Upload
melissa-mcdowell
View
219
Download
0
Embed Size (px)
DESCRIPTION
SECTION SKILL OVERVIEW Configure Windows Firewall for different networks Configure privacy settings in Internet Explorer Clear the browser history within Internet Explorer Configure the Internet Explorer pop-up blocker Evaluate messages to determine if they are safe or if they represent a possible social engineering attack
Citation preview
ONLINE SAFETY
AND SECURITY
Computer Basics
1.5
INFAMOUS CYBER ATTACKS IN
2014Sony Pictures: Attackers stole just about everything in the corporate network, including entire movies.Target: Data was compromised on 40 million customer credit and debit cards and 70 million phone numbers and addresses.Home Depot: 56 million credit cards and 53 million email addresses were exposed.J.P. Morgan Chase: Phone numbers and email addresses for 76 million households and 7 million small businesses were compromised.
SECTION SKILL OVERVIEW
Configure Windows Firewall for different networksConfigure privacy settings in Internet ExplorerClear the browser history within Internet ExplorerConfigure the Internet Explorer pop-up blockerEvaluate email messages to determine if they are safe or if they represent a possible social engineering attack
KEY TERMS
Anti-malware Software
Cookie Email Firewall
Netiquette
Pop-up Blocker
Social Engineer
ing
Web Browse
rWeb
Browser Cache
KEY DEFINITIONS
Anti-malware Software: Software that detects and removes malicious computer programs that are designed to gain unauthorized access to computer systems and information.Cookie: A small text file that a website sends to a web browser to store on a user's computer. The cookie contains information about the user's previous browsing sessions on the website, which the website accesses the next time the user visits.Email: Electronic messages that are sent or received over a network, using a computing device. Usually, the Internet is the network used to send and receive email.
KEY DEFINITIONS (CONTINUED)
Firewall: A security instrument that controls network communication and user access to computers and networks. Firewalls can be either software or hardware based.Netiquette: Rules of etiquette that should be observed while using computer networks, such as the Internet.Pop-up Blocker: A software program or browser option that prevents pop-up advertisements from launching in a web browser.
KEY DEFINITIONS (CONTINUED)
Social Engineering: Techniques used by threat agents to obtain personal information that can be used to access secure data and computer assets or to circumvent security policies and procedures.Web Browser: A software application that processes HTML web pages so that a user can interact with websites. Common web browsers include Chrome, Internet Explorer, Safari, and Firefox.Web Browser Cache: A temporary storage area that contains a record of the websites visited by a user and the associated website data stored by the browser.
SOCIAL ENGINEERING
Technique DescriptionReconnaissance
Gathering sensitive information about a potential victim through:• Shoulder surfing• Eavesdropping• Dumpster diving
Pretexting Tricking a victim to reveal information under false pretenses through:• Intimidation• Familiarity• Social validation
SOCIAL ENGINEERING
(CONTINUED)
Technique DescriptionEmail Attacks
Exploiting a victim using email messages:• Phishing• Spear phishing• Nigerian scams• Email hoaxes
Browser Attacks
Tricking a victim to reveal information in a browser window:• Pharming• Rogue antivirus
IN-CLASS PRACTICE
Complete the first lab in this section, Applied Lab 1.5.10 – Configure Windows Firewall.Let me know if you need help on a task.
CLASS DISCUSSION
What are the most common types of computer security risks?What can you do to protect yourself against Internet security risks?What are some ethical principles that encourage responsibility and trust in working with computers?
CLASS ACTIVITIES
Write down a list of “netiquette” rules that you and your friends try to follow when texting, emailing, and using the Internet. Examples include:
Not being a “troll” who creates conflict among online usersAvoiding using all capital letters when communicating
Open a Web browser other than Internet Explorer. Do the following:
Clear the browser’s cache (including browsing history and cookies)Find the browser’s popup blocker settingsFind the browser’s privacy settings
SUMMARY
Network firewallsAnti-malware packagesWeb browser privacy and security settingsNetiquetteSocial engineering exploits
Complete the labs in this section:
Applied Lab 1.5.10 – Configure Windows FirewallApplied Lab 1.5.11 – Configure Privacy Settings in IEApplied Lab 1.5.12 – Clear the Browser CacheApplied Lab 1.5.13 – Respond to Social EngineeringApplied Lab 1.5.14 – Configure the IE Popup Blocker
Prepare for the next class:Video 1.6.1 – Office Application Features: The RibbonVideo 1.6.2 – Office Application Features: Beyond the RibbonVideo 1.6.5 – Windows Printing Features
HOMEWORK ASSIGNMENTS