0% found this document useful (0 votes)
19 views26 pages

Day 3

The document discusses various methods for protecting devices and networks, including enabling firewalls and antivirus software, strong password protection, wireless network security best practices, and safe online privacy practices like two-factor authentication and encrypted web browsing. It also provides guidelines for strong passwords according to NIST standards.

Uploaded by

scosee171
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views26 pages

Day 3

The document discusses various methods for protecting devices and networks, including enabling firewalls and antivirus software, strong password protection, wireless network security best practices, and safe online privacy practices like two-factor authentication and encrypted web browsing. It also provides guidelines for strong passwords according to NIST standards.

Uploaded by

scosee171
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Protecting Your

Devices and Network


Outline

• Protecting your device network


• Wireless network security at home
• Public Wi-Fi
• Safeguarding your online privacy
• Class activity
Protecting Your Devices and Network
Turn The Firewall On
You should use at least one type of firewall (either a software firewall or a hardware firewall on a
router) to protect your device from unauthorized access. The firewall should be turned on and
constantly updated to prevent hackers from accessing your personal or organization data.
Protecting Your Devices and Network

Install Antivirus And Antispyware


To prevent virus and spyware, you should only ever download
software from trusted websites. However, you should always use
antivirus software to provide another layer of protection. This
software, which often includes antispyware, is designed to scan
your computer and incoming email for viruses and delete them.
Keeping your software up to date will protect your computer from
any new malicious software that emerges. Examples of Antivirus
include Bitdefender Antivirus Plus, Norton AntiVirus Plus, Avira
Antivrus Pro.
Protecting Your Devices and Network

Manage Your Operating System And Browser


To protect your computer and your data, you should set the security settings on your
computer and browser to medium level or higher. You should also regularly update your
computer’s operating system, including your web browser, and download and install the
latest software patches and security updates from the vendors.
Protecting Your Devices and Network
Set Up Password Protection
All of your computing devices, including PCs, laptops, tablets and smartphones, should
be password protected to prevent unauthorized access. Any stored information,
especially sensitive or confidential data, should be encrypted. You should only store
necessary information on your mobile device, in case it is stolen or lost.
Wireless Network Security at Home
Wireless networks allow Wi-Fi enabled devices, such as laptops and tablets, to connect to the
network by way of a pre-set network identifier, known as the service set identifier (SSID).
Hackers will be aware of the pre-set SSID and default password. Therefore, these details
should be changed to prevent intruders from entering your home wireless network.
Furthermore, you should encrypt wireless communication by enabling wireless security and
the WPA2 encryption feature on your wireless router. But be aware, even with WPA2
encryption enabled, a wireless network can still be vulnerable.
Wireless Network Security at Home
This vulnerability can be exploited by key reinstallation attacks (KRACKs) by intruders. In simple
terms, attackers break the encryption between a wireless router and a wireless device, giving
them access to network data. This flaw affects all modern, protected Wi-Fi networks.
To mitigate this situation, you should:
1. Update all wireless capable devices such as routers, laptops and mobile devices, as soon as
security updates become available
2. Use a wired connection for any devices with a wired Network Interface Card (NIC)
3. Use a trusted Virtual Private Network (VPN) service when accessing a wireless network.
Public Wi-Fi Risks
There are some risks involved, which mean that it is best not to access or
send any personal information when using public Wi-Fi.

• You should always verify that your device isn’t configured with file and
media sharing and that it requires user authentication with encryption.

• You should also use an encrypted VPN service to prevent others from
intercepting your information (known as ‘eavesdropping’) over a public
wireless network. This service gives you secure access to the Internet, by
encrypting the connection between your device and the VPN server.
Public Wi-Fi Risks

• Bluetooth wireless protocol, found on many smartphones and tablets, can


also be exploited by hackers to eavesdrop, establish remote access
controls, distribute malware and drain batteries! Therefore, my top tip is to
keep Bluetooth turned off when you aren’t using it.
Strong Password
Password Guidelines
The United States National Institute of Standards and
Technology (NIST) has published improved password
requirements. NIST standards are intended for
government applications but can serve as a standard
for other sectors as well.
Password Guidelines
These guidelines aim to place responsibility for user verification on service providers and ensure
a better experience for users overall. They state:

• Passwords should be at least eight characters, but no more than 64 characters.


• Common, easily guessed passwords, such as ‘password’ or ‘abc123’ should not be used.
• There should be no composition rules, such as having to include lower and uppercase letters
and numbers.
• Users should be able to see the password when typing, to help improve accuracy.
• All printing characters and spaces should be allowed.
• There should be no password hints.
• There should be no password expiration period.
• There should be no knowledge-based authentication, such as having to provide answers to
secret questions or verify transaction history.
Data Maintenance
Encryption
What Is Encryption?
Encryption is the process of converting information into a form in which unauthorized
parties cannot read it. Only a trusted, authorized person with the secret key or password can
decrypt the data and access it in its original form.
Note that the encryption itself does not prevent someone from intercepting the data. It can only
prevent an unauthorized person from viewing or accessing the content. In fact, some criminals
may decide to simply encrypt your data and make it unusable until you pay a ransom.
How Do You Encrypt Your Data?
Software programs are used to encrypt files, folders
and even entire drives.
Encrypting File System (EFS) is a Windows feature
that can encrypt data. It is directly linked to a specific
user account and only the user that encrypts the data
will be able to access it after it has been encrypted
using EFS.
How Do You Encrypt Your Data?

Step 1
Select one or more files or folders.
How Do You Encrypt Your Data?

Step 2
Right click the selected data and
go to ‘Properties.’
How Do You Encrypt Your Data?

Step 3
Find and click ‘Advanced.’
How Do You Encrypt Your Data?

Step 4
Select the ‘Encrypt contents to secure
data’ check box.
How Do You Encrypt Your Data?

Step 5
Files and folders that have been
encrypted with EFS are displayed
in green as shown here.
Safeguarding Your
Online Privacy
Two Factor Authentications
Besides your username and password or personal
identification number (PIN), two factor authentication
requires a second token to verify your identity. This may be a:
• Physical object such as a credit card, mobile phone or fob
• Biometric scan such as a fingerprint or facial and voice
recognition
• Verification code sent via SMS or email
Open Authorization
Open authorization (OAuth) is an open standard protocol that allows you to use your credentials to
access third-party applications without exposing your password.
Email and Web Browser Privacy
These problems can be minimized by enabling the in-
private browsing mode on your web browser. Many of
the most commonly used web browsers have their
own name for private browser mode:
• Microsoft Internet Explorer: InPrivate
• Google Chrome: Incognito
• Mozilla Firefox: Private tab or private window
• Safari: Private browsing
Class Activity
Question 1: Which type of technology can prevent malicious software from
monitoring user activities, collecting personal information and producing
unwanted pop-up ads on a user computer?

Question 2: How can you keep your personal browsing history hidden from
other users on a shared computer?

Question 3: Give one example of two factor authentication?

Question 4: Give two NIST requirement of a strong password

Question 5: How can you prevent others from eavesdropping on network


traffic when operating a PC on a public Wi-Fi hotspot?

You might also like