14
ONLINE SAFETY AND SECURITY Computer Basics 1.5

ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

Embed Size (px)

DESCRIPTION

SECTION SKILL OVERVIEW Configure Windows Firewall for different networks Configure privacy settings in Internet Explorer Clear the browser history within Internet Explorer Configure the Internet Explorer pop-up blocker Evaluate messages to determine if they are safe or if they represent a possible social engineering attack

Citation preview

Page 1: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

ONLINE SAFETY

AND SECURITY

Computer Basics

1.5

Page 2: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

INFAMOUS CYBER ATTACKS IN

2014Sony Pictures: Attackers stole just about everything in the corporate network, including entire movies.Target: Data was compromised on 40 million customer credit and debit cards and 70 million phone numbers and addresses.Home Depot: 56 million credit cards and 53 million email addresses were exposed.J.P. Morgan Chase: Phone numbers and email addresses for 76 million households and 7 million small businesses were compromised.

Page 3: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

SECTION SKILL OVERVIEW

Configure Windows Firewall for different networksConfigure privacy settings in Internet ExplorerClear the browser history within Internet ExplorerConfigure the Internet Explorer pop-up blockerEvaluate email messages to determine if they are safe or if they represent a possible social engineering attack

Page 4: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

KEY TERMS

Anti-malware Software

Cookie Email Firewall

Netiquette

Pop-up Blocker

Social Engineer

ing

Web Browse

rWeb

Browser Cache

Page 5: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

KEY DEFINITIONS

Anti-malware Software: Software that detects and removes malicious computer programs that are designed to gain unauthorized access to computer systems and information.Cookie: A small text file that a website sends to a web browser to store on a user's computer. The cookie contains information about the user's previous browsing sessions on the website, which the website accesses the next time the user visits.Email: Electronic messages that are sent or received over a network, using a computing device. Usually, the Internet is the network used to send and receive email.

Page 6: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

KEY DEFINITIONS (CONTINUED)

Firewall: A security instrument that controls network communication and user access to computers and networks. Firewalls can be either software or hardware based.Netiquette: Rules of etiquette that should be observed while using computer networks, such as the Internet.Pop-up Blocker: A software program or browser option that prevents pop-up advertisements from launching in a web browser.

Page 7: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

KEY DEFINITIONS (CONTINUED)

Social Engineering: Techniques used by threat agents to obtain personal information that can be used to access secure data and computer assets or to circumvent security policies and procedures.Web Browser: A software application that processes HTML web pages so that a user can interact with websites. Common web browsers include Chrome, Internet Explorer, Safari, and Firefox.Web Browser Cache: A temporary storage area that contains a record of the websites visited by a user and the associated website data stored by the browser.

Page 8: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

SOCIAL ENGINEERING

Technique DescriptionReconnaissance

Gathering sensitive information about a potential victim through:• Shoulder surfing• Eavesdropping• Dumpster diving

Pretexting Tricking a victim to reveal information under false pretenses through:• Intimidation• Familiarity• Social validation

Page 9: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

SOCIAL ENGINEERING

(CONTINUED)

Technique DescriptionEmail Attacks

Exploiting a victim using email messages:• Phishing• Spear phishing• Nigerian scams• Email hoaxes

Browser Attacks

Tricking a victim to reveal information in a browser window:• Pharming• Rogue antivirus

Page 10: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

IN-CLASS PRACTICE

Complete the first lab in this section, Applied Lab 1.5.10 – Configure Windows Firewall.Let me know if you need help on a task.

Page 11: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

CLASS DISCUSSION

What are the most common types of computer security risks?What can you do to protect yourself against Internet security risks?What are some ethical principles that encourage responsibility and trust in working with computers?

Page 12: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

CLASS ACTIVITIES

Write down a list of “netiquette” rules that you and your friends try to follow when texting, emailing, and using the Internet. Examples include:

Not being a “troll” who creates conflict among online usersAvoiding using all capital letters when communicating

Open a Web browser other than Internet Explorer. Do the following:

Clear the browser’s cache (including browsing history and cookies)Find the browser’s popup blocker settingsFind the browser’s privacy settings

Page 13: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

SUMMARY

Network firewallsAnti-malware packagesWeb browser privacy and security settingsNetiquetteSocial engineering exploits

Page 14: ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,

Complete the labs in this section:

Applied Lab 1.5.10 – Configure Windows FirewallApplied Lab 1.5.11 – Configure Privacy Settings in IEApplied Lab 1.5.12 – Clear the Browser CacheApplied Lab 1.5.13 – Respond to Social EngineeringApplied Lab 1.5.14 – Configure the IE Popup Blocker

Prepare for the next class:Video 1.6.1 – Office Application Features: The RibbonVideo 1.6.2 – Office Application Features: Beyond the RibbonVideo 1.6.5 – Windows Printing Features

HOMEWORK ASSIGNMENTS