Beruflich Dokumente
Kultur Dokumente
Module 6
Simplifying Security.
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
May 18, 2011 1:15 AM CDT
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Objectives
Internet Security Online Gaming Risks
Internet Explorer Security Settings Security Practices Specific to Gaming
Child Online Safety
Mozilla Firefox Security Settings
Role of Internet in Child Pornography
Google Chrome Security Settings
Protecting Children from Online
Apple Safari Security Settings Threats
Instant Messaging (IMing) How to Report a Crime?
Searching on the Web Internet Security Laws
Online Gaming and MMORPG Internet Security Checklists
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Internet Security Child Online
Laws Safety
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Security
Internet security involves
protecting user data from
Top 10 Malware Hosting Countries
unauthorized access and damage
when connected to the Internet
United States 39%
A proper browser configuration
helps in preventing malware France 10%
infection, protecting personal
information, and preventing or Russia 8.72%
limiting the damage from an cyber
attack Germany 5.87%
Ukraine 1.97%
Hungary 1.84%
http://www.findmysoft.com
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security Settings
Launch Internet Explorer, click the Tools button, and select Internet options
Select the Security tab, which displays websites classified into four zones:
1. Internet 2. Local Intranet 3. Trusted sites 4. Restricted sites
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Internet Zone
The Internet zone is for all the Internet
websites except for those listed in the
Trusted or Restricted zones
Click Custom level to set the Internet
zone security settings
Disable or enable the required options
Move the slider to change the security
level
Set the security level for the zone High
to ensure higher security
Maintaining the higher security level
may degrade the performance of the
browser
Click OK to apply the settings
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: ActiveX Controls
ActiveX controls are small programs that work
over the Internet through the browser
They include customized applications that are
required to gather data, view select files, and run
animations when the user visits websites
Malware is downloaded onto the user system
through ActiveX controls when he/she visits
malicious websites
Disable the ActiveX controls and plug‐ins options
in the Security Settings window
Enable the Automatic prompting for ActiveX
controls option so that the browser prompts
when there is a requirement of ActiveX controls
and plug‐ins to be enabled
Click OK to apply the settings
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Local Intranet Zone
Local intranet zone covers the
sites on intranet
Steps to add websites to Local
intranet zone:
Select Security Local Intranet
Click Sites
Click the Advanced button
Enter the URL into Add this
website to the zone column and
click Add
Click OK to apply the settings
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Trusted Sites Zone
The Trusted sites zone
contains those websites that
the users believe will not
damage their computers or
data
Select Security Trusted sites
Click the Sites button
Enter the URL into Add this
website to the zone column and
click Add
Click OK to apply the settings
10 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Restricted Zone
The Restricted sites zone restricts
the access to the websites that
might cause damage to a computer
To add restricted websites to
Restricted sites zone:
Select the Security tab and choose
Restricted sites
Click the Sites button
Enter the site URL into the Add this
website to the zone column to
restrict the access
Click Add and then click OK to apply
the settings
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Understanding Cookies
A cookie is information that is provided by a web server to web browser and then sent back
unchanged by the browser each time it accesses that server
When the website is revisited, the browser sends the information back to it to help
recognize the user
This activity is invisible to the user and is generally intended to improve the web surfing
experience (for example, at an online store)
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Privacy Settings
The user can limit the information
that is stored in a cookie
A cookie is only a text file and cannot
search a drive for information or
carry a virus
To configure cookie settings:
Choose Internet options from the Tools
menu on the browser
Select the Privacy tab and use the slider
to set the level at low, medium,
medium‐high, or high
Block all or accept all cookies
depending upon the requirement
Check the Turn on Pop‐up Blocker
option to block the pop‐ups that appear
while visiting some websites
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Deleting Browsing History
1. Choose Internet options
from the Tools menu on
the browser
2. Go to the Browsing history
section
3. Check the desired options
in the Delete Browsing
History dialog box
4. Click Delete to delete the
browsing history
14 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Do Not Allow the Browser to
Remember any Password
Internet Explorer Autocomplete Password
prompt
Firefox Remember Password prompt
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing File Downloads
To configure the download settings
for Internet Explorer, navigate to
Tools Internet options go to
Security tab
Click the Custom Level button in the
Security Settings window
In the Downloads menu Enable the
Automatic prompting to File
downloads and File download
options
Click OK to save the settings
Setting Download options in Internet Explorer
16 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Mozilla Firefox: Security Settings
Launch the Mozilla Firefox browser
Click the Tools menu item and select Options
17 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Mozilla Firefox: Security Settings
Select Security from the Options window
Check the option Warn me when sites try to
install add‐ons so that the browser prompts
before installing add‐ons to the browser
Click the Exceptions button and enter the URL into
Address of Website box and click Allow to specify
which websites are allowed to install add‐ons
Check the Block reported attack sites option to
avoid visiting malicious websites
Check the option Block reported web forgeries
to actively check whether the site being visited
is an attempt to steal personal information
Uncheck the Remember passwords for sites
option to prevent the browser from remembering
the passwords for the login pages visited
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Mozilla Firefox: Privacy Settings
Select Privacy in the Options
window
The user can choose if Firefox
remembers the browsing history
Click clear your recent
history
Select the Time range to clear
the history
Check the options required to
clear the history and click
Clear Now
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing File Downloads
Do not accept file downloads from unknown
members on the Internet
These downloads may contain malware that will
degrade computer performance
File are downloaded by default to My
Documents Downloads
The user may configure the browser settings
so that he/she is prompted to specify the
location to save the file
20 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing File Downloads
To configure the download
settings for Mozilla Firefox,
navigate to Tool Options
General
Check the option Always ask me
where to save the file to allow
the browser to ask before
downloading a file and to
specify the location to which it
will be downloaded
The browser directly downloads
Setting Download options in Mozilla Firefox the file to the default location
without any intimation if this
option is unchecked
21 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Installing Plugins
The Install Missing Plugins message appears while opening
1 some websites
Plug‐ins are required to display files, graphics or play a video
2 on a webpage
Check if the source of missing plug‐ins is trustworthy or
3 not
Scan the downloaded plug‐in using an antivirus software
4 before installing it
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Google Chrome Privacy and
Security Settings
Launch Google Chrome
Click the icon, then
select Options
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Google Chrome:
Privacy Settings
Click the Under the Hood tab in Google
Chrome Options window
Under Privacy, check the desired web
services
Check the Use DNS pre‐fetching to
improve page load performance option
DNS pre‐fetching stands for Domain Name
System pre‐fetching
When the user visits a webpage, Google
Chrome can look up or pre‐fetch the IP
addresses of all links on the webpage
Check the option Enable phishing and
malware protection to prevent the
browser from opening any malicious
websites
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Google Chrome: Security Settings
Secure Sockets Layer (SSL) is an Internet
protocol used by many websites to
ensure safe data encryption and
transmission
The SSL setting in web browsers is
turned on by default
Some websites require older version of
SSL 2.0; check the Use SSL 2.0 option in
such conditions
Check the check for server certificate
revocation option to turn on real‐time
verification for the validity of a
website's certificate
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Apple Safari: Security Settings
Launch the Safari browser
To change the settings, select the icon and then select Preferences
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Apple Safari: Security Settings
Select the Security tab in the
preferences window
The Web Content section
permits the user to enable
or disable various forms of
scripting and active content
It is recommended to accept
cookies only from the sites
visited
Checking this option allows
the browser to warn the
user before opening any
website that is not secure
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Testing the Browser
for Privacy
Launch the Internet browser and
navigate to http://privacy.net/
analyze/ to test the privacy
Click Click here to take the browser
test and analyze the privacy of your
Internet connection
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Internet Security Child Online
Laws Safety
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instant Messaging (IMing)
Instant Messaging (IMing) allows the user to interact with other people on
the Internet using a software application
30 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instant Messaging Security Issues
IMWorm
A worm that harms the computer and locates all the
contacts in the IM address book
The IMWorm tries to send itself to all the contacts in the
user’s IM contact list
Social Engineering
Social engineering depends on human interaction that
involves tricking people through IM and getting their
personal information
Spam over IM( SPIM)
SPIM is spam delivered through IM instead of delivering
it through email
IM systems such as Yahoo! Messenger, AIM, Windows
Live Messenger, and chat rooms in social networking
sites are popular targets for spammers
31 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instant Messaging Security Measures
Do not reveal personal information
on IMs
Do not accept links received from
unknown people on IM
Block the users who send unsolicited
web‐links
Always use strong passwords
Sign out of the IM application after
using it
Do not check the Remember
password option
32 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Searching on the Web
Search engines display
hundreds of results for a Not all the web page results
search query obtained by the search
engine are secure
To filter the malicious search
results, use an antivirus To add Add‐ons in the
application as an add‐on to Mozilla Firefox browser,
the browser and Enable it navigate to Tools Add‐ons
Get Add‐ons
33 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Internet Security Child Online
Laws Safety
34 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Gaming and MMORPG
Online gaming has become a
popular pastime, especially due
to high‐speed Internet and
MMORPGs are popular emerging technology It has also become the target
worldwide and the revenues for attackers for the large
for these games are well amounts of money involved
over a billion dollars
Massively Multiplayer Online Role‐
Playing Game (MMORPG) is a type
of computer role‐playing games in
which a large number In the world of MMORPGs, also known
of players interact with one another as online games, players can meet other
within a virtual game world players, become friends, engage in a
battle, fight against evil, and play
35 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Gaming Risks
Interactions with
potential fraudsters who Computer intruders
may trick the gamer to exploiting security
reveal personal/financial vulnerabilities
information
Malware such as viruses,
Trojan horses (Trojans), Online and real‐world
computer worms, and predators
spyware
36 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Insecure or Compromised Game Servers
and Game Coding
If the software at the game server is compromised,
the computers that are connected to the server can
also be compromised
Any game with a network connection has a risk
involved
The attacker may even use the vulnerabilities to
crash the gaming server
The vulnerabilities in the game server can be used by the
attackers to:
Steal game passwords
Steal information from the gamers’ computers
Control the gamers’ computers remotely
Launch attacks on other computers
Install programs such as Trojans, adware, spyware
The game code is generally not as well analyzed as the
other software coding
This may result in introducing unknown vulnerabilities
onto the computer
37 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Social Risks
The attackers may use the social interaction in the online game environment to
attack the unprotected computers or to exploit security vulnerabilities
Social Engineering Virtual Mugging
Identity Theft Cyber Prostitution
Protection Schemes
38 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Social Engineering
Attackers may trick the gamers into installing malicious
software on their computers by social engineering
They offer a bonus or help in the game in exchange for
other players’ passwords or other information in the
game forums on a game server
The gamers who are looking for ways to make the play
easier respond to such offers
Attackers send phishing emails supposedly from
the game server administrators, which will invite the
player to authenticate his/her account via a website
linked in the message
Note: Game Masters (GMs) of a game will never ask a gamer for his/her username and/or password
39 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Message from a Gamer About a Password
Stolen by a Malicious Program
http://www.securelist.com
40 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Protection Schemes, Cyber Prostitution,
and Virtual Mugging
Protection Cyber Virtual
Schemes Prostitution Mugging
41 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How the Malicious Users Make Money
Stolen items such as passwords or virtual items are put on sale on websites, such as eBay, or on forums
These are sold to other gamers for real or virtual money
The cyber criminal may ask the gamer for ransom in return for this information
http://www.securelist.com
42 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Security Practices Specific
to Gaming
43 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Recognize Administrator Mode Risks
1 2 3
44 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Recognize Risks due to ActiveX
and JavaScript
Some of the games played
over the web require
ActiveX or JavaScript to be
enabled
45 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Play the Game, Only at the
Game Site
Play the games at the This reduces the risk
game site and save of visiting a malicious
the Internet Once done with website when playing
browsing for later playing the game, a game
switch to the user
account to browse
the Internet
46 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Pay Attention to Firewall
Management
Playing certain multiplayer games may require the
firewall settings to be changed to allow information
from the game to get through to the gamers’ computers
Every time the permissive settings are changed
on the firewall, the risk of computer security
concerns increases
In the firewalls, the gamer can designate the fellow
gamers’ IP addresses as trusted to avoid any interactions
with the attacker
47 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Internet Security Child Online
Laws Safety
48 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Risks Involved Online
The risks involved when a child works
online include:
Misdirected searches
Stealth sites and misleading URLs
Online sexual harassment
Child pornography
Grooming
Cyberbullying
49 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Misdirected Searches
Parents may take all the precautions to protect the child online, but all that could
1 be negated when the child is unconsciously led to visit harmful sites
2 Search engines use terms known as “meta variables” to index a website
When a user searches for websites, the search engines display the results using
3 the meta variables
Example: a sports website may be indexed by the meta terms “soccer”,
“football”, “scores”, etc.
Porn site promoters add popular search terms to their meta variable list, to redirect
4 the web traffic towards their site
Porn sites may use the words “sports”, “school”, “movies”, etc., to lure children
5 to their websites
Unless a filtering software is used, the search engines cannot distinguish between
6 the search requests of an adult and a child
50 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Stealth Sites and Misleading
URLs
Pornographic sites use
Pornographic websites
common typo errors to
thrive on increased web
lure visitors to their
traffic
websites
Porn site promoters buy
Children may end up at a
domain names such as the
pornographic website just by
“.com” equivalent of a “.gov”
typing
or a “.org” website, being
“www.whitehouse.com”
aware that web surfers would
instead of
end up at their website if
“www.whitehouse.gov”
there is a typographical error
51 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Child Pornography, Grooming, and
Cyberbullying
Child Pornography Grooming Cyberbullying
52 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Role of the Internet in Child Pornography
The Internet provides easy access to huge quantities of pornographic materials
It ensures complete anonymity and privacy
Various web services such as emails, newsgroups, and chat rooms facilitate the
sharing of pornographic materials
It provides a cost‐effective medium for the transfer of pornographic
materials
It enables people with an Internet connection to access pornographic
materials at any time and anywhere
It supports transfer of pornographic materials in various formats that can be
stored on different digital storage devices
53 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Effects of Pornography on Children
They experience mental
Child victims suffer weakness such as:
from depression, anger,
withdrawal, and other Guilt and feeling
psychological problems responsible for the
abuse and betrayal
Physical injuries due to
molestation, such as A sense of
genital bruising or powerlessness and
exposure to sexually worthlessness
transmitted diseases
Low self‐esteem
54 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Risks Involved in Social Networking
Websites
People on the social networking websites can view the profiles,
photos, and videos of other people on that website
The child may provide too much information on a social
networking website
Online predators may get information such as email IDs,
telephone numbers, residential address, hobbies, interests
and more from their profile
Online predators may use this information for cyberbullying,
identity theft, or cyber exploitation
55 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Unsolicited Emails
Online predators may
use email techniques
to steal information
from children
They may send spam emails The child may even be
that contain pornographic asked to register on that
materials or links to website by providing
pornographic websites personal information
56 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Chat Rooms
Online predators may use chat
rooms to build contacts with
children and then lead them into
cyber prostitution
Online predators may use
social engineering techniques
to get personal information
from children in a chat room
They may also use chat rooms
to sends links to websites with
inappropriate content, such as
pornography
They may also send malicious
links to children, which may
result in the computer getting
infected with malware
57 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Finding if Children are at Risk Online
The parent can find if their children are facing any online threats from the following symptoms:
The child spends more time sitting at the computer
Pornographic material is present on the child’s computer
The child receives phone calls and/or gifts from unknown
persons
The child turns off the monitor or quickly changes the
screen when the parent enters their room
The child looks depressed and does not show any interest in
talking with family or friends
58 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Protecting Children from Online
Threats
Ensure that the child knows about dangers Check credit card statements each
of computer‐sex offenders month for any unusual charges that may
Monitor what the child does on the indicate unauthorized purchases by a
computer stranger or your child
Use caller ID on phones to determine who is Notify the police if someone the child
calling the child, and block numbers that met online starts calling them, sends
are suspicious gifts, or trying to lure them for revealing
sensitive information
Monitor the child's access to all types of live
electronic communications such as chat Ensure that the child does not:
rooms, instant messages, Internet Relay Provide personal information such as
Chat, etc. name, address, phone, school name
Restrict access to the malicious and porn Meet anyone online without
websites using Internet content filtering permission
software Open emails from unknown senders
If the child is maintaining a social Share their photos/videos with
networking profile, look closely at what strangers over the Internet
information they have posted in their
member profiles and blogs, including
photos and videos
59 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Encourage Children to Report
The parents should encourage their children to
report any inappropriate behavior they may face
online
The parents can encourage the child to come to
them if they are being bullied or are facing online
predators
The children may also be encouraged to speak to a
trusted individual such as an aunt, uncle, or older
sibling, if they are uncomfortable talking to the
parents
60 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Report a Crime
Internet crimes can be
reported at
http://www.ic3.gov/comp
laint/default.aspx by
clicking Report Internet
Crime
http://www.ic3.gov
61 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Security Software for Protecting Children from Online
Threats
Children can be protected from online threats by installing appropriate security software on
the child’s computer
The features that a parent should look for in the software include:
Web blocking IM features
To help in recording and monitoring the IM chats of the child,
To help prevent the child from viewing thus help the parent in determining if the child is engaged in
inappropriate content an inappropriate dialogue with unknown persons
Program blocking Usage reports
To help block games, peer‐peer file To provide a timely report on the child’s Internet usage and IM
sharing, etc. history to monitor the child’s online interactions
Email blocking Video filtering
To help block unknown email addresses and To ensure that the child does not view inappropriate videos on
prevent children from communicating with sites such as YouTube, but at the same time allow the child to
people they met online, through email view useful/fun videos
Time limits Social networking features
To help in recording and monitoring the content that the child
To help control the amount of time the child posts online, and to determine if the child is being bullied
spends on the computer online
62 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
KidZui
KidZui is a free web
browser, search engine,
and online playground for
kids
It has a large number of
games, websites, videos,
and photos reviewed by
parents and teachers
It eliminates the need for
parents when kids are
online
http://www.kidzui.com
63 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Actions To Take When the Child
Becomes an Online Victim
Ignore any contact from the
online predator or cyberbully
Report the offense to the
Encourage the child not to
Internet Service Provider
log into the website where
(ISP)
bullying occurred
Also report to the offender’s ISP
Change the online Block the offender’s email
information of the child and address and screen name so
delete the social networking that they cannot contact the
accounts if necessary child anymore
64 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
Internet Security Child Online
Laws Safety
65 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Laws
The web space is a vast terrain and with plethora of e‐commerce sites, analytical sites, sports sites,
information sites, business sites, etc.
Such a large domain requires supervision to protect the netizens from Internet criminals, attackers, etc.
Internet laws protect the users from immoral/indecent acts, privacy breach, etc., on the Internet
66 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
USA PATRIOT Act
USA PATRIOT (Uniting and Strengthening Section 212 of the act allows the ISPs to
America by Providing Appropriate Tools voluntarily disclose the customer
Required to Intercept and Obstruct Terrorism, information including the customer records
USAPA),was passed on October 26, 2001 and all electronic transmissions (email,
voice transmissions)
TITLE II‐Enhanced Surveillance Procedures,
section 216 of the Patriot act, gives law The ISPs may choose to reveal the
enforcement authorities access to dialing, customer information if they believe that
routing, and signaling information there is risk of death or bodily injury to an
individual/group
According to the act, law enforcement
authorities have access to the email packets Section 220 of the act allows for
(includes email content) nationwide search warrants for email
Under the act, the government can compel This gives the authorities the right to
the ISP to release the subscriber information search a suspect without having to go to
that includes: the place of the ISP
Customer name
Customer address
Mode of payment
Credit card information
Bank account information
67 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Children’s Online Privacy
Protection Act (COPPA)
The COPPA is relevant to the online collection of The privacy policy should include:
personal information from children below the age The name and contact information of all the operators
of 13 collecting/maintaining the personal information
The act dictates: The kind of personal information that will be collected
What a website owner must include in the privacy How the operator intends to use the personal information
policy
Whether the operator releases the personal information
When and how the verifiable consent can be requested to third parties
from the parents
If the parents’ consent is required for releasing the
The responsibility of the website owner in protecting
information to third parties
the children’s online safety and privacy
The procedure that the parents should follow to control
Every operator of a website or online service who their children’s personal information
collects the personal information of children,
knowingly, must comply with COPPA According to the act, the operator should:
The operator must include a link to the privacy Notify the parents that he/she intends to collect their
children’s information
policy of the website on the home page
Ask for the parents’ consent before releasing the
information to the third parties/public disclosure
Inform the parents about the internal use of the personal
information
Inform the parents if there are any changes in the privacy
policy
68 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
The Digital Millennium Copyright
Act
The European Union
The Digital Millennium
Copyright Directive
Copyright Act (DMCA)
(EUCD) addresses some of
1998 was signed into
the same copyright
law by President
infringement issues as the
Clinton
DMCA
According to the act, any
infringement of the copyrighted
material is a criminal offense
69 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Highlights of DMCA
Circumventing any anti‐piracy measures built into commercial software is a crime
Bans the production, sale, or distribution of code cracking tools to illegally copy software
Permits the cracking of copyright‐protected software to perform encryption research and test
computer security systems
Nonprofit libraries, educational institutions, etc., are exempted from the act under certain
circumstances
ISPs are exempt for simply transmitting information over the Internet
ISPs are, however, required to remove the copyright‐infringing materials from user websites
Webcasters are required to pay licensing fee to the recording companies
70 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CAN-SPAM Act
The CAN‐SPAM act was signed into Requirements
law by the U.S. President George W.
Do not use false or misleading email
Bush on December 16, 2003
header information
The act establishes the standards for
If the message is an advertisement,
sending commercial email
you are required to disclose it
The CAN‐SPAM act: clearly
Defines the rules for commercial email You should tell the recipients how
Establishes the requirements for they can opt out of receiving further
commercial messages emails from you
Gives recipients the right to have the You should honor the recipients opt‐
sender stop emailing them out request within 10 business days
Each email that violates CAN‐SPAM act If a third party is sending emails on
is subject to penalties of up to your behalf, monitor what they are
$16,000 sending to the recipients
71 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Computer Misuse Act 1990
The Computer Misuse Act 1990 is an act of the UK Parliament
The act makes certain activities The act defines three computer
illegal such as: misuse offenses:
Hacking into other users’ computers Unauthorized access to computer material
Misusing software Unauthorized access with intent to commit
Helping an attacker gain access to or facilitate commission of further offenses
secured files/documents in another Unauthorized modification of computer
user’s computer material
72 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
European Union Data Protection
Directive (95/46/EC)
The 95/46/EC directive provides guidelines to European Union member states for individuals’ privacy and
data protection
The directive regulates the processing of personal data regardless of whether such processing is
automated or not
Section 1of the directive provides the principles relating to data quality, section 2 provides criteria for
making data processing legitimate and section 5 defines the data subject's right of access to data
According to section 1 of the directive, Member States shall provide that personal data must be collected
for specified, explicit and legitimate purposes and not further processed in a way incompatible with those
purposes
Section 2 states that Member States shall provide that personal data may be processed only if the data
subject has unambiguously given his consent
Section 5 states that Member States shall guarantee every data subject the right to obtain from the
controller without constraint at reasonable intervals and without excessive delay
73 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Data Protection Act 1998 (UK)
Personal Data Right To Privacy
Data Protection Act 1998 It protects people's
defines UK law on the fundamental rights and
processing of data on freedoms and in particular
identifiable living people and is their right to privacy with
the main piece of legislation respect to the processing of
that governs the protection of personal data
personal data in the UK
Data must not be disclosed to It is an offence for other parties
other parties without the to obtain this personal data
consent of the individual whom without authorization
it is about, unless there is
legislation or other overriding
legitimate reason to share the
information
74 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary
Internet security involves protecting user’ data and information from unauthorized access when
connected to the Internet
Scan the file downloads with updated antivirus software to check for the presence of malware
Online gaming has become a popular pasttime, especially due to high‐speed Internet and emerging
technology
If the software at the game server is compromised, the computers that are connected to the server
can also be compromised
Parents may take all precautions to protect the child online, but all that could be negated when the
child is unconsciously led to visit harmful sites
Children can be protected from online threats by installing appropriate security software on the
child’s computer
Internet laws protect users from immoral/indecent acts and privacy breach on the Internet
Knowing the Internet laws helps the users to understand what they can and cannot post on the
Internet
75 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Security Checklists
Regularly update your operating system and other installed
applications
Set up a firewall to control the flow of information
Ensure that you have the latest web browser installed on
the system and update it regularly
Install a safe browsing tool that warns about reported phishing sites
and blocks access to the addresses
Ensure that you are connected to a secured network when using a
wireless network
Never respond to unsolicited email offers or requests for
information
76 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Security Checklists
Do not click the links sent by unknown users
Do not download files from unknown sources
Do not give out personally identifiable information when registering
with websites/applications
Do not click any pop‐ups that appear while browsing websites
Regularly scan your system for viruses, worms, Trojans, spyware, key
loggers and other malware using antivirus
Update the antivirus application on a regular basis
77 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Security Checklists
Use strong passwords and change them at regular intervals
Disconnect from the Internet if anything suspicious is found on the
computer
Always check the Address bar for correct URL
Always check the website certificate, SSL padlocks and HTTPs
Do not enable ActiveX and JavaScript features
Regularly back up the important files
Remove unnecessary protocols from the Internet interface
Check router or firewall logs to identify abnormal network
connections to the Internet
78 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Checklist for Parents to
Protect Their Child from Online Threats
Talk to children about what they do on the computer
Get a profile on the social networking site the child is on
Review the list of the child’s friends
Be informed of the challenges of social networking
Check if anyone is trying to impersonate the child online
Encourage the child to use the child safe applications such as KidZui
79 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.