Protecting Our Digital Devices
Protecting Our Digital Devices
Computer Threats
Cybercrimes are criminal acts conducted by cybercriminals through the use of computers Computer users need to protect themselves from becoming victims of cybercriminals
Types of Cybercrime
Fraud-related (58 percent of cybercrime in 2008) o Auction fraud o Non-delivery of ordered items o Credits and debit card fraud Non-fraud-related o Computer intrusions o Unsolicited email o Child pornography
What Viruses Do
Replicate themselves o Slow down networks Secondary objectives o Display annoying messages o Delete files on the hard drive o Change computer settings
Types of Viruses
Boot-Sector Viruses
Replicate themselves in the boot sector of the hard drive
Logic Bombs
Activate when certain conditions are met
Time Bombs
Triggered by the passage of time or on a certain date
Worms
Travel between systems through networks
Script Viruses
Hidden on web pages as mini-programs
Macro Viruses
Attached to documents
Email Viruses
Use email address books to distribute themselves
Encryption Viruses
Compress files using a complex encryption key
Virus Classifications
Polymorphic Viruses
Multipartite Viruses
Infect multiple file types
Stealth Viruses
Erase their code from the hard drive and reside in the active memory
Antivirus Software
Programs designed to detect viruses o Scan files looking for virus signatures (unique code) o Provide options for deleting or fixing infected files o Inoculate files against further infection Needs to be updated frequently
Keep your antivirus and operating system (OS) software up to date Load security patches as soon as they are available Enable automatic updates
Hackers
Anyone who unlawfully accesses a computer system Types of hackers o White hat o Black hat o Script kiddies
Firewalls
Software programs or hardware designed to close logical ports to invaders o A software firewall is built into Windows 7 o Other software firewalls are available from vendors o Network routers can contain a hardware firewall Firewalls are critical if you have an always-on broadband connection Test your computers vulnerability
Packet Filtering
Look at incoming data packets and refuse them under certain circumstances
Change IP Often
Dynamic host configuration provider (DHCP) pool or IP addresses Easier for hacker to find you if your IP address is constant
Network Address Translation (internal IPs behind firewall) NAT capable router
Bluetooth Attacks
Bluesnarfing
Exploits flaw in access software to steal information contained on the device
Bluebugging
Hacker takes control of the device
Carwhisperer
Designed to eavesdrop on conversations in your car when using a hands-free device Make your device invisible
Passwords
Create a strong password o At least 14 characters, including numbers, symbols, and upper- and lowercase letters o Not a single word or a word from a dictionary o Not easily associated with you (birthday, name of pet, nickname) o Use different passwords for different sites o Do not tell anyone or write down password o Change password regularly (every month)
Password Managers
Remember all your different passwords Built into o Operating systems o Web browsers o Some security packages
o Might already have viruses or hacking tools installed Portable privacy devices Linux OS on a flash drive
Malware
Software that has a malicious intent o Grayware (nondestructive) Adware Spyware o Viruses (destructive)
SPAM or SPIM
SPAM: Unwanted or junk email o To avoid spam Create free web-based email account for filling out online forms or making online purchases Use a spam filter Do not try to unsubscribe from spam emails Use an email forwarding service SPIM: Unsolicited instant messages
Cookies
A web site assigns an ID number to your computer, stored in a cookie file Each time you log in to the site, it notes the visit and keeps track of it in a database Provide information about browsing habits Identify user preferences Pose some privacy risks, but low security threat
Social Engineering
Uses social skills to generate human interaction to entice individuals to reveal sensitive information
Hoaxes
An attempt to make someone believe something that is untrue o Target large audiences o Practical joke, agents of social changes, or time wasters o Mostly email
Power Surges
Occur wen electrical current is supplied in excess of normal voltage (120 volts in the United States) Caused by o Old or faulty wiring o Downed power lines o Malfunctions at electric substations o Lightning strikes Use surge protectors
Deterring Theft
Alarms Locks and surrounds Software alerts