/
Certified Secure Computer User (CSCU)  Certified Secure Computer User (CSCU) 

Certified Secure Computer User (CSCU)  - PowerPoint Presentation

tawny-fly
tawny-fly . @tawny-fly
Follow
443 views
Uploaded On 2018-11-21

Certified Secure Computer User (CSCU)  - PPT Presentation

Fakultas Ilmu Komputer Bekerjasama Dengan Partnership 23 September 2014 Ditandatangani oleh Rektor Universitas Mercu Buana dan Country Manager Ec Council ID: 732474

email data computer windows data email windows computer security laptop time software cloud online malware system service network social

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "Certified Secure Computer User (CSCU) " is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

Certified Secure Computer User (CSCU) 

Fakultas

Ilmu

Komputer

Bekerjasama

DenganSlide2

Partnership : 23 September 2014

Ditandatangani oleh

: Rektor Universitas Mercu Buana dan

Country Manager Ec Council Ec Council adalah organisasi yang

memberikan sertifikasi kepada tiap individu dalam berbagai bidang e-business dan keahlian

keamanan informasi. Pemilik dan pencipta dari sertifikasi yang terkenal dan telah diakui di seluruh dunia, Certified Ethical Hacker (CEH).Slide3

TUJUAN PELATIHAN

Memberikan

Pengetahuan dan keterampilan untuk melindungi aset

informasi mereka. Memberikan pemahaman keamanan

komputer dan jaringan komputer dasar, seperti ancaman pencurian identitas, penipuan kartu

kredit

, pemalsuan online banking, virus dan backdoors, email palsu, hacking. Memberikan pengertian bagaimana cara meminimalisir kebocoran informasi-informasi pribadi tersebut.Slide4

Materi CSCU

Foundations of Security

Securing Operating SystemsProtecting Systems Using AntivirusesData EncryptionData Backup and Disaster RecoveryInternet SecuritySecuring Network ConnectionsSecuring Online TransactionsSecuring Email Communications

Social Engineering and Indentity TheftSecurity on Social Networking SitesInformation Security and Legal ComplianceSecuring Mobile Devices

Download di :Ppt fasilkom.mercubuana.ac.idPdf  Aspen.eccouncil.orgSlide5

REGISTER  ASPEN.ECCOUNCIL.ORG

Step 1 : Complete the official training.

Step 2 : Visit: https://aspen .eccouncil.org. Slide6

Step 3 : Click

Register and fill out the registration form. Click

Register button.Step 4 : Using the email you provided in step 3, follow the instruction in the auto-genereted email to activate your EC-Council Aspen Portal account.Slide7

Download Digital Copy of Class Certificate of Attendance

Login

Click Class Eval icon in the Student Services section.Enter the EEC (see the attached code below) in the Evalution

Code field nd click Submit.Fill the Course Evalution Form. Note

: All fields on this form are mandatory. Click Submit Classroom Evalution button.In Course Evalution Submission page, click the Download Certificate of Attendance button to download your certificate of attendance.Register for the exam. Please use your exam voucher and EEC to register.Attempt the exam.Slide8

Instructions for Downloading your Electronic Courseware, Lab Manuals, and Tools.

Login

Once successfully logged in, click Academia icon under the Learning Resources section. It will open Academia page.Enter the access code below in the Access Code field and click Submit button.Access

Code:XXXXXXXXXXXXXIf your Access Code is valid, you will be able to view the e-courseware and lab manuals in the Select Courseware dropdown menu.

Pilih Academia

Masukkan

kodeSlide9

Instructions for Exam

Klik

RegisterSlide10

Klik

Register

Isi Data

Klik

ContinueSlide11

Pilih

Yes

Pilih

TestSlide12

Hasil

UjianSlide13

SERTIFIKATSlide14

Module 01 : Foundations of Security

Understand :

What data is and the difference between data and informationHow often data is generatedThe importance of personal and organizational dataDifferent threats to dataWhat data security is and the risks associated with data compromise

Elements of securityThe potential losses due to a data breachHow to implement data securitySlide15

Module 02 : Securing Operating Systems

Lock a windows system when not in use

Create and change a user account password for a windows systemDisable the guest account of a windows systemLock out unwanted guests from a windows systemRename the administrator account of a windows systemDisable jumb lists of a windows systemEnable software updates in a windows system

Enable the firewall in a windows systemAdd new apps in the firewall of a windows systemRemove/disable app rules from the firewall of a windows systemCreate a new firewall rule in a windows systemTurn on windows defenderEnable bitlocker in a windows system

Understand windows encrypting file systemSlide16

Decrypt a file using EFS in a Windows system

Disable unnecessary services in a windows systemKill unwanted processes in a windows system

Hide files and folders in a windows systemDisable simple file sharing in a windows systemLock a mac system, when not in useDisable automatic login in a macAllow app downloads from the Mac app storeEnable automatic software updates in a MacDisable the guest account in a MacEnable

FileVault in a macEnable the Firewall in a MacChange User account password in a MacEnable and set parental Controls in a MacSlide17

Module 3 : Malware and Antivirus

Understand what malware isIdentify the various types of Malware

Identity the various symptoms of Malware InfectionsUnderstand what an antivirus is and how it worksUnderstand how to choose the right antivirus software for you and what its limitations areConfigure and use Kaspersky and Avast antivirus softwareTest if your antivirus is workingSlide18

Module 4 : Internet Security

Understand :The basic security measures to implement when online

The different threats web browsers pose and their countermeasuresConfigure web browsers in a secure mannerThe different threats posed by instant messaging apps and their countermeasuresThe different risks children are exposed to when onlineKnow about and use children friendly web browsers like

KidZuiIdentify :A secure websiteIf a child is a victim of online abuse and take corrective measures if soSlide19

Module 5 : Security on Social Networking Sites

Understand :The concept of virtual social networking

What a profile is on a social networking site and the information it containsThe risks associated with online social networkingWhat geotagging is and the risks it posesVarious risks of online social networking that minors are exposed toConfigure :The security settings of Facebook and TwitterSlide20

Module 6 : Securing Email Communications

Understands :The concept of an email

Why email security is importantThe various threats associated with using emailThe various email security proceduresIdentify the different email client products and service providers availableSlide21

Module 7 : Securing Module Devices

Understand :

The basics of mobile security and its importanceThe importance of an IMEI Number of a mobile phoneThe risks that a mobile device is exposed toWhat mobile malware isThe threats that Bluetooth poses to a mobile deviceThe various security procedure of an android device, an IOS device, and a windows device

Identify various mobile security toolsSlide22

Module 8: Securing The Cloud

Understand :The various types of clouds available and the different services they offer

The advantages of a cloud serviceThe Different thereats posed to a cloud account and their countermeasuresThe different privacy issues related to a cloud account and how to address themHow to choose the correct cloud advisor as per your needs Slide23

Module 9 : Securing Network Connections

Understand :

The different types of networksHow to set up your home networkHow to set up wireless networks in Windows and MacThe Various threats to a wireless network and their countermeasuresHow to use a firewall, antivirus, and encryption to secure a wireless networkSlide24

Module 10 : Data Backup and Disaster Recovery

Understand :

The Importance and need for data backupsThe reasons behind data loss incidentsWhat files to back up and whenThe different types of data backupsHow to create backups and restore data from them in Windows and MacThe difference between data deletion and data destruction and the importance of the latterSlide25

LATIHAN SOALSlide26

What does a lock icon symbolize besides a website name?

The

website needs a password to be accessedThe website cannot be accessed without the site admin’s permissionThe website is a secure website

The website is not accessible at the momentSlide27

Horace is a 64 year-old man who worked as an accountant for SN Associates before his retirement. The company gifted him a laptop at the time of his retirement. Since Horace was not a technically savvy person, he did not install any applications on his laptop, and only used it for checking his email and playing poker online. After some time, Horace’s laptop started giving him problems. It crashed frequently, often displayed the Blue Screen of Death (BSOD), and unwanted windows kept popping up whenever he went online. When Horace took his laptop to the service center, he was told that his laptop was infected with malware.

Which software should Horace have installed to prevent malware infection in his laptop?

Adobe Reader

Antivirus softwareOne DriveSkypeSlide28

Harold, an associate at AQ Corporation, received a phone call from a person claiming to be Bob from the IT department. Bob told Harold that he had noticed that Harold’s computer was running slow, and could help him fix it. Harold, not having much knowledge regarding computers, readily agreed. Following Bob’s instructions, Harold typed in some commands on his computer, and gave remote access to Bob to have his computer fixed. Later on, Harold noticed that confidential information concerning his clients was missing from his computer.

Which attack was Harold a victim of?

War driverEvil twin

Social engineeringBluesnarfingSlide29

Ruth Cole is a sales manager and travels extensively on business. She regularly updates and stores clients’ data on a remote data storage device via the Internet, so that in case she loses her laptop or it crashes for some reason, she does not lose the data which is essential to carrying out her work.

Which type of data backup is Emma using to carry out her daily work?

Differential backupIncremental backup

Online data backupFull system backupSlide30

A new online service allows people living with roommates to feed in all their house hold expenses in its ‘share calculator’ program. The program then calculates how much each person is supposed to pay and sends a detailed report to all those who are listed as roommates for that particular transaction.

The above mentioned service is an example of which of the following?

Network as a ServiceSoftware as a Service

Infrastructure as a ServicePlatform as a ServiceSlide31

John is an 18 year-old college-going student. He loves to read books and listen to music on his laptop. He regularly downloads e-books and music from the internet. Lately, whenever John has been spending time on his laptop, the laptop begins displaying the infamous Blue Screen of Death (BSOD). Upon taking his laptop to the service center, John was told that his laptop was infected with malware.

Which symptom of malware infection is John’s laptop displaying?

Laptop screen malfunctionHard drive malfunction

Unexpected crashesSlow systemSlide32

Which of the following is the strongest password?

Domike

*Donna1992donnamike92Pa#72tLeSlide33

Which of the following terms refers to the process of protecting information, and the infrastructure that stores it?

Keystroke

loggingMaintenanceAvailabilityData

securitySlide34

Luke works as an analyst for AS Pvt. Ltd. His job there is to analyze statistics and records obtained from people to improve the sales of the company. However, recently the statistics and records given to him have been incorrect, thus leading to gross miscalculations and wrong predictions on his part. Which of the terms listed below, best describes these statistics and records that are incorrect?

Information

DataArchives

IndicatorsSlide35

Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get his work assessed by an expert. On the subway an unknown person picks his pocket. Along with his wallet Duke also lost the pen drive with his pictures. Since he had not made any more copies of those pictures, he lost them forever.

What type of data loss is this?

Hardware theftMalware attack

Natural disasterSoftware theftSlide36

Andrew lost his iPhone on the way home from college. He anxiously wanted to recover it, as it was a gift from his late grandfather. The iPhone also contained pictures that he had taken for a national photography contest.

Using which iOS feature, can Andrew locate his phone?

iCloud backupSIM lockFind my iPhone

System updatesSlide37

Andrew lost his iPhone on the way home from college. He anxiously wanted to recover it, as it was a gift from his late grandfather. The iPhone also contained pictures that he had taken for a national photography contest.

Using which iOS feature, can Andrew locate his phone?

iCloud backupSIM lockFind my iPhone

System updatesSlide38

Which of the following fundamental concepts of security refers to an action taken in advance to protect the system against threats or dangers?

Maintenance

NonrepudiationPrecautionReactionSlide39

Which of the following software programs runs on the internet and allows users to find, access, and display web pages?

Email

Web browsersExtensionsSearch engineSlide40

A newly established ITES company plans to launch a website which enables its users to share pictures and videos with each other. Apart from this, users can also comment on these pictures and share them further.

Under which of the following cloud categories will the company’s product come?

Public CloudPrivate CloudCommunity cloud

Hybrid CloudSlide41

InfraTech

Inc. is an international IT company with offices in Dubai, Singapore, and Australia. To have continuity of business practice, it is imperative that all the branch offices be able to communicate amongst themselves.

Which of the following network systems would be suitable for data communication between the employees of all branches of InfraTech Inc.?EthernetLocal Area Network

Virtual Private NetworkWide Area NetworkSlide42

Which of the following terms refers to the process that ensures accuracy of the sender and receiver of a message?

Nonrepudiation

DataAuthenticityAvailabilitySlide43

Which of the following terms refers to a collection of information that defines or describes the user and his or her interests?

Facebook

groupAccount settingsTimelineProfileSlide44

Sam uses his work laptop to watch pirated movies at home sometimes. When he tried to watch the latest movie he downloaded, the movie file did not play even after trying on several different players. Within a day of this, Sam noticed that many of his files were vanishing one after the other from his laptop even though neither he nor anyone else deleted them. The network administrator of his company, after taking a look at his computer told him that the movie files, which did not play, definitely had something to do with this peculiar behavior.

What type of data loss could this be?

Software failureComputer virus

Human errorNatural disasterSlide45

Alex, the coach of Manchester United, called up Wayne, the captain of the team, to discuss the tactics they would employ in the upcoming Champions League Final. The following day, Alex received an email with the transcript of the conversation he had with Wayne. The sender of the email threatened to make Alex’s tactics public, if he did not pay him $5000.

Which form of mobile device attack was Alex a victim of?

Social engineeringMan in the middle attack

EavesdroppingPhishingSlide46

Raymond received an email from an official claiming to be from his bank. The email requested Raymond to send his personal details since the customer database of the bank was being updated. Upon confirmation from the bank, Raymond was told that the bank had not sent any emails asking for the personal details of their customers.

Which cyber-attack would Raymond have been a victim of if he had replied to the email?

Man in the middle attackWar driver

EavesdroppingPhishingSlide47

Ellie, an 18 year-old student, shares her Windows computer with her younger brother, Adam. Adam is very mischievous and whenever he is on the computer, he ruins Ellie’s college assignments. Ellie, who is fed up of this decides to encrypt the drive that contains her assignments. She uses inbuilt Windows software to encrypt the drive so that Adam cannot access the drive.

Which software did Ellie use?

BitLockerAdobe

SkypeSPAMfighterSlide48

Fred, a 14 year-old boy, is an only child. Fred loves spending time on his Mac OS X browsing the internet. When his parents are not at home, he spends hours at a stretch on the computer. Once, when Fred’s parents come home late from work and find him on the Mac, they decided to limit his computer time. Enabling an inbuilt feature in the Mac, Fred’s parents limit his computer time to two hours daily.

Which MAC OS X feature did Fred’s parents enable?

FileVaultParental control

Jump listsUAC slider barSlide49

Which of the following antivirus techniques refers to the process of comparing the current state of stored programs to a previously recorded state, which is known to be free of malware?

Bookmarks

methodIntegrity checkingScanningHeuristics analysisSlide50

Tom, a 14 year-old boy has been chatting online with Adam, whom Tom assumes is 14 years old as well. Over the months, they built up a great ‘online’ friendship, playing online games, checking out EDM websites, continuing with their friendly rivalry over football, and just talking about ‘guy’ stuff. When Adam invited Tom over to meet him, Tom was obviously excited. However, when Tom met Adam, he was shocked, as Adam turned out to be a 35 years old man. Despite this shock, Tom entered Adam’s house, as he trusted him. Tom was having a great time playing PS3 with Adam, until the time Adam touched him inappropriately. Tom ran away from Adam’s house and did not know what to do.

Which form of cyber-attack was Tom a victim of?

Pornography

Social engineeringGroomingPhishingSlide51

You received the following email from an official claiming to be from your bank.

Dear ABC Bank User,

Since we will be updating our customer database shortly, you are kindly requested to send the following information.• Name• Bank login id• Password• Branch• Date of birth

• Alternate emailPlease click the below link to update your details.Proceed to update your account detailsPlease contact the ABC Bank customer team in case of any queries. Thank you for your cooperation.Which type of email security threat is this?

PhishingMalicious email attachmentNigerian scamSpy-phishingSlide52

Which of the following helps to backup data on a Mac?

Extensions

App StoreInternet AccountsTime MachineSlide53

This part of an email informs you about the address from where it came, time of the message, date sent, and the subject line.

Identify the email part?

SignatureHeaderFooter

BodySlide54

Lucy, a 55 year-old woman, was not a technically savvy person. She did not install or enable any applications on her computer, and only used it for looking up recipes and knitting patterns. After some time, Lucy’s computer started giving her problems. It often displayed the Blue Screen of Death (BSOD) and unwanted windows kept popping up whenever she went online. When a computer technician checked Lucy’s computer, it was discovered that her computer was infected with malware.

Which inbuilt Windows software should Lucy have enabled to prevent malware infection in her computer?

Task manager

Jump listsSimple file sharingWindows DefenderSlide55

Sally is a 16-year-old high school student who is extremely attached to her laptop. She uses it to download and watch episodes of her favorite sitcom. While watching one of the episodes, her laptop switched off automatically a couple of times. Suspecting a malware infection, she opened the antivirus software on her laptop and chose a technique, which examined all files on the memory and hard disk in order to identify and locate the malware.

Which antivirus technique did Sally employ?

Bookmarks methodIntegrity checking

Heuristics analysisScanningSlide56

Which of the following terms refers to malicious software that is specifically built to target mobile phones and smartphones systems?

Unmanaged

applicationsBroken cryptographyMobile malwarePhishingSlide57

Which privacy issue of clouds exposes users to the risk of their data being accessed by the cloud service provider without the user’s consent?

Data

migrationData ownershipData location

Data permanencySlide58

Which of the following terms refers to software that attackers create to install on a victim’s computer in order to compromise its security?

Lockbin

MalwareDropboxBitlockerSlide59

Which of the following websites can Windows Phone users use to locate their stolen smartphone?

http

://www.symbianguru.com/tracking-mobile-with-phone-guardian.htmlaccount.microsoft.com/devicesiCloud.comandroid.com/

devicemanagerSlide60

Amy received an email from an official claiming to be from ABC Parcel Services. The email asked her to collect a gift parcel sent by her friend three weeks ago. The service claimed that they were unable to deliver the parcel to Amy, as the address provided was wrong. The service asked her to print out the attached invoice copy, fill it, and collect the package from the branch office located in her city. .

Which type of email security threat could Amy have faced, if she clicked or downloaded the attachment?

Phishing

Hoax mailMalicious user redirectionMalicious email attachmentSlide61

ABC Info Ltd. has a part of its business already on a cloud computing platform. However, its new product suite would need a cloud service which runs on a totally different technology. The company should be able to make its legacy products and new products communicate with each other as the new products are just an upgrade of the old ones and much of the required data still resides on the old cloud.

Which of the following cloud computing platforms will be suitable for ABC Info’s future needs?

Hybrid cloudPrivate cloud

Community cloudPublic cloudSlide62

Daniel, a bank officer, communicates with his clients through emails on a daily basis. Recently, he noticed that his Gmail inbox was filled with unsolicited emails. The cluttered inbox annoyed him, as it was difficult to filter the important emails. Hence, he decided to find a solution for it. Upon inquiry, a service provider told him that he could use software which automatically filters out the unsolicited emails. This software would not only protect his Gmail account, but also protect all the email accounts configured on his email client.

Which of the following tools did Daniel probably enquire about?

NortonKaspersky

Avast ProSPAMfighterSlide63

Isaac is transferring all the data from his computer to an external drive as he wants to format his laptop. While moving the data, he accidentally hits delete instead of cut on one of the files and without realizing, hit the enter key when the computer prompted to confirm his action. As the file was a huge one, it did not go to the recycle bin and got permanently deleted.

What type of data loss is this?

Software failureComputer virus

Human errorHardware theftSlide64

Janine’s parents gave her a smartphone for her birthday. The phone’s operating system intrigued and delighted Janine at the same time. This was because it was the first time she had seen a smartphone that had

a tile-based setup

. In addition, the tiles could be removed and interchanged on the home screen. Which operating system did Janine’s phone have?WindowsSymbian

iOSAndroidSlide65

Sarah has recently rented a small room on ABC Street, and started a business with seven employees. She provided every employee with a computer and a common printer which is meant to be shared by everyone.

Which of the following networks would suit Sarah’s business need?

Wide Area NetworkVirtual Private NetworkEthernet Physical Layer

Local Area NetworkSlide66

Hermione is a 21 year-old college student. She loves spending time on Facebook. However, with her final exams approaching, she feels that spending time on Facebook will harm her exam results. Hence, she enables a particular Facebook feature, with the help of which, she will not get any emails or notifications from Facebook.

Which Facebook feature did Hermione use?

Who can look me up ?Deactivate accountLogin

alertsWhere you’re logged inSlide67

Hermione is a 21 year-old college student. She loves spending time on Facebook. However, with her final exams approaching, she feels that spending time on Facebook will harm her exam results. Hence, she enables a particular Facebook feature, with the help of which, she will not get any emails or notifications from Facebook.

Which Facebook feature did Hermione use?

Who can look me up ?Deactivate accountLogin

alertsWhere you’re logged inSlide68

Certain software applications add or modify a particular feature in a browser. A few versions allow users to block ads, watch online videos, or IM with friends.

What is this application called?

ActiveXExtensionsCookiesJavaSlide69

As part of his security implementation plan, Glenn was updating his firewall. Which aspect of the security implementation plan was Glenn working on?

Nonrepudiation

ReactionPrecautionMaintenanceSlide70

Samuel, a network admin in an IT firm, has just discovered a phishing site known for targeting corporate entities. Several employees have received emails with the domain name, which is the same as that of this site. In order to prevent the company’s network from being corrupted, Samuel decides to block all incoming and outgoing traffic from that site.

Which of the following defense mechanisms can Samuel use to implement this?

EncryptionVirus

FirewallDisk encryptionSlide71

Susan downloaded a software from the Internet and installed it on her computer for watching movies online. After installing the software, she noticed that her PC was slowing down and was taking more time to open webpages.

What could Susan do to solve this problem?

Start using EthernetInstall a latest antivirus software and scan her computerStop using wireless internet connection

Choose a suitable encryption methodSlide72

Harry, a 21 year-old college-going student, was working on his dissertation when suddenly a message flashed on his screen, “All files on your computer have been encrypted. You must pay $1000 within 72 hours to regain access to your

data.”Even

after Harry paid the money, he was not able to access his data, and all the documents on his dissertation were lost.Which malware attack was Harry a victim of?Botnet

VirusRansomwareAdwareSlide73

Susan, a 15-year-old girl, loves spending her free time baking and cycling. However, recently she has been spending all of her free time glued to the computer. She shows no interest in her hobbies anymore and looks depressed most of the time. Her parents also noticed that whenever they enter her room, she quickly changes the computer screen. Understandably, Susan’s parents are worried about her.

What could be the reason for her behavior?

Social engineeringToo much pressure at school

Victim of online child abuse>?Unsolicited emailsSlide74

Imagine getting a letter from the Inland Revenue Authority of Singapore (IRAS) demanding that you pay $5,700 in taxes. This is what happened to Rick. He received a letter informing him that he owed the government unpaid income tax on wages he never earned. The IRAS letter said that Rick had worked at several places. However, Rick is only 15 years old and his only job was working at his uncle’s grocery store during the summer. He had never even visited some of the places where the letter said he worked. Rick was not sure what to do next. After all, he has never even had a “real” job like those listed in the letter.

What is going on in this scenario?

Social engineering

Identity TheftNigerian scamPhishingSlide75

XYZ Infra Solutions, a startup company is looking for a cloud service provider who can provide virtual machines, virtual local area network, customized software applications, on demand storage, IP addresses, and firewalls to meet its business needs.

Which of the following cloud computing services can meet the business needs of the company?

Platform as a ServiceSoftware as a ServiceInfrastructure

as a ServiceApplication as a ServiceSlide76

Which of the following is an encryption program in Mac that helps users to protect their data?

Safari

SPAMfighterFileVaultLockbinSlide77

TERIMA KASIH

&

SEMOGA SUKSES