1 / 16

Chapter Nine

Chapter Nine. Maintaining a Computer Part II: Internet Privacy and Security. Strata Objectives Covered. 4.1 (3.1 FC0-U11 U.K.) Recognize the basic security risks and procedures to prevent them Identify security threats related to: cookies, pop-ups, and accidental misconfiguration

giona
Download Presentation

Chapter Nine

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter Nine Maintaining a ComputerPart II: Internet Privacy and Security

  2. Strata Objectives Covered 4.1 (3.1 FC0-U11 U.K.) Recognize the basic security risks and procedures to prevent them • Identify security threats related to: cookies, pop-ups, and accidental misconfiguration 4.2 (3.2 FC0-U11 U.K.) Recognize security breaches and ways to resolve them • Recognize the proper procedures to maintain a secure environment 2

  3. Avoiding Identity Fraud • Use strong passwords • Change passwords frequently • Do not share personal information with untrusted sources • Be aware of social engineering tricks

  4. Social Engineering • Tricking someone into sharing personal information • Examples: • Email • Pop-up web window • Phone call • Instant message

  5. Web Browser Risks • Malware scripts embedded in web pages • ActiveX controls that cause harm when downloaded • Low security settings in browser prevent warnings from being displayed for risky content • Cookies store personal information, compromising privacy

  6. Cookies • A plain text file that a web page stores on your hard disk for tracking purposes • Usually harmless, and may perform useful functions • Risks: • Cookies can deliver personally identifiable information to website • A virus may copy a stored password from a cookie and send it to someone

  7. Cookies • First-party cookie: placed on computer by a website you visit • Third-party cookie: placed on computer by an ad on a website • Session cookie: persists only as long as web browser is open • Persistent cookie: stays on the hard disk after you close the browser

  8. Cookies in IE

  9. Pop-Ups • An extra, small browser window that appears automatically when you click a link or open a page • Usually a nuisance, displaying ads • Browsers may block some pop-ups automatically • To allow a pop-up, hold down Shift as you click the link to display the page

  10. Pop-Ups in IE

  11. Secure Sites • Encrypt transmissions between client and web server to prevent snooping • Typically begin with https:// • Secure Sockets Layer (SSL) is one of the technologies for generating secure connections • Security certificates verify that the site is legitimate

  12. Secure Sites in IE

  13. Security Certificates in IE

  14. Phishing • Site that masquerades as a legitimate secure site but steals your login information • Also called spoofing • Can be solicited via email or another website • Most browsers have some phishing protection, such as SmartScreen Filter in IE

  15. SmartScreen Filter in IE

  16. InPrivate Browsing • Highly secure browsing mode that guards your privacy • History, cookies, user names, passwords, and temporary files are not stored • To enable, choose Tools, InPrivate Browsing • Close browser window when finished

More Related