Digital security, ethics and privacy
Module 5
Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats
Risks Associated with Technology Use�(1 of 5)
Figure 5-1 You can protect yourself from digital security risks.
Cybercrimes and Criminals (2 of 5)
Risks Associated with Technology Use�(3 of 5)
Risks Associated with Technology Use�(4 of 5)
Cybercrimes and Criminals (5 of 5)
Table 5-1 Social engineering principles.
Principle | Description | Example |
Authority | Directed by someone impersonating authority figure or falsely citing their authority | “I’m the CEO calling.” |
Intimidation | To frighten and coerce by threat | “If you don’t reset my password, I will call your supervisor.” |
Consensus | Influenced by what others do | “I called last week and your colleague reset my password.” |
Scarcity | Something is in short supply | “I can’t waste time here.” |
Urgency | Immediate action is needed | “My meeting with the board starts in five minutes.” |
Familiarity | Victim well-known and well-received | “I remember reading a good evaluation on you.” |
Trust | Help a person known to you | “You know who I am.” |
Ethics and Society (1 of 4)
Ethics and Society (2 of 4)
Information Accuracy
Figure 5-3 A digitally edited photo that shows a fruit that looks like an apple on the outside and an orange on the inside.
Ethics and Society (3 of 4)
Intellectual Property Rights
Ethics and Society (4 of 4)
Green Computing
Figure 5-5 A list of suggestions to make computing healthy for the environment.
Internet and Network Attacks (1 of 6)
Internet and Network Attacks (2 of 6)
Table 5-2 Common types of malware.
Type | Description |
Adware | A program that displays an online advertisement in a banner, pop-up window, or pop-under window on web pages, email messages, or other Internet services |
Ransomware | A program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money |
Rootkit | A program that hides in a computer or mobile device and allows someone from a remote location to take full control of the computer or device |
Spyware | A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online |
Trojan horse | A program that hides within or looks like a legitimate program. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers or devices |
Virus | A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission |
Worm | A program that copies itself repeatedly, for example, in memory or on a network, using up resources and possibly shutting down the computer, device, or network |
Internet and Network Attacks (3 of 6)
Botnets
Internet and Network Attacks (4 of 6)
Denial of Service Attacks
Back Doors
Internet and Network Attacks (5 of 6)
Figure 5-5 Spoofers alter the components and header of an email message so that it appears the message originated from a different sender.
Internet and Network Attacks (6 of 6)
Practices for Protection from Viruses and Other Malware
Secure IT: Protect Yourself and Your�Data (1 of 7)
Secure IT: Protect Yourself and Your�Data (2 of 7)
Table 5-3 Uses of personal information.
Organization | Information | Valid Use | Invalid Use |
School | Telephone number | Call you about an advising appointment | Give to credit card company who calls you about applying for a new credit card |
Hospital | Medical history | Can refer to past procedures when you are admitted as a patient | Sell to drug company who sends you information about its drugs |
Employer | Personal email address | Will send to you the latest company newsletter | Provide to a local merchant who is having a holiday sale |
Secure IT: Protect Yourself and Your�Data (3 of 7)
Secure IT: Protect Yourself and Your�Data (4 of 7)
Figure 5-8 How a firewall works.
Secure IT: Protect Yourself and Your�Data (5 of 7)
Secure IT: Protect Yourself and Your�Data (6 of 7)
Secure IT: Protect Yourself and Your�Data (7 of 7)
Table 5-4 Various backup methods.
Type of Backup | Description | Advantages | Disadvantages |
Full Backup | Copies all of the files on media in the computer | Fastest recovery method; all files are saved | Longest backup time |
Differential backup | Copies only the files that have changed since the last full backup | Fast backup method; requires minimal storage space to back up | Recovery is time-consuming because the last full backup and the differential backup are needed. |
Incremental backup | Copies only the files that have changed since the last full or incremental backup | Fastest backup method; requires minimal storage space to back up; only most recent changes saved | Recovery is most time-consuming because the last full backup and all incremental backups since the last full backup are needed. |
Selective backup | Users choose which folders and files to include in a backup | Fast backup method; provides great flexibility | Difficult to manage individual file backups; least manageable of all the backup methods |
Continuous data protection | All data is backed up whenever a change is made. | The only real-time backup; very fast recovery of data | Very expensive and requires a great amount of storage |
Wireless Security (1 of 5)
Protect Mobile Devices
Precautions
Wireless Security (2 of 5)
Table 5-5 Configuration settings for wireless routers.
Wireless Router Settings | Explanation | Recommended Configuration |
Access password | This requires a password to access the configuration settings of the device. | Create a strong password so that attackers cannot access the wireless router and turn off the security settings |
Remote management | Remote management allows the configuration settings to be changed from anywhere through an Internet connection. | Turn off remote management so that someone outside cannot access the configuration settings |
Service Set Identifier (SSID) | The SSID is the name of the local wireless network. | Change this from the default setting to a value that does not reveal the identity of the owner or the location of the network (such as MyWireNet599342) |
Wireless Security (3 of 5)
Table 5-5 Configuration settings for wireless routers (continued).
Wireless Router Settings | Explanation | Recommended Configuration |
Wi-Fi Protected Access 2 (WPA2) Personal | WPA2 encrypts the wireless data transmissions and also limits who can access the Wi-Fi network. | Turn on WPA2 and set a strong pre-shared key, which must also be entered once on each mobile device |
Wi-Fi Protected Setup (WPS) | WPS simplifies setting up the security on a wireless router. | Turn off WPS due to its security vulnerabilities |
Guest access | Guest access allows temporary users to access the wireless network without any additional configuration settings. | Turn on guest access when needed and turn it back off when the approved guests leave |
Disable SSID broadcasts | This prevents the wireless router from advertising the wireless network to anyone in the area. | Leave SSID broadcasts on; turning them off only provide a very weak degree of security and may suggest to an attacker that your network has valuable information |
Wireless Security (4 of 5)
Secure Your Wireless Network
Wireless Security (5 of 5)
Cloud Data Privacy
Information Privacy (1 of 11)
Information Privacy (2 of 11)
Passwords
Figure 5-9 User sign in requiring password.
Information Privacy (3 of 11)
Table 5-6 Ten most common passwords.
Rank | Password |
1 | 123456 |
2 | 123456789 |
3 | qwerty |
4 | password |
5 | 1111111 |
6 | 12345678 |
7 | abc123 |
8 | password1 |
9 | 1234567 |
10 | 12345 |
Table 5-7 Numbers of possible passwords.
Password length | Number of possible Passwords | Average attempts to Break Password |
2 | 9025 | 4513 |
3 | 857,375 | 428,688 |
4 | 81,450,625 | 40,725,313 |
5 | 7,737,809,375 | 3,868,904,688 |
6 | 735,091,890,625 | 367,545,945,313 |
Information Privacy (4 of 11)
Information Privacy (5 of 11)
Biometrics
Figure 5-10 Facial recognition.
Information Privacy (6 of 11)
Figure 5-12 Two-factor authentication.
Information Privacy (7 of 11)
CAPTCHAs
Figure 5-13 CAPTCHAs verify human usage.
Information Privacy (8 of 11)
Encryption
Browser Security
Information Privacy (9 of 11)
Protect your Personal and Financial Information
Actions to Protect Your Personal and Financial Information
Information Privacy (10 of 11)
Protecting Your Online Profile
Privacy Laws
Information Privacy (11 of 11)
Table 5-8 Some U.S. privacy laws.
Law | Purpose |
Children’s Internet Protection Act | Protects minors from inappropriate content when accessing the Internet in schools and libraries |
Children’s Online Privacy Protection Act (COPPA) | Requires websites to protect personal information of children under 13 years of age |
Digital Millennium Copyright Act (DMCA) | Makes it illegal to circumvent antipiracy schemes in commercial software; outlaws sale of devices that copy software illegally |
Freedom of Information Act (FOIA) | Enables public access to most government records |
HIPAA (Health Insurance Portability and Accountability Act) | Protects individuals against the wrongful disclosure of their health information |
PATRIOT (Provide Appropriate Tools Required to Intercept and Obstruct Terrorism) | Gives law enforcement the right to monitor people’s activities, including web and email habits |
Privacy Act | Forbids federal agencies from allowing information to be used for a reason other than that for which it was collected |
Fair and Accurate Credit Transactions Act (FACTA) | Provides rules for financial institutions, including lenders and credit reporting agencies, to protect consumers from fraud and identity theft |
How To: Establish Policies to Ensure�Safety (1 of 7)
Figure 5-14 Sample IT code of conduct.
How To: Establish Policies to Ensure�Safety (2 of 7)
How To: Establish Policies to Ensure�Safety (3 of 7)
Employee Monitoring
How To: Establish Policies to Ensure�Safety (4 of 7)
How To: Establish Policies to Ensure�Safety (5 of 7)
Backup Plan
The backup plan specifies how to use backup files and equipment to resume computer operations, and includes:
How To: Establish Policies to Ensure�Safety (6 of 7)
Recovery Plan:
The recovery plan specifies the actions to restore full computer operations such as replacing hardware or software.
Test Plan:
The test plan includes simulating various levels of disasters and recording the ability to recover.
How To: Establish Policies to Ensure�Safety (7 of 7)
Table 5-9 Considerations for disaster recovery.
Disaster Type | What to Do First | What Might Occur | What to Include in the Plan |
Natural (earthquake, hurricane, tornado, etc.) | Shut off power Evacuate, if necessary Pay attention to advisories Do not use phone lines if lightning occurs | Power outage Phone lines down Structural damage to building Road closings, transportation interruptions Flooding Equipment damage | Generator Satellite phone, list of employee phone numbers Alternate worksite Action to be taken if employees are not able to come to work/leave the office Wet/dry vacuums Make and model numbers and vendor information to get replacements |
Man-made (hazardous material spill, terrorist attacks, fire, hackers, malware, etc.) | Notify authorities (fire departments, etc.) of immediate threat Attempt to suppress fire or contain spill, if safe to do so Evacuate, if necessary | Data loss Dangerous conditions for employees Criminal activity, such as data hacking and identity theft Equipment damage | Back up data at protected site Protective equipment and an evacuation plan Contact law enforcement Make and model numbers and vendor information to obtain replacements |
Ethics and Issues: Inclusivity and
Digital Access (1 of 2)
Digital Inclusion
Ethics and Issues: Inclusivity and
Digital Access (2 of 2)
Some barriers to digital inclusion include: