CHAPTER 9 PART 3

Ace your homework & exams now with Quizwiz!

VIRTUAL PRIVATE NETWORKS (VPNs)

are secure networks established in public Internet infrastructure using specialized software, servers, and data transmission protocols = sending data on public Internet as if it was a private network.

PREVENTION OF FUTURE INFECTION

most antivirus software will attempt to prevent infection by INOCULATION, meaning recording key attributes of computer files + keeping those statistics in safe place in hard drive. Antivirus software is now being created for smartphones. Popular Programs are Symantec, Kaspersky, AVG, and McAfee.

NETWORK ADDRESS TRANSLATION (NAT)

process used by firewalls to assign internal IP addresses on network = can't be detected by hackers.

Antivirus Software

specially designed to detect viruses + protect computer and files from harm. Active virus scan should be ran on entire system once a week or can configure software to run scans at times system isn't being used like during the night.

Authentication: Passwords and Biometrics

Password-cracking programs have become more sophisticated = creating secure password is now more important than ever.

Knowing Your Computer is Secure

Possible to scan computer's vulnerabilities through website using SHIELDSUP and LEAKTEST programs = free + easy to run to pinpoint security vulnerabilities of system connected to Internet.

Types of Firewalls

Security Suites such as Norton Security, McAfee Security, Trend Micro Internet Security Suite include firewall software + Windows and OS X do too. Two firewalls running at the same time can conflict w/ each other and cause computer to slow down or freeze up. Many routers sold for home networks include firewall protection allowing to adjust settings to allow access to specific ports if needed.

DETECTION

antivirus software looks for virus signature in files. VIRUS SIGNATURE is a portion of virus code that is unique to particular computer virus.

INTERNET PROTOCOL ADDRESS (IP ADDRESS)

every computer connected to Internet has a unique address assigned to router by Internet Service Provider (ISP) but each device on home network has its own.

PENDRIVELINUX

excellent website resource offering many different versions of Linux for download + includes step-by-step instructions on how to install them on flash drive. For Mac, Elementary OS Luna distro of Linux provides close approximation of OS X.

CAPTCHA (COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART) PROGRAMS

used to generate distorted text + require to be typed into a box. Possible to use websites to create strong passwords or to check to strength of passwords. Windows allow to use picture passwords meaning selecting a picture and draw three gestures on it.

IRONKEY PERSONAL FLASH DRIVES

provide higher level of surfing privacy when plugged in USB port = Internet history + browser caches will be stored on flash drive instead of computer. Comes with preloaded software designed to shield IP address + password-management tools to store all login information + encrypt it.

Firewalls

software program or hardware device designated to protect computers from hackers. A firewall specially designated for home network is called PERSONAL FIREWALL = open/close logical ports. Both software and hardware firewall equally good.

Guidelines To Create Strong Passwords:

1. Don't use easily deduced components related to your life. 2. Use passwords at least 14 characters long. 3. Don't use words found in dictionary. 4. Use mix of upper and lowercase letters and symbols. 5. Never tell anyone password or write it down to place others might see it. 6. Change passwords on regular basis. 7. Don't use same password for every account.

Two Main Ways To Protect Computer From Viruses:

1. Installing antivirus software 2. Keeping software up to date

Ways to Keep Hackers and Viruses Away:

1. Preventing hackers to access computer. 2. Using techniques to prevent virus infections from reaching computer. 3. Protecting digital information so can't be accessed. 4. Hiding activities from prying eyes.

Advantages to use Linux-based OS on public or work computer:

1. Reduces chances that drive will become infected by any malware running on computer. 2. Virus and hacking attacks are far less likely to happen on Linux than Windows. 3. Avoid reading and writing the hard disk of computer.

CAPTCHA: Keeping Websites Safe from Bots

Bots are used to make tasks easier on Internet but can also be used for malicious or illegal purposes because perform some computing tasks faster than humans. 1. CAPTCHA (COMPLETELY AUTOMATED PUBLIC TURING TEST TO TELL COMPUTERS AND HUMANS APART) PROGRAMS

Common Logical Ports

PORT NUMBER: 21 23 25 53 80 443 PROTOCOL USING THE PORT: FTP (File Transfer Protocol) control Telnet (Unencrypted Text Communications) SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) HTTP (Hypertext Transfer Protocol) HTTPS (HTTP with Transport Layer Security (TLS) encryption)

Managing Your Passwords

Password-management software remembers all passwords for user, like Microsoft Edge by example using "auto complete".

Biometric Authentication Devices

device reading unique personal characteristics such as fingerprint or iris pattern to convert it into digital code = high level of security + eliminate possible human error occurring in password protection. Can also use voice authentication or facial recognition systems now widely offered on laptops and smartphones.

Main Functions of Antivirus Software:

1. DETECTION 2. STOPPING VIRUS EXECUTION 3. PREVENTION OF FUTURE INFECTION

Firewalls protect in two major ways:

1. Blocking access to logical ports. 2. Keeping computer's network address secure.

Anonymous Web Surfing: Hiding from Prying Eyes

Browsers often have privacy tools allowing surfing Internet anonymously. 1. IRONKEY PERSONAL FLASH DRIVES There are advantages to use Linux-based OS 2. PENDRIVELINUX 3. VIRTUAL PRIVATE NETWORKS (VPNs)

How Firewalls Work

Firewalls protect in two major ways 1. PACKET FILTERING 2. LOGICAL PORT BLOCKING 3. INTERNET PROTOCOL ADDRESS (IP ADDRESS) 4. NETWORK ADDRESS TRANSLATION (NAT)

Software Updates

DRIVE-BY DOWNLOAD: viruses exploiting OS weaknesses to set up attacks from malicious websites downloading harmful software to computer. Windows 10 now automatically downloads updates whenever Microsoft makes them available. Mac OS X also has a similar utility to gather updates.

PACKET FILTERING

process where firewalls can be configured to filter out packets sent to specific logical ports.

LOGICAL PORT BLOCKING

process where firewalls can be configured to ignore requests originating from Internet asking to access certain ports.

STOPPING VIRUS EXECUTION

if virus signature or suspicious activity detected, stops file and virus execution + notifies user. Virus is placed in secure area in hard drive, this procedure is known as QUARANTINING.


Related study sets

ATI Learning System RN: Fundamentals 1, 2, and Final

View Set

5.9 Security Fundamentals - Describe wireless security protocols (WPA, WPA2, and WPA3)

View Set

2 - The Firm and Market Structures

View Set

Life Insurance Underwriting and Policy Issue

View Set