Securing Your System Protecting Your Digital Data and Devices
Securing Your System Protecting Your Digital Data and Devices
Eighteenth Edition
Global Edition
Chapter 9
• Cybercrime
• Cybercriminals
• Common types of
cybercrimes
• Zombies—computers that a
hacker controls
• Denial-of-service
– Legitimate users are
denied access to a
computer system
– System shuts down
• DDoS
• Botnet—large group of
devices that have been
infected by software programs
• Boot-sector viruses
• Logic bombs and time bombs
• Worms
• Script and macro viruses
• E-mail viruses
• Encryption viruses
• Packet filtering
– Filter out packets sent to logical ports
• Logical port blocking
– Completely refuses requests from the Internet asking
for access to specific ports
• Network address translation
– Assign IP addresses on a network
• Antivirus software
– Detects viruses and
protects your
computer
• Popular programs
– Norton
– Trend Micro
• Virus signature
– Portion of the virus code that’s unique to a particular
computer virus
• Quarantining
– Placing virus in a secure area, so it won’t spread to
other files
• Inoculation
– Records key attributes about your computer files and
keep stats in secure place
• Drive-by download
– Exploits
weaknesses in
operating systems
– Combat by keeping
OS up to date
• Biometric Authentication
Devices
– Fingerprint
– Iris pattern in eye
– Voice authentication
– Face pattern
recognition
– Provide a high
level of security
• Privacy tools
– Private Browsing
– InPrivate
– Incognito
• Virtual private networks
(VPNs)
– Secure networks that
are established using
the public Internet
infrastructure
Online (in the cloud) • Files stored at a secure, remote • Most free storage sites don’t
location provide enough space for image
• Files/backups accessible anywhere backups
through a browser
External hard drive • Inexpensive, One-time cost • Could be destroyed in one event
• Fast backups with U SB 3.0 devices (fire/flood) with your computer
connected directly to your computer • Can be stolen
• Slightly more difficult to back up
multiple computers with one device
Network-attached storage • Makes backups much easier for • More expensive than a stand-alone
device and home server multiple computing devices external hard drive
• Could be destroyed in one event
(fire/flood) with your computer
• Can be stolen
• Power surges
– Old or faulty wiring
– Downed power lines
– Lightning strikes
– Electric substation malfunctions
• Surge protector/Whole-house
surge protector
– Replace every
2–3 years
– Use with all devices
that have solid-state
components
• U PS
– Battery backup for power
outages