal information. Phishing scams direct users to a fake website where they are asked to enter or update personal information.

Ransomware

Ransomware is malware that makes a computer's data inaccessible until a ransom is paid. Ransomware usually invades a computer by a Trojan Horse in a legitimate-looking e-mail or with a worm in a networked computer. Ransomware typically encrypts the victim's data files. A message offers to decrypt the files if the victim makes a ransom payment to the perpetrator. Payment is made via a means that is difficult to trace such as Bitcoin or prepaid cards. Once payment is made, the perpetrator may or may not send a decrypting code that may allow the victim to open their data files again. Another version of ransomware threatens to make the victim's personal files public unless the ransom is paid.

Managing Cookies in Safari

Safari accepts cookies and website data only from websites you visit. This helps prevent certain advertisers from storing data on your device. • You can change options in Safari preferences so that Safari always accepts or always blocks cookies and other website data. • Important: Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard.

Safe Browsing Tactics

Some tactics that can help keep you safe on the web are as follows: • Go incognito—The four most popular web browsers have a private browsing mode. When private browsing has been activated, your browser will not store cookies. Private browsing does not securely hide your identity beyond the device because your Internet protocol (IP) address can still be tracked. • Be cautious when using social media—Go to Facebook, click Settings, and then download a copy of your Facebook data. You will be surprised how much data Facebook has collected about your usage habits. Many other social media sites also collect data on usage patterns, so be aware! • A Virtual Private Network (VPN) is a very useful tool in protecting your online identity. A VPN essentially hides your IP address from outside websites by running your communications through a secure network. Tor and Hotspot Shield are popular options. • HTTPS—Make sure the sites you are visiting have "https" at the beginning of the uniform resource locator (URL). HTTPS is the secure version of the HTTP protocol. You can force the sites you are visiting to use HTTPS by employing an extension such as the one offered by HTTPS Everywhere.

Free Versus Fee-Based Antivirus Software

There are many choices of free versus fee-based antivirus software programs. Which one is the best choice? This depends on a number of factors. One of the main differences between free and fee-based antivirus software is the number of features. Free antivirus programs come with basic detection and protection. Fee-based software usually comes with identity theft protections, firewalls, and parental controls. Fee-based software also comes with technical support. Technical support can be very helpful when trying to fix an infected computer. Most free software does not come with technical support. Another drawback is that many free antivirus programs come with advertising. One of the positives of free antivirus software (other than the cost) is their malware detection performance. Experts compared the malware detection and removal capabilities of fee-based and free antivirus software programs. Most of the free antivirus programs performed almost as effectively as their fee-based counterparts.


Set pelajaran terkait

Pols 111 Ch 10, Pols 111 ch 9, Pols 111 Ch 8, Pols 111 Chapter 7, pols 111 chapter 5, Pols 111 Ch6, Polls 111 Ch4, Pols 111 Chapter 3, Pols 111 Chapter 2, Pols 111 Chapter 1

View Set

4.1 Social Responsibility and Business Ethics

View Set

AP Comparative Government: Iran Review

View Set

Chapter 1 Accounting Information Systems & the Accountant- True/False

View Set

Chapter 8 + 9 | American National Government | Dr. Kiggins

View Set

Chapter 9-13 Exam Life Spam Development

View Set

Accounting-Statement of Cash flows

View Set

Seizure Practice Questions (Test #2, Fall 2020)

View Set