Vous êtes sur la page 1sur 29

Technology

in Action
Alan Evans Kendall Martin
Mary Anne Poatsy
Twelfth Edition

Technology in Action
Chapter 9
Securing Your System:
Protecting Your Digital Data and Devices

Major Threats to Your


Digital Assets
Cybercrime and Identity Theft
Protecting Yourself from Computer
Viruses
Protecting Digital Assets from
Hackers
Copyright 2016 Pearson Education, Inc.

9-3

Cybercrime and Identity Theft


Objective
1. What is cybercrime, and who perpetrates it?

Copyright 2016 Pearson Education, Inc.

9-4

Protecting Yourself from


Computer Viruses
Objectives
2. What are the types of viruses from which I
need to protect my computer?
3. What can I do to protect my computer from
viruses?

Copyright 2016 Pearson Education, Inc.

9-5

Protecting Digital Assets


from Hackers
Objectives
4. How can hackers attack my computing
devices, and what harm can they cause?
5. What is a firewall, and how does it keep my
computer safe from hackers?
6. How do I create secure passwords and
manage all of my passwords?
7. How can I surf the Internet anonymously and
use biometric authentication devices to
protect my data?
Copyright 2016 Pearson Education, Inc.

9-6

Cybercrime and Identity Theft


Cybercrime
Cybercriminals
Common types of cybercrimes

Copyright 2016 Pearson Education, Inc.

9-7

Computer Viruses
Major Categories of Viruses

Copyright 2016 Pearson Education, Inc.

9-8

Preventing Virus Infections


Antivirus software
Detects viruses and protects your computer

Popular programs
Symantec
Kaspersky
AVG
McAfee

Copyright 2016 Pearson Education, Inc.

9-9

Understanding Hackers
Types of hackers
White-hat or ethical
hackers
Black-hat hackers
Grey-hat hackers

Copyright 2016 Pearson Education, Inc.

9-10

Understanding Hackers
Trojan Horses and Rootkits

Trojan horsesAppear to be useful


Rootkits
Zombies

Copyright 2016 Pearson Education, Inc.

9-11

Understanding Hackers
Denial-of-Service Attacks

Legitimate users
are denied
access to a
computer
system
System shuts
down

Copyright 2016 Pearson Education, Inc.

9-12

Restricting Access to Your Digital Assets


Firewalls
Firewallhardware or software
Windows and OS X include firewalls
Security suites include firewall software

Copyright 2016 Pearson Education, Inc.

9-13

Restricting Access to Your Digital Assets


Creating Passwords
Need strong passwords
Password strength tests
Operating systems have built-in password
protection

Copyright 2016 Pearson Education, Inc.

9-14

Restricting Access to Your Digital Assets


Biometric Authentication Devices

Fingerprint
Iris pattern in eye
Voice authentication
Face pattern recognition
Provide high level of
security

Copyright 2016 Pearson Education, Inc.

9-15

Protecting Your Digital


Property from Yourself
Managing Online Annoyances
Keeping Your Data Safe
Protecting Your Physical
Computing Assets
Copyright 2016 Pearson Education, Inc.

9-16

Managing Online Annoyances


Objective
8. How do I manage online annoyances such
as spyware and spam?

Copyright 2016 Pearson Education, Inc.

9-17

Keeping Your Data Safe


Objectives
9. What data do I need to back up, and what
are the best methods for doing so?
10.What is social engineering, and how do I
avoid falling prey to phishing?

Copyright 2016 Pearson Education, Inc.

9-18

Protecting Your Physical


Computing Assets
Objective
11. How do I protect my physical computing
assets from environmental hazards, power
surges, and theft?

Copyright 2016 Pearson Education, Inc.

9-19

Managing Online Annoyances


Malware: Adware and Spyware
Spyware
Transmits information
Tracking cookies
Keystroke logger

Windows Defender
Installs one or two additional
standalone anti-spyware
programs

Many antispyware packages


are available
Copyright 2016 Pearson Education, Inc.

9-20

Managing Online Annoyances


Spam
Spamjunk e-mail
Spimunwanted instant messages
Tactics to minimize spam

Copyright 2016 Pearson Education, Inc.

9-21

Keeping Your Data Safe


Backing Up Your Data
How might I lose data?
Unauthorized access
Tampering
Destruction

Backups
Copies of data used to
replace originals

Copyright 2016 Pearson Education, Inc.

9-22

Social Engineering
Phishing and Pharming
Phishing
Luring people into revealing
information

Pharming
Malicious code planted on
your computer to gather
information

Guidelines to avoid
schemes
Copyright 2016 Pearson Education, Inc.

9-23

Social Engineering
Scareware
Type of malware
Attempts to
convince you
something is
wrong and to
pay money to fix
it

Copyright 2016 Pearson Education, Inc.

9-24

Protecting Your Physical Computing Assets


Power Surges
Power surges
Old or faulty wiring
Downed power lines
Lightning strikes
Malfunctions at electric company substations

Surge protector
Replace every 23 years
Use with all devices that have solid-state
components
Copyright 2016 Pearson Education, Inc.

9-25

Check Your Understanding


1. What is cybercrime, and who perpetrates
it?
2. What are the types of viruses from which
I need to protect my computer?
3. What can I do to protect my computer
from viruses?
4. How can hackers attack my computing
devices, and what harm can they cause?
Copyright 2016 Pearson Education, Inc.

9-26

Check Your Understanding


5. What is a firewall, and how does it keep
my computer safe from hackers?
6. How do I create secure passwords and
manage all of my passwords?
7. How can I surf the Internet anonymously
and use biometric authentication devices
to protect my data?
8. How do I manage online annoyances
such as spyware and spam?
Copyright 2016 Pearson Education, Inc.

9-27

Check Your Understanding


9. What data do I need to back up, and
what are the best methods for doing so?
10.What is social engineering, and how do I
avoid falling prey to phishing?
11.How do I protect my physical computing
assets from environmental hazards,
power surges, and theft?

Copyright 2016 Pearson Education, Inc.

9-28

All rights reserved. No part of this publication may be reproduced, stored in a


retrieval system, or transmitted, in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, without the prior written
permission of the publisher. Printed in the United States of America.

Copyright 2016 Pearson Education, Inc.

Vous aimerez peut-être aussi