Module 3 - Protecting Your Data and Privacy
Module 3 - Protecting Your Data and Privacy
2. Data maintenance
Protecting and preserving your data
6. Questionnaire
Test your knowledge
1
Cisco Networking Academy 2023
2
Cisco Networking Academy 2023
Your computing devices are the portal to your online life, storing much of your personal
data. Therefore, it is important to protect the security of your devices.
Select the titles for some important tips on how to do it.
Turn on the firewall
You should use at least one type of firewall (either a software firewall or a hardware
firewall on a router) to protect your device from unauthorized access. The firewall must
be activated and constantly updated to prevent hackers from accessing your personal
or organizational data.
You can click here to learn how to turn on the firewall in Windows 10, or click here for
Mac OS X devices.
3
Cisco Networking Academy 2023
Allow only essential apps and services to connect: Turn on Block all incoming
connections.
Automatically allow embedded software to receive incoming connections – Enable
Automatically allow embedded software to receive incoming connections.
Automatically allow downloaded signed software to receive incoming connections –
Turn on Automatically allow downloaded signed software to receive incoming
connections.
Make it harder for hackers and malware to find your Mac by enabling Turn on
Stealth Mode.
4
Cisco Networking Academy 2023
5
Cisco Networking Academy 2023
WPA2 encryption feature on the wireless router. But keep in mind that even with WPA2
encryption enabled, a wireless network can still be vulnerable.
Select the image to learn more about the discovery of a security flaw in the
WPA2 protocol in 2017.
KRACK: Introduction
We discovered serious weaknesses in WPA2, a protocol that protects all modern
protected Wi-Fi networks. An attacker within range of a victim can exploit these
weaknesses using key reinstallation (KRACK) attacks. Specifically, attackers can use
this new attack technique to read information that was previously assumed to be
securely encrypted. This can be abused to steal sensitive information such as credit
card numbers, passwords, chat messages, emails, photos, etc. The attack works
against all modern protected Wi-Fi networks. Depending on the network
configuration, it is also possible to inject and manipulate data. For example, an attacker
could inject ransomware or other malware into websites.
The weaknesses are in the Wi-Fi standard itself, and not in individual products or
implementations. Therefore, any correct implementation of WPA2 is likely affected. To
avoid the attack, users should update affected products as soon as security updates
are available. Please note that if your device supports Wi-Fi, it is most likely
affected. During our initial investigation, we discovered that Android, Linux, Apple,
6
Cisco Networking Academy 2023
Windows, OpenBSD, MediaTek, Linksys, and others are affected by some variant of
the attacks. For more information on specific products, please consult the CERT/CC
database or contact your vendor.
The research behind the attack will be presented at the Computer and
Communications Security (CCS) conference and the Black Hat Europe conference.
Our detailed research paper is now available for download.
October 2018 Update: We have a follow-up paper in which we generalize the attacks,
look at more handshakes, bypass official Wi-Fi defense, audit patches, and improve
the attacks using implementation-specific bugs.
7
Cisco Networking Academy 2023
It's right!
You have correctly identified that your colleague advocates poor password practices
and have improved your privacy settings. Check your progress by clicking on the icon
in the top right corner of the screen.
It is important that all of your online accounts have a unique password. Using the same
passwords leaves you and your data vulnerable to cybercriminals.
And if it becomes too complicated to remember all these passwords, you should use a
password manager. This tool stores and encrypts all your passwords and helps you log
in to your accounts automatically.
8
Cisco Networking Academy 2023
9
Cisco Networking Academy 2023
These guidelines aim to place the responsibility for user verification on service
providers and ensure a better experience for users overall. They state:
Passwords must be at least 8 characters, but no more than 64.
Do not use common or easily guessed passwords, for example, “password”,
“abc123”.
There should be no rules of composition, such as including numbers and upper and
lower case letters.
Users should be able to see the password as they type, to help improve accuracy.
All printing characters and spaces must be allowed.
There should be no password hints.
There should be no password expiration period.
There should be no knowledge-based authentication, such as having to provide
answers to secret questions or verify transaction history.
10
Cisco Networking Academy 2023
11
Cisco Networking Academy 2023
12
Cisco Networking Academy 2023
13
Cisco Networking Academy 2023
Next...
While access to your computers and network devices is secure, it's also important to
protect and preserve your data.
14
Cisco Networking Academy 2023
DATA MAINTENANCE
Step 1
15
Cisco Networking Academy 2023
Step 2
Step 3
Step 4
16
Cisco Networking Academy 2023
Step 5
17
Cisco Networking Academy 2023
Secondary location
You can copy all your data to a network attached storage
(NAS) device, a simple external hard drive, or you can
select just a few important folders to back up to USB flash
drives, CD/DVDs, or even tapes. In such a scenario, you
own and are fully responsible for the cost and
maintenance of the storage device equipment.
The cloud
You can subscribe to a
cloud storage service, such as Amazon Web Services
(AWS). The cost of this service will depend on
how much storage space you need, so you may
need to be more selective about what data you back
up. You will have access to the backup as long as you
have access to your account.
One of the benefits of using a cloud storage service is
that your data is safe in case a storage device fails or if you experience an extreme
situation, such as a fire or theft.
18
Cisco Networking Academy 2023
No, the photos are simply inaccessible from the operating system
It's right!
When you move a file to the Recycle Bin and permanently delete it, the file cannot be
accessed from the operating system alone. Anyone with the right forensic tools can
recover the file because of the magnetic trail it leaves on the hard drive.
So how do you ensure that deleted data can no longer be recovered? Let's see!
19
Cisco Networking Academy 2023
Next...
Take a moment to consider where you store your data. Is it backed up and encrypted?
Why not put some of the information in this topic into practice and keep your valuable
information safe and secure?
You should also be aware of how your personal data will be handled when you enter
into a service agreement with an online service provider.
20
Cisco Networking Academy 2023
LAB
Who owns your data?
A contract that describes the services you expect to receive from the service
provider and how you will use their service
An informal agreement that sets out the rules of the relationship between you, the
service provider, and other people who use the service
A legally binding contract that governs the rules of the relationship between
you, the service provider, and others who use the service.
21
Cisco Networking Academy 2023
It's right!
Terms of Service, also known as Terms of Use or Terms and Conditions, are a legally
binding agreement that governs the rules of the relationship between you, your
provider, and others who use the service.
Scroll down to learn more about what is included in the Terms of Service.
Privacy Policy
Privacy settings allow you to control who sees information
about you and who can access your profile or account data.
22
Cisco Networking Academy 2023
You have successfully created the @Apollo account and agreed to the online photo
sharing company's Terms of Service. But do you really know what you've signed up
for?
Let's look at this in more detail.
You no longer own your content and the photo sharing company can reuse any of
your content, but only under specific circumstances.
The content is yours, but the company may reuse any of your content for any
purpose.
You own your content and the photo sharing company must obtain permission to
reuse your content.
No one will be able to see information about you or access your profile until you
change your preferences in your privacy settings.
23
Cisco Networking Academy 2023
Anyone will be able to see information about you and access your profile
until you change your privacy settings.
Now that you've looked at it more closely, do you still agree with all of these terms?
24
Cisco Networking Academy 2023
Answer. To protect your data and secure your account, you must:
Always read the Terms of Service when signing up for a new service and
decide whether it is worth giving up your rights to your data for the service.
select your privacy settings instead of accepting the default settings
limit the group of people you share content with
Review the service provider's security policy to understand what they are doing
to protect your data
change your passwords periodically, use a complex password and two-factor
authentication to protect your account.
Next...
Paying attention to the Terms and Conditions before signing up is just one way to
protect your data. Let's look at what else you can do to help protect your privacy online.
25
Cisco Networking Academy 2023
Be careful!
Even with two-factor authentication, hackers can still
gain access to your online accounts through attacks
such as phishing, malware, and social engineering.
26
Cisco Networking Academy 2023
series, which will help him develop his career. However, you must log in to the
eLearning portal to do so.
Birthdate
27
Cisco Networking Academy 2023
Email address
It's right!
She shared just the right amount of information and improved her online privacy
settings. Click the icon in the top right corner to check your progress.
To protect your privacy on social media, it is important to share as little personal
information as possible. You should check your social media settings to allow only
people you know to see your activities or participate in your conversations.
The more personal information you share online, the easier it is for someone to build a
profile of you and take advantage of you online or off.
28
Cisco Networking Academy 2023
generic piece of spam, it is an email from your boss with your company's signature. It is
written in the voice of the boss. This is what he would say if he wrote this.
What about the malware itself? How does that work?
Someone else out there has already written the code that performs the attack. I only
use it in the attachment. My skill is in my ability to get a lot of people to click on that
attachment. I always wonder what it's like when everything starts happening from the
other side, when the panic begins.
[Answering Machine] Please leave your message after the beep. (The machine
beeps.) Hi, this is Rajeed from finance, call me as soon as you get this, something is
wrong with my laptop. I can't— Hey, are you on your way to the office? Something's
going on with our file servers. I'm Karen from HR, our monitoring panel is very slow, we
are receiving calls from users on it. Can you call me when you hear this? Joining the
conference now. Apparently, there is a malware patch targeting our headquarters – It’s
ransomware, they are holding us hostage. We're all locked down, I can't even check
my phone.
What about backups?
That will take days. We need you to fix it now! Just pay the ransom, we have no choice.
We are reporting earnings in two hours. But how do we know it's going to— Just pay it!
Put each person in charge to get us back up and running. Now it is the only priority.
Okay, it's done. I have the decryption key. Mark, we have a big problem. The
ransomware was just there to distract us. They came in, they have everything.
Customer data, finances, everything!
[Male News Anchor 2] Qualicart is reeling today from news that hackers have
published the personal information of nearly two million ---
[Female News Anchor] The NASDAQ closed lower today, led by Qualicart, which fell
14% on news that its recent data breach may be much worse than the company
originally acknowledged.
[Male News Anchor 3] Shares fell to a new all-time low on news that CEO Mark
Hanning is stepping down, following what turns out to be one of the worst breaches of
personal information in recent history.
Do you feel bad about disclosing personal information?
All the finances, all the money was lost. All I did was get the files. I'm not the one who
decided to release them, I'm not the one who shorted the shares. Someone else has
their reasons for that, it's above my pay grade. I was paid to do a job and I did it well.
And that's what's expected of everyone, isn't it? The markets are rebounding anyway.
29
Cisco Networking Academy 2023
30
Cisco Networking Academy 2023
others from collecting information about your online activities and trying to tempt you
into purchasing something with targeted ads.
Even with private browsing enabled and cookies disabled, companies develop different
ways to identify users to collect information and track user behavior. For example,
intermediary devices, such as routers, may have information about the user's web
browsing history.
Next...
Finally, it is your responsibility to protect your data, your identity and your computing
devices. So, next time you're sending an email or surfing the Internet, why not check
that you're following all the guidelines outlined in this module? Just a few precautions
can save you trouble in the future.
Let's see if you can spot risky online behavior.
31
Cisco Networking Academy 2023
LAB
Discover their risk-taking behavior
online
3.5.1 Scenario 1
This is a media player component. Select the play/pause button to watch or listen.
Do you know what information is safe to share on social media sites?
Press the play button to watch the video.
Description: A computer screen shows a social media website with a picture of a
beach and a "post" button. The words “Finally on vacation!!!” are written as a caption
above the image.
Narrator: Always limit the amount of information you share online.
Description: A red triangle containing an exclamation point appears, giving a
"danger" warning signal.
Narrator: Think about what data you are going to share about yourself. Could it be a
threat?
Description: The camera zooms out to show the entire team. A loading progress line
connects the computer to a World Wide Web (www) icon and then connects to a
hooded character sitting in front of a laptop with a "skull and crossbones" symbol.
32
Cisco Networking Academy 2023
Narrator: Posting something containing your address along with a recent vacation
photo of yourself could be an invitation for criminals to target your home.
Description: The view returns to the computer still showing the social media website
with the beach image and the title “Finally on vacation!!!”. The mouse pointer clicks on
the “Publish” button and it loads on the web page.
Narrator: Remember that a social media post can spread quickly because it can be
shared over and over again with people you don't know.
It's amazing what people post on social media without thinking! Which of the following
options do you think represents a risk if posted on social media?
Select three correct answers and then Submit.
33
Cisco Networking Academy 2023
It's right!
Photos that show bank details or valuable information about assets and vacations
always put you at risk, especially when you have already given clues about where you
live or where you are going to visit. Always stop and think about what you are about to
post, would you say it to a complete stranger?
3.5.2 Scenario 2
When creating a new account on an online service, what password do you use? Is it
safe?
Press the play button to watch the video.
Description: A computer screen appears showing different login screens. A hidden
password is entered in each login box.
Narrator: For every online service you use, you should use a unique, strong password.
Description: Mouse cursor clicks on the “Login” button on the @Apollo login screen.
The hidden password turns red and an error message appears saying “It appears this
data is incorrect. Please try again."
Narrator: Memorizing a lot of passwords can be a challenge, but writing them down
would be a security nightmare if someone had access to them.
Description: The camera zooms in on the @Apollo login screen, which resets and a
"Password Manager" dialog box appears next to a lock icon at the top right of the
computer screen.
Narrator: Instead, you should start using some password management apps.
34
Cisco Networking Academy 2023
Description: The mouse cursor clicks on an arrow symbol next to the word @Apollo in
the Password Manager dialog box. Username and password information is seen by
filling in the login fields.
In your own words, describe what a password manager app is, how they work, and why
they are beneficial. If you have already used a password manager, please describe
some details and share your experience.
Type your ideas in the box and then submit. Select Show Answer to check your
answer. (500 Characters remaining)
3.5.3 Scenario 3
This is a media player component. Select the play/pause button to watch or listen.
Connecting to an open Wi-Fi hotspot can make your system and data vulnerable to
attack.
Press the play button to watch the video.
Description: Three circles appear containing images of hands using a mobile phone,
a woman sitting in front of a computer, and hands typing on a keyboard.
Narrator: Being online has become an essential part of our daily lives.
Description: The camera zooms in on the woman sitting in front of a computer. The
screen displays a “Connect to Wifi” login box for the CoffeshopWiFi network. A hidden
password is entered and the mouse cursor clicks on the “Connect” button.
35
Cisco Networking Academy 2023
Narrator: However, we should all think twice before connecting to the Internet through
an open public Wi-Fi hotspot.
Describer: Camera pans out to show woman sitting in a coffee shop setting while
accessing the @Apollo website. A hooded figure sits in front of a computer at a nearby
table. The screen moves to focus on the hooded figure and a “Sensitive Information
Download” box appears with a loading bar showing the progress of the download.
Narrator: It may be hosted by an attacker who will have access to the data you are
transferring.
Description: The screen is split into four sections as the progress bar in the
“Downloading Confidential Information” box turns red before completing and says
“FAILED.” In the other areas of the screen, the hooded figure can be seen, along with
the woman in the cafe and a “Connect to VPN” login box.
Narrator: Try using a VPN to provide a layer of security over insecure open Wi-Fi and
only access websites via HTTPS.
Description: The mouse cursor clicks to connect to the VPN and the screen returns to
the woman sitting in the cafe once again as she accesses the @Apollo website as a
VPN user. The URL address https://www.apollo.com can be clearly seen.
@Apollo sales manager travels to meet a client. He forgot to download the
contract from the @Apollo server to take to the meeting with her. The train has
an open WiFi network. He contacts you to ask what he should do. What would
you advise?
You should use your phone's 4G connection to find an alternative open Wi-Fi
network.
You should access the train's open Wi-Fi network and connect to the @Apollo
servers using the VPN connection on your work laptop.
36
Cisco Networking Academy 2023
You must wait until you arrive at the client's office and request the access
code to their Wi-Fi network, then access the @Apollo service directly on your
work laptop.
You should forget about the contract for the meeting and catch up on other work
online by using the train's open Wi-Fi to access the https websites you need.
It's right!
The sales manager can use the VPN connection on his laptop to create a secure,
encrypted channel back to @Apollo, in addition to the untrusted open Wi-Fi network.
This way, all your laptop traffic will be safely transferred through the secure VPN
tunnel.
3.5.4 Scenario 4
This is a media player component. Select the play/pause button to watch or listen.
Do you know the risks of downloading a trial version of a program?
Press the play button to watch the video.
Description: A computer screen appears showing a progress loading bar titled "Test
Install." A red triangle containing an exclamation point appears indicating a hazard
warning,
Narrator: Installing apps on your device from untrusted sources is a huge security risk.
Description: A gremlin icon appears in the center of the computer screen and
several folder icons on the left side start displaying "No Entry" symbols.
Narrator: How do you know the app doesn't come with malware?
Description: A pop-up appears in the top right corner of the screen that says “You
have 5 new messages.”
Narrator: Can you take the risk?
Description: A mouse cursor clicks on the pop-up window and a mailbox opens
displaying several emails with subject lines related to hacking and data security
breaches:
URGENT: Your online bank account has been hacked.
URGENT: Your social media accounts have been closed.
IMPORTANT: Your fraudulent activity is being investigated.
URGENT: Please contact regarding your online account.
EMERGENCY ACTION REQUIRED: You are a victim of identity theft!
Narrator: Can your organization afford the risk?
37
Cisco Networking Academy 2023
No, the designer should consult with a member of the IT team before
installing any application from an untrusted source.
Yes, the design manager considers the risk to be low, so it must be correct!
No, the designer must purchase the trusted application from the conventional
software vendor and pay for it with his own money.
It's right!
The designer should consult with a member of the IT team before installing any
application from an untrusted source, even if a manager recommended it. No
organization can afford to risk a cyberattack by installing applications from an untrusted
source.
3.5.5 Scenario 5
This is a media player component. Select the play/pause button to watch or listen.
Have you ever received a warning message telling you to download a diagnostic
program to ensure the safety of your computer? You must be aware of the risks.
Press the play button to watch the video.
Description: A computer screen appears displaying a pop-up box with the message:
'Your computer has been infected with a virus and your computer is at risk. Download
A++ Premium Antivirus Software Now to Prevent Damage to Your Files. Red warning
triangles containing exclamation marks are placed next to the text to create a sense of
danger.
Narrator: You may have seen them before; you're browsing the web and suddenly a
pop-up appears with a scary warning...
Description: The camera zooms in on the pop-up message and the mouse cursor
clicks on the “Download Now” button.
38
Cisco Networking Academy 2023
Narrator: He says that your computer is infected with a virus and recommends
downloading special antivirus software.
Description: The screen changes to show a larger pop-up window containing a
gremlin icon and a "Downloading" progress bar, which begins to fill. The mouse cursor
clicks on “Cancel” and the pop-up window closes and returns to the desktop view of the
computer screen.
Narrator: You must never follow any of these instructions! Most of these pop-ups are
just trying to convince you to download a new, potentially malicious application on your
computer.
Description: The mouse cursor clicks on an “Antivirus Software” icon in the top left
corner and an application window appears displaying a progress bar and the message
“Running a security scan.”
Narrator: Instead, simply close the pop-up or browser and, to be safe, run a system
security scan with your trusted antivirus software on your computer.
Description: The progress bar fills and the message changes to “System Security
Scan Complete.” You have accessed a website that poses a security risk. We are
scanning your system and will remove all harmful files.
It's right!
39
Cisco Networking Academy 2023
Clicking anything other than the close icon could put your system at risk.
To be safe, you should run a system security scan with your trusted antivirus software
on your computer. And you should always decline or cancel update reminders unless
you are sure they come from an official, trusted source.
3.5.6 Scenario 6
This is a media player component. Select the play/pause button to watch or listen.
Clicking on links in an email may seem safe, but often not everything is as it seems.
Make sure you know the signs to look out for!
Press the play button to watch the video.
40
Cisco Networking Academy 2023
Matt Smith
IT Manager | Ext: 3400 | Mobile: 07000 800900
@Apollo
Narrator: However, even if it looks okay, before you click on any link, you should first
check with your IT department to make sure they actually sent this email.
UNSURE
41
Cisco Networking Academy 2023
It's right!
Key signs of a potential phishing email are signs that it was sent from outside the
organization.
Remember that even if you think the email is safe, you should always check with your
IT department before clicking on links to download anything.
Next...
This module is almost complete. But before you go any further, let's check your
knowledge with a quick quiz.
42
Cisco Networking Academy 2023
QUESTIONNAIRE
The following quiz is based on what you have just learned. There are 12
questions in total and you must score at least 70% to pass.
Luck!
Question 1
Why do IoT devices pose a greater risk than other computing devices on a
network?
Most IoT devices do not require an Internet connection and therefore cannot
receive new updates.
Question 2
What should you do to ensure that people you live with do not have access to
your secure data?
Question 3
What type of technology can prevent malware from monitoring user activities,
collecting personal information, and delivering unwanted mobile ads to a user's
computer?
Two-factor authentication
Anti-spyware technology
43
Cisco Networking Academy 2023
Firewall
Password Manager
Question 4
You want to print photos you've saved to a cloud storage account using a third-party
online printing service. After successfully logging into the cloud account, the customer
automatically receives access to the online printing service. What allows this automatic
authentication to occur?
The user is on an unencrypted network and the cloud storage service password is
visible to the online printing service.
Your account information for the cloud storage service was intercepted by a
malicious application.
The password entered by the user for the online printing service is the same as the
password used in the cloud storage service.
Question 5
Which of the following is an example of two-factor authentication?
Question 6
How can users working on a shared computer keep their personal browsing
history hidden from other workers who may use the same computer?
44
Cisco Networking Academy 2023
Question 7
Which of the following is a requirement for a strong password?
Question 8
Which password will take the longest for a malicious user to guess or "crack"?
10 characters
super3secret2password1
drninjaphd
mk$$cittykat104#
Question 9
How can a user prevent others from intercepting network traffic when operating
a computer at a public wireless access point?
Disable Bluetooth
Question 10
What is the best method to prevent Bluetooth attacks?
Question 11
Which technology eliminates direct user maintenance and equipment costs for
data backup?
45
Cisco Networking Academy 2023
A ribbon
A cloud service
Question 12
What is the only way to ensure that files deleted from your computer are
unrecoverable?
Description: A red target symbol randomly moves over various people icons on the
screen.
Narrator: We are all targets!
Description: The target symbol stops and approaches one of the person icons. It links
to a smartphone which then links to the hooded hacker character working on a laptop
with a skull and crossbones on the other side.
Narrator: Cybercriminals want our personal information...
46
Cisco Networking Academy 2023
Description: A small white circle is placed over an empty input field on the smartphone
screen. It is filled with four asterisks and a red line strength indicator appears below it.
Narrator: ...and will exploit any weaknesses in our computing devices or online
accounts to obtain it.
Descriptor: One of the asterisks disappears and two more are entered into the field.
The force line indicator below turns green. The hooded hacker character disappears
and a green login button appears on the smartphone screen. The little white circle
moves and presses the login button.
Narrator: Making some small changes to your online behavior can reduce your
chances of becoming a victim of cybercrime.
Description: A Module 3 knowledge check activity titled “Are They Really Gone?”
appears on screen. The cursor clicks on the correct answer and then on the "Submit"
button. The privacy settings indicator turns red and then turns blue when all knowledge
check questions have been answered correctly.
Narrator: You're off to a good start! Responding correctly to the activities throughout
this module has improved your privacy settings.
Description: The cursor points to the defensive shield icon in the upper right corner of
the module. The shield icon flashes.
Narrator: Be sure to check your settings by clicking the icon in the top right corner of
the screen.
Description: The smartphone reappears. It has a blue shield with a green check mark
in the center of the screen. The green check mark on the shield changes to a question
mark.
Narrator: Now that you know how to protect yourself from cyberattacks, you're ready
for the next step.
Description: A blue ribbon banner appears with '@Apollo' written on it. It moves to
the left side of the screen and the hooded hacker character working on a laptop with a
skull and crossbones appears on the right, with a close-up of the @Apollo website
below.
Narrator: It's time to look at what you can do to protect @Apollo from cybercrime.
Description: Four puzzle pieces come onto the screen and fit together at the top of the
@Apollo website to form an image of a closed padlock.
Narrator: Can you help protect the business before it's too late?
Description: A cursor clicks the exit icon on the Module 3 menu screen and the
Module 4 menu screen appears.
Narrator: Let’s move directly to the next module, “Protecting the Organization.”
47