Internet Security
Internet Security
Module 6
Simplifying Security.
1 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
May 18, 2011 1:15 AM CDT
2 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Objectives
Internet Security Online Gaming Risks
Internet Explorer Security Settings Security Practices Specific to Gaming
Child Online Safety
Mozilla Firefox Security Settings
Role of Internet in Child Pornography
Google Chrome Security Settings
Protecting Children from Online
Apple Safari Security Settings Threats
Instant Messaging (IMing) How to Report a Crime?
Searching on the Web Internet Security Laws
Internet Security Checklists
Online Gaming and MMORPG
3 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
4 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Security
Internet security involves
protecting user data from
Top 10 Malware Hosting Countries
unauthorized access and damage
when connected to the Internet
Ukraine 1.97%
Hungary 1.84%
http://www.findmysoft.com
5 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security Settings
Launch Internet Explorer, click the Tools button, and select Internet options
Select the Security tab, which displays websites classified into four zones:
1. Internet 2. Local Intranet 3. Trusted sites 4. Restricted sites
6 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Internet Zone
The Internet zone is for all the Internet
websites except for those listed in the
Trusted or Restricted zones
Click Custom level to set the Internet
zone security settings
Disable or enable the required options
Move the slider to change the security
level
Set the security level for the zone High
to ensure higher security
Maintaining the higher security level
may degrade the performance of the
browser
Click OK to apply the settings
7 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: ActiveX Controls
ActiveX controls are small programs that work
over the Internet through the browser
They include customized applications that are
required to gather data, view select files, and run
animations when the user visits websites
Malware is downloaded onto the user system
through ActiveX controls when he/she visits
malicious websites
Disable the ActiveX controls and plug‐ins options
in the Security Settings window
Enable the Automatic prompting for ActiveX
controls option so that the browser prompts
when there is a requirement of ActiveX controls
and plug‐ins to be enabled
Click OK to apply the settings
8 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Local Intranet Zone
Local intranet
Local
intranet
9 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Trusted Sites Zone
10
Copyright © by EC-Council
All Rights
Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Security
Settings: Restricted Zone
The Restricted sites zone restricts
the access to the websites that
might cause damage to a computer
To add restricted websites to
Restricted sites zone:
Select the Security tab and choose
Restricted sites
Click the Sites button
Enter the site URL into the Add this
website to the zone column to
restrict the access
Click Add and then click OK to apply
the settings
11 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Understanding Cookies
A cookie is information that is provided by a web server to web browser and then sent back
unchanged by the browser each time it accesses that server
When the website is revisited, the browser sends the information back to it to help
recognize the user
This activity is invisible to the user and is generally intended to improve the web surfing
experience (for example, at an online store)
12 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Explorer Privacy Settings
The user can limit the information
that is stored in a cookie
A cookie is only a text file and cannot
search a drive for information or
carry a virus
To configure cookie settings:
Choose Internet options from the Tools
menu on the browser
Select the Privacy tab and use the slider
to set the level at low, medium,
medium‐high, or high
Block all or accept all cookies
depending upon the requirement
Check the Turn on Pop‐up Blocker option
to block the pop‐ups that appear while
visiting some websites
13 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Deleting Browsing History
Internet options
Tools
Browsing history
Delete Browsing
History
Delete
14 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Do Not Allow the Browser to
Remember any Password
Internet Explorer Autocomplete Password
prompt
15 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing File Downloads
To configure the download settings
for Internet Explorer, navigate to
Tools Internet options go to
Security tab
Click the Custom Level button in the
Security Settings window
In the Downloads menu Enable the
Automatic prompting to File
downloads and File download
options
Click OK to save the settings
16 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Mozilla Firefox: Security Settings
Launch the Mozilla Firefox browser
Click the Tools menu item and select Options
17 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Mozilla Firefox: Security Settings
Select Security from the Options window
18 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Mozilla Firefox: Privacy Settings
Select Privacy in the Options
window
19 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing File Downloads
Do not accept file downloads from unknown
members on the Internet
These downloads may contain malware that will
degrade computer performance
20
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Securing File Downloads
21
All Rights Copyright © by EC-Council
Reserved. Reproduction is Strictly Prohibited.
Installing Plugins
The Install Missing Plugins message appears while opening
1 some websites
22 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Google Chrome Privacy and
Security Settings
23 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Google Chrome:
Privacy Settings
24 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Google Chrome: Security Settings
Secure Sockets Layer (SSL) is an Internet
protocol used by many websites to
ensure safe data encryption and
transmission
The SSL setting in web browsers is
turned on by default
Some websites require older version of
SSL 2.0; check the Use SSL 2.0 option in
such conditions
Check the check for server certificate
revocation option to turn on real‐time
verification for the validity of a
website's certificate
25 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Apple Safari: Security Settings
Launch the Safari browser
To change the settings, select the icon and then select Preferences
26 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Apple Safari: Security Settings
Select the Security tab in the
preferences window
It is recommended to accept
cookies only from the sites
visited
27 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Testing the Browser
for Privacy
Launch the Internet browser and
navigate to http://privacy.net/
analyze/ to test the privacy
Click Click here to take the browser
test and analyze the privacy of your
Internet connection
28 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
29 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instant Messaging (IMing)
Instant Messaging (IMing) allows the user to interact with other people on
the Internet using a software application
30 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instant Messaging Security Issues
IMWorm
A worm that harms the computer and locates all the
contacts in the IM address book
The IMWorm tries to send itself to all the contacts in the
user’s IM contact list
Social Engineering
Social engineering depends on human interaction that
involves tricking people through IM and getting their
personal information
31 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Instant Messaging Security Measures
Do not reveal personal information
on IMs
32 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Searching on the Web
Search engines display
hundreds of results for a Not all the web page results
search query obtained by the search
engine are secure
33 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
34 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Gaming and MMORPG
Online gaming has become a
popular pastime, especially due
to high‐speed Internet and
emerging technology
MMORPGs are popular It has also become the target
worldwide and the revenues for attackers for the large
for these games are well amounts of money involved
over a billion dollars
35 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Online Gaming Risks
Interactions with
potential fraudsters who Computer intruders
may trick the gamer to exploiting security
reveal personal/financial vulnerabilities
information
36
All Rights Copyright © by EC-Council
Reserved. Reproduction is Strictly Prohibited.
Insecure or Compromised Game Servers
and Game Coding
If the software at the game server is compromised,
the computers that are connected to the server can
also be compromised
Any game with a network connection has a risk
involved
The attacker may even use the vulnerabilities to
crash the gaming server
The vulnerabilities in the game server can be used by the
attackers to:
Steal game passwords
Steal information from the gamers’ computers
Control the gamers’ computers remotely
Launch attacks on other computers
Install programs such as Trojans, adware, spyware
37 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Social Risks
The attackers may use the social interaction in the online game environment to
attack the unprotected computers or to exploit security vulnerabilities
Protection Schemes
38
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Social Engineering
Attackers may trick the gamers into installing malicious
software on their computers by social engineering
The gamers who are looking for ways to make the play
easier respond to such offers
Note: Game Masters (GMs) of a game will never ask a gamer for his/her username and/or password
39 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Message from a Gamer About a Password
Stolen by a Malicious Program
http://www.securelist.com
40 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Protection Schemes, Cyber Prostitution,
and Virtual Mugging
Protection Cyber Virtual
Schemes Prostitution Mugging
Organized crime has Online games are being Virtual mugging was
emerged in South Korean used for cyber prostitution coined when some
gaming community where the players of Lineage II
The criminal organizations customers/gamers pay used bots to defeat
force the gamers into money for cybersex other gamers and take
protection schemes, In The Sims online, a their items; these items
where the gamers have to Massively Multiplayer were later put on sale in
pay money (virtual or Online (MMO) game, a 17‐ online auctions
real) to avoid killing of the year‐old developed a cyber
gamers’ characters and “brothel”, where the
theft of the passwords gamers paid Sim‐money
(Simoleans) for cybersex
per minute
The gamers’ accounts were
eventually cancelled
41 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How the Malicious Users Make Money
Stolen items such as passwords or virtual items are put on sale on websites, such as eBay, or on forums
These are sold to other gamers for real or virtual money
The cyber criminal may ask the gamer for ransom in return for this information
http://www.securelist.com
42 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Security Practices Specific
to Gaming
43 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Recognize Administrator Mode Risks
Some games require the Free downloads of games may Instead of using the
game to be run in contain malicious software, administrator account, the
Administrator mode including plugins to run the gamer is advised to browse the
If that is the case, ensure game Internet or play the games
that the game has been This software may be used using a User Account, which
downloaded from a to gain administrator level may deny the attacker access
trusted website/vendor control of the computer to administrator rights
1 2 3
44 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Recognize Risks due to ActiveX
and JavaScript
45 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Play the Game, Only at the
Game Site
46 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Pay Attention to Firewall
Management
Playing certain multiplayer games may require the
firewall settings to be changed to allow information
from the game to get through to the gamers’ computers
47 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
48 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Risks Involved Online
The risks involved when a child works
online include:
Misdirected searches
Stealth sites and misleading URLs
Online sexual harassment
Child pornography
Grooming
Cyberbullying
49 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Misdirected Searches
Parents may take all the precautions to protect the child online, but all that could
1 be negated when the child is unconsciously led to visit harmful sites
When a user searches for websites, the search engines display the results using
3 the meta variables
Porn site promoters add popular search terms to their meta variable list, to redirect
4 the web traffic towards their site
Porn sites may use the words “sports”, “school”, “movies”, etc., to lure children
5 to their websites
Unless a filtering software is used, the search engines cannot distinguish between
6 the search requests of an adult and a child
50 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Stealth Sites and Misleading
URLs
Pornographic sites use
Pornographic websites
common typo errors to
thrive on increased web
lure visitors to their
traffic
websites
51 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Child Pornography, Grooming, and
Cyberbullying
Child Pornography Grooming Cyberbullying
“Under federal law (18 U.S.C. “Grooming” is an act of Cyberbullying occurs when a
§2256), child pornography is befriending and establishing child, preteen or teen, is
defined as any visual depiction, emotional connection with threatened, harassed, and/or
including any photograph, film, children embarrassed using the
video, picture, or computer or Child grooming is used for Internet or mobile phones or
computer‐generated image or lessening the child’s other communication media
picture, whether made or inhibitions and preparing Cyberbullying signs:
produced by electronic, them for child abuse Upset after using the
mechanical, or other means, of computer
The offenders target children
sexually explicit conduct, where through attention, affection,
the production of the visual Refuse to step out of the
kindness and sympathy, and house or to go to school
depiction involves the use of a offer gifts and/or money
minor engaging in sexually Draws away from friends
explicit conduct” and family
‐http://www.missingkids.com
52
All Rights
Copyright © by EC-Council
Reserved. Reproduction is Strictly Prohibited.
Role of the Internet in Child Pornography
Various web services such as emails, newsgroups, and chat rooms facilitate the
sharing of pornographic materials
53 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Effects of Pornography on Children
54 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Risks Involved in Social Networking
Websites
People on the social networking websites can view the profiles,
photos, and videos of other people on that website
55 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Unsolicited Emails
Online predators may
use email techniques
to steal information
from children
56 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Chat Rooms
Online predators may use chat
rooms to build contacts with
children and then lead them into
cyber prostitution
57 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Finding if Children are at Risk Online
The parent can find if their children are facing any online threats from the following symptoms:
The child looks depressed and does not show any interest in
talking with family or friends
58 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Protecting Children from Online
Threats
Ensure that the child knows about dangers Check credit card statements each
of computer‐sex offenders month for any unusual charges that may
Monitor what the child does on the indicate unauthorized purchases by a
computer stranger or your child
Use caller ID on phones to determine who is Notify the police if someone the child
calling the child, and block numbers that met online starts calling them, sends
are suspicious gifts, or trying to lure them for revealing
sensitive information
Monitor the child's access to all types of live
electronic communications such as chat Ensure that the child does not:
rooms, instant messages, Internet Relay Provide personal information such as
Chat, etc. name, address, phone, school name
Restrict access to the malicious and porn Meet anyone online without
websites using Internet content filtering permission
software Open emails from unknown senders
If the child is maintaining a social Share their photos/videos with
networking profile, look closely at what strangers over the Internet
information they have posted in their
member profiles and blogs, including
photos and videos
59 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Encourage Children to Report
60 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
How to Report a Crime
http://www.ic3.gov
61 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Security Software for Protecting Children from Online
Threats
Children can be protected from online threats by installing appropriate security software on
the child’s computer
The features that a parent should look for in the software include:
Web blocking IM features
To help in recording and monitoring the IM chats of the child,
To help prevent the child from viewing
thus help the parent in determining if the child is engaged in
inappropriate content
an inappropriate dialogue with unknown persons
62 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
KidZui
KidZui is a free web
browser, search engine,
and online playground for
kids
It has a large number of
games, websites, videos,
and photos reviewed by
parents and teachers
It eliminates the need for
parents when kids are
online
http://www.kidzui.com
63 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Actions To Take When the Child
Becomes an Online Victim
Ignore any contact from the
online predator or cyberbully
64 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Flow
65 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Internet Laws
The web space is a vast terrain and with plethora of e‐commerce sites, analytical sites, sports sites,
information sites, business sites, etc.
Such a large domain requires supervision to protect the netizens from Internet criminals, attackers, etc.
Internet laws protect the users from immoral/indecent acts, privacy breach, etc., on the Internet
66
All Rights
Copyright © by EC-Council
Reserved. Reproduction is Strictly Prohibited.
USA PATRIOT Act
USA PATRIOT (Uniting and Strengthening Section 212 of the act allows the ISPs to
America by Providing Appropriate Tools voluntarily disclose the customer
Required to Intercept and Obstruct Terrorism, information including the customer records
USAPA),was passed on October 26, 2001 and all electronic transmissions (email,
voice transmissions)
TITLE II‐Enhanced Surveillance Procedures,
section 216 of the Patriot act, gives law The ISPs may choose to reveal the
enforcement authorities access to dialing, customer information if they believe that
routing, and signaling information there is risk of death or bodily injury to an
individual/group
According to the act, law enforcement
authorities have access to the email packets Section 220 of the act allows for
(includes email content) nationwide search warrants for email
Under the act, the government can compel This gives the authorities the right to
the ISP to release the subscriber information search a suspect without having to go to
that includes: the place of the ISP
Customer name
Customer address
Mode of payment
Credit card information
Bank account information
67 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Children’s Online Privacy
Protection Act (COPPA)
The COPPA is relevant to the online collection of The privacy policy should include:
personal information from children below the age The name and contact information of all the operators
of 13 collecting/maintaining the personal information
The act dictates: The kind of personal information that will be collected
What a website owner must include in the privacy How the operator intends to use the personal information
policy
Whether the operator releases the personal information
When and how the verifiable consent can be requested to third parties
from the parents
If the parents’ consent is required for releasing the
The responsibility of the website owner in protecting
information to third parties
the children’s online safety and privacy
The procedure that the parents should follow to control
Every operator of a website or online service who
their children’s personal information
collects the personal information of children,
knowingly, must comply with COPPA According to the act, the operator should:
The operator must include a link to the privacy Notify the parents that he/she intends to collect their
policy of the website on the home page children’s information
Ask for the parents’ consent before releasing the
information to the third parties/public disclosure
Inform the parents about the internal use of the personal
information
Inform the parents if there are any changes in the privacy
policy
68 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
The Digital Millennium Copyright
Act
The European Union
The Digital Millennium
Copyright Directive
Copyright Act (DMCA)
(EUCD) addresses some of
1998 was signed into
the same copyright
law by President
infringement issues as the
Clinton
DMCA
69 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Highlights of DMCA
Circumventing any anti‐piracy measures built into commercial software is a crime
Bans the production, sale, or distribution of code cracking tools to illegally copy software
Permits the cracking of copyright‐protected software to perform encryption research and test
computer security systems
Nonprofit libraries, educational institutions, etc., are exempted from the act under certain
circumstances
ISPs are exempt for simply transmitting information over the Internet
ISPs are, however, required to remove the copyright‐infringing materials from user websites
70 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
CAN-SPAM Act
Requirements
U.S. President George W.
false misleading
Bush
commercial email
disclose it
clearly
rules for commercial email
receiving further
commercial messages emails from you
71 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Computer Misuse Act 1990
The Computer Misuse Act 1990 is an act of the UK Parliament
The act makes certain activities The act defines three computer
illegal such as: misuse offenses:
Hacking into other users’ computers Unauthorized access to computer material
Misusing software Unauthorized access with intent to commit
Helping an attacker gain access to or facilitate commission of further offenses
secured files/documents in another Unauthorized modification of computer
user’s computer material
72 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
European Union Data Protection
Directive (95/46/EC)
The 95/46/EC directive provides guidelines to European Union member states for individuals’ privacy and
data protection
The directive regulates the processing of personal data regardless of whether such processing is
automated or not
Section 1of the directive provides the principles relating to data quality, section 2 provides criteria for
making data processing legitimate and section 5 defines the data subject's right of access to data
According to section 1 of the directive, Member States shall provide that personal data must be collected
for specified, explicit and legitimate purposes and not further processed in a way incompatible with those
purposes
Section 2 states that Member States shall provide that personal data may be processed only if the data
subject has unambiguously given his consent
Section 5 states that Member States shall guarantee every data subject the right to obtain from the
controller without constraint at reasonable intervals and without excessive delay
73 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Data Protection Act 1998 (UK)
Personal Data Right To Privacy
74 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Module Summary
Internet security involves protecting user’ data and information from unauthorized access when
connected to the Internet
Scan the file downloads with updated antivirus software to check for the presence of malware
Online gaming has become a popular pasttime, especially due to high‐speed Internet and emerging
technology
If the software at the game server is compromised, the computers that are connected to the server
can also be compromised
Parents may take all precautions to protect the child online, but all that could be negated when the
child is unconsciously led to visit harmful sites
Children can be protected from online threats by installing appropriate security software on the
child’s computer
Internet laws protect users from immoral/indecent acts and privacy breach on the Internet
Knowing the Internet laws helps the users to understand what they can and cannot post on the
Internet
75 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Checklists
Regularly update your operating system and other installed
applications
Install a safe browsing tool that warns about reported phishing sites
and blocks access to the addresses
76 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Checklists
Do not click the links sent by unknown users
Regularly scan your system for viruses, worms, Trojans, spyware, key
loggers and other malware using antivirus
77 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Checklists
Use strong passwords and change them at regular intervals
78 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.
Checklist for Parents
Encourage the child to use the child safe applications such as KidZui
79 Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited.