Understand current cybersecurity threats, including:
Malware
Phishing
Ransomware
Comprehend concepts of:
Encryption
Authentication
Access control
Secure coding practices
Explore ethical and legal aspects of privacy, including data protection laws and regulations
Awareness of security concerns:
Theft of PC
Loss of important data
Pirated or counterfeit products
Privacy risks
Hardware loss: Stolen or misplaced devices
Theft:
Commonly targeted for hardware value or contained information
Hardware damage: Can occur accidentally or intentionally
System failure:
Total malfunction due to hardware/software issues, natural disasters, or attacks
Security Measures:
Use locks for computers and doors
Employ cable locks
Utilize encryption for data protection
Tracking Software:
Software to find lost/stolen PCs
Kill switch: Deletes sensitive data remotely
Power Protection:
Surge suppressors for electrical protection
UPS for continuous power supply
Backup Plans:
Use continuous data protection (CDP) and secure backup
Definition: Unauthorized software copying
Common scenarios:
Illegal copies shared among individuals
Businesses exceeding EULA by installing on multiple machines
Unauthorized software on sold PCs
Making Unlicensed copies of currencies and collectibles using scanning or printing
Methods:
Education on piracy
Strengthened anti-piracy laws
Use of holograms for authenticity
Physical and Digital Protections:
New currency designs, microprinting, and digital watermarks
Privacy: Freedom from unauthorized intrusion
Information privacy: Control over personal data collection and use
Collection of in-depth information using electronic means
Definition: Unsolicited bulk emails
Examples:
Health products, fraudulent offers, instant messaging spam
Email Safeguards:
Use throw-away email addresses
Data Disposal:
Properly wipe sensitive data
Shred data storage media
Computer Monitoring Software:
Used to track computer usage
Video Surveillance:
Monitor interactions in various settings
Includes:
Network breaches
Financial theft
Data manipulation
Sabotage activities
Unauthorized Access: User gains access without permission
Unauthorized Use: Utilization outside authorized scope
Types of Sabotage:
Computer viruses (harmful)
Worms (self-replicating)
Trojan horses (disguised harmful software)
Ransomware (gatekeeping access for payment)
Denial of service (flooding a server)
Access Control Systems:
Knowledge, object, and biometric systems for restricted access
Firewalls:
Prevention of unauthorized network access
Types:
Private key encryption: Single key for scrambling
Public key encryption: Two keys for secure communication
Standards of moral conduct; ethics guides behavior
Protect individuals using responsible information system practices
Documents outlining acceptable behaviors for professionals
Restrictions on how networks and systems can be used
Examples of prohibitions:
Borrowing IDs and passwords
Unsolicited emailing
Definition: Protection of creator works, ideas, and inventions
Protection of creative works, giving authors control over their work
Importance of proper crediting to avoid plagiarism
Online plagiarism detection tools available
Legal tools allowing authors to control their work while ensuring accessibility
Patent: Protection of inventions and processes
Trademark: Protects identifiers of goods and services
Protection against cybersquatting and typosquatting
Trademarks serve to protect consumers and assure quality