<?xml version="1.0" encoding="utf-8"?>
<?sc-transform-do-oumusic-to-unicode?>
<?sc-transform-do-oxy-pi?>
<Item xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" Autonumber="false" id="X-ALT_1" TextType="CompleteItem" SchemaVersion="2.0" PageStartNumber="0" Template="Generic_A4_Unnumbered" Module="default" DiscussionAlias="Discussion" ExportedEquationLocation="" SessionAlias="" SecondColour="None" ThirdColour="None" FourthColour="None" Logo="colour" ReferenceStyle="OU Harvard" Rendering="OpenLearn" xsi:noNamespaceSchemaLocation="http://www.open.edu/openlearn/ocw/mod/oucontent/schemas/v2_0/OUIntermediateSchema.xsd" x_oucontentversion="2020102004">
    <meta name="aaaf:olink_server" content="http://www.open.edu/openlearn/ocw"/>
    <meta content="false" name="vle:osep"/>
    <meta content="mathjax" name="equations"/>
    <CourseCode>CYBER_B1</CourseCode>
    <CourseTitle/>
    <ItemID/>
    <ItemTitle>Introduction to cyber security</ItemTitle>
    <FrontMatter>
        <Imprint>
            <Standard>
                <GeneralInfo>
                    <Paragraph>This content was created and adapted within The Open University and originally published as an open educational resource on the OpenLearn website – <a href="http://www.open.edu/openlearn">http://www.open.edu/openlearn/</a>. This content may include video, images and interactive
            content that may not be optimised for your device. To view the original version of this
            content please go to OpenLearn – <a href="http://www.open.edu/openlearn">http://www.open.edu/openlearn/</a>.</Paragraph>
                    <Paragraph>If reading this text has inspired you to learn more, you may
            be interested in joining the millions of people who discover our free learning
            resources and qualifications by visiting The Open University – <a href="http://www.open.ac.uk/choose/ou/open-content">http://www.open.ac.uk/choose/ou/open-content</a>.</Paragraph>
                </GeneralInfo>
                <Address>
                    <AddressLine/>
                    <AddressLine/>
                </Address>
                <FirstPublished>
                    <Paragraph/>
                </FirstPublished>
                <Copyright>
                    <Paragraph>Copyright © 2014 The Open University</Paragraph>
                </Copyright>
                <Rights>
                    <Paragraph>Except for third party materials and/or otherwise stated (see terms and conditions
            – <a href="http://www.open.ac.uk/conditions">http://www.open.ac.uk/conditions</a>)
            the content in OpenLearn and OpenLearn Works is released for use under the terms of the 
            Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence – <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GBdeed.en_GB">http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB</a>.</Paragraph>
                    <Paragraph>In short this allows you to use the content throughout the world without payment
            for non-commercial purposes in accordance with the Creative Commons non commercial
            sharealike licence.  Please read this licence in full along with OpenLearn terms
            and conditions before making use of the content.</Paragraph>
                    <Paragraph>When using the content you must attribute us (The Open University) (the OU)
            and any identified author in accordance with the terms of the Creative Commons Licence.</Paragraph>
                    <Paragraph>The Acknowledgements section is used to list, amongst other things, third party
            (Proprietary), licensed content which is not subject to Creative Commons licensing.  Proprietary
            content must be used (retained) intact and in context to the content at all times.  The
            Acknowledgements section is also used to bring to your attention any other Special Restrictions
            which may apply to the content.  For example there may be times when the Creative Commons
            Non-Commercial Sharealike licence does not apply to any of the content even if owned by us (the
            OU).  In these stances, unless stated otherwise, the content may be used for personal and non-commercial
            use.  We have also identified as Proprietary other material included in the content which is not subject
            to Creative Commons Licence.  These are: OU logos, trading names and may extend to certain photographic and
            video images and sound recordings and any other material as may be brought to your attention.</Paragraph>
                    <Paragraph>Unauthorised use of any of the content may constitute a breach of the terms and conditions
            and/or intellectual property laws.</Paragraph>
                    <Paragraph>We reserve the right to alter, amend or bring to an end any terms and conditions provided
            here without notice.</Paragraph>
                    <Paragraph>All rights falling outside the terms of the Creative Commons licence are retained or controlled
            by The Open University.</Paragraph>
                    <Paragraph>Head of Intellectual Property, The Open University</Paragraph>
                </Rights>
                <Edited>
                    <Paragraph/>
                </Edited>
                <Printed>
                    <Paragraph/>
                </Printed>
                <ISBN><!--INSERT ISBNS WHEN AVAILABLE--></ISBN>
                <Edition/>
            </Standard>
        </Imprint>
        <Covers>
            <Cover template="false" src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_1_cover_ebook.jpg" type="ebook"/>
            <Cover template="false" src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_1_cover_pdf.jpg" type="A4"/>
        </Covers>
    </FrontMatter>
    <Unit>
        <UnitID/>
        <UnitTitle>Introduction and guidance</UnitTitle>
        <Session>
            <Title>Introduction and guidance</Title>
            <Paragraph><i>Introduction to cyber security: stay safe online</i> is an informal, introductory course for people who want to feel more confident about their online safety. This free online course will help you to understand online security and start to protect your ‘digital life’, whether at home or work. You will learn how to recognise the threats that could harm you online and the steps you can take to reduce the chances that they will happen to you.</Paragraph>
            <Paragraph>Part of this practice will be the weekly interactive quizzes, of which Weeks 4 and 8 will provide you an opportunity to earn a badge to demonstrate your new skills. You can read more on how to study the course and about badges in the next sections.</Paragraph>
            <Paragraph>Like most courses these days, <i>Introduction to cyber security: stay safe online</i> has learning outcomes. These are not as complicated as they sound, but are simply what we hope you will achieve by the end of the course. After completing this course, we hope that you will have a better understanding of: </Paragraph>
            <BulletedList>
                <ListItem>implementing a plan to protect your digital life</ListItem>
                <ListItem>recognising threats to online safety</ListItem>
                <ListItem>taking steps to reduce the risk of online threats</ListItem>
                <ListItem>concepts including malware, viruses and Trojans</ListItem>
                <ListItem>network security, cryptography and identity theft.</ListItem>
            </BulletedList>
            <InternalSection>
                <Heading>Moving around the course</Heading>
                <Paragraph>The easiest way to navigate around the course is through the ‘My course progress’ page. You can get back there at any time by clicking on ‘Back to course’ in the menu bar. </Paragraph>
                <Paragraph>It’s also good practice, if you access a link from within a course page (including links to the quizzes), to open it in a new window or tab. That way you can easily return to where you’ve come from without having to use the back button on your browser.</Paragraph>
                <Paragraph><b>Get careers guidance</b></Paragraph>
                <Paragraph>This course has been included in the <a href="https://nationalcareers.service.gov.uk/find-a-course/the-skills-toolkit?utm_source=openlearn&amp;utm_medium=referral&amp;utm_campaign=skillstoolkit_return">National Careers Service</a> to help you develop new skills.</Paragraph>
            </InternalSection>
            <Section>
                <Title>What is a badged course?</Title>
                <Paragraph>While studying <i>Introduction to cyber security: stay safe online</i> you have the option to work towards gaining a digital badge.</Paragraph>
                <Paragraph>Badged courses are a key part of The Open University’s mission <i>to promote the educational well-being of the community</i>. The courses also provide another way of helping you to progress from informal to formal learning. </Paragraph>
                <Paragraph>To complete a course you need to be able to find about 24 hours of study time, over a period of about 8 weeks. However, it is possible to study them at any time, and at a pace to suit you.</Paragraph>
                <Paragraph>Badged courses are all available on The Open University’s <a href="http://www.open.edu/openlearn/about-openlearn/try">OpenLearn</a> website and do not cost anything to study. They differ from Open University courses because you do not receive support from a tutor. But you do get useful feedback from the interactive quizzes.</Paragraph>
                <InternalSection>
                    <Heading>What is a badge?</Heading>
                    <Paragraph>Digital badges are a new way of demonstrating online that you have gained a skill. Schools, colleges and universities are working with employers and other organisations to develop open badges that help learners gain recognition for their skills, and support employers to identify the right candidate for a job.</Paragraph>
                    <Paragraph>Badges demonstrate your work and achievement on the course. You can share your achievement with friends, family and employers, and on social media. Badges are a great motivation, helping you to reach the end of the course. Gaining a badge often boosts confidence in the skills and abilities that underpin successful study. So, completing this course should encourage you to think about taking other courses.</Paragraph>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_sec_ol_badge_90xx90.png" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_sec_ol_badge_90xx90.png" x_folderhash="e1d42cc2" x_contenthash="8d9a213d" x_imagesrc="cyber_sec_ol_badge_90xx90.png" x_imagewidth="90" x_imageheight="90"/>
                    </Figure>
                </InternalSection>
            </Section>
            <Section>
                <Title>How to get a badge</Title>
                <Paragraph>Getting a badge is straightforward! Here’s what you have to do:</Paragraph>
                <BulletedList>
                    <ListItem>read each week of the course</ListItem>
                    <ListItem>score 50% or more in the two badge quizzes in Week 4 and Week 8.</ListItem>
                </BulletedList>
                <Paragraph>For all the quizzes, you can have three attempts at most of the questions (for true or false type questions you usually only get one attempt). If you get the answer right first time you will get more marks than for a correct answer the second or third time. Therefore, please be aware that for the two badge quizzes it is possible to get all the questions right but not score 50% and be eligible for the badge on that attempt. If one of your answers is incorrect you will often receive helpful feedback and suggestions about how to work out the correct answer. </Paragraph>
                <Paragraph>For the badge quizzes, if you’re not successful in getting 50% the first time, after 24 hours you can attempt the whole quiz, and come back as many times as you like.</Paragraph>
                <Paragraph>We hope that as many people as possible will gain an Open University badge – so you should see getting a badge as an opportunity to reflect on what you have learned rather than as a test.</Paragraph>
                <Paragraph>If you need more guidance on getting a badge and what you can do with it, take a look at the <a href="http://www.open.edu/openlearn/about-openlearn/frequently-asked-questions-on-openlearn">OpenLearn FAQs</a>. When you gain your badge you will receive an email to notify you and you will be able to view and manage all your badges in <a href="http://www.open.edu/openlearn/my-openlearn">My OpenLearn</a> within 24 hours of completing the criteria to gain a badge.</Paragraph>
                <Paragraph>Get started with <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48261">Week 1</a>.</Paragraph>
            </Section>
        </Session>
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 1: Threat landscape</UnitTitle>
        <ByLine/>
        <Session>
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1001.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1001_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="dd864fc8" x_subtitles="ou_futurelearn_cyber_security_vid_1001.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Hi, I'm Cory Doctorow, and I'll be your guide through this eight week course, catching up with you each week to recap on what we've covered and how it relates to what you'll be learning during the week. I used to be the European director of the Electronic Frontier Foundation. That's a campaigning civil liberties group in San Francisco that, among other things, legalised the use of strong cryptography around the world and continues to be involved in a lot of important struggles. I'm also a visiting professor at the Open University, and I hold an honorary doctorate in Computer Science from the OU.</Remark>
                    <Remark>At the start of the course, you'll learn the basics of information security and how to take some easy steps to secure your digital life. We'll then begin to look under the hood, exploring some of the technologies underpinning the internet and information security. You'll see how data moves between computers over the internet, how it can be attacked, and how it can be kept secure.</Remark>
                    <Remark>What if you are attacked? We'll also be looking at ways to deal with the aftermath, as well as steps you can take to prevent any future attacks from being successful. By the end of the course, you'll know how to recognise online threats. You'll know what steps to take to reduce any chance of being harmed by them, and you'll know how to feel secure in your digital life. This week you'll be learning some of the basic terminology used when discussing information security. You'll also start to learn about the different threats you'll face online.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1001.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1001.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="04e557e9" x_imagesrc="ou_futurelearn_cyber_security_vid_1001.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Welcome to this free course, <i>Introduction to cyber security: stay safe online</i>.</Paragraph>
            <Paragraph>Cory Doctorow is your guide through this course. He is a visiting professor at The Open University. He’ll meet you at the start of each week to let you know what’s coming up and remind you of what you’ve learned so far to help you make the most of your learning.</Paragraph>
            <InternalSection>
                <Heading>About the course</Heading>
                <Paragraph>Your journey into the world of cyber security and protecting your digital life has been organised into eight weeks of study. The first three weeks focus on understanding the basics of cyber security. This includes an exploration of the security threat landscape, together with some of the basic techniques for protecting your computers and your online information.</Paragraph>
                <Paragraph>You’ll then look ‘under the hood’, exploring some of the technologies that underpin the internet and cyber security. This will include gaining an understanding of how computers are connected in a network and how the data transmitted across that network is kept secure.</Paragraph>
                <Paragraph>In the final two weeks of the course, you’ll look at what can be done if you suffer a successful cyber security attack and how to develop an action plan. As part of this, you’ll learn about both the legal and technical aspects of recovering from an attack.</Paragraph>
                <Paragraph>This course will not only help you take steps to protect yourself online, such as how to create a strong password, but also provide an overview of cyber security from the security threat landscape to how the internet works. It will also provide a foundation for further study of this important discipline.</Paragraph>
                <Paragraph>To test your knowledge you can try the end-of-week practice and end-of-course compulsory badge quizzes.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Paragraph>The Open University would really appreciate a few minutes of your time to tell us about yourself and your expectations for the course before you begin, in our optional <a href="https://www.surveymonkey.co.uk/r/cyber_security_stay_safe_start">start-of-course survey</a>. Participation will be completely confidential and we will not pass on your details to others.</Paragraph>
            </InternalSection>
        </Session>
        <Session>
            <Title>1 Online, the new frontline</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1000.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1000_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="e7d89eb0">
                <Transcript>
                    <Remark>An estimated 1.6 billion people regularly access the web. And while most people log in, log out and harm no one, some of them do. Among them, criminals, malicious hackers and terrorists. The threats they pose are huge and multiplying. Today, online is the new frontline.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1000.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1000.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="7eef3bd6" x_imagesrc="ou_futurelearn_cyber_security_vid_1000.jpg" x_imagewidth="512" x_imageheight="355"/>
                </Figure>
            </MediaContent>
            <Paragraph>We shop online. We work online. We play online. We live online. More and more, our lives depend on online, digital services. Almost everything can be done online – from shopping and banking to socialising and card making – and all of this makes the internet, also known as cyberspace, an attractive target for criminals.</Paragraph>
            <Paragraph>Large-scale cyber security breaches often make the headlines but about 70% of organisations are keeping their worst security incidents under wraps, so what makes the news is just a small proportion of the breaches that are actually taking place. Computers and their users in Britain are being targeted by many thousands of cyber attacks every hour.</Paragraph>
            <Paragraph>We all have a responsibility to protect services from being maliciously disrupted or misused, through our vigilance, through our own security measures and through reporting events when they arise.</Paragraph>
            <Paragraph>The knowledge, tools and best practices relating to protecting the computers, communications networks, programs and data that make our digital lives possible are collectively referred to as cyber security, or information security. For the purposes of this course, we use the two terms interchangeably.</Paragraph>
            <InternalSection>
                <Heading>Behind the numbers</Heading>
                <Paragraph>Cyber security is definitely one of those areas where you need to evaluate the validity of any information you find online before accepting it. The UK government regularly publishes surveys of cyber security breaches. In 2019, 32% of businesses identified cyber security breaches or attacks in the previous 12 months. Medium (over 50 employees) and large businesses (over 250 employees) were particularly at risk with 60% reporting attacks. The report also notes that attacks may be under reported and the true cost and impact of cyber security breaches may be undervalued. It also notes that some businesses may not be aware that they have been attacked (Department for Digital, Culture, Media and Sport, 2019).</Paragraph>
                <Paragraph>By far the largest number of attacks reported are fraudulent emails, or fraudulent websites. Phishing attacks have resulted in the most disruptive and expensive breaches in the past 12 months. Specialist security firms also publish regular reports on the current cyber security situation. TrendMicro reports blocking 26,804,076,261 threats in the first half of 2019 (TrendMicro, 2019). Again, the largest proportion contained in emails. Sophos also reports spam emails as the biggest source of attacks and warns that ransomware is increasing and can be the most destructive (Sophos, 2019).</Paragraph>
                <Paragraph>Statista is a business that focuses on collecting and presenting statistics on a huge variety of subjects. Some of these reports are free of charge. For example, it reports that over 446.5 million records were exposed by data breaches in the United States in 2018 (Statista, 2018).</Paragraph>
                <Paragraph>Let’s get started by learning some of the basic terminology used when discussing cyber security.</Paragraph>
            </InternalSection>
            <Section id="talking_security_basics">
                <Title>1.1 Talking security: the basics</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1045.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1045.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="2aa9f1ae" x_imagesrc="ou_futurelearn_cyber_security_fig_1045.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 1</b></Caption>
                    <Description>This is a photograph of a woman's head and shoulders. Going around her head are square images depicting images linked with security.</Description>
                </Figure>
                <Paragraph>In any discussion of security, there are some basic terms that will be used a lot. This section will introduce you to the basic terminology of information security.</Paragraph>
                <InternalSection>
                    <Heading>CIA</Heading>
                    <Paragraph>The guiding principles behind information security are summed up in the acronym CIA (and we’re pretty sure there’s a joke in there somewhere), standing for confidentiality, integrity and availability.</Paragraph>
                    <Paragraph>We want our information to:</Paragraph>
                    <BulletedList>
                        <ListItem>be read by only the right people (confidentiality)</ListItem>
                        <ListItem>only be changed by authorised people or processes (integrity)</ListItem>
                        <ListItem>be available to read and use whenever we want (availability).</ListItem>
                    </BulletedList>
                    <Paragraph>It is important to be able to distinguish between these three aspects of security. So let’s look at an example.</Paragraph>
                    <CaseStudy>
                        <Heading>Case study: Equifax, credit reporting company</Heading>
                        <Paragraph>In September 2017, Equifax reported a data breach in which the records of 147 million people had been exposed. This mostly affected people in the US, but 693,665 people in the UK also had their data exposed. Equifax UK later wrote letters to each of these people explaining the situation.</Paragraph>
                        <Paragraph>The exposed data contained millions of names and dates of birth, Social Security numbers, physical addresses, and other personal information that could lead to identity theft and fraud. Equifax had a system to monitor network traffic, but it hadn’t worked for the previous 19 months because a security certificate hadn’t been renewed.</Paragraph>
                        <Paragraph>Equifax stored its data in a database called ACIS, and was alerted in March 2017 to a critical security vulnerability in an Apache Struts web server that provided access to this database. A patch had been issued but Equifax failed to ensure that the patch was installed. Hackers exploited this vulnerability until the missing certificate was installed at the end of July 2017.</Paragraph>
                        <Paragraph>In May 2019, the data breach was thought to have cost Equifax $1,400,000,000.</Paragraph>
                        <Paragraph>In July 2019, Equifax agreed a settlement with The Federal Trade Commission (US) of over $575,000,000 (perhaps up to $700,000,000) with a free monitoring and identity theft service for up to 10 years.</Paragraph>
                    </CaseStudy>
                    <Paragraph>So how do the principles of CIA apply to the Equifax case? Quite obviously, confidentiality was violated: unauthorised people could read the data. However, authorised users still had full access to the data, so it remained available; and the data was not changed, so its integrity was preserved.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Information assets</Heading>
                    <Paragraph>Time for another definition. When talking about valuable data we use the term ‘information assets’. In the Equifax case, the information assets were the data about people and their financial records collected by Equifax.</Paragraph>
                    <Paragraph>When we consider security of online communications and services, we also need two additional concepts: ‘authentication’ and ‘non-repudiation’.</Paragraph>
                    <Paragraph>When we receive a message, we want to be confident that it really came from the person we think it came from. Similarly, before an online service allows a user to access their data, it is necessary to verify the identity of the user. This is known as authentication.</Paragraph>
                    <Paragraph>Non-repudiation is about ensuring that users cannot deny knowledge of sending a message or performing some online activity at some later point in time. For example, in an online banking system the user cannot be allowed to claim that they didn’t send a payment to a recipient after the bank has transferred the funds to the recipient’s account.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Malware</Heading>
                    <Paragraph>Finally, there are a number of terms associated with software that attempts to harm computers in different ways. Collectively these are known as ‘malware’ (a contraction of malicious software).</Paragraph>
                    <Paragraph>Depending on what the malware does, different terms are used to in relation to malware. For example:</Paragraph>
                    <BulletedList>
                        <ListItem><b>ransomware</b> is malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action</ListItem>
                        <ListItem><b>spyware</b> records the activities of the user, such as the passwords they type into the computer, and transmits this information to the person who wrote the malware</ListItem>
                        <ListItem><b>botnets</b> are created using malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others, such as for sending spam emails or flooding a website with so many requests for content that the server cannot cope, called a denial-of-service attack.</ListItem>
                    </BulletedList>
                    <Paragraph>You’ll learn more about malware in Week 3.</Paragraph>
                    <Paragraph>Now that you understand some of the basic concepts and terminology, you’ll use this knowledge to study real examples of cyber security breaches.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>1.2 Obtaining Sophos Threatsaurus</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1075.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1075.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="d8498b97" x_imagesrc="ou_futurelearn_cyber_security_fig_1075.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This is an image of a dictionary being flicked through. </Description>
                </Figure>
                <Paragraph>There are lots of technical terms relating to cyber security and it can be difficult to keep track of what’s what.</Paragraph>
                <Paragraph>Sophos is one of the major players in the anti-malware business. They publish a Threatsaurus to help you remember and define the terms relating to malware. The Threatsaurus is a plain-English guide, to help IT managers and end users understand the threats posed by malicious software. The Threatsaurus includes:</Paragraph>
                <BulletedList>
                    <ListItem>an A–Z glossary on computer and data security threats</ListItem>
                    <ListItem>practical tips to stay safe from email scams, identity theft, malware and other threats</ListItem>
                    <ListItem>a guide to Sophos’s security software and hardware.</ListItem>
                </BulletedList>
                <Paragraph>Download the Sophos Threatsaurus PDF from <a href="https://ugc.futurelearn.com/uploads/files/3f/d3/3fd36a66-d941-4595-b587-1a7b41998ae9/Week_3_Sophos_Threatsaurus_AZ.pdf">https://ugc.futurelearn.com/uploads/files/3f/d3/3fd36a66-d941-4595-b587-1a7b41998ae9/Week_3_Sophos_Threatsaurus_AZ.pdf</a>.</Paragraph>
                <Paragraph>We have provided the complete web address for this file, so that you can easily check that the link points to a trustworthy site – in this case futurelearn.com. In general, before clicking on any link you should develop the habit of checking the address that it points to. This can be done by hovering your mouse pointer over the link and checking the status bar of your browser. On a mobile or tablet device, touching and holding the link will usually bring up a dialog box showing the complete link and some options of how to open it.</Paragraph>
                <Paragraph>Save it so that you can refer to it throughout the course. You’ll use it again in Week 3.</Paragraph>
            </Section>
            <Section>
                <Title>1.3 Cyber security attacks and phishing</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1046.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1046_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="a76ab9e5" x_subtitles="ou_futurelearn_cyber_security_vid_1046.srt">
                    <Transcript>
                        <Speaker>CORY DOCTOROW</Speaker>
                        <Remark>So there was a time that I actually got phished. I was successfully attacked over the internet. And it really illuminated the fact that security depends on you never making any mistakes, and attacking depends on finding one person who can make a mistake.</Remark>
                        <Remark>So the way that happened was the night before, I'd reinstalled the operating system on my phone, and so every time I logged into a service that normally I'd have a password stored on my phone for, it was prompting me to reenter my password, because I had a new operating system. And also, I had a new browser, and the browser hid part of the URL of the website I was looking at. So that made things bad, too.</Remark>
                        <Remark>I went to the coffee shop after dropping off our daughter at school with my wife, and she sat down to read the free sheet and I stood in the queue, and I fired up Twitter and there was a direct message from a friend of mine that said, was this you? And a URL. And the day before, I had also published a bunch of newspaper editorials, so I was getting a lot of emails and direct messages, saying oh, I saw that, or how was this, or whatever. And so it seemed kind of plausible. And I clicked on it, and it prompted me for my password. And it brought me to a Twitter login screen and prompted me for a password, which was normal. Everything was prompting me for it. It looked like I was visiting Twitter dot com, because of the way the browser was displaying, and I entered it in.</Remark>
                        <Remark>And then I got three more DMs from other people saying, is this you? And I was like, oooh, they've all been infected by something that presumably I've just been infected by, too. And if nothing else, I just entered my password into this.</Remark>
                        <Remark>The consequences, thankfully, were pretty light, because it happened immediately, and I had good password hygiene that I didn't recycle passwords across services. So I immediately sat down in the cafe, cancelled all my morning meetings, and changed that password and went through and made sure everything looked OK and then ended up blowing out the operating system on that phone and reinstalling it. Luckily, the consequences were pretty slight and nothing bad happened to me apart from losing that morning and feeling like an idiot.</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1046.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1046.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ec5ae699" x_imagesrc="ou_futurelearn_cyber_security_vid_1046.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>Britain is being targeted by many thousands of cyber attacks every hour. For small organisations the worst breaches cost between £65,000 and £115,000 on average and for large organisations may run to many millions of pounds. These costs can occur as direct financial losses due to fraud or theft; the loss of productivity due to time spent recovering from the effects of a successful attack; or the lost of trust and reputation.</Paragraph>
                <InternalSection>
                    <Heading>Phishing</Heading>
                    <Paragraph>It may be surprising that many cyber security breaches do not result from technical failures. In fact, it is commonplace for attackers to exploit the goodwill and trust of people to gain access to systems, using a form of attack that is known as ‘social engineering’. Pretending to be technical support personnel or crafting emails that ask for usernames and passwords are common forms of social engineering attacks. You may have heard the term ‘<b>phishing</b>’ used to describe these kinds of emails. Phishing is a form of social engineering. In the video, course guide Cory explains how it happened to him.</Paragraph>
                    <Paragraph>Phishing emails can use your real details and passwords to make you think that the attacker is a real contact that you already know, or to make you think that they have more information than they actually do to panic you into clicking on a message. The criminals get your email address and password data etc. from breaches of many online databases.</Paragraph>
                    <Paragraph>In October 2019, over 30,000 aggressive phishing emails an hour were being sent out to email addresses where a password was known: <a href="https://www.bbc.co.uk/news/technology-50065713">https://www.bbc.co.uk/news/technology-50065713</a></Paragraph>
                    <Paragraph>In January 2019, Troy Hunt, a security professional, published details of a database being used by criminals that contained 773 million records and over 21 million unique passwords. </Paragraph>
                    <Paragraph>To check if your account has been part of a data breach that included your email address visit <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com</a>. To check if a password that you use has also been found in a data breach visit <a href="https://haveibeenpwned.com/Passwords">https://haveibeenpwned.com/Passwords</a>. Don’t type in a complete password to start with. Type in the first few characters and click ‘pwned?’ If it doesn’t come up, your password is safe. If it does get a match, add the next character and check again. If you have typed in the complete password and get a match it is time to change your password!</Paragraph>
                    <Paragraph>Of interest, check the password 123456789. How many times has that been seen?!</Paragraph>
                    <Paragraph>In a later week in the course you’ll study how to create secure passwords.</Paragraph>
                    <Paragraph>In the next section you’ll find out about three high profile cyber security breaches.</Paragraph>
                </InternalSection>
            </Section>
            <Section id="Cyber_security_attacks">
                <Title>1.4 Examples of high profile cyber security breaches</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1047.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1047.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="e64be21e" x_imagesrc="ou_futurelearn_cyber_security_fig_1047.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 3</b></Caption>
                    <Description>This image is made up of a dark blue/black background, with a yellow dotted line running along the left-hand side, and the word 'DANGER'.</Description>
                </Figure>
                <Paragraph>Cyber security attacks take many forms from obtaining users’ personal information, to attacking critical national infrastructure and obtaining companies’ proprietary data. Here we describe four high profile cyber security breaches which caused major financial losses and damaged the reputations of the organisations concerned.</Paragraph>
                <InternalSection>
                    <Heading>Attacking online identities</Heading>
                    <Paragraph>Adobe Systems is one of the more important companies in the digital economy. Its software is used to produce, publish and present an enormous amount of material – chances are your favourite magazines and books were laid out with Adobe software.</Paragraph>
                    <Paragraph>Over the years, Adobe had stored the names, addresses and credit card information of tens of millions of users on its servers. Then, in October 2013, Adobe admitted that data from 2.9 million accounts had been stolen. Later, that number was revised to 38 million accounts, but when the data file was found on the internet it contained no less than 153 million user accounts. Much of this data could be read and soon copies of the stolen accounts were in wide circulation. It also became clear that the people who had stolen user data had also gained access to Adobe’s development servers – program code, potentially worth billions of dollars, had also been stolen.</Paragraph>
                    <Paragraph>Adobe was forced to change the log in details of every one of its users and to greatly improve its own security. And, of course, users sued Adobe for not protecting their information.</Paragraph>
                    <Paragraph>You can check to see if your email address was included in this information that was stolen by visiting: <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a> and entering your email address into the email input box.</Paragraph>
                    <Paragraph>Is Adobe alone, or are other companies holding valuable data but not protecting it properly?</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Fast forward to 2019</Heading>
                    <BulletedList>
                        <ListItem>A huge database of 49 million Instagram accounts was exposed online without any password protection (TechCrunch, 2019a). </ListItem>
                        <ListItem>A database containing hundreds of millions of phone numbers linked to Facebook accounts was left exposed online (TechCrunch, 2019b). </ListItem>
                        <ListItem>Personal data of the entire population of Ecuador was available online – 20.8 million records, some including bank balance (ZDNet, 2019). </ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Attacking industrial systems</Heading>
                    <Paragraph>Not many people want a uranium centrifuge, but those that do, really want a uranium centrifuge. The centrifuge was developed after the Second World War for enriching uranium so that it can be used either for generating nuclear power, or, as the heart of a nuclear weapon.</Paragraph>
                    <Paragraph>Under international treaty it is not illegal for countries to slightly enrich uranium for nuclear energy, but high levels of enrichment are forbidden to all but a handful of countries. As a consequence, centrifuge technology is tightly controlled, but still, centrifuges have gradually spread around the world. Most recently they have been developed by Iran, ostensibly for that country’s legal civil nuclear programme; but it is sometimes suspected it might possibly be for the development of an Iranian nuclear bomb.</Paragraph>
                    <Paragraph>In the summer of 2010, a new piece of malicious software for the Microsoft Windows operating system was discovered by an antivirus company in Belarus. The software was dissected and found to attack a very specific set of computer-controlled high-speed motors manufactured by Siemens. Left unchecked, the software, dubbed ‘Stuxnet’, would rapidly increase and decrease the speed of the motors causing irreparable damage to whatever was connected to them – among other things, uranium centrifuges.</Paragraph>
                    <Paragraph>The very specific nature of the systems targeted by Stuxnet make many believe that it was developed specifically to disrupt the Iranian uranium enrichment programme. By the autumn of 2010, reports were appearing that the Iranian centrifuge programme was in trouble. The Israeli paper Haaretz reported that Iran’s centrifuges had not only produced less uranium than the previous year, but that the entire programme had been forced to stop and start several times because of technical problems. Other sources reported that Iran had been forced to remove large numbers of damaged centrifuges from its enrichment plant.</Paragraph>
                    <Paragraph>In 2016, there was a serious cyber attack on the Ukrainian power grid (Ars Technica, 2019). Recent analysis has provided much more detail about how it was carried out. It would appear that the intention was to disable safety monitoring equipment in such a way that the operators would not be aware that important safety equipment had also been turned off. This could have caused catastrophic damage when operators attempted to restore power. The target was a known vulnerability in a piece of Siemens equipment known as a Siprotec protective relay. A security patch was available but may not have been installed.</Paragraph>
                    <Paragraph>In 2017, there was an incident at a Saudi oil refinery, Petro Rabigh, when malware shut down the plant. A report by Dragos, updated in 2019, suggested that the malware was probing the plant’s industrial control systems when it accidentally triggered the shutdown. In 2019, Dragos reports that the same group behind this malware was probing industrial control systems within the electrical transmission networks in the US and Europe-wide. They have named this threat XENOTIME (Dragos, 2019).</Paragraph>
                    <Paragraph>In 2019, a week after suffering a <a href="https://www.zdnet.com/article/aluminium-producer-switches-to-manual-operations-after-extensive-cyber-attack/">crippling ransomware infection</a> by LockerGoga, Norwegian aluminum producer Norsk Hydro estimates that total losses from the incident had already reached $40 million. It is not clear whether Norsk Hydro was specifically targeted, or whether this was the result of a random infection, but it illustrates the risk to industrial operations from attacks on the IT infrastructure.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Attacking specific targets</Heading>
                    <Paragraph>In December 2013, the American retailer Target announced that hackers had stolen data belonging to 40 million customers. The attack had begun in late November and continued for several weeks before it was detected. By then it had compromised more than 110 million accounts, including unencrypted credit and debit card information as well as encrypted PIN data. By February 2014, American banks had replaced more than 17 million credit and debit cards at a cost of more than $172 million. The amount of fraud linked to the attack is unknown, as is the damage to Target’s reputation.</Paragraph>
                    <Paragraph>Target was not the first major retailer to be hit by hackers, but this attack was different from most; the weakness that allowed the attackers into the Target computers lay outside of the company. The hackers had gained access through computers belonging to one of Target’s heating, ventilation and air conditioning services (HVAC) contractors. Like many large organisations, Target allows other companies to access its internal networks, to submit bills and exchange contracts.</Paragraph>
                    <Paragraph>The hack appears to have begun when an employee of the HVAC company received an email from one of their trusted partners. In fact, the email was fake and contained malicious software. Unlike traditional spam email, this message had been targeted at a very specific audience – the HVAC company. It was what is known as ’spear phishing’.</Paragraph>
                    <Paragraph>Once the email had been opened, the hidden software went to work and retrieved the HVAC company’s Target network authorisations, allowing them to log on to their real objective. In an ideal system, the HVAC company’s authorisations should have restricted them to a network responsible solely for billing and contracts, but, like a lot of big organisations, Target used a single network for all of its data, allowing the attackers to eventually locate, and steal, customer data.</Paragraph>
                    <Paragraph>The Target attack is an example of an advanced persistent threat. Rather than attempting to attack the retailer directly, the hackers had chosen an external company which was much less likely to have the resources to detect and defend against an attack. Their spear phishing email was directly targeted at the contractor, lulling them into a false sense of security and allowing the malware to retrieve the logon credentials needed to attack Target itself.</Paragraph>
                    <Paragraph>In 2017, Target had to pay a settlement of $18,500,000 and agree to make the following changes to significantly improve its security.</Paragraph>
                    <BulletedList>
                        <ListItem>Develop and maintain a comprehensive information security program</ListItem>
                        <ListItem>Maintain software and encryption programs to safeguard people’s personal information</ListItem>
                        <ListItem>Separate its cardholder data from the rest of its computer network</ListItem>
                        <ListItem>Rigorously control who has access to the network</ListItem>
                        <ListItem>Regularly bring in an independent and well-qualified third party to conduct regular, comprehensive security assessments of its security measures.</ListItem>
                        <ListItem>Hire an executive officer to run its new security program and serve as a security advisor to the CEO and the board of directors.</ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>You don’t need to be a huge company to be specifically targeted by criminal hackers</Heading>
                    <Paragraph>An employee responsible for handling the company finances knew that a meeting to finalise the acquisition of another company was in progress. He received the email: ‘Hey, the deal is done. Please wire $8m to this account to finalise the acquisition ASAP. Needs to be done before the end of the day. Thanks.’ The employee thought nothing of it and sent the funds over, ticking it off his list of jobs before heading home. But alarm bells started to ring when the company that was being acquired called to ask why it had not received the money. An investigation began - $8m was most definitely sent, but where to?</Paragraph>
                    <Paragraph>The criminal hacker clearly new of the meeting in progress. Most likely by intercepting emails over several days or weeks to look for an opportunity for an attack. For the rest of the report see <a href="https://www.bbc.co.uk/news/technology-49857948">https://www.bbc.co.uk/news/technology-49857948</a></Paragraph>
                    <Paragraph>Even private individuals have been attacked in this way – again the most likely method of attack is by intercepting emails. Perhaps by sitting in a car outside the victims house and snooping on the data transmitted through home router wireless networks (WiFi) that have not been password protected, or perhaps by snooping the WiFi traffic of a local tradesman or estate agent, waiting for emails that show that an invoice is about to be sent. The hacker then sends an identical invoice, but with a different account to receive the payment.</Paragraph>
                    <Activity>
                        <Heading>Activity 1 Describing cyber security breaches</Heading>
                        <Timing>Allow about 10 minutes</Timing>
                        <Question>
                            <Paragraph>Choose one of the three example attacks outlined above. You can choose Adobe, Stuxnet or Target.</Paragraph>
                            <Paragraph>Using the terminology you’ve learned so far, try writing a brief description of the attack which might explain it to other learners, and write it in the space below.</Paragraph>
                            <Paragraph>Examples of things you might put into your description are:</Paragraph>
                            <BulletedList>
                                <ListItem>the CIA concepts that are relevant to the example you have chosen</ListItem>
                                <ListItem>whether malware was involved in the attack, and what type of malware it was</ListItem>
                                <ListItem>the asset that was affected by the attack.</ListItem>
                            </BulletedList>
                        </Question>
                        <Interaction>
                            <FreeResponse size="paragraph" id="act1response1"/>
                        </Interaction>
                    </Activity>
                </InternalSection>
            </Section>
            <Section id="taking_stock">
                <Title>1.5 Taking stock of your information assets</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1049.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1049.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="42c85a34" x_imagesrc="ou_futurelearn_cyber_security_fig_1049.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 5</b></Caption>
                    <Description>The image is a screenshot showing the files on a person's computer desktop.</Description>
                </Figure>
                <Paragraph>Before you can take steps to protect your corner of cyberspace, you need to know what information you have that needs protection: your information assets.</Paragraph>
                <Activity>
                    <Heading>Activity 2 Your information assets</Heading>
                    <Timing>Allow about 15 minutes</Timing>
                    <Question>
                        <Paragraph>Compile a list, perhaps in a spreadsheet or using one of our templates, of the different types of information you store on your computer or online. For example, you may have personal correspondence, photographs, work documents or personal details such as your National Insurance number, insurance policy details and passwords for online services.</Paragraph>
                        <BulletedList>
                            <ListItem><a href="https://www.open.edu/openlearn/ocw/pluginfile.php/696856/mod_resource/content/2/Information%20asset%20list%20template.pdf">Information assets list template (PDF)</a></ListItem>
                        </BulletedList>
                        <Paragraph>For each type of information, think of its value to you. Label the most valuable types of information as ‘High’, the least valuable as ‘Low’ and those that are in between as ‘Medium’.</Paragraph>
                        <Paragraph>The value could be the cost to replace the information, in time or money, or the impact of its loss on your reputation, for example, all your emails or photographs could all be published online.</Paragraph>
                        <Paragraph>Do the same exercise for the online activities you engage in. For example, you might use online banking, shopping or social networking services. This time, label each one with a value based on the potential cost of an unauthorised person gaining access to it.</Paragraph>
                    </Question>
                </Activity>
                <Paragraph>In the next section, you will use this information as part of a survey that will help you get a picture of your exposure to information security threats but you won’t be asked to share the details of your list. You’ll use this list later in the course, too.</Paragraph>
            </Section>
            <Section>
                <Title>1.6 What are your own safeguards?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1050.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1050.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="63823a22" x_imagesrc="ou_futurelearn_cyber_security_fig_1050.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>This is an abstract image showing an outline of a person's face in profile multiple times.</Description>
                </Figure>
                <Paragraph>It’s time for you to take stock of your own safeguards against data loss, unwarranted access or malicious software. We’d also like to know a bit more about the frequency of computer crime to the average user.</Paragraph>
                <Paragraph>This <a href="https://www.open.edu/openlearn/ocw/mod/questionnaire/view.php?id=51804">survey</a> is a series of multiple-choice questions based on your current habits. There are no right or wrong answers so you should choose the answer that most closely matches the way you use your computer.</Paragraph>
                <Paragraph>The data collected is anonymous and cannot be linked to your OpenLearn profile or email address. However, filling in online surveys is not something to be done without considering the risk. Many surveys are often designed to capture saleable information, or information to use in a phishing attack, or for identity theft. Often a small prize is offered as well. Remember, your online security is worth far more than any possible prize. </Paragraph>
            </Section>
        </Session>
        <Session id="understanding_current_threats">
            <Title>2 Understanding current threats</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1051.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1051.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="dbf6bc2e" x_imagesrc="ou_futurelearn_cyber_security_fig_1051.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 7</b></Caption>
                <Description>This is a photograph of dark clouds above a green field.</Description>
            </Figure>
            <Paragraph>Now you know what information assets you have, you’ll look at how those assets can be compromised.</Paragraph>
            <Paragraph>You will learn about some different kinds of threat, the vulnerabilities that they exploit and some countermeasures that can be put in place to guard against them. When we use those terms we mean:</Paragraph>
            <BulletedList>
                <ListItem><b>vulnerability</b> – a point at which there is potential for a security breach</ListItem>
                <ListItem><b>threat</b> – some danger that can exploit a vulnerability</ListItem>
                <ListItem><b>countermeasure</b> – action you take to protect your information against threats and vulnerabilities.</ListItem>
            </BulletedList>
            <Paragraph>Threats can take many different forms, including unauthorised access to data with the intent of committing fraud against individuals or businesses. At its most extreme, there is the potential for the systematic disruption of computer networks and services, putting cyber security threats on a par with those associated with terrorism. The UK government set up the National Cyber Security Centre to act as the UK government’s single authority on cyber security – improving our understanding of the threat, reducing the harm from cyber attacks and providing a unified source of advice and support. </Paragraph>
            <Paragraph>In a 2018 report, the UK government’s National Cyber Security Centre highlighted that cyber security threats to UK businesses continue to grow, with particular emphasis on ransomware and distributed denial of service (DDoS) attacks.</Paragraph>
            <Paragraph>New threats are being discovered all the time and they can affect any and every operating system, including Windows, Mac OS, Linux, Android and iOS. Additionally, there are growing threats due to potential vulnerabilities in the growing number of Internet of Things devices being connected to our networks. To protect ourselves it is important to keep ourselves up to date with the latest cyber security news.</Paragraph>
            <Paragraph>Next, you will explore how vulnerable systems can be identified using the Shodan search engine.</Paragraph>
            <Section>
                <Title>2.1 Identifying vulnerable systems</Title>
                <Paragraph>The first step in protecting systems from attack is to identify if there are any vulnerabilities.</Paragraph>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_security_shodan_video.mp4" type="video" width="512" x_manifest="cyber_security_shodan_video_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="0fbef307">
                    <Transcript>
                        <Speaker>NARRATOR</Speaker>
                        <Remark>Shodan is a search engine. But rather than just list web pages, it stores information about devices connected to the internet. Not just conventional computers and servers, but also routers, switches, and internet of things devices. It works by scanning the network ports of devices and retrieving what are known as banners. A banner is nothing more than a piece of text that displays information about a particular device. A banner can list the type of services offered by that machine, the software it is running, when it was last updated, even default user name and passwords. Not all machines display banners. Indeed, in some cases, they should not publish a banner at all. And the banner information can be out of date or is misleading. However, examining a banner is one way of learning more about a computer and its vulnerability to attack.</Remark>
                        <Remark>We can also use Shodan to identify computers that may not been correctly set up. Most devices are supplied with default user names and passwords, and we're encouraged to change these as part of the setup process. All too often, however, this isn't done. And these machines represent a serious security risk. The banners examined by Shodan occasionally include default passwords supplied by the manufacturer. This is no guarantee that the password will work, but it does suggest that computer may not be correctly set up. Looking at the banner for this computer, I can tell from the 401 message that it requires me to enter a username and password. I can also see that the default user name is "admin" and the password "1234". This doesn't guarantee that this user name and password would still work, but if I was trying to attack this computer, it would be a good way to find out. </Remark>
                        <Remark>Whilst it might be very tempting to connect to this computer and try that combination, I won't be doing it. It's an offence under the Computer Misuse Act 1990 to try and gain access to a computer without authorization. And even if I failed to get in, I could well be found guilty of a crime. It's incredibly easy to break the law if you misuse information from Shodan, so don't do it. Having said that, let's try one last search.</Remark>
                        <Remark>Programmable logic controllers are found just about everywhere and can be attacked just like any other computer. Shodan allows us to search for PLCs. In this case, I'm going to look at the Siemens PLCs running the same System 7 software as the uranium enrichment plant at Natanz. System 7 often uses a particular network port, so the best way to find Siemens PLCs is to look for banners containing that port number, 102. </Remark>
                        <Remark>As we can see, thousands of results from all around the world. I'll see if one I spotted earlier is still connected. Here it is. The banner tells me quite a lot about the PLC itself. The module information refers to a model number in Siemens catalogue, so I was able to search their site to learn a lot more about this PLC. This took me some time, so here's the page. Now I know that the PLC was released in 2012 and production ended in 2014, presumably to be replaced by a more modern device. That might mean this PLC isn't receiving regular software updates. I now know the model number, so it is possible to find out if there are any known security risks from using this PLC. </Remark>
                        <Remark>Fortunately, the US government is here to help. The Department of Homeland Security regularly publishes advisories to industries and the public about potential computer security risks. This one, released in March 2014, lists six vulnerabilities in this family of Siemens PLCs, which could allow attackers to interrupt or stop their operations. It also highlights that this family of PLCs are used in a range of critical sectors. This PLC isn't just vulnerable, it is also quite likely to be working in an important facility. Siemens themselves published security notice about the PLC, detailing the security problems and how and the attackers did not need to be especially skilled. Siemens' recommendation for solving this problem was to update to version 4 of the firmware on the PLC. But as we can see, this PLC is still using the vulnerable version 3 and is still open to attack. Hopefully, this video has shown you how.</Remark>
                        <Remark>Shodan can be a powerful tool for security researchers. It is also a tool that can be abused by people wishing to cause harm to computers and the people who depend on them. In case I wasn't clear enough before, attempting to gain access to a computer to change its programming is a crime in the United Kingdom and most other countries. So think very carefully about your actions, should you choose to use Shodan or any other computer security applications</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_security_shodan_video.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_security_shodan_video.jpg" x_folderhash="e1d42cc2" x_contenthash="3c8a8734" x_imagesrc="cyber_security_shodan_video.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>The proliferation of networked computing devices that are embedded in everyday things (often called the “Internet of Things” or “IoT”) is going to pose a significant challenge for cyber security in the future. Already we are seeing examples of security vulnerabilities in home entertainment devices like Smart TVs and internet connected home security cameras. Sources of these security vulnerabilities range from devices that use out of date operating systems or software applications, to devices that do not use any cryptography to protect their communications.</Paragraph>
                <Paragraph>The video describes how different types of system vulnerabilities can be identified by using the Shodan search engine. This is a tool that catalogues millions of devices connected to the Internet, collecting information about the operating systems they use, their configurations and even in some cases default user names and passwords for accessing them.</Paragraph>
                <Paragraph>Using Shodan to find computers connected to the Internet is legal. However, please note that it is an offence under the Computer Misuse Act 1990 to try and gain access to a computer without authorization. And even if you failed to get in, you could well be found guilty of a crime. It is incredibly easy to break the law if you misuse information from Shodan, so don't do it!</Paragraph>
                <Paragraph>Addressing the security challenges of IoT systems is a multi-pronged effort, with researchers in academia and industry working on developing new technology solutions for improving their security. It is also critical that engineers are trained to ensure that security and privacy is considered as a core part of the design and development of all computer systems, including the Internet of Things.</Paragraph>
            </Section>
            <Section id="where_can_i_find_more">
                <Title>2.2 How to keep up to date</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1053.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1053.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="81e9e26f" x_imagesrc="ou_futurelearn_cyber_security_fig_1053.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 8</b></Caption>
                    <Description>This is an abstract image of a cityscape with the shadow of a person holding a laptop over it.</Description>
                </Figure>
                <Paragraph>Attackers are constantly finding new vulnerabilities and ways of attacking computer systems. Therefore, it is important to keep yourself informed and up to date with threats that are relevant to your situation.</Paragraph>
                <Paragraph>There are many sources of news about cyber security. Many of them are extremely technical and are designed for security specialists to communicate their findings with one another, for software developers to improve their programs or academic publications. There are also plenty of free resources, written by journalists, security professionals and enthusiastic amateurs, where you can learn more even if you are new to the field.</Paragraph>
                <Paragraph>The links provided below are a selection from those that are available. You are not expected to look at all of them in detail.</Paragraph>
                <InternalSection>
                    <Heading>Government sites</Heading>
                    <BulletedList>
                        <ListItem><a href="https://www.ncsc.gov.uk/">National Cyber Security Centre </a></ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>News sites</Heading>
                    <Paragraph>The best places to get started are the major media outlets, most of whom employ technology journalists. These sites will give you readable information intended for as wide an audience as possible. Many of them are updated several times a day, but they will only consider ‘newsworthy’ events such as a major hack or virus outbreak, and some will only cover news in a particular country – so you may need to look at a variety of sites:</Paragraph>
                    <BulletedList>
                        <ListItem><a href="http://www.bbc.co.uk/news/technology/">BBC News Technology</a></ListItem>
                        <ListItem><a href="http://www.theguardian.com/media-network/information-security">Guardian Online Technology</a></ListItem>
                        <ListItem><a href="http://www.telegraph.co.uk/technology/internet-security/">The Telegraph Internet security</a></ListItem>
                        <ListItem><a href="http://topics.bloomberg.com/cyber-security">Bloomberg Cyber security</a></ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Technology sites</Heading>
                    <Paragraph>Many sites devoted to technology will cover aspects of security on a regular basis. Most of the sites below cover other topics, so you might need to use their search functions to find relevant information.</Paragraph>
                    <BulletedList>
                        <ListItem><a href="http://www.wired.com/category/threatlevel">Wired – Threat level</a></ListItem>
                        <ListItem><a href="http://www.computerweekly.com/resources/IT-security">Computer Weekly</a></ListItem>
                        <ListItem><a href="http://thehackernews.com/">The Hacker News</a></ListItem>
                        <ListItem><a href="http://www.infosecurity-magazine.com/">Info-Security magazine</a></ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Information security companies</Heading>
                    <Paragraph>There are a large number of companies selling security software to home users and to businesses. Almost all of them maintain regularly updated websites explaining new and emerging security threats and how they can be overcome.</Paragraph>
                    <Paragraph>Much of this information is technical and aimed at administrators responsible for large computer systems, but the introductory material is often quite easily understood. These sites can be the best to use when a new security issue is identified.</Paragraph>
                    <BulletedList>
                        <ListItem><a href="http://nakedsecurity.sophos.com/">Sophos labs</a></ListItem>
                        <ListItem><a href="http://microsoft.com/security">Microsoft</a></ListItem>
                        <ListItem><a href="https://ssl.apple.com/uk/support/security/">Apple</a></ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Blogs</Heading>
                    <BulletedList>
                        <ListItem><a href="http://krebsonsecurity.com/">Krebs On Security</a> Brian Krebs is an American journalist and investigative reporter. He is best known for his coverage of profit-seeking cybercriminals. His interest grew after a computer worm locked him out of his own computer in 2001.</ListItem>
                        <ListItem><a href="http://grahamcluley.com/">Graham Cluley</a> is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon’s.</ListItem>
                        <ListItem><a href="https://www.schneier.com/">Bruce Schneier</a> is an internationally renowned security technologist who writes a monthly newsletter, called ‘Crypt-o-gram’. He provides commentary and insights into critical security issues of the day. The content of this blog can be accessed in multiple forms, including a podcast and an email newsletter.</ListItem>
                        <ListItem><a href="http://www.troyhunt.com/">Troy Hunt</a> provides analyses of different system breaches and useful hints on how to avoid being attacked.</ListItem>
                    </BulletedList>
                </InternalSection>
                <Paragraph>Before you can identify your enemies you need to know who you can trust. First you need to think about, and constantly evaluate who and what you trust, and to what degree you trust them. You cannot rigorously check every possible contact or item of software yourself, so you build up a network of trusted contacts or sources of information. For each of your trusted contacts or sources you need to evaluate the degree to which you trust them. What is their level of expertise? And to what degree do you trust them? If you compare sources of information, to what degree is one simply copying from the other? You need sources that have the expertise and independently evaulate the information you are interested in. </Paragraph>
                <Paragraph>For example, you build trust in a bank because it has branches on many high streets, it is recognised and regulated by <a href="https://www.fca.org.uk/about/the-fca">The Financial Conduct Authority</a> in the UK and your money is protected by laws in the UK and the EU up to EUR100,000 when in a regulated bank. Based on this trust you may use the bank's website, or an app provided by that bank.</Paragraph>
                <Paragraph>You may share information about yourself with people and organisations that you trust - but even so you need to evaluate what information they might need to have and what they might do with that information.</Paragraph>
                <Paragraph>You throw away that security if you post information about yourself to any stranger who might come across it. So think carefully before placing any information online that may be passed on by a friend, who then passes it on to someone else and so on. Also think carefully about information that might be included in web pages, photos or videos posted online and available to many strangers.</Paragraph>
                <Paragraph>Here are a couple of examples of information you shouldn’t trust:</Paragraph>
                <BulletedList>
                    <ListItem><b>Profiles on dating websites:</b> there may be a genuine person behind that profile, but on the other hand it might be a criminal or scammer. Scammers may continue to exchange information for a year or more, drawing you in, using fake information and images from someone else's blog, even exchanging intimate pictures, until there is a very plausible request for money for the plane fare to visit you, or blackmail you over your intimate pictures. You have no basis for trust! Only what they have told you.</ListItem>
                    <ListItem><b>An advert for anti-malware software at a bargain price:</b> the link takes you to a website that claims it is totally brilliant, with lots of reviews on that site saying how good it is. It may also claim that it has been ranked number 1 by various other sites. But note that you have no basis for trust. A criminal can easily create such a website with that information, a shopping cart payment system to take your money and provide software for you to download. At best the software may be useless. At worst it will install malware on your computer and attempt to take repeated payments from your account.</ListItem>
                </BulletedList>
                <Paragraph>When searching for information on how to keep yourself secure you need to evaluate your trust in the sources of information, and you should start from our highly trusted sources.</Paragraph>
                <Activity>
                    <Heading>Activity 3 Knowing your enemies</Heading>
                    <Timing>Allow about 20 minutes</Timing>
                    <Question>
                        <Paragraph>Carry out some research about different cyber security threats and the types of groups who pose the threat.</Paragraph>
                        <Paragraph/>
                        <Paragraph>Using the information sources above find out about:</Paragraph>
                        <BulletedList>
                            <ListItem>a threat to your information, computers and other devices that arise from malware</ListItem>
                            <ListItem>a threat to your communications (such as spam and denial of service (DoS) or distributed denial of service (DDoS) attacks, often launched using botnets).</ListItem>
                        </BulletedList>
                        <Paragraph>For each threat, try to identify the type of individuals or organisations that are posing the threat. Which of the following types would best describe them?</Paragraph>
                        <BulletedList>
                            <ListItem><b>Cybercriminal:</b> those carrying out cyber attacks for personal financial gain.</ListItem>
                            <ListItem><b>Spies:</b> those engaged in espionage activities on behalf of either commercial organisations or national governments.</ListItem>
                            <ListItem><b>Hacktivists:</b> those who carry out cyber attacks as a form of protest against organisations or governments.</ListItem>
                            <ListItem><b>Insider attacker:</b> disgruntled or dishonest staff who attack their organisation’s computer systems.</ListItem>
                        </BulletedList>
                        <Paragraph>If you identify a different type of attacker, how would you describe it?</Paragraph>
                        <Paragraph>Spend 10–15 minutes researching, then spend five minutes noting down your findings in the space below.</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="act3response"/>
                    </Interaction>
                </Activity>
            </Section>
            <Section>
                <Title>2.3 Staying informed</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1055.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1055.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="dd155456" x_imagesrc="ou_futurelearn_cyber_security_fig_1055.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>This image shows a person's hand holding a mobile device with one finger of the other hand pressing onto the tablet's surface.</Description>
                </Figure>
                <Paragraph>Hopefully, you now have some ideas of how to stay up to date with the latest developments in cyber security.</Paragraph>
                <Paragraph>Before continuing to the final part of the week, take some time to plan some concrete steps you will take to keep yourself more informed.</Paragraph>
                <Paragraph>For example, you could subscribe to a blog via email or <a href="https://cloud.feedly.com/">Feedly</a>, or follow updates via Twitter or Facebook.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>3 Securing my digital information</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1056.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1056.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="6f89c114" x_imagesrc="ou_futurelearn_cyber_security_fig_1056.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 10</b></Caption>
                <Description>This figure is made up of three separate images. Starting top left and going clockwise: the first image is of two small devides, presumably used for online banking, sitting on top of a computer keyboard; the second is off a man taking a photo of a plate of food with a mobile phone; the third shows one person with their hands hovering over a computer keyboard and another person holding a magazine and using a mobile phone.</Description>
            </Figure>
            <Paragraph>What issues arise in doing everyday activities online? As we’ve already discussed, most of us rely on the internet for everyday tasks such as shopping, working, banking or social networking. We often do this without stopping to think about the security issues that might be involved.</Paragraph>
            <Activity>
                <Heading>Activity 4 Securing your information</Heading>
                <Timing>Allow about 15 minutes</Timing>
                <Question>
                    <Paragraph>Choose one of the following activities and think about the main security issues that might threaten your chosen activity. </Paragraph>
                    <BulletedList>
                        <ListItem><b>Online banking</b> – for example, to check the balance in your account or make a payment.</ListItem>
                        <ListItem><b>Online shopping</b> – think particularly about buying something from a new store that you don’t recognise and haven’t shopped from before.</ListItem>
                        <ListItem><b>Social networking</b> – think about whether you would add someone as a ‘friend’ if you hadn’t met them in person.</ListItem>
                        <ListItem><b>Working from home</b> – consider the need to transfer documents that contain confidential information between members of your team.</ListItem>
                    </BulletedList>
                </Question>
                <Answer>
                    <Paragraph>The following case study provides an example for the fourth option above, working from home.</Paragraph>
                    <CaseStudy>
                        <Heading>Case study: working from home</Heading>
                        <Paragraph>When working from home you may need to share a confidential file with a colleague in another location. You could email it to them, but this is not a secure method of transmitting information – email is easily intercepted en route to its destination and there is always the risk that you send it to the wrong person!</Paragraph>
                        <Paragraph>You could use an online cloud service such as Dropbox, Google Drive or Microsoft OneDrive to store the file, but you will have to make sure that your colleague can access the uploaded file. You might also be worried about the security of the cloud services against hackers.</Paragraph>
                        <Paragraph>You could put the file on a USB flash memory drive and post it to your colleague. But the drive could be lost, stolen or intercepted by an attacker who adds malware to the drive as a way of infecting your organisation’s computers.</Paragraph>
                        <Paragraph>Or, you could use encryption to lock the file against intruders. You could email the encrypted file safe in the knowledge that no one else could read the document. However, you would have to be sure that your colleague knows how to use encryption software so that they can decrypt the document when it arrives.</Paragraph>
                    </CaseStudy>
                </Answer>
            </Activity>
            <InternalSection>
                <Heading>Questions to consider</Heading>
                <Paragraph>Remember that earlier this week we classified security issues under three headings. We want our information to:</Paragraph>
                <BulletedList>
                    <ListItem>be read by only the right people (confidentiality)</ListItem>
                    <ListItem>only be changed by authorised people or processes (integrity)</ListItem>
                    <ListItem>be available to read and use whenever we want (availability).</ListItem>
                </BulletedList>
            </InternalSection>
            <Section>
                <Title>3.1 Threats to your assets</Title>
                <Paragraph>As you have already seen, for many the threats are most likely to arrive as emails or attached to emails. Another significant threat comes from apps for mobile devices that are not what they seem. In 2019, Sophos reported apps that hide their icons and use other tricks to prevent the user uninstalling them while aggressively displaying advertising.</Paragraph>
                <Paragraph>Other examples reported include:</Paragraph>
                <BulletedList>
                    <ListItem>Many utility apps don’t initially contain malware but include the code to download and install malware from elsewhere. This extra code installed may be designed to collect your banking details, or lock you out of your phone until you pay the criminals.</ListItem>
                    <ListItem>A VPN client that installs a trojan designed to capture banking details.</ListItem>
                    <ListItem>Fleeceware – apps that pretend to offer a free trial for some simple function and ask you to provide banking details first. Even after uninstalling the app, users still get charged a large amount unless they explicitly cancel the trial.</ListItem>
                </BulletedList>
                <Paragraph>You can find up to date Sophos reports at: <a href="https://news.sophos.com/en-us/tag/android-malware/">https://news.sophos.com/en-us/tag/android-malware/</a></Paragraph>
                <Paragraph>For the final activity this week you’ll update your own list of cyber threats.</Paragraph>
                <Activity>
                    <Heading>Activity 5 Your threats</Heading>
                    <Timing>Allow about 5 minutes</Timing>
                    <Question>
                        <Paragraph>Update the list of information assets and online activities you compiled in <CrossRef idref="taking_stock">Taking stock of your information assets</CrossRef>. Add any threats that are relevant to your assets.</Paragraph>
                        <Paragraph>Save this list to use later in the course.</Paragraph>
                    </Question>
                </Activity>
                <Paragraph>Next, you have a chance to review your learning in the end-of-week practice test.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1057.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1057.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="185d7c12" x_imagesrc="ou_futurelearn_cyber_security_fig_1057.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 11</b></Caption>
                    <Description>In the centre of the image is a digital handprint. Coming of the hand there is a close up a finger print, the outline of a person, and a heading 'Personal Data' with entries underneath such as 'Name', 'Home Address', and Passport No'.</Description>
                </Figure>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 1 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 1. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48332">Week 1 practice quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. In the context of information security, what does CIA stand for?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Cyberspace, Information, Accessibility</Paragraph><Feedback><Paragraph>No, try again. These terms have been used during the first week, but this is not the right definition of CIA.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Cryptography, Intelligence, Assets</Paragraph><Feedback><Paragraph>No, try again. These terms have been used during the first week, but this is not the right definition of CIA.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Crime, Identity, Authentication</Paragraph><Feedback><Paragraph>No, try again. These terms have been used during the first week, but this is not the right definition of CIA.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Confidentiality, Integrity, Availability</Paragraph><Feedback><Paragraph>Well done. The guiding principles behind information security are summed up in the acronym CIA, which stands for confidentiality, integrity and availability. This term was introduced in Talking security: the basics.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. What is the term used to describe the security property that means our information can be read only by people who are allowed to read it?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Confidentiality</Paragraph><Feedback><Paragraph>Well done. You saw in Talking security: the basics that CIA means we want our information to be read by only the right people (confidentiality), to stay the same all the time we’re not changing it (integrity) and to be available to read and use whenever we want (availability).</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Integrity</Paragraph><Feedback><Paragraph>No, try again. Integrity means that we want information to stay unchanged unless we are deliberately intending to change it.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Availability</Paragraph><Feedback><Paragraph>No, try again. Availability is about being able to access our information whenever we want to read or use it.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Authentication</Paragraph><Feedback><Paragraph>No, try again. Authentication is about verifying someone’s identity, for example when we receive a message or allow a user access to their data.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Information assets</Paragraph><Feedback><Paragraph>No, try again. ‘Information assets’ is a term used to describe data that is valuable to us in some way.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. What is the term used to describe the security property that means users cannot deny knowledge of sending a message or performing some online activity at some later point in time?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Integrity</Paragraph><Feedback><Paragraph>No, try again. Integrity means that we want information to stay unchanged unless we are deliberately intending to change it.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Availability</Paragraph><Feedback><Paragraph>No, try again. Availability is about being able to access our information whenever we want to read or use it.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Authentication</Paragraph><Feedback><Paragraph>No, try again. Authentication is about verifying someone’s identity, for example when we receive a message or allow a user access to their data.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Non-repudiation</Paragraph><Feedback><Paragraph>Well done. Non-repudiation is about ensuring that users cannot deny knowledge of sending a message or performing some online activity at some later point in time, such as claiming that they haven’t authorised a payment or sent an email when in fact they have done so.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Ransomware</Paragraph><Feedback><Paragraph>No, try again. Ransomware is a type of malware (malicious software) that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action.</Paragraph><Paragraph>You may find <CrossRef idref="talking_security_basics">1.1.1 Talking security: the basics</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. What is the term used to describe the potential for a security breach?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Threat</Paragraph><Feedback><Paragraph>No, try again. A threat is a danger of some kind that could potentially exploit a weakness but we are looking for another word for that weakness.</Paragraph><Paragraph>You may find <CrossRef idref="understanding_current_threats">1.2 Understanding current threats</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Vulnerability</Paragraph><Feedback><Paragraph>Well done. A vulnerability is a point at which there is potential for a security breach, in other words a weakness in the security of our information.</Paragraph><Paragraph>You may find <CrossRef idref="understanding_current_threats">1.2 Understanding current threats</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Counter-measure</Paragraph><Feedback><Paragraph>No, try again. A counter-measure is an action you take to protect your information.</Paragraph><Paragraph>You may find <CrossRef idref="understanding_current_threats">1.2 Understanding current threats</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Denial-of-service</Paragraph><Feedback><Paragraph>No, try again. Denial-of-service is a particular type of threat to the availability of our information. The word we are looking for is a type of weakness in the security of our information.</Paragraph><Paragraph>You may find <CrossRef idref="understanding_current_threats">1.2 Understanding current threats</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. The Target data theft case included which type of cyber security attack?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Denial-of-service</Paragraph><Feedback><Paragraph>No, try again. Denial-of-service was not an issue in the Target case.</Paragraph><Paragraph>You may find <CrossRef idref="Cyber_security_attacks">1.1.4 Cyber security attacks</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Spam</Paragraph><Feedback><Paragraph>No, try again. Although the unsolicited email, also known as Spam, was part of the attack on Target, the type of attack has a more specific name.</Paragraph><Paragraph>You may find <CrossRef idref="Cyber_security_attacks">1.1.4 Cyber security attacks</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Botnets</Paragraph><Feedback><Paragraph>No, try again. Botnets may have been involved in emails similar to those used in the Target attack, this isn’t the type of attack that was used.</Paragraph><Paragraph>You may find <CrossRef idref="Cyber_security_attacks">1.1.4 Cyber security attacks</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Spear Phishing</Paragraph><Feedback><Paragraph>Well done. Spearphishing was the type of attack in the Target case, as mentioned in Cyber security attacks. The attackers focussed their attention on an specific victim, on this case a heating and ventilation contracting company, and used the information gained from this to attack Target’s systems.</Paragraph></Feedback></Right></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 1</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1058.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1058.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="55b958ba" x_imagesrc="ou_futurelearn_cyber_security_fig_1058.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 12</b></Caption>
                <Description>This image shows a padlock with a key inserted.</Description>
            </Figure>
            <Paragraph>This week you explored the security threats that could affect your digital information and use of online services.</Paragraph>
            <Paragraph>You also learned how to keep your knowledge of these threats up to date and started looking at how these threats relate to your own information assets and online activities. In the coming weeks you will explore the different ways in which these threats can become attacks.</Paragraph>
            <Paragraph>You have also learned about the wider world of cyber security and how attacks can affect a variety of systems. As we enter into an age where most everyday devices are connected to the internet – the ‘Internet of Things’ – we will have to deal with a growing range of threats and cyber security will be increasingly important.</Paragraph>
            <Paragraph>There is some optional further reading relating to cyber security in a business setting in the further reading section.</Paragraph>
            <Paragraph>You can now go to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48319">Week 2: Authentication</a>.</Paragraph>
        </Session>
        <Session id="further_reading">
            <Title>Further reading</Title>
            <Paragraph><a href="http://technet.microsoft.com/en-us/security/dn440717">Microsoft Security Response Centre</a></Paragraph>
            <Paragraph><a href="http://windows.microsoft.com/en-gb/windows/turn-automatic-updating-on-off">Microsoft – Turning automatic updates on or off</a></Paragraph>
            <Paragraph><a href="https://ssl.apple.com/support/security/">Apple Product Security</a></Paragraph>
            <!--<Paragraph><a href="http://eandt.theiet.org/magazine/2013/06/small-firms-in-the-firing-line.cfm">Small firms in the firing line</a> An article raising awareness of cyber security issues in SMEs from The Institution of Engineering and Technology. </Paragraph>-->
            <Paragraph><a href=" https://www.gov.uk/government/publications/cyber-governance-health-check-2018">Cyber Governance Health Check</a>: the annual FTSE 350 Cyber Governance Health Check assesses and reports on cyber security risk management in the UK’s 350 largest firms (the “FTSE 350”.)
</Paragraph>
            <Paragraph><a href="https://www.ncsc.gov.uk/threats">National Cyber Security Centre – Threat Listing</a></Paragraph>
            <Paragraph><a href="https://www.ncsc.gov.uk/cyberthreat">National Cyber Security Centre – The cyber threat to UK business 2017-2018 report</a></Paragraph>
        </Session>
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 2: Authentication</UnitTitle>
        <Session>
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1003.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1003_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="2a35a9a6" x_subtitles="ou_futurelearn_cyber_security_vid_1003.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Hello and welcome to Week 2. Last week we looked at online activities and security threats. We saw that many of these threats depend on attackers being able to impersonate us online. For this to happen, the attacker needs to access our online identities.</Remark>
                    <Remark>So this week we're looking at passwords. Many online services use passwords. From social networks to payment systems, passwords are how we identify ourselves and interact with the services that we use. So you'll learn the ways in which attackers will try to discover your password so they can impersonate you online. And you'll learn how you can improve the security of your passwords, and online identification methods that use different techniques and password managers.</Remark>
                    <Remark>But before we get started, a note of caution-- there will be discussions during the course, and just as you should never disclose your PIN, please also take care never to share any of your passwords. If you need an example, make one up.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1003.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1003.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="05e6bb97" x_imagesrc="ou_futurelearn_cyber_security_vid_1003.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Cory introduces you to Week 2 of the course.</Paragraph>
            <Paragraph>Last week you explored the security threats that could affect your ability to stay secure online. You also learned how to keep your knowledge of these threats up to date.</Paragraph>
            <Paragraph>This week you’ll learn about the purpose of passwords and the different situations in which they are used, the ways in which attackers try to learn your password so they can impersonate you online and ways of improving the security of your passwords and online identification methods.</Paragraph>
            <Paragraph><b>Important warning:</b> This week, you will be asked to discuss different aspects of password security. It is critical that you never share your actual passwords and only discuss the general principles. If you need an example, please make one up rather than give an actual password!</Paragraph>
        </Session>
        <Session>
            <Title>1 Passwords: what are they for?</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1059.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1059.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="85255c85" x_imagesrc="ou_futurelearn_cyber_security_fig_1059.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 1</b></Caption>
                <Description>This is an abstract image of an outline of a person's head in profile, showing an outline of their brain. Coming from the brain are different numbers.</Description>
            </Figure>
            <Paragraph>Millions of people use online services every day, and it is crucial that these systems prevent users from accessing each other’s information. To do this, they need a way of uniquely identifying each user that prevents users from impersonating each other. This is called identification and authentication.</Paragraph>
            <Paragraph>Passwords and passcodes are the most common way of authenticating users. Examples of their use includes the PIN (Personal Identifier Number) you use with your credit and debit card as well as the many passwords you are expected to remember when logging in to computer-based services.</Paragraph>
            <Paragraph>An ideal password must satisfy two conflicting aims. It should be:</Paragraph>
            <NumberedList>
                <ListItem>memorable enough that the user can recall it without writing it down</ListItem>
                <ListItem>long enough and unique enough that no one else can guess it.</ListItem>
            </NumberedList>
            <Paragraph>As you’ve almost certainly found out, remembering passwords is hard and it can be even harder to think of one that is secure. For these reasons many services are thinking about replacing passwords – we will return to this later.</Paragraph>
            <Paragraph>First, let’s think about how passwords are used and the different ways attackers try to learn our password.</Paragraph>
            <Section id="what_happens_when_you_enter_password">
                <Title>1.1 What happens when you enter a password?</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1043.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1043_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="e4ab6cda" x_subtitles="ou_futurelearn_cyber_security_vid_1043.srt">
                    <Transcript>
                        <Speaker>Speaker</Speaker>
                        <Remark>When a user connects to the server for the first time, they may be asked to create a password so they can get access to the services available on the server. In this case, the user types in a simple password. To keep things easy, we're using the very simple-- and very bad-- password "apple." Your own passwords should be much harder to guess. The user's password is sent over the network and is stored in a database on the server. At some later date, the user wants to access the server again. They're asked for their password, and type in "apple." The password is sent over the network and compared to the stored password-- also "apple"-- in the server's database. If the two match, they're given access.</Remark>
                        <Remark>Any data passing over a network can be stored or intercepted. It's very easy to copy data on a network, so an attacker could make their own copy of the password. Once they have that, they can then log into the server masquerading as the original user. A second problem is that the database itself might be stolen from the server by hackers-- or even a disgruntled employee. If this were to happen, all of the passwords belonging to all of the users could be misused.</Remark>
                        <Remark>To prevent passwords being stolen in transit, we use a secure network link between the user's computer and the server which hides data using strong cryptography. One type of secure link is called SSL, which you'll have used, perhaps without knowing it, when shopping online.</Remark>
                        <Remark>It's much harder to stop the server's database being stolen. But we can obscure passwords using a technique called hashing. Hashing is a mathematical technique that scrambles a password to produce a so-called hash. So when the user creates a password, server turns the password into a hash. And rather than storing the password in the database, we store the hash. So when the user logs in next time, they enter their password, which is sent over the network. The server creates a new hash from the password and compares it to the stored hash. If the two hashes match, then the user is allowed into the computer. Crucially, hashing only works one way. It's not possible to simply undo the hashing to recover the original password. Even if the database is stolen, the attackers only have the hashed passwords, rather than the passwords themselves. If the attackers want to find out the original passwords, they'll have to hash every possible password and compare them to the list of stored hashes. This is an enormously time-consuming process.</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1043.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1043.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="10aa1d30" x_imagesrc="ou_futurelearn_cyber_security_vid_1043.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>If the password is <i>transmitted</i> from the user to the server as <b>plaintext</b> (what you see is exactly what you get; it isn’t hidden in any way) – it could be intercepted as it travels across the network. </Paragraph>
                <Paragraph>This is usually overcome by encrypting the communication between the user and the server. The most common form of encryption is the Transport Layer Security (TLS) standard or the older SSL standard (Secure Socket Layer). You’ll recognise that TLS or <b>SSL</b> is being used when you see ‘https’ at the beginning of a web page address instead of ‘http’, and by a padlock symbol in your browser. (You’ll look at encryption and TLS and SSL more fully in Week 4.)</Paragraph>
                <Paragraph>Another problem occurs if a password is stored on a server as plaintext. In this case a successful attack on the server would not only reveal the user’s password, but all the passwords for all the users of the system. However, when a user enters a password the server needs to be able to confirm that this is the correct password for that user before it grants access.</Paragraph>
                <Paragraph>This second problem can also be solved using a technique called hashing. A hash with salt is the result of processing plaintext to create a unique, fixed length identifier – you’ll find out more in Week 5. It cannot be used to reconstruct the original data – even if the hash falls into hostile hands. In this scheme, a hashing function is used to create a hash of a password, which is stored on the server – the password itself is discarded. When the user enters a password, this is sent over the network and hashed on the server using a copy of the same hashing function. The resulting hash is compared to the hash stored on the password server. Only if they match will the user be granted access. Some implementations of this scheme will hash the user’s password before sending it across the network to be compared with the hash stored on the server.</Paragraph>
                <Paragraph>Almost all online services and computer systems store passwords as hashes – but surprisingly, errors still happen. The problems described in the following case study could have been avoided if hashing had been used.</Paragraph>
                <CaseStudy>
                    <Heading>Case study: RockYou</Heading>
                    <Paragraph>The game and advertising company RockYou suffered a major security breach in 2009 when 32 million user accounts were compromised, revealing that not only did the company store passwords in plaintext, it encouraged insecure passwords by only requiring them to be five alphanumeric characters long.</Paragraph>
                    <Paragraph>RockYou’s problems were made worse when it became clear that they had known that their database was vulnerable to an attack for more than ten years. The company had previously been criticised on privacy grounds for sending emails containing complete lists of their advertising partners, and for poor security in issuing passwords through insecure email.</Paragraph>
                </CaseStudy>
                <Paragraph>Over the years many billions of accounts have been breached and the data collected by criminals. These criminals then try the same user name and password on other accounts. If you have reused the same password then they may take over your account.</Paragraph>
                <Paragraph>In 2016, a list of 593 million unique email addresses together with multiple passwords for each address was being circulated by criminals. This list was known as ‘Exploit.In’</Paragraph>
                <Paragraph>You can check to see if your own email has been part of a data breach by visiting <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a>. Later this week you will look at how to improve your password security.</Paragraph>
                <Paragraph>Even when hashing and encrypted communications are used, there are still ways in which attackers can successfully learn your password.</Paragraph>
            </Section>
            <Section id="attacking_passwords">
                <Title>1.2 Attacking passwords</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1060.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1060.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="043eb6df" x_imagesrc="ou_futurelearn_cyber_security_fig_1060.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This image shows two shelves on a bookcase, both of which are full of books. The titles of the books cover a range of academic disciplines, from Latin to human biology, and from modern politics to medicine.</Description>
                </Figure>
                <Paragraph>The obvious ways that attackers can find or steal passwords, such as looking over your shoulder when you’re using an ATM or credit card machine or trying obvious passwords such as ‘abc123’ and ‘password’, are familiar to us.</Paragraph>
                <Paragraph>Almost as long as there have been passwords there have been people attempting to break passwords. One of the oldest methods of automatically breaking into computers is to perform a <b>dictionary attack</b>. As its name suggests, a computer will attempt to log into an account by working its way through one or more dictionaries – each entry in the dictionary is one possible password and if it doesn’t work, the computer moves on to the next.</Paragraph>
                <Paragraph>Dictionaries need not be the familiar A–Z references that we are familiar with: a concerted dictionary attack will also include more specialised reference works such as atlases, lists of astronomical bodies and characters from literature, as well as lists of the most commonly used passwords and lists of stolen passwords that are in widespread circulation.</Paragraph>
                <Paragraph>Dictionary attacks can also be performed on the hashed values of words; they may take a little longer, but they will work. Some system administrators might set up dictionary attacks on their own users’ passwords to try to identify weak passwords that should be changed.</Paragraph>
                <Paragraph>An alternative, simple attack is a <b>brute force attack</b> where a computer will methodically work through all possible passwords (so beginning with ‘A’, then ‘AA’, ‘AB’ and so on …) trying each in turn until it stumbles upon an actual password.</Paragraph>
                <Paragraph>Dictionary and brute force attacks can be foiled by having computers watch for unsuccessful attempts to log in to accounts. Almost all computer systems restrict the number of unsuccessful logins after which the account is locked and can only be accessed after the intervention of an administrator.</Paragraph>
                <Paragraph>Another type of attack on passwords is based on the incorrect configuration of the hashing technique used to store the passwords on the server, which is discussed in the next section.</Paragraph>
            </Section>
            <Section>
                <Title>1.3 Salt to protect</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1061.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1061.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ab280502" x_imagesrc="ou_futurelearn_cyber_security_fig_1061.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 3</b></Caption>
                    <Description>This is a close-up image of a spoon of salt.</Description>
                </Figure>
                <Paragraph>The security of stored passwords can be increased by a process known as salting – in which a random value (called the salt) is added to the plaintext password before the hashing process.</Paragraph>
                <Paragraph>This greatly increases the number of possible hash values for the password and means that even if two people choose identical passwords, their hashed passwords have completely different values.</Paragraph>
                <Paragraph>The hashed password and the relevant salt are stored by the password server. When the user attempts to log in to the computer, their password and the salt are added together, hashed and compared to the stored, hashed value.</Paragraph>
                <Paragraph>Salting is only effective if:</Paragraph>
                <BulletedList>
                    <ListItem>truly random salts are used for each password (some systems have either used a single salt for all passwords, or have only changed the salt when the computer is restarted)</ListItem>
                    <ListItem>the salt is long enough that, when added to a password, it will create enough possible hashed values that an attacker cannot generate a table containing all possible hashes from a salted dictionary. For instance, the passwords used by UNIX in the early 1970s were restricted to eight characters and used a 12-bit salt. When released this was secure enough – it was not feasible to generate the hashes for every possible password each of which had been salted with all 4,096 possible salts. However, the rapid advance in computer power and storage capacity meant that longer salts are required. A typical piece of advice is that the salt should be the same length as the output of the hashing function – so if your hashing function generates 256-bit hashes, a different 256-bit unique salt should be used for each password.</ListItem>
                </BulletedList>
                <CaseStudy>
                    <Heading>Case study: LinkedIn</Heading>
                    <Paragraph>In the middle of 2012, the hugely successful social networking site LinkedIn was attacked by Russian hackers. The passwords to some 6.5 million accounts were stolen, but although they were stored as hashed values, the passwords had not been salted.</Paragraph>
                    <Paragraph>The hashing had been performed using the relatively old SHA-1 hashing algorithm which can be performed at very high speed (a desktop computer can calculate several tens of millions of SHA-1 hashes per second).</Paragraph>
                    <Paragraph>It was therefore not surprising that within a day, decrypted passwords were being published on the internet and LinkedIn was forced to ask all users to change their passwords.</Paragraph>
                </CaseStudy>
                <Paragraph>Preventing the attacks described above depends on the online service taking steps to encrypt the transmission and storage of passwords. As users, we can help in this protection by choosing passwords that are difficult to attack.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>2 Improving password security</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1062.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1062.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="631d5930" x_imagesrc="ou_futurelearn_cyber_security_fig_1062.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 4</b></Caption>
                <Description>This is an image of a man wearing sunglasses. Reflected in the sunglasses are the words 'Enter password' and a box containing six asterisks.</Description>
            </Figure>
            <Paragraph>Just about every website you sign up to requires a password. What strategies do you use when choosing passwords?</Paragraph>
            <Paragraph>If your passwords are easily guessable, you are effectively giving attackers easy access to your accounts. If your passwords are along the lines of ‘password’, ‘123’ or ‘letmein’, they won’t even need to use their automatic password-breaking tools. This is especially true when people don’t change the default passwords that are used to control access to the settings of certain pieces of equipment such as broadband routers.</Paragraph>
            <Paragraph>Think about your strategies for picking memorable passwords. Consider these questions:</Paragraph>
            <BulletedList>
                <ListItem>How many passwords do you use?</ListItem>
                <ListItem>How long are the passwords you use?</ListItem>
                <ListItem>Do you use upper and lower case letters, numbers, other symbols in them?</ListItem>
            </BulletedList>
            <Section>
                <Title>2.1 How to pick a proper password</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1042.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1042_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="5da53e43" x_subtitles="ou_futurelearn_cyber_security_vid_1042.srt">
                    <Transcript>
                        <Heading>How to pick a proper password </Heading>
                        <Speaker>PAUL DUCKLIN </Speaker>
                        <Remark>Hello everybody. I'm Paul Ducklin. And this is a two-minute tutorial on How to pick a proper password. </Remark>
                        <Remark>Number one. Make your passwords hard to guess. The crooks have dictionaries, books, movie scripts, song lyrics, Facebook, Twitter, and much more. So avoid passwords based on nicknames, birthdays, quotations, pets, anything of that sort. And don't forget that easy passwords don't get harder if all you do is add some digits on the end. Password cracking programmes can do that, as well. </Remark>
                        <Remark>Point two. Go as long and complex as you can. Random, eight-letter passwords look pretty tough, with 26 to the power 8 possibilities. That's a whopping 200 hundred billion. But a password cracking service costing less than $20,000, under ideal circumstances, can try out more than 100 hundred billion passwords each second. So mix together uppercase, lowercase, digits, and punctuation. </Remark>
                        <Remark>And aim for 14 characters or even longer. That may look terribly complicated, but you can make up a little saying to help you out. If you don't like that approach, some people take several unusual words and combine them into a meaningless phrase, like the XKCD cartoon's famous correct horse battery staple password. But watch out for words that relate obviously to you. They do need to be unusual. </Remark>
                        <Remark>And Point three. Consider using a password manager. Examples include LastPass, KeePass, and 1Password. Password managers can make up complex, random nonsense for each account, plus they remember which password goes with what website. That also helps protect you from phishing, because you can't put the right password into the wrong page. But do remember, you will need a really good password for the Password Manager itself. </Remark>
                        <Remark>So let's go over the points again. One, make your passwords hard to guess. Two, go as long and complex as you can. Three, consider using a password manager. </Remark>
                        <Remark>And no, we haven't forgotten. Number four. One account, one password. Don't reuse passwords. </Remark>
                        <Remark>Don't make things easy for the crooks. And until next time, stay secure. </Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1042.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1042.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="58113ff1" x_imagesrc="ou_futurelearn_cyber_security_vid_1042.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>Using your pet’s name, your street’s name or a random word can be easy to remember, but can also be easy to guess.</Paragraph>
                <Paragraph>Even if the website uses hash functions, if the passwords are single dictionary words, the attacker can generate lots of possible passwords, hash them and see whether any of them match a stored one. Attackers always start with dictionary words and variations thereof, as most passwords are normal words.</Paragraph>
                <Paragraph>So your accounts will be more secure using long passwords made up of a collection of numbers, letters and symbols that don’t resemble a dictionary word. One way of coming up with such passwords is first to choose a memorable phrase and convert it in the way described in the video above.</Paragraph>
                <Paragraph>Strong passwords – long strings of characters that don’t appear in any dictionary, or at least five separate non-related words that are not easily guessable – are vital. The other thing to remember is to use a different password for every account.</Paragraph>
                <Paragraph>The majority of cases in which someone’s password has been compromised have occurred when an attacker has cracked someone’s password on a low-value, low-security site, and that user used the same password for another, higher-value site. The attacker either knows or guesses the target’s username on the higher-value site and then tries the cracked password on it.</Paragraph>
                <Paragraph>For more advice about how to choose strong passwords read the Good password checklist. It might be useful to print off and keep this.</Paragraph>
                <Box>
                    <Heading>Good password checklist</Heading>
                    <BulletedList>
                        <ListItem>Don’t use simple, short, easy to guess passwords such as names of friends, family and pets. Don’t use words from the dictionary or commonly used passwords such as 12345 or QWERTY.</ListItem>
                        <ListItem>Don’t use substitute characters such as pa22w0rd</ListItem>
                        <ListItem>Don’t use the same password on more than one website</ListItem>
                        <ListItem>Do use long passwords that are a random mix of upper case, lower case, numbers and other characters, such as giYT%$54vcD3W</ListItem>
                        <ListItem>For memorable passwords do use a string of at least five unrelated disctionary words such as bamboo glasses book engine red</ListItem>
                        <ListItem>Don’t share passwords with other people. If they need access to data they should be given their own login.</ListItem>
                        <ListItem>Don’t leave passwords lying around in notebooks, or on sticky notes close to your computer, or in files on your computer where they can easily be read.</ListItem>
                        <ListItem>Before you enter a password into a website, make sure it is using a secure connection beginning with https:// (it might also show a small padlock close to the address) this means the site is using a secure link that cannot be intercepted by attackers.</ListItem>
                        <ListItem>When you register with some online services they will send you a password so that you can log in. Many sites force you to change the password when you first log in, if they don’t, change it when you first visit the site.</ListItem>
                        <ListItem>If possible, change the default password on devices such as your internet router. This is programmed at the factory and some companies have a single password for all their devices. An attacker only needs to know the make of your router to gain access.</ListItem>
                        <ListItem>If you have trouble remembering passwords try a password manager program that not only stores passwords, but can generate new, highly complex passwords for you.</ListItem>
                        <ListItem>Two-factor authentication gives you additional protection as it requires two pieces of information (such as a password and a random number sent by SMS) to provide access to your data. If a company offers two-factor authentication, you should use it.</ListItem>
                    </BulletedList>
                </Box>
                <Paragraph>In the next section you’ll get to test the strength of your passwords.</Paragraph>
            </Section>
            <Section>
                <Title>2.2 Checking the strength of a password</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1063.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1063.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="76533834" x_imagesrc="ou_futurelearn_cyber_security_fig_1063.tif.jpg" x_imagewidth="512" x_imageheight="330"/>
                    <Caption><b>Figure 5</b></Caption>
                    <Description>This image, depicting strength, shows two young men arm wrestling.</Description>
                </Figure>
                <Paragraph>So you’ve learned to pick strong passwords that are easier to remember, to use different passwords for different organisations and to change them periodically.</Paragraph>
                <Paragraph>When you create a new password you will sometimes see an indication of how weak or strong a password is. There are also apps that can help us to create and manage our passwords. We will look at these a little bit later, but let us start by getting some understanding of how to measure the strength of a password.</Paragraph>
                <Paragraph>Construct an example password using the place name of the city, town or village where you live using only lower case letters – no capitals, spaces, dashes, and so on.</Paragraph>
                <Paragraph>Test it using the <a href="https://www2.open.ac.uk/openlearn/password_check/index.html">password strength checker</a> on the OpenLearn site and make a note of the score. Open the link in a new window so that you can refer back to it as you continue with this section. If you live in a place with a short name such as Ayr, just repeat the name a few times until you have met the minimum length requirement for the password checker.</Paragraph>
                <Paragraph>Modify it into a very strong password using the technique for converting a phrase into a password that you learned earlier.</Paragraph>
                <Paragraph>Think about why the security of the two passwords was different and what makes a very strong password. Things to consider include:</Paragraph>
                <BulletedList>
                    <ListItem>password length</ListItem>
                    <ListItem>the range of characters you used</ListItem>
                    <ListItem>whether any personal information is recognisable in your passwords (and could be guessed)</ListItem>
                    <ListItem>how easy or difficult it is for you to remember the new password.</ListItem>
                </BulletedList>
                <!--<Paragraph><b>Note</b>: Do not share your passwords in the forum or give away any personal information such as where you live!</Paragraph>-->
            </Section>
            <Section id="password_manager">
                <Title>2.3 Password managers</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1064.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1064.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="03ae8f8e" x_imagesrc="ou_futurelearn_cyber_security_fig_1064.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>This image shows a collection of jumbled up letters and numbers.</Description>
                </Figure>
                <Paragraph>While it is possible to create your own strong passwords, it can sometimes be difficult to remember each one, especially if you use a number of online services.</Paragraph>
                <Paragraph>A password manager is an application running on your computer that stores passwords for you. Very simple password managers allow stored passwords to be copied and pasted into login boxes. More sophisticated managers let users launch and log in to an application or website by clicking on their entry in the manager itself, while some password managers include browser ‘plug-ins’ so that you can complete a login on a web page simply by pressing a button.</Paragraph>
                <Paragraph>The majority of password managers also offer password generation facilities. Since computers can remember arbitrarily long pieces of nonsense text, say MHpKQCvpYoouTAaPiiWuFKjpNe7qnsbwkrvq3s3cX, password managers have no problems with creating passwords that are highly resistant to both brute force and dictionary attacks. Since a password manager contains a great deal of extremely valuable information it represents an attractive target for an attacker. Before choosing a manager you should check that:</Paragraph>
                <BulletedList>
                    <ListItem>The password manager itself requires a password to use it. This prevents an attacker simply starting the password manager and accessing your passwords.</ListItem>
                    <ListItem>The password manager should lock itself after a period of inactivity. This stops an attacker accessing the passwords if you have previously used the password manager and then left your machine unattended.</ListItem>
                    <ListItem>The passwords themselves should be encrypted on your computer. This prevents an attacker reading your passwords without needing to open the password manager.</ListItem>
                </BulletedList>
                <Paragraph>Most modern web browsers offer to remember passwords when you enter them into web forms, providing password management for websites you visit using the browser. This can be very convenient for frequently visited sites where you regularly have to enter details. The security of this password storage is strong and your data will not be visible to casual inspection, but you should be <b>extremely</b> careful using them on any computer that you do not own or have sole control of, since your data will be stored on the machine and could be misused by another user or an administrator.</Paragraph>
                <Paragraph>You should only consider using a browser’s password storage on a machine that you are the sole user of, or one where you entirely trust the other users. Under no circumstances should you store passwords in the browsers of public machines in places such as cafes, libraries and workplaces.</Paragraph>
                <Paragraph>When using a password manager check that the password manager’s security functionality has been evaluated by a reputable independent organisation that has the ability to understand and test how such software works. For example, <a href="https://www.av-test.org/en/news/secure-passwords-its-a-snap/">https://www.av-test.org/en/news/secure-passwords-its-a-snap/</a>. Additionally, make sure you select a very strong password for controlling access to the password store. This will minimise the risk of attackers having access to your passwords, even if they do manage to steal the encrypted password store, either from your machine or from online storage provided by the password manager software.</Paragraph>
                <Paragraph>Password managers are a prime target for hackers, and occasionally hackers have managed to find ways of attacking them. It is important that such software is always kept up to date.</Paragraph>
            </Section>
            <Section>
                <Title>2.4 Installing and using a password manager</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1065.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1065.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ad88f446" x_imagesrc="ou_futurelearn_cyber_security_fig_1065.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 7</b></Caption>
                    <Description>This image shows a large wooden filing cabinet with a few draws open. </Description>
                </Figure>
                <Paragraph>Alternatives to a browser’s password management are dedicated password management applications.</Paragraph>
                <Paragraph>Before choosing any product to manage your passwords, you should make sure that it meets your requirements – in particular:</Paragraph>
                <BulletedList>
                    <ListItem>Is the software available for your computer?</ListItem>
                    <ListItem>Does it manage passwords on one machine or more than one computer?</ListItem>
                    <ListItem>Can it synchronise passwords between multiple machines?</ListItem>
                    <ListItem>Does it have a good reputation?</ListItem>
                </BulletedList>
                <Paragraph>Check that the password manager software has a good reputation by making sure that it has been evaluated by a reputable organisation such as av-test.org : <a href="https://www.av-test.org/en/news/secure-passwords-its-a-snap/">https://www.av-test.org/en/news/secure-passwords-its-a-snap/</a>. Don’t depend on anecdotal evidence.</Paragraph>
                <Paragraph>When you evaluate using a password manager consider the balance of risk. A password manager only requires you to memorise a single secure password. All the other passwords it looks after can be long, unique strings of random characters, for example, dyet%eb5YT%^ahyrp)(nd. This is much more secure than using a paper notebook – thieves breaking into a house or office look for password notebooks. Notebooks also get dropped or left on the train!</Paragraph>
                <Paragraph>Some examples of password manager applications are:</Paragraph>
                <BulletedList>
                    <ListItem><a href="https://lastpass.com/">LastPass</a> is available for a range of operating systems, including mobile devices. It can generate and store passwords, and manage them across multiple devices.</ListItem>
                    <ListItem><a href="https://agilebits.com/onepassword">1Password</a> is available for Windows and Mac computers as well as mobile devices running iOS, Android and Windows Phone. As well as generating and storing passwords, 1Password can be used to hold other confidential documents. It offers password synchronisation through the free Dropbox cloud service where encrypted copies of all 1Password data are shared between your machines.</ListItem>
                    <ListItem><a href="http://keepass.info/index.html">KeePass</a> is available for Windows, Mac and Linux operating systems. It is an open source password manager, which makes it easier for security experts to check its program code and identify potential security problems.</ListItem>
                </BulletedList>
                <Paragraph>The protection offered by a password manager is only as good as the password you select to control access to it – the ‘master password’. Therefore, make sure to select a long, hard to guess password – ideally a phrase or combination of random words. This will prevent attackers from getting access to all of your passwords, even if they steal the password store from your machine or an online password system. For example, in June 2015 attackers were able to <a href="https://blog.lastpass.com/2015/06/lastpass-security-notice.html/">steal a large number of password stores from LastPass</a>, putting those users with very weak master passwords at risk of having all their passwords used by hackers.</Paragraph>
                <Paragraph>In September 2019, another vulnerability was discovered in LastPass by a Google Project Zero researcher. This was fixed almost immediately by LastPass in an update.</Paragraph>
            </Section>
            <Section id="alternatives_to_pw_managers">
                <Title>2.5 Alternatives to using password managers</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1066.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1066.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="6a7a74e9" x_imagesrc="ou_futurelearn_cyber_security_fig_1066.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 8</b></Caption>
                    <Description>This image shows a large rock with a crack. Through the crack, blue sky can be seen.</Description>
                </Figure>
                <Paragraph>Using a password manager makes your life much simpler because, rather than having to remember a multitude of passwords, you only need to remember a single password and the computer does the rest.</Paragraph>
                <Paragraph>But what if you forget that password? All of a sudden all of your passwords are unavailable. And what if your password manager’s data file falls into the wrong hands? You’d better hope your password is strong, otherwise all of your passwords are accessible to an attacker. But, what are the alternatives?</Paragraph>
                <Paragraph>For an increasing number of websites it is possible to use your existing online accounts, such those provided by Google or Facebook, to register and log in. This approach for managing users’ account details depends on an authentication mechanism called OAuth (i.e. Open Authentication).</Paragraph>
                <Paragraph>This method of checking a user’s identity requires the website to ask the user’s computer for some proof that the user’s identity has been authenticated by the OAuth provider (e.g., Google). This requires the user’s computer to first contact the OAuth provider where the user can input their username and password. The OAuth provider provides a digitally signed token that confirms the user’s identity.</Paragraph>
                <Paragraph>You will learn more about digital signatures in Week 5 of the course, but for now it is sufficient to understand that in this case the digitally signed token cannot be created or modified by anyone other than the OAuth provider. Once it receives the token all the website needs to do is to check that the signature on this token is valid to confirm the identify of the user.</Paragraph>
                <Paragraph>So using OAuth can simplify your password management because all you need to remember is the username and password for your account with the OAuth provider. However, just as with password managers, if you forget this password you will no longer have access to any of the accounts. Additionally, if an attacker gets access to this password, they will be able to access all the online systems you are able to access using your OAuth account details.</Paragraph>
                <Paragraph>So while password managers and online authentication services like OAuth can simplify the management of your online accounts, they are not complete solutions.</Paragraph>
                <Paragraph>Often an account will ask you for other information such as date of birth, or for memorable information or answers to security questions. For official websites such as government sites, banking, or airline sites the date of birth needs to be accurate. But for most other sites you can make up your memorable security information so that these cannot be worked out from your social media pages, and the answers could be unique for each website, e.g. Mothers name, first school, favourite pet would be different every time. To keep track of all this information you could use a spreadsheet. To keep this spreadsheet secure the spreadsheet should be stored inside an encrypted folder . For this you could use VeraCrypt: <a href="https://www.veracrypt.fr/en/Home.html">https://www.veracrypt.fr/en/Home.html</a>. Then, you only need to remember a single very strong password for the secure folder.</Paragraph>
                <Paragraph>Next, you will look at another way of improving the security of the authentication mechanisms you use.</Paragraph>
            </Section>
        </Session>
        <Session id="two_factor_authentication">
            <Title>3 Two-factor authentication</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1067.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1067.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="31290906" x_imagesrc="ou_futurelearn_cyber_security_fig_1067.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 9</b></Caption>
                <Description>This image shows a computer keyboard and a small device used for internet banking.</Description>
            </Figure>
            <Paragraph>So, if a password isn’t secure enough, perhaps having two pieces of information is more secure? This is known as two-factor authentication and you’ve almost certainly used it without realising.</Paragraph>
            <Paragraph>When you take money out of an ATM you have to give the bank two pieces of information – the first is the data stored on your bank card, the second is the PIN. Individually, neither can access your account, but when brought together they allow you to withdraw money.</Paragraph>
            <Paragraph>Some banks have given similar two-factor authentication to online banking customers – in this case accounts need to be unlocked with the combination of a password and a four or six digit number generated on a hardware banking card reader. If you use online banking and don’t have a card reader device it will be well worth finding out if your bank offers them to customers, and if they do not, consider switching to a more secure banking service.</Paragraph>
            <InternalSection>
                <Heading>Banking card reader</Heading>
                <Paragraph>The banking card reader reads the account details from your bank debit card, which includes your account number and a hash of your pin. It will also require you to enter a pin to log in, and if the pin matches the hashed pin this reader can generate passcodes that can be used on the banks website to authorise log in and for certain transactions. The banking card reader confirms that you both have the card and know the pin, without the need to enter a pin on a web page.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Two-factor authentication on the web</Heading>
                <Paragraph>A number of companies, including Apple, eBay, Google and Microsoft support two-factor authentication (2fa) to improve the security for their web users. Rather than a single password, two-factor authentication requires the user to enter two pieces of information – their password and a changing value which is either sent by the website to their mobile phone, or generated by a companion application on the user’s own computer.</Paragraph>
                <Paragraph>Depending on the site, it might be necessary to enter the two values every time (which is inconvenient), or after a period of inactivity, or it may be possible to tell the site that the computer which has already been authenticated should be trusted in future and a single password will be sufficient to allow you to use the site (although this raises a security weakness if the machine should be stolen).</Paragraph>
                <Paragraph>This method of two-factor authentication works well as protection against random attacks. However, if you are being specifically targeted by the attacker, the attackers have found it quite easy to take over the user’s phone number and then intercept authentication messages. They don’t need to steal the phone to do this. Criminals can locate the telephone number and date of birth on social media, and then ask for the number to be transferred to a new sim with a new provider.</Paragraph>
                <Paragraph>One way to greatly reduce this risk is to use a dual sim phone with a number on a pay-as-you-go tariff where the balance remains indefinitely – you usually have to make one call every 6 months to keep the sim working. Only use that number for two-factor authentication, not for anything else and never publish that number.</Paragraph>
                <Paragraph>Alternatively, use a separate very basic phone or an old phone with a new pay-as-you-go sim purely for authentication. Switch it on only when you want to get an authentication. Don't used the phone for making phone calls. Don’t publish the number anywhere.</Paragraph>
                <Paragraph>If your phone number stops working contact your phone provider immediately to check why. It might have been diverted.</Paragraph>
                <Paragraph>A much more secure method of two-factor authentication is to use a special hardware security key on the computer instead of the phone. This restricts authentication to the computer with a unique hardware security key.</Paragraph>
                <Paragraph>Another place where you might have come across two-factor authentication is if you’ve ever connected to a virtual private network (VPN), which is a type of encrypted network connection. (You will cover VPNs in more detail in Week 5.)</Paragraph>
                <Paragraph>The organisation that owns the network you are connecting to will give you a card or device, often called a VPN token, that can be used to generate a sequence of random characters. When you try to connect to the VPN, you will first be asked for your password (the secret based on something you know) and then will be challenged to provide some information from the VPN token (the secret based on something you have).</Paragraph>
            </InternalSection>
            <Section>
                <Title>3.1 Setting up two-factor authentication</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1069.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1069.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="edac74e5" x_imagesrc="ou_futurelearn_cyber_security_fig_1069.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 10</b></Caption>
                    <Description>In the foreground of this image is a person holding a mobile phone: on the screen is 'Internet Banking. One-Time Security Code' and a set of numbers. In the background the person's other hand hovers over a computer keyboard.</Description>
                </Figure>
                <Paragraph>Two-factor authentication is available on many websites such as Google and Facebook and it’s very easy to set up. Follow the instructions below to add two-factor authentication to your accounts.</Paragraph>
                <Paragraph>You should make sure that you check how you would log in if you didn’t have access to your phone or phone signal, or you lost your phone or had it stolen.</Paragraph>
                <SubSection>
                    <Title>Two-factor authentication on Google</Title>
                    <Paragraph>If you have a Google account it is a good idea to set up two-factor authentication.</Paragraph>
                    <Paragraph>Google’s two-factor authentication sends authentication codes to your mobile phone. You will need a phone that only you have access to, as otherwise someone who has stolen your details could use it to gain access to your Google account.</Paragraph>
                    <Paragraph>You can find out more at <a href="http://www.google.com/landing/2step/">Google’s 2-Step page</a> and follow the instructions there to set it up.</Paragraph>
                </SubSection>
                <SubSection>
                    <Title>Two-factor authentication on Facebook</Title>
                    <Paragraph>Facebook also supports two-factor authentication (which it calls Log in Approvals). Facebook’s two-factor authentication process is activated whenever you log in from a new computer. An SMS is sent to your phone containing a unique security code, which you will need to enter into Facebook before you can log in.</Paragraph>
                    <Paragraph>Set it up using  following the instructions on <a href="https://www.facebook.com/help/148233965247823/">https://www.facebook.com/help/148233965247823/</a></Paragraph>
                </SubSection>
                <SubSection>
                    <Title>Other two-factor authentication services</Title>
                    <Paragraph>As well as many online banking systems, other websites support two-factor authentication, most of which rely on SMS messages. Services include:</Paragraph>
                    <BulletedList>
                        <ListItem><b>Apple</b></ListItem>
                        <ListItem><b>Dropbox</b> – a cloud file sharing service</ListItem>
                        <ListItem><b>Evernote</b> – a cloud-based document and note taking service</ListItem>
                        <ListItem><b>Microsoft Accounts</b> – used by the Microsoft App Store and its OneDrive cloud storage service</ListItem>
                        <ListItem><b>PayPal</b> – online payments used by many small web retailers and eBay</ListItem>
                        <ListItem><b>Steam</b> – online game delivery</ListItem>
                        <ListItem><b>Twitter</b></ListItem>
                    </BulletedList>
                    <Paragraph>Look out for two-factor authentication on other websites. Set it up to better secure access to your data.</Paragraph>
                </SubSection>
            </Section>
            <Section>
                <Title>3.2 Other services supporting two-factor authentication</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1070.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1070.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="aeeece59" x_imagesrc="ou_futurelearn_cyber_security_fig_1070.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 11</b></Caption>
                    <Description>This image shows a USB cable sitting on top of a credit card.</Description>
                </Figure>
                <Paragraph>You may be surprised at the range of services and products that provide two-factor authentication. You’ll consider these in the next activity.</Paragraph>
                <Activity>
                    <Heading>Activity 1 Two-factor authentication</Heading>
                    <Timing>Allow about 15 minutes</Timing>
                    <Question>
                        <Paragraph>Consider the questions below and see what you can find out.</Paragraph>
                        <BulletedList>
                            <ListItem>Does your bank or credit card company use two-factor authentication, either online or via telephone banking? If so, what form does it take?</ListItem>
                            <ListItem>What kind of two-factor authentication is used by shops that you use, either online or in the high street?</ListItem>
                            <ListItem>Can you find examples connected with your work, for example to access the company VPN or different areas of the building?</ListItem>
                        </BulletedList>
                        <Paragraph>Write a short comment about the type of methods and devices you came across that offer two-factor authentication in the space below. Then discuss the questions with colleagues and add to your notes any other methods and devices you have learned about.</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="act1response46464"/>
                    </Interaction>
                </Activity>
                <Paragraph>Next, you will have an opportunity to review your learning in the end-of-week practice test.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 2 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 2. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48333">Week 2 practice quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. Which one of the following is not considered good practice when managing passwords?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>The password should not be shared with other people</Paragraph><Feedback><Paragraph>No, try again. This is a good property of a password.</Paragraph><Paragraph>You may find <CrossRef idref="what_happens_when_you_enter_password">2.1.1 What happens when you enter a password?</CrossRef>useful.</Paragraph></Feedback></Wrong><Right><Paragraph>The password should be sent in plaintext by email</Paragraph><Feedback><Paragraph>Well done. Sending passwords in plaintext is a problem because they would be easy to intercept.</Paragraph><Paragraph>You may find <CrossRef idref="what_happens_when_you_enter_password">2.1.1 What happens when you enter a password?</CrossRef>useful.</Paragraph></Feedback></Right><Wrong><Paragraph>The password should be long and complex enough to make it difficult for someone else to guess</Paragraph><Feedback><Paragraph>No, try again. Making a password long and complex so that it is difficult to guess is a good thing to do.</Paragraph><Paragraph>You may find <CrossRef idref="what_happens_when_you_enter_password">2.1.1 What happens when you enter a password?</CrossRef>useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>The password should be stored and transmitted securely</Paragraph><Feedback><Paragraph>No, try again. This is not a property of the password, but a requirement for transmission of the password across the network. Think about what was recommended you do, and not do, when creating a password.</Paragraph><Paragraph>You may find <CrossRef idref="what_happens_when_you_enter_password">2.1.1 What happens when you enter a password?</CrossRef>useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. What is the term used to describe a type of attack where a computer works methodically through all possible passwords?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Man in the middle attack</Paragraph><Feedback><Paragraph>No, try again. A man in the middle attack is a type of cryptographic attack and will be discussed in a later week.</Paragraph><Paragraph>You may find <CrossRef idref="attacking_passwords">2.1.2 Attacking passwords</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Cryptographic attack</Paragraph><Feedback><Paragraph>No, try again. Cryptographic attacks will be discussed in a later week. </Paragraph><Paragraph>You may find <CrossRef idref="attacking_passwords">2.1.2 Attacking passwords</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Brute force attack</Paragraph><Feedback><Paragraph>Well done. This is the correct answer.</Paragraph><Paragraph>You may find <CrossRef idref="attacking_passwords">2.1.2 Attacking passwords</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Denial-of-service attack</Paragraph><Feedback><Paragraph>No, try again. You met denial-of-service attacks in Week 1 in connection with malware.</Paragraph><Paragraph>You may find <CrossRef idref="attacking_passwords">2.1.2 Attacking passwords</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. Which one of the following should always be avoided?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Allowing a web browser on a cyber-cafe computer to remember your passwords</Paragraph><Feedback><Paragraph>Well done. You should never save passwords on a computer that you do not own or have sole control of, since your data will be stored on the machine and could be misused by another user or an administrator.</Paragraph><Paragraph>You may find <CrossRef idref="password_manager">2.2.3 Password manager</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Using a password manager on your home computer</Paragraph><Feedback><Paragraph>No, try again. Provided your home computer is secure and you are aware of the risks, using a password manager could be a good idea. A more serious risk was discussed.</Paragraph><Paragraph>You may find <CrossRef idref="password_manager">2.2.3 Password manager</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Using a different password for every website</Paragraph><Feedback><Paragraph>No, try again. Using a different password for every website is strongly recommended. A serious risk was discussed.</Paragraph><Paragraph>You may find <CrossRef idref="password_manager">2.2.3 Password manager</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Choosing passwords that contain a mixture of alphanumeric characters</Paragraph><Feedback><Paragraph>No, try again. Using passwords that contain a mixture of alphanumeric characters is recommended. A serious risk was discussed.</Paragraph><Paragraph>You may find <CrossRef idref="password_manager">2.2.3 Password manager</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. All but one of the following are examples of two-factor authentication. Which of these is the odd one out, because it does not involve two factors?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>A VPN token and password</Paragraph><Feedback><Paragraph>No, try again. This is a good example of two-factor authentication. Think about what the two factors are in each case.</Paragraph><Paragraph>You may find <CrossRef idref="two_factor_authentication">2.3 Two-factor authentication</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Entering your password twice</Paragraph><Feedback><Paragraph>Well done. The password is still only one factor, even though it has been entered twice. The other answers were all mentioned as examples.</Paragraph><Paragraph>You may find <CrossRef idref="two_factor_authentication">2.3 Two-factor authentication</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>The chip and PIN on a bank card</Paragraph><Feedback><Paragraph>No, try again. This is a good example of two-factor authentication. Think about what the two factors are in each case.</Paragraph><Paragraph>You may find <CrossRef idref="two_factor_authentication">2.3 Two-factor authentication</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>A hardware security token and password</Paragraph><Feedback><Paragraph>No, try again. This is a good example of two-factor authentication, as used by some banks. Think about what the two factors are in each case.</Paragraph><Paragraph>You may find <CrossRef idref="two_factor_authentication">2.3 Two-factor authentication</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. Which of the following statements about the OAuth (Open Authentication) mechanism is true?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>It stores passwords in plaintext on your machine and automatically logs you into websites you have configured to use your OAuth account information.</Paragraph><Feedback><Paragraph>No, try again. This statement is false: storing passwords in plaintext would make OAuth insecure since anyone with access to your computer will be able to get your login details.</Paragraph><Paragraph>You may find <CrossRef idref="alternatives_to_pw_managers">2.2.5 Alternatives to using password managers</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>It allows you to use the username and password for the OAuth service (e.g., Google or Facebook) to register and log in to websites you have configured to use the service.</Paragraph><Feedback><Paragraph>Well done. OAuth makes it possible to use your existing online accounts, such those provided by Google or Facebook, to register and log in to websites configured to use the service.</Paragraph><Paragraph>You may find <CrossRef idref="alternatives_to_pw_managers">2.2.5 Alternatives to using password managers</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>When logging in, you provide the OAuth username and password to the website you are trying to access, which then uses this information to confirm your identity with the OAuth service.</Paragraph><Feedback><Paragraph>No, try again.  This statement is false: you enter your OAuth username and password into a login page provided by the OAuth service, not the website you are trying to access.</Paragraph><Paragraph>You may find <CrossRef idref="alternatives_to_pw_managers">2.2.5 Alternatives to using password managers</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>The OAuth service will send your username and password to the website you are trying to access, which will then check them to verify your identity.</Paragraph><Feedback><Paragraph>No, try again.  This statement is false: you enter your OAuth service verifies your identity and sends back a digitally signed token your machine.  This token is then presented to the website you are trying to access.</Paragraph><Paragraph>You may find <CrossRef idref="alternatives_to_pw_managers">2.2.5 Alternatives to using password managers</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 2</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1071.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1071.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="9005947d" x_imagesrc="ou_futurelearn_cyber_security_fig_1071.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 12</b></Caption>
                <Description>This is an illustration of the palm of a hand, made up of numbers and words such as 'password', 'lifehack' and 'QWERTY'.</Description>
            </Figure>
            <Paragraph>This week you explored how authentication works and the role of passwords in the operation of authentication mechanisms.</Paragraph>
            <Paragraph>You learned how weak passwords could threaten the security of digital information and your online identity. You also learned about different ways of improving your password security, including techniques for coming up with strong passwords, using password managers and two-factor authentication.</Paragraph>
            <Paragraph>Of course attacking passwords are not the only way that attackers can gain access to systems. They can also exploit vulnerabilities in software, making it important that you keep systems up to date with the latest security fixes/patches. Attackers might also try to execute malicious software, ‘malware’, on your systems. These topics will be covered in the week ahead.</Paragraph>
            <Paragraph>You can now go to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48320">Week 3: Malware</a>.</Paragraph>
        </Session>
        <Session>
            <Title>Further reading</Title>
            <Paragraph>An article by The Verge on hardware security keys: <a href="https://www.theverge.com/2019/2/22/18235173/the-best-hardware-security-keys-yubico-titan-key-u2f">https://www.theverge.com/2019/2/22/18235173/the-best-hardware-security-keys-yubico-titan-key-u2f</a></Paragraph>
            <Paragraph>Fido Alliance administers and develops standards for hardware security keys: <a href="https://fidoalliance.org/">https://fidoalliance.org/</a></Paragraph>
        </Session>
        <!--<Session id="further_reading"><Title>Further reading</Title><Paragraph><a href="http://eandt.theiet.org/magazine/2011/06/who-what-why-where-when.cfm">ID access management and cloud computing</a> An article...<EditorComment> Link broken - also need rest of description</EditorComment></Paragraph></Session>-->
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 3: Malware</UnitTitle>
        <Session id="malware_basics">
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1005.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1005_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="b5b9d22c" x_subtitles="ou_futurelearn_cyber_security_vid_1005.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Last week we explored how authentication works and the role of passwords in protecting online identities and digital information. Now you're armed with different ways of improving your password security, including password managers and two-factor authentication. This week we'll be looking at another common way the computer systems are compromised, which is through the use of malicious software or malware. By the end of the week you'll be able to describe the different types of malware and their key characteristics, as well as how malware gains access to computer systems, and which steps you can take to prevent your own computer from being infected. 'Til next week.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1005.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1005.jpg" x_folderhash="e1d42cc2" x_contenthash="f3a6d6c4" x_imagesrc="ou_futurelearn_cyber_security_vid_1005.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>The two biggest threats to consumers online are malware and phishing. Cory introduces you to malware, which is the focus of this week.</Paragraph>
            <Paragraph>Malware is the collective name for software that has been designed to disrupt or damage data, software or hardware. There are several types of malware, such as viruses, worms and Trojans, which you’ll learn more about in the next few sections.</Paragraph>
            <Paragraph>However, as malware has evolved from its beginnings as demonstrations of prowess by individual programmers to sophisticated technologies developed by organised crime, the boundaries between the different categories are beginning to blur.</Paragraph>
        </Session>
        <Session id="viruses">
            <Title>1 Viruses</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1072.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1072.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="80030d83" x_imagesrc="ou_futurelearn_cyber_security_fig_1072.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 1</b></Caption>
                <Description>This image shows cells associated with a virus.</Description>
            </Figure>
            <Paragraph>The best-known type of malware is probably the virus; although many pieces of malware are called viruses, they are nothing of the sort.</Paragraph>
            <Paragraph>A virus is a piece of software that has been written to insert copies of itself into applications and data and onto crucial parts of a computer’s data storage systems (e.g. hard disks, memory sticks, etc.). Viruses are said to be self-replicating programs and date back as far as the early 1970s, but they only became well known with the advent of microcomputers and later, the internet.</Paragraph>
            <Paragraph>Viruses attach themselves to specific applications on a computer and are activated when the program is first run. At that point, the virus may make a copy of itself on the hard disk and continue to run, or it may only run each time the application is used. Early viruses, relying on floppy disks for transmission, spread quickly as infected data disks were shared around an office, or pirated software was passed around a playground. Nowadays, viruses rely on devices such as flash memory cards or are transmitted through internet connections.</Paragraph>
            <Paragraph>Although some viruses are not intended to cause harm, the majority of these programs are designed to harm users, by corrupting their data or attacking the operating system itself or providing an exploitable ‘back door’, giving attackers access to the computer. Even where no harm is intended, viruses consume memory, disk space and processing power.</Paragraph>
            <Section id="worms">
                <Title>1.1 Worms</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1073.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1073.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="85f1dbd3" x_imagesrc="ou_futurelearn_cyber_security_fig_1073.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This image shows a small worm coming out of an apple.</Description>
                </Figure>
                <Paragraph>Another type of self-replicating malware is the worm; like a virus it is designed to make copies of itself, but unlike a virus, a worm is a standalone application.</Paragraph>
                <Paragraph>Worms spread through network connections, accessing uninfected machines and then hijacking their resources to transmit yet more copies across the network.</Paragraph>
                <Paragraph>There are four stages in a worm attack:</Paragraph>
                <NumberedList>
                    <ListItem>The first stage is when the worm probes other machines looking for a vulnerability that can be exploited to copy itself to.</ListItem>
                    <ListItem>The second stage is to penetrate the vulnerable machine by performing the operations for exploiting the vulnerability. For example, the worm might detect an open network connection, through which it can get the remote machine to execute arbitrary instructions.</ListItem>
                    <ListItem>In the third stage, the worm will download itself to the remote machine, and store itself there. This is often called the ‘persist’ stage.</ListItem>
                    <ListItem>In the final stage, the worm will propagate itself by picking new machines to attempt to probe.</ListItem>
                </NumberedList>
                <Paragraph>Worms were invented as a curiosity and have even been suggested as ways of testing networks or distributing software patches across a network; however their drawbacks far outweigh their benefits. Even the most ‘benign’ worm consumes resources and can affect the performance of a computer system.</Paragraph>
            </Section>
            <Section id="trojans">
                <Title>1.2 Trojans</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1074.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1074.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="da1718b0" x_imagesrc="ou_futurelearn_cyber_security_fig_1074.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 3</b></Caption>
                    <Description>The image depicts a wooden Trojan horse being pulled along on a cart.</Description>
                </Figure>
                <Paragraph>The final major type of malware is the Trojan (or Trojan horse) – named after the wooden horse that supposedly smuggled Greek soldiers into the ancient city of Troy.</Paragraph>
                <Paragraph>A Trojan disguises itself as an entirely legitimate program (such as a screensaver), but behind the scenes it is causing damage – perhaps allowing someone else to gain control of the computer, copying personal information, deleting information, monitoring keystrokes, or using email software to pass itself on to other computers. Unlike viruses and worms, Trojans are not self-replicating − they rely on their apparent usefulness to spread between computers.</Paragraph>
                <Paragraph>Some Trojans work in isolation. Some, however, rely on networks, either to transmit stolen information – such as passwords, bank account details or credit card numbers – or to act as back doors to compromised computers. They allow attackers to bypass the operating system’s security features and gain access to data or even control the machine over a network.</Paragraph>
                <Paragraph>Trojans have become a serious problem with Android apps.</Paragraph>
            </Section>
            <Section>
                <Title>1.3 Defining terms</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1178.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1178.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="862e1bde" x_imagesrc="ou_futurelearn_cyber_security_fig_1178.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 4</b></Caption>
                    <Description>The image shows a person using a laptop which is sitting on top of a pile of books.</Description>
                </Figure>
                <Paragraph>In addition to the types of malware described in the previous sections, ‘Adware’, that forces users to view advertising, and ‘Spyware’, malware that attempts to access personal information and user passwords, are other examples you may have heard about.</Paragraph>
                <Paragraph>From the Sophos Threatsaurus PDF downloaded in Week 1 (<a href="https://ugc.futurelearn.com/uploads/files/3f/d3/3fd36a66-d941-4595-b587-1a7b41998ae9/Week_3_Sophos_Threatsaurus_AZ.pdf">https://ugc.futurelearn.com/uploads/files/3f/d3/3fd36a66-d941-4595-b587-1a7b41998ae9/Week_3_Sophos_Threatsaurus_AZ.pdf</a>) , look for a term that you have not come across before.</Paragraph>
                <Paragraph>Try to think of a way to define the term in your own words.</Paragraph>
                <Paragraph>You could also look at examples or information from the sources recommended in Week 1, Section 2.2, <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48261&amp;section=2.2">How to keep up to date</a>.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>2 How malware gets into your computer</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1076.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1076.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="2086ae38" x_imagesrc="ou_futurelearn_cyber_security_fig_1076.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 5</b></Caption>
                <Description>This abstract figure shows an open laptop and a number of circles and spheres with numbers floating around them.</Description>
            </Figure>
            <Paragraph>Malware can get into a computer through a variety of mechanisms, most of which involve exploiting a combination of human and technical factors.</Paragraph>
            <Paragraph>For example, a malware creator might get you to download their malware by putting a link in an email, or attaching the malware to an email. Alternatively, malware might be packaged with illegal copies of standard software so that it can get into the machines of people who choose to use these illegal copies rather than pay for the genuine versions.</Paragraph>
            <Paragraph>However, before looking in detail at how malware gets into your computer, it’s worth thinking about why it does. What is malware for?</Paragraph>
            <Section id="what_is_malware_for">
                <Title>2.1 What is malware for?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1077.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1077.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="60030c24" x_imagesrc="ou_futurelearn_cyber_security_fig_1077.tif.jpg" x_imagewidth="512" x_imageheight="335"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>The image shows a city at night, with curved lines connecting different parts of the city.</Description>
                </Figure>
                <Paragraph>There are many reasons why malware is created including intellectual curiosity, financial gain or corporate espionage.</Paragraph>
                <Paragraph>Many programmers thrive on the challenge of seeing what is possible, and set out to create a malware program even if they do not intend to do harm. Perhaps the most famous of these experiments was the 1988 Morris Worm – the first worm to spread over the internet. The supposed intent of this worm was to gauge the number of machines connected to the network. However, the result was to slow down the operation of infected machines to the point of being unusable.</Paragraph>
                <Paragraph>Worms continue to represent a major threat, as shown by the case of the Conficker Worm of 2008.</Paragraph>
                <CaseStudy>
                    <Heading>Case study: Conficker</Heading>
                    <Paragraph>In 2008, Microsoft Windows computers began being infected by an advanced worm called Conficker, which spread when users shared files, either over networks or via USB flash memory drives. The malware disabled important security features, such as antivirus software and automated update systems and blocked users from downloading fixes. At the same time, Conficker would exploit a weakness in Microsoft’s server software to infect computers on the same network.</Paragraph>
                    <Paragraph>Conficker became the fastest-spreading malware known then, eventually being found in almost every country. Conficker outbreaks were reported from (among others) the armed forces of the UK, France and Germany, as well as the British House of Commons and UK police forces. In the US, Conficker’s impact was sufficiently serious that the Department of Homeland Security set up a Conficker Working Group of security experts tasked with creating strategies that could be used against similar outbreaks in the future.</Paragraph>
                    <Paragraph>Conficker’s authors were clearly not amateurs. They released new variants of Conficker on a regular basis to overcome weaknesses in the original malware and took steps, (including using digital signatures), to ensure that no one else could hijack their program.</Paragraph>
                    <Paragraph>Although Conficker caused a great deal of nuisance, it did not appear to do any actual harm to data, however, the program could have delivered other malware that would have attacked users. In many ways, Conficker was a harbinger of the advanced criminal malware – such as Cryptolocker – that is a major threat to today’s users.</Paragraph>
                    <Paragraph>A detailed analysis of the development of Conficker and how the source was identified was published by Mark Bowden in the <i>New York Times</i> in June 2019: <a href="https://www.nytimes.com/2019/06/29/opinion/sunday/conficker-worm-ukraine.html">https://www.nytimes.com/2019/06/29/opinion/sunday/conficker-worm-ukraine.html</a></Paragraph>
                </CaseStudy>
            </Section>
            <Section id="phishing">
                <Title>2.2 Phishing</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1078.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1078.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="831d725f" x_imagesrc="ou_futurelearn_cyber_security_fig_1078.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 7</b></Caption>
                    <Description>This image shows a figurine of a fisherman standing on top of a computer keyboard. On the end of his fishing line is a piece of paper with the word 'Password'.</Description>
                </Figure>
                <Paragraph>Phishing is any attempt by attackers to steal valuable information by pretending to be a trustworthy party – a form of social engineering attack.</Paragraph>
                <Paragraph>So, an attacker might impersonate a bank to obtain credit card numbers or bank account details. It gets its name from ‘fishing’ – as in ‘fishing for information’, the process of luring people to disclose confidential information.</Paragraph>
                <Paragraph>Phishing relies on people trusting official looking messages, or conversations with apparently authoritative individuals, as being genuine. It is widespread and it can be enormously costly to people who find their bank accounts emptied, credit references destroyed or lose personal or sensitive information.</Paragraph>
                <InternalSection>
                    <Heading>Email phishing</Heading>
                    <Paragraph>The use of electronic technologies to perform phishing attacks was described in the late 1980s, but the term did not become commonplace until the mid 1990s when a program called AOHell allowed AOL users to impersonate other people (including the founder of AOL itself).</Paragraph>
                    <Paragraph>Phishing became increasingly common as more and more people connected for the first time and began receiving official looking messages that looked very much like those sent out by genuine organisations such as banks, stores and government departments. What most of these users did not realise was that not only could email addresses be faked, but that electronic data can be easily copied – just because an email claims to come from your bank and has your bank’s logo doesn’t mean that it is genuine.</Paragraph>
                    <Paragraph>Phishing emails may be indiscriminate. A phisher will create an email asking the user to get in touch with a bank or credit card company claiming that there is a problem with the account or that the bank may have lost some money. These sorts of messages make people justifiably worried and more likely to follow the instruction. The phisher will then include some plausible looking details such as the bank’s logo and address and then send it to millions of individuals. Among all the recipients, a few people will have accounts with that bank and will click the link in the message, or telephone a number, which will begin the process of eliciting further personal information.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>What to do</Heading>
                    <Paragraph>If you do receive an email that worries you from an organisation such as a bank or shop that you use, do not click on or follow the links in the message. Get in touch with their customer services department, or log in to your account through their website. Type in their web address or use the address in your list of favourite sites, or use their published phone number. Most organisations will have a published policy of not asking for sensitive information such as your password through email or over the phone so you should be suspicious of anything that contravenes this policy.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Social media phishing</Heading>
                    <Paragraph>Although email still accounts for the majority of phishing attacks, the technique is also used in social media sites as well as in text messages. The same rules apply – if in doubt, go to the official site and make contact with the company through their published links.</Paragraph>
                    <Paragraph>As we saw in the first week of the course, phishing can sometimes be targeted at individuals or specific parts of an organisation. These attacks, commonly called a ‘spear phishing attack’, will depend on detailed information about the target. For example, an attacker might use information gleaned from recent emails to craft a plausible reply that appears to come from colleagues of the targeted user.</Paragraph>
                    <Paragraph>Attackers may also include links to malware-infected software in personal messages posted in social media. This is especially common after major disasters or during fast-breaking news when people are likely to click on interesting looking links without thinking carefully.</Paragraph>
                </InternalSection>
            </Section>
            <Section id="trapping_phishing_emails">
                <Title>2.3 Trapping phishing emails</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1079.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1079.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="44fc8c12" x_imagesrc="ou_futurelearn_cyber_security_fig_1079.tif.jpg" x_imagewidth="512" x_imageheight="458"/>
                    <Caption><b>Figure 8</b></Caption>
                    <Description>This is a cartoon showing a fishing boat in the sea. In its net are a number of captured letters and pieces of paper.</Description>
                </Figure>
                <Paragraph>Phishing is just one type of spam email which clutters our mailboxes and often delivers unsuitable or even illegal content to individuals.</Paragraph>
                <InternalSection>
                    <Heading>Spam</Heading>
                    <Paragraph>Spam is yet another consequence of the early internet being developed by people who trusted one another. Just as we have had to protect computer networks against hackers – which you’ll cover in Week 6 – as more and more people have accessed the internet, email has become a tool that anyone can use for good or bad.</Paragraph>
                    <Paragraph>Most internet email is moved around the world using the Simple Mail Transfer Protocol (SMTP) which defines a standard template of commands and formatting that allow different mail programs, on a huge range of computers, to understand one another. Protocols are used to specify a set of special messages that should be exchanged between computers to achieve a particular functionality, in this case the delivery of email.</Paragraph>
                    <Paragraph>SMTP was defined when the internet had only a tiny number of users, so the original specification did not include any way for computers to authenticate one another, i.e. there was no way of knowing if the message claiming to come from TrustedBank actually came from TrustedBank’s computers. This weakness was addressed in a later extension to SMTP called SMTP-AUTH, but crucially it was not required, and so almost all mail servers still accept unauthenticated messages.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Spoofing</Heading>
                    <Paragraph>Spammers can attack a mail system by changing the information stored in email ‘envelopes’ which enclose the messages themselves. This is known as ‘spoofing’ and allows a spammer to disguise their actual address by writing new addresses for the sender (such as replacing their own address with that of TrustedBank) and the destination for receipts. Since SMTP servers do not perform any authentication, they simply pass on the email without checking that it was sent out by TrustedBank.</Paragraph>
                    <Paragraph>Simple spoofing is now being challenged by technologies that allow genuine senders to authenticate messages which can be checked by the recipient’s mail server, however only about half of all mailboxes have any protection against spoofing.</Paragraph>
                    <Paragraph>Provided a spammer has access to a fast network (or increasingly to a botnet), spam costs the sender almost nothing and although only a tiny fraction of users will respond to a spam message, sufficiently vast numbers of emails are sent that the rewards far outweigh the costs. It has been estimated that seven TRILLION spam messages, making up more than 85% of all email, were sent during 2011 alone. In 2018, spam was estimated to be down to 55% of all messages. Such is the torrent of spam that internet service providers and companies have to buy far more bandwidth and storage than they will ever need for legitimate purposes.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>2.4 Spotting a phishing email</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1080.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1080.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="8dcdf075" x_imagesrc="ou_futurelearn_cyber_security_fig_1080.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>This is an example of what could be a phishing email.</Description>
                </Figure>
                <Paragraph>Although a phishing attack may appear plausible at first glance, there are some tell-tale signs that should make you very cautious about clicking on any links or giving any personal information to the supposed sender.</Paragraph>
                <Paragraph>Read through the points below to find out what to look out for.</Paragraph>
                <BulletedList>
                    <ListItem><Paragraph><b>Spelling mistakes</b>: Most English-language phishing expeditions are sent from countries where English is not the primary language. Attackers often give themselves away by imprecise use of English, even with quite common phrases, and including spelling errors. So read the message carefully. However, there are many phishing emails that use excellent English.</Paragraph></ListItem>
                    <ListItem><Paragraph><b>Who is it to?</b> Many, but not all phishing attacks do not use your name in the introduction – preferring ‘Dear valued customer,’ or ‘Dear user,’. This is because they cannot personalise the emails sufficiently. Your bank or online store can do this and should address you as ‘Dear Bob,’ or ‘Dear Mrs Jones,’ (or whatever your name is). However, note that because so many millions of user details have been revealed by data breaches it is quite possible for a phishing email to use your personal details.</Paragraph></ListItem>
                    <ListItem><Paragraph><b>Poor quality images</b>: Sometimes, the images used in the emails are fuzzy, or your information may appear as an image rather than type. These images have been copied from screens and would not be used by original companies. It is easy to obtain images every bit as good as the originals though, so a high quality image should not persuade you the message is genuine.</Paragraph></ListItem>
                    <ListItem><Paragraph><b>Content of the email</b>: In almost all countries, banks and other financial bodies will not email you to tell you about problems with your account. They recognise that email is fundamentally insecure and that personal information should not be sent by email. So, even the method of communication will give you a clue about whether it’s genuine. The email may give a false sense of urgency, claiming that your account is at risk if you do not act quickly. This is not the case.</Paragraph></ListItem>
                    <ListItem><Paragraph><b>Links</b>: The text of a web link is not the same as the destination of the link itself – the link might say it is taking you to, for example http://www.trustedbank.com, but in fact it can take you anywhere on the web – including to a phisher’s computer impersonating that of a reputable company. You can spot some fake links by hovering your mouse pointer over the link – but do not click the button. The actual destination of the link will appear at the bottom of the window or in a small floating window next to the link. In a phishing email, the link will probably be to an address you aren’t familiar with. Other fake links may display a genuine destination when you hover over them, but still take you to a fake website because code in the page intercepts the link and sends your click elsewhere.</Paragraph></ListItem>
                </BulletedList>
                <Paragraph>The example message below claims to come from a fictional site called ePay and is about unauthorised activity on the account. The link says it goes to ePay’s site, but the address is slightly different and is unlikely to be owned by ePay.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1171.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1171.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="8d235277" x_imagesrc="ou_futurelearn_cyber_security_fig_1171.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 10</b> A phishing email claiming to come from the fictional ePay site</Caption>
                </Figure>
                <Paragraph>So the rules are to be suspicious and to look at the details of the message, the language, the quality of the images and where the links actually take you. Banks and shops will always prefer you to call them and check rather than risking your security.</Paragraph>
                <Paragraph>If you have not already done so recently, check you email address on <a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a>. Email addresses that are on a breached list are much more likely to receive spam than those that are not listed. If your email address is on the list you need to assess what related data may have been revealed. You may need to change passwords that use that email address, especially if you have reused the same passwords in the past, or even stop using that email address </Paragraph>
            </Section>
            <Section>
                <Title>2.5 Emails are not the only phish</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1081.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1081.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="fca86564" x_imagesrc="ou_futurelearn_cyber_security_fig_1081.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 11</b></Caption>
                    <Description>This image shows a computer keyboard. Instead of letters and numbers, on each key is an emoji.</Description>
                </Figure>
                <Paragraph>Please don’t think that malware is spread solely through email. Malware will be spread through any means possible.</Paragraph>
                <Paragraph>Malware can be distributed by including it with pirated material such as illegal copies of software, video games and movies. Malware can also be installed on your computer by clicking links on websites – especially sites that distribute illegal copies of software, videos and pornography – or by annoying pop-up windows that claim to have identified problems with your computer (quick tip – they probably haven’t! But it’s a great prompt to run your antivirus software and remind yourself what a genuine alert looks like on your computer).</Paragraph>
                <Paragraph>A recent trend is for malware to be spread through social networking services, like Cory’s experience of the direct message on Twitter that you heard about in Week 1. Once it is on a machine running social networking software, the malware masquerades as the real user and posts messages containing links to sites that distribute yet more malware.</Paragraph>
                <Paragraph>Once again, this type of malware relies on social engineering to multiply – users of social networks are highly likely to click on links they think have come from friends and spread the infection. Most of these social networking infections have exploited weaknesses in client software rather than the web versions of the networks, so it is important to keep social networking client software, such as the Facebook App for mobile devices, up to date.</Paragraph>
            </Section>
            <Section>
                <Title>2.6 The role of malware in click fraud</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1082.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1082.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="203288f5" x_imagesrc="ou_futurelearn_cyber_security_fig_1082.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 12</b></Caption>
                    <Description>This is an image of a pile of notes of different currency, for example American dollars and Euros.</Description>
                </Figure>
                <Paragraph>The majority of modern malware has been designed with malicious intent; to cause damage to a computer’s operating system or its data, or to steal information from a user, or increasingly, from online advertisers.</Paragraph>
                <Paragraph>As you will have seen, many large websites rely on advertising for their revenue. The amount of money spent on online advertising is growing rapidly with more than £16 billion spent in the UK alone during 2011. This is expected to exceed £26 billion in 2020. Advertisers like online advertising because it can be relatively cheap compared to a printed advertisement and because software allows for individuals to be targeted with specific adverts for products they are likely to buy.</Paragraph>
                <Paragraph>The most common type of advertising is ‘pay per click’ where advertisers only pay the owners of a site when a user clicks on an advert. This system can be subverted by either generating clicks that don’t come from genuine customers, or by hijacking a click intended for a genuine advertiser. This is known as click fraud, it accounts for more than 20% of all clicks and it can be aided by malware. Computers all around the world, operating as a botnet, can generate false clicks, siphoning money from advertisers through multiple layers of publishers and redistributors to hide its eventual destination.</Paragraph>
                <Paragraph>There are two frequently used modes of click fraud – both can use botnets to generate the clicks.</Paragraph>
                <NumberedList>
                    <ListItem>Clicking on targeted company ads on genuine sites to waste their advertising revenue. The perpetrator doesn’t collect any income.</ListItem>
                    <ListItem>The criminal sets up many hundreds or thousands of websites, often just copying other website content. They sign up for advertising e.g. adsense with google. Then they commission a bot network to click on the ads on their own pages and collect their share of the ad revenue.</ListItem>
                </NumberedList>
                <Paragraph>While an individual click will only raise a tiny amount of money, done millions of times, click fraud can raise serious amounts of money. In 2011, the FBI broke a click fraud operation based in Estonia that had infected more than four million computers in 100 countries and stolen in excess of $14 million from advertisers.</Paragraph>
                <Paragraph>In 2016, a Russian criminal group created 6,000 websites with over 250,000 pages containing video advertising. Their bot network ‘watched’ over 300 million video ads each day. They were defrauding the advertisers of close to four million dollars a day.</Paragraph>
            </Section>
            <Section>
                <Title>2.7 Botnets</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1006.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1006_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="d7cc69d5" x_subtitles="ou_futurelearn_cyber_security_vid_1006.srt">
                    <Transcript>
                        <Speaker>COMPUTER</Speaker>
                        <Remark>Hello there. Are you about to click on a link you're not sure about? Well I hope you've taken care. Because if not, I could quite easily drop a Trojan horse, or a drive-by download, or some other sinister malware into your laptop and turn your computer into a zombie. Don't worry, it's not one of those zombies.</Remark>
                        <Remark>But it does mean I could take control of your computer without you knowing and either steal your identity or make your computer do things it shouldn't, like sending out spyware or spam. I can make it happen without you noticing. And it's not only your computer I can do that to. I can make a whole network of them which is called a botnet, or a zombie army.</Remark>
                        <Remark>So, I guess you'll want to know how to avoid it all, won't you? Well, the first thing to do is not to click on any unsafe links or download any attachments that you're not sure of. But if you're worried you may be part of a botnet, check if your computer is running slower than normal, or if starts behaving erratically. Or you might notice some unusual internet activity that you weren't expecting.</Remark>
                        <Remark>You could check your Task Manager to see what it's up to. Disconnect from the network and see if the computer behaves differently. Looks like you've got a problem. Of course your virus scanner should be telling you as well.</Remark>
                        <Remark>So what can you do to stop it happening? Uh oh, almost right. You need to make sure your antivirus and anti-spyware software is up to date. But use a reputable source. Rogue antivirus software could be malware in disguise. And remember, though that helps, it can't save you if you go and click on an unsafe link anyway. You're learning, but give it a full scan. And make sure your firewall is on too. And, if all else fails, ask an expert to help you. No need to thank me. I was just doing my j-.</Remark>
                        <Remark>[TYPING]</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1006.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1006.jpg" x_folderhash="e1d42cc2" x_contenthash="b6be9548" x_imagesrc="ou_futurelearn_cyber_security_vid_1006.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>You heard about botnets briefly in Week 1, when we said that botnets are created using malware that give an attacker control over a group of computers and commonly use them to gather information from the computers (e.g., usernames and passwords), launch attacks against others. These attacks might be sending spam emails, or flooding a website with so many requests for content that the server cannot cope, which is known as a denial-of-service attack.</Paragraph>
                <Paragraph>A single piece of malware can cause enormous damage, but when thousands, or even millions of computers run the same program, their effects can be devastating. So a botnet is a group of computers that coordinate their activity over the internet. There are a number of harmless botnets used for such purposes as the Internet Relay Chat (IRC) text messaging program, but the vast majority are created by malware.</Paragraph>
                <Paragraph>Botnets spread through viruses and worms and once installed on the victim’s computer they use the internet to make contact with a control computer. At this point, the infected computer (often called a zombie) will do nothing more except periodically check for instructions from the control computer. Over time, more and more computers are recruited to the incipient botnet until it may contain tens of thousands of zombies, but they don’t raise suspicion as they appear to be doing nothing.</Paragraph>
                <Paragraph>At some point in the future, the control computer will issue a command for the botnet to wake up and begin doing something. Often the people who created the botnet itself have either sold or rented the botnet to another group who want to use its capabilities.</Paragraph>
                <Paragraph>Botnets have been used to flood the internet with spam messages, to commit fraud against advertisers and to perform so-called distributed denial-of-service attacks on companies and governments. Botnets are so large, and so widely distributed across the internet that they can be very hard to tackle and the effects of a coordinated attack on critical parts of the network can mean even very large websites struggle to remain online while the botnet targets their computers.</Paragraph>
            </Section>
            <Section>
                <Title>2.8 Confessional</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1083.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1083.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="cdab630b" x_imagesrc="ou_futurelearn_cyber_security_fig_1083.tif.jpg" x_imagewidth="512" x_imageheight="384"/>
                    <Caption><b>Figure 13</b></Caption>
                    <Description>This is an illustration of two laptops sitting opposite each other, with various robots shooting lasers at each other.</Description>
                </Figure>
                <Paragraph>It’s time to confess! Think about the following:</Paragraph>
                <BulletedList>
                    <ListItem>Has your computer ever been infected with malware?</ListItem>
                    <ListItem>Do you know the name of the malware that was involved?</ListItem>
                    <ListItem>Was it a virus, worm or Trojan?</ListItem>
                    <ListItem>What happened, and what were the consequences?</ListItem>
                </BulletedList>
                <Paragraph>If you discuss this with others, remember not to share any personal information including the name of the company you work for.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>3 Keeping yourself protected</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1084.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1084.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ddd82f74" x_imagesrc="ou_futurelearn_cyber_security_fig_1084.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 14</b></Caption>
                <Description>This shows a needle being injected into a bottle.</Description>
            </Figure>
            <Paragraph>The growth in malware has been accompanied by an explosive growth in software designed to prevent it spreading.</Paragraph>
            <Paragraph>So-called antivirus software (which actually targets a range of malware) is a multi-billion pound business with a large number of commercial and free packages available for all computer users ranging from individuals to large corporations.</Paragraph>
            <Paragraph>At the same time, the developers of computer operating systems are incorporating a wider range of security features that try to stop malware running at all.</Paragraph>
            <Paragraph>And there is a lot you can do yourself to keep yourself protected such as installing antivirus software, keeping your software up to date, looking out for the signs of phishing emails and implementing new security developments.</Paragraph>
            <Paragraph>Before you install or change anti-malware software you should check the reviews from a number of reputable and independent organisations. Look at how they rate the free packages as well as the paid for packages.</Paragraph>
            <BulletedList>
                <ListItem><a href="https://www.av-test.org/en/">https://www.av-test.org/en/</a></ListItem>
                <ListItem><a href="https://selabs.uk/">https://selabs.uk/</a></ListItem>
                <ListItem><a href="https://www.av-comparatives.org/">https://www.av-comparatives.org/</a></ListItem>
            </BulletedList>
            <Section id="antivirus_software">
                <Title>3.1 Antivirus software</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1085.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1085.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="fb4f5a58" x_imagesrc="ou_futurelearn_cyber_security_fig_1085.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 15</b></Caption>
                    <Description>This image shows numerous toy soldiers guarding a laptop.</Description>
                </Figure>
                <Paragraph>Antivirus software aims to detect, isolate and if necessary, delete malware on a computer before it can harm data. Antivirus software uses several techniques to identify malware – the two most common are known as signatures and heuristics.</Paragraph>
                <InternalSection>
                    <Heading>Signatures</Heading>
                    <Paragraph>A malware’s signature is a distinctive pattern of data either in memory or in a file. An antivirus program may contain thousands of signatures, but it can only detect malware for which a signature has been identified and published by the antivirus program’s authors. As a result there is a period between a new piece of malware being released ‘into the wild’ and when its signature can be incorporated into antivirus products. During this period, the malware can propagate and attack unprotected systems, exploiting the so-called ‘zero day’ vulnerabilities that exist until the systems are fixed and antivirus signatures are updated. It is not uncommon for several variants of a malware program to be published at intervals, each sufficiently different that they possess different signatures.</Paragraph>
                    <Paragraph>A second weakness of signatures is that more sophisticated malware has the ability to change its program (it is said to be polymorphic or metamorphic), disguising itself without affecting its operation.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Heuristics</Heading>
                    <Paragraph>Complementing signatures, heuristics use rules to identify viruses based on previous experience of the behaviour of known viruses. Heuristic detection may execute suspicious programs in a virtual machine (a software recreation of a physical computer) and analyse the program for operations typical of known malware (such as replicating itself or attempting to overwrite key operating system files); or it might revert the program back to its original source code and look for malware-like instructions. If the heuristic analysis considers that the file acts in a malware-like manner, it is flagged as potentially dangerous.</Paragraph>
                    <Paragraph>Unlike signatures, heuristics do not require specific knowledge about individual types of malware – they can detect new malware, for which signatures do not exist, simply by their behaviour. The drawback of heuristics is that they can only draw conclusions based on past experience; radically new malware (which appears all too regularly) can pass unnoticed.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Issues with antivirus software</Heading>
                    <Paragraph>Although antivirus software is an essential part of protecting your computer, it is not a complete solution to malware problems.</Paragraph>
                    <Paragraph>Despite the best endeavours of its makers, antivirus software has occasionally proved to contain bugs with consequences like being inaccurate, failing to update itself or simply consuming huge amounts of computer power. Fortunately, these problems are rare, easily fixed and much less serious than the risk from a malware attack.</Paragraph>
                    <Paragraph>Note that not all anti-malware software is equally good. There is even fake anti-malware offered for sale, especially for mobile devices.</Paragraph>
                    <Paragraph>Check the reviews of anti-malware software by reputable organisations:</Paragraph>
                    <BulletedList>
                        <ListItem><a href="https://www.av-test.org/en/">https://www.av-test.org/en/</a></ListItem>
                        <ListItem><a href="https://selabs.uk/">https://selabs.uk/</a></ListItem>
                        <ListItem><a href="https://www.av-comparatives.org/">https://www.av-comparatives.org/</a></ListItem>
                    </BulletedList>
                </InternalSection>
                <Paragraph>In October 2019, the BBC reported that a combined operation by British Police, Indian police and Microsoft had shut down two Indian call centres using web pages and phone calls to sell fake computer security services. Victims were conned out of thousands of pounds. The City of London Police say it is one of the most common online scams, with over 2,000 cases reported to Action Fraud every month.</Paragraph>
                <Paragraph>The police offered these tips to avoid being scammed:</Paragraph>
                <BulletedList>
                    <ListItem>Always check out callers, especially cold callers who claim to be Microsoft, your telephony provider or internet service provider.</ListItem>
                    <ListItem>Legitimate organisations will encourage you to call back via a number you've obtained from a trustworthy source.</ListItem>
                    <ListItem>Do not assume that the number displayed on your phone is accurate, these can be spoofed, leading you to believe that the caller is in the UK or from a trusted organisation.</ListItem>
                    <ListItem>Don't call phone numbers on pop-up messages which indicate there is a problem with your computer.</ListItem>
                </BulletedList>
                <Reference>(BBC, 2019)</Reference>
            </Section>
            <Section>
                <Title>3.2 Installing antivirus software</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1086.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1086.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="9e8aca23" x_imagesrc="ou_futurelearn_cyber_security_fig_1086.tif.jpg" x_imagewidth="512" x_imageheight="280"/>
                    <Caption><b>Figure 16</b></Caption>
                    <Description>This image shows six computer screens, each displaying images related to antivirus software, such as images of locks and the words 'privacy, 'password' and 'protection'.</Description>
                </Figure>
                <Paragraph>If you don’t already have antivirus software on your computer, it should be a high priority to install some. Windows 10 has Windows Defender built into the OS and got a top rating in June 2019: <a href="https://www.av-test.org/en/antivirus/home-windows/">https://www.av-test.org/en/antivirus/home-windows/</a>. </Paragraph>
                <Paragraph>There are a number of good, free packages available but you should always check that it meets your needs before installing it. Some important features to consider are:</Paragraph>
                <BulletedList>
                    <ListItem><b>Is it compatible with your computer?</b> You will have to make sure the antivirus software is appropriate for the operating system and computer that you have.</ListItem>
                    <ListItem><b>Does it come from a reputable source?</b> For example, it may have been developed by one of the major computer security companies, such as Norton, Kaspersky, Sophos or AVG. Alternatively, it may have been provided or recommended by your bank or internet service provider.</ListItem>
                    <ListItem><b>Does it provide updates that allow it to protect you against the latest malware?</b> New malware is being developed all the time, and it is important that you use an anti-malware application that will update itself.</ListItem>
                    <ListItem><b>Have you checked the reviews?</b> Use: <a href="https://www.av-test.org/en/">https://www.av-test.org/en/</a>, <a href="https://selabs.uk/">https://selabs.uk/</a> or <a href="https://www.av-comparatives.org/">https://www.av-comparatives.org/</a>.</ListItem>
                </BulletedList>
                <Paragraph>Use the above criteria to research antivirus products available so that you can choose the one that is best for you. If you already have an antivirus application, answer the questions for the program you have.</Paragraph>
            </Section>
            <Section>
                <Title>3.3 Keeping your software up to date</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1087.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1087.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="152f36e8" x_imagesrc="ou_futurelearn_cyber_security_fig_1087.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 17</b></Caption>
                    <Description>This is an image of a smartphone. On the screen is a calendar alert for a software update.</Description>
                </Figure>
                <Paragraph>Computer operating systems and application programs are so large that they inevitably contain bugs, some of which could compromise your security.</Paragraph>
                <Paragraph>The majority of companies issue regular updates to their programs to fix known problems. Major operating systems and some application packages (such as Microsoft Office and the Adobe productivity suite) automate most of the process of updating software by automatically checking for updates, prompting the user to install them and then actually performing the update itself. This process is sometimes called ‘patching’.</Paragraph>
                <Activity>
                    <Heading>Activity 1 Keeping your software up to date</Heading>
                    <Timing>Allow about 15 minutes</Timing>
                    <Question>
                        <Paragraph>How do you go about keeping one of the software applications on your computer or device up to date? Reseach the application online to find out if there is any additional information about keeping it up to date.</Paragraph>
                    </Question>
                </Activity>
            </Section>
            <Section>
                <Title>3.4 End-of-life software</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1088.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1088.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="aaa5795c" x_imagesrc="ou_futurelearn_cyber_security_fig_1088.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 18</b></Caption>
                    <Description>This image shows an old-fashioned typewriter, but with a DVD drive and a mouse attached.</Description>
                </Figure>
                <Paragraph>Software is continually being developed and replaced by a new version. The lifespan of software begins when it is released and ends when it’s no longer supported and updated.</Paragraph>
                <Paragraph>Software doesn’t become completely unsafe as soon as it reaches the end of its lifespan; in many cases you can continue to use it, but you should be aware that security risks may not be addressed by its authors. If you work for an employer, you may be required to move to an updated version of the software as part of their security management process.</Paragraph>
                <Paragraph>The first effect you will feel from end-of-life software is that companies will cease telephone and internet support for queries. So if you have problems using a product you won’t get any help. The manufacturer may also withdraw bug reporting, so you won’t be able to tell them about problems. At the same time you might also find that cheap upgrades to later versions of paid software are no longer available.</Paragraph>
                <Paragraph>Most large software companies will continue to offer critical software support to obsolete products for a period of time. However, they will not prioritise these programs, instead they will concentrate on fixing problems in up to date software and releasing patches; only then testing older products to see if they are affected and if they can be fixed. This means that users of older products might be exposed to vulnerabilities for longer than those using more modern software. Developers of malicious software, who know about unpatched bugs in older products, are likely to attack these older, weaker programs in preference to more secure programs.</Paragraph>
                <Paragraph>In 2019, Windows 10 was used by 55.77% of Windows OS computers. Windows 7 was still used by 33.42% and Windows 8 and XP and older by 10%. Windows 7 loses extended support on 14 January 2020. Windows 8.1 loses extended support on 10 January 2023.</Paragraph>
                <Paragraph>For example, Windows XP is now no longer supported by Microsoft (since April 2014), despite being widely used. Windows XP and Windows Vista, the two oldest operating systems, have much higher incidences of infection than the newer operating systems that feature much greater levels of security.</Paragraph>
                <Paragraph>If you are using end-of-life software, security applications such as up-to-date firewalls and antivirus software are essential as well as keeping up to date with key applications, such as web browsers and email programs which are used to send and receive personal data. Good information security will help keep you safe. Even if you take these precautions, you should begin planning for a transition to more modern applications. Upgrades are relatively cheap from one version to another (or even free), and any expense should be considered in the light of what you stand to lose if you do not use more secure software.</Paragraph>
                <Paragraph>Finally, don’t forget that even supported software can be vulnerable if it is not updated regularly. In 2017, the WannaCry ransomware infected thousands of computers globally and it was later determined that most infected systems were running Windows 7, an operating system that was still supported by Microsoft. Indeed, months before the global infection of systems, an update to fix the vulnerability exploited by WannaCry had been released, but many systems had not been updated.</Paragraph>
            </Section>
            <Section>
                <Title>3.5 Sandboxes and code signing</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1089.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1089.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="e1ffc522" x_imagesrc="ou_futurelearn_cyber_security_fig_1089.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 19</b></Caption>
                    <Description>This is an image of an elaborate sandcastle.</Description>
                </Figure>
                <Paragraph>In addition to keeping software up to date and using antivirus products, there are other technological innovations that can help mitigate the threats of malware.</Paragraph>
                <Paragraph>Sandboxes and code signing are examples of some of the technologies that developers are integrating into the software we commonly use to help protect our computers.</Paragraph>
                <InternalSection>
                    <Heading>Sandboxes</Heading>
                    <Paragraph>A software sandbox is a way for computers to run programs in a controlled environment. The sandbox offers a constrained amount of memory and only allows very limited access to resources such as operating system files, disks and the network. In theory, the software cannot break out of the sandbox and affect other parts of the computer, so even if malicious software attempts to overwrite parts of the disk, the sandbox will prevent it from doing so.</Paragraph>
                    <Paragraph>Sandboxing is widely used in modern web browsers, such as Internet Explorer 10 onwards, and Chrome, to prevent internet content causing damage to files on the computer. Similar sandboxes exist for most browser plugins and the Adobe Acrobat PDF viewer.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Code signing</Heading>
                    <Paragraph>Code signing is a use of cryptography where software companies issue digitally signed copies of their programs that can be checked by recipients for its authenticity. You’ll discover more about digital signatures in Week 4.</Paragraph>
                    <Paragraph>Code signing is used by the designers of all three major operating systems (Microsoft Windows, Mac OS and Linux) to guarantee that operating system updates are genuine even if they are distributed using flash memory cards rather than directly from the publisher.</Paragraph>
                    <Paragraph>Microsoft Windows uses code signing on operating systems components, such as hardware drivers, which have direct access to the heart of the operating system. Apple has taken code signing even further. Versions of Mac OS from 10.8 onwards can restrict users to only running programs that have been certified by the Apple App Store. While this does offer greater security against malware, it may also restrict choice and prevent users from running certain unsigned apps from third parties.</Paragraph>
                    <Paragraph>Next, you have an opportunity to review what you’ve learned in the end-of-week practice test.</Paragraph>
                </InternalSection>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 3 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 3. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48334">Week 3 practice quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. What type of malware makes copies of itself and hijacks resources by exploiting vulnerabilities to spread itself across a network?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Worm</Paragraph><Feedback><Paragraph>Well done. Worms make copies of themselves and spread themselves across a network.</Paragraph><Paragraph>You may find <CrossRef idref="worms">3.1.1 Worms</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Trojan</Paragraph><Feedback><Paragraph>No, try again. A Trojan can be a standalone program, such as a screensaver, but is not self-replicating.</Paragraph><Paragraph>You may find <CrossRef idref="trojans">3.1.2 Trojans</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Virus</Paragraph><Feedback><Paragraph>No, try again. A virus attaches itself to other applications rather than being standalone.</Paragraph><Paragraph>You may find <CrossRef idref="viruses">3.1 Viruses</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Spam</Paragraph><Feedback><Paragraph>No, try again. The term spam is used for email that is unwanted or malicious, but this is not a standalone application.</Paragraph><Paragraph>You may find <CrossRef idref="worms">3.1.1 Worms</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. What is the term used for a group of computers controlled by an attacker and used for sending spam emails or instigating a denial-of-service attack?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Zombie</Paragraph><Feedback><Paragraph>Not quite right, try again. An individual infected computer is known as a zombie. What is the term used for a group of such computers?</Paragraph></Feedback></Wrong><Wrong><Paragraph>Threatsaurus</Paragraph><Feedback><Paragraph>No, try again. The Threatsaurus is a very useful web-based guide to the different types of malicious software.</Paragraph></Feedback></Wrong><Right><Paragraph>Botnet</Paragraph><Feedback><Paragraph>Well done. A botnet is a group of computers (sometimes called zombies) that coordinate their activity over the internet, as you saw in <CrossRef idref="malware_basics"><i>Malware basics</i></CrossRef>.</Paragraph></Feedback></Right><Wrong><Paragraph>Morris worm</Paragraph><Feedback><Paragraph>No, try again. The Morris worm was an early example of a worm, as you saw in <CrossRef idref="what_is_malware_for"><i>What is malware for</i></CrossRef>.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. The AOHell program that, in the 1990s, allowed AOL users to impersonate another person, was an early example of what type of attack?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Virus</Paragraph><Feedback><Paragraph>No, try again. The term we are looking for became commonplace in the 1990s.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Worm</Paragraph><Feedback><Paragraph>No, try again. Look back at the TrustedBank example.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Trojan</Paragraph><Feedback><Paragraph>No, try again. The term we are looking for involves the attacker trying to pass off a fraudulent message as belonging to a genuine bank or other organisation.</Paragraph></Feedback></Wrong><Right><Paragraph>Phishing</Paragraph><Feedback><Paragraph>Yes, well done. The AOHell case was the first time that the term phishing became commonplace.</Paragraph><Paragraph>You may find <CrossRef idref="phishing">3.2.2 Phishing</CrossRef> useful.</Paragraph></Feedback></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. Which of the following is an example of spoofing?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Placing one’s own address in an email ‘envelope’ with a different address.</Paragraph><Feedback><Paragraph>Yes, well done. This is an example where a spammer can disguise their address and pretend a message comes from a trusted organisation such as a bank.</Paragraph><Paragraph>You may find <CrossRef idref="trapping_phishing_emails">3.2.3 Trapping phishing emails</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Siphoning money from advertisers by hijacking clicks on websites and sending them to another, fraudulent, website.</Paragraph><Feedback><Paragraph>No, try again. This is an example of click fraud, not spoofing.</Paragraph><Paragraph>You may find <CrossRef idref="trapping_phishing_emails">3.2.3 Trapping phishing emails</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Including links to malware in personal messages posted in social media websites.</Paragraph><Feedback><Paragraph>No, try again. This is a common way for malware to get into your computer, but is not called spoofing.</Paragraph><Paragraph>You may find <CrossRef idref="trapping_phishing_emails">3.2.3 Trapping phishing emails</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Including malware as an attachment to an email.</Paragraph><Feedback><Paragraph>No, try again. This is a common way for malware to get into your computer, but is not called spoofing</Paragraph><Paragraph>You may find <CrossRef idref="trapping_phishing_emails">3.2.3 Trapping phishing emails</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. What is the term used to describe rules that identify viruses based on previous experience of known viruses?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Signatures</Paragraph><Feedback><Paragraph>No, try again. You’re on the right track but signatures are distinctive patterns that identify particular viruses once they have been detected. What is the technique used alongside signatures to detect new viruses?</Paragraph></Feedback></Wrong><Wrong><Paragraph>Anti-virus software</Paragraph><Feedback><Paragraph>No, try again. You’re on the right track but the term we’re looking for is one the techniques that anti-virus software uses.</Paragraph></Feedback></Wrong><Right><Paragraph>Heuristics</Paragraph><Feedback><Paragraph>Well done. In Antivirus software, you saw how heuristics are used alongside signatures to identify and detect viruses.</Paragraph><Paragraph>You may find <CrossRef idref="antivirus_software">3.3.1 Antivirus software</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Code signing</Paragraph><Feedback><Paragraph>No, try again. Code signing is an application of cryptography where software companies issue digitally signed copies of their programs whose authenticity can be checked by recipients.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 3</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1090.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1090.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="c47d165b" x_imagesrc="ou_futurelearn_cyber_security_fig_1090.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 20</b></Caption>
                <Description>This image shows silver spider-like robots on a patterned image.</Description>
            </Figure>
            <Paragraph>You have also taken a closer look at ways of keeping attackers from impersonating you online or infecting your devices with malware.</Paragraph>
            <Paragraph>In the next part of the course, you will delve a little deeper into the technologies that underpin information security, first focusing on how to protect the networks that we depend on for transmitting our digital information and accessing online services.</Paragraph>
            <Paragraph>There is some optional further reading in the next section relating to some basic precautions you should take before you go online.</Paragraph>
            <Paragraph>You can now go to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48321">Week 4: Networking and communications</a>.</Paragraph>
        </Session>
        <Session>
            <Title>Further reading</Title>
            <!--<Paragraph><a href="http://eandt.theiet.org/magazine/2011/06/out-of-control.cfm">Infrastructure cuber security</a> An article raising awareness of the lack of IT security in public infrastructure from The Institution of Engineering and Technology.</Paragraph>-->
            <Paragraph><a href="http://www.staysafeonline.org/stay-safe-online/keep-a-clean-machine/malware-and-botnets">Keep a clean machine</a> Basic precautions to take before you go online.</Paragraph>
        </Session>
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 4: Networking and communications</UnitTitle>
        <Introduction>
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1032.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1032_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="905669ef" x_subtitles="ou_futurelearn_cyber_security_vid_1032.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Over the past three weeks, we've explored the many potential threats to our digital lives. We've also taken a closer look at ways of keeping attackers from impersonating you online or infecting your devices with malware. Now we're going to delve a little deeper into the technology that underpins information security, focusing first on how to protect the internet itself and the network security problems that can affect it.</Remark>
                    <Remark>By the end of the week you'll be aware of some of the networking standards that allow different devices to connect to the internet and exchange information. You'll also be able to explain how data is transmitted across networks. And you'll understand the difference between the internet and the world wide web.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1032.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1032.jpg" x_folderhash="e1d42cc2" x_contenthash="9e6ccaa1" x_imagesrc="ou_futurelearn_cyber_security_vid_1032.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Cory introduces the networking and communications topic.</Paragraph>
            <Paragraph>You’ll learn how data is transmitted across the networks, including wireless networks and understand the difference between the internet and the world wide web.</Paragraph>
        </Introduction>
        <Session id="what_is_the_internet">
            <Title>1 What is the internet?</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1174.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1174.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="e1acd192" x_imagesrc="ou_futurelearn_cyber_security_fig_1174.tif.jpg" x_imagewidth="512" x_imageheight="324"/>
                <Caption><b>Figure 1</b></Caption>
                <Description>This is a photograph of Vinto Cerf.</Description>
            </Figure>
            <Paragraph>The internet is not a single entity with a single owner; instead it comprises a hierarchy of individual networks that have been connected to one another. These networks range from local area networks (LANs) that can be found in many businesses and universities to the telephone and data networks that link cities and countries by fibre optic cables and satellite links.</Paragraph>
            <Paragraph>A definition often used is that the internet is a network of networks. Before looking at the design of the internet in more detail, let’s hear from Vinton Cerf, one of the engineers who was involved in the creation of one of the earliest computer networks:</Paragraph>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_aud_1091.mp3" type="audio" x_manifest="ou_futurelearn_cyber_security_aud_1091_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="ffd49f53">
                <Transcript>
                    <Speaker>SPEAKER</Speaker>
                    <Remark>Vinton Cerf is vice president and chief internet evangelist for Google. He has been involved in internet technology right from the very start. Ten years ago, the Open University interviewed him for a series called TheWebStory.com.</Remark>
                    <Remark>His involvement with internet technology started in the 1960s, when he was working on a computer networking project funded by the US Defense Advanced Research Project Agency, ARPA. He is widely known as the ‘father of the internet’.</Remark>
                    <Speaker>VINTON CERF</Speaker>
                    <Remark>Well I think people have gotten a little carried away at least in our culture there seems to be a need to focus a lot of attention on just one or two people. That’s not right. There are many fathers of the Internet depending on how far back you want to go and the evolution of the technology. At UCLA I was a graduate student along with Steve Parker, John Postel, Bob Braden, and a number of others, all working for Professor Len Kleinrock, who had the network measurement centre at UCLA. And so our job was to put the first computer up on the ARPANET and particularly the one that did network measurement.</Remark>
                    <Speaker>SPEAKER</Speaker>
                    <Remark>The ARPANET was a network of computers set up in 1969 to link research departments in universities around the United States. The big challenge was to get the different computers to talk to each other.</Remark>
                    <Speaker>VINTON CERF</Speaker>
                    <Remark>No one was really in charge of the development of the host protocols to connect computers up to the underlying network that Bolt Beranek and Newman was building, and so the graduate students just sort of gravitated to try to work on that. We always expected that someone would come out who was professional and would run the show. Steve Parker, who was my good friend then and still is, ran the network working group and we always expected that somebody from the East Coast would show up to tell us what to do but they never did. So we just went on and did the best we could.</Remark>
                    <Remark>Protocol is of course it's a diplomatic term. It's something that you establish in agreement between countries and that’s called protocol. It also turns out to come from the Greek word ‘protocollum’, which was the table of contents of a scroll. Well we stole that word for computer communication conventions because packets of information that computers exchange have little headers on them to say where they're going, where they came from and how much there is in that piece. So we called the procedures computer protocols. They're simply conventions for communications between computers.</Remark>
                    <Speaker>SPEAKER</Speaker>
                    <Remark>To get information between the various computers that formed the ARPANET, the data was chopped up into small ‘packets’. The packet switching protocols Vint and his colleagues devised enabled the packets to be sent by different routes and recombined at the other end to recreate the original data.</Remark>
                    <Speaker>VINTON CERF</Speaker>
                    <Remark>When the first wide area packet switch network was being built the ARPANET there was some uncertainty whether it was going to work at all. That actually worked out quite well. It was a very powerful and useful tool for computer science departments that were part of that system. In fact packet switching was so successful that we at ARPA anyway decided it would explore using packet switching in radio and satellite communication. That led to the development of the mobile packet radio network and an Atlantic satellite net that linked the US to Europe using packet switching technology. Well once those projects were under way Bob Kahn who was at ARPA at the time realised that these networks would ultimately have to be inter connected to each other. And we didn’t have any protocols, no procedures, no conventions that would allow computers that were on different networks to smoothly intercommunicate with each other. That led to the inter net project which Bob started at ARPA around 1970 – late ’72 or early ’73 and he posed that problem to me when I was at Stanford in March of ’73 and we worked together on solving that problem: how could computers on different networks communicate with each other uniformly. And that led to the design of what is now called TCP/IP.</Remark>
                    <Remark>This really was a back of the envelope moment. I was sitting in San Francisco in a hotel lobby waiting for some session to start at a conference and had an envelope in my pocket and I pulled it out and I was just sketching what the implications were of the architecture that Bob and I had talked about, eventually leading to what we called gateways and are today called routers. And so in a sense the system’s basic architecture was forced on us because we weren't allowed to change any of the networks themselves we had to work outside of them and then figure out a way to achieve uniformity. So that little sketch, which is long since lost, I had no idea it was an important sketch at the time, it was just getting my thoughts in order, was the beginning of at least for me of understanding how the structure would work.</Remark>
                    <Speaker>SPEAKER</Speaker>
                    <Remark>TCP/IP was one of the great technological breakthroughs of the twentieth century. It allowed the internet to become what it is today.</Remark>
                    <Speaker>VINTON CERF</Speaker>
                    <Remark>The easiest way to understand how the Internet works is to think of Internet packets as electronic postcards. Just like postcards: they have a 'to' address and a 'from' address and a finite amount of content on them. And the fact that they're electronic means that they go through the system about a hundred million times faster than the postcard that goes through the post office. But they behave just like postcards. They don’t necessarily arrive in the same order they were sent. They might not even arrive on the same day. Some of them get lost. That’s true of the Internet packets as well as postcards and so if you think about Internet packets as postcards you have a pretty good model. To understand TCP you need a little bit more thinking. Suppose that you were sending a novel to someone and the only way you could send it was by sending postcards so you cut the pages of the novel up, put them on postcards and then you realise that you have to number the postcards in order to let the party at the other end put them in the right order. Then you wonder you know if some of them got lost you'd have to re-transmit them so you keep copies to send. Then you realise that you need to find out whether you need to send any copies and you have acknowledgements coming back in the form of post cards, some of which might get lost. And so you have time outs that say if I haven't heard anything I'll start sending copies. It's basically the way the TCP works. It essentially allows us to send novels in sequenced order on top of postcards except of course we do it electronically and much faster.</Remark>
                    <Speaker>SPEAKER</Speaker>
                    <Remark>So the internet is essentially a giant game of pass the packet, using a set of rules or protocols called TCP/IP. When the protocol was first used to create an inter network from three separate networks, it was a milestone in internet history.</Remark>
                    <Speaker>VINTON CERF</Speaker>
                    <Remark>Interestingly enough there are two big milestones, neither one of which were very noted at the time by anybody except those of us deeply involved. In 1977, late in the year we actually got all three, packet radio, sat net and ARPANET networks to function together using the Internet protocols and gateways in between and that was very exciting for a few of us who were a part of that, but not noted anywhere. We didn’t call a press conference or issue a press release or anything. We just breathed a great sigh of relief. In 1983 in January we actually insisted on the deployment of those protocols by all the computers that were part of the ARPANET and satellite net and packet radio net. And that was a big moment for the people who had to get their machines up but there were only about two hundred and at most four hundred computers involved. Today there are fifty million computers on the Internet. And so any such similar kind of transformation can't be done in what's called a flash cut. It wasn’t even a flash cut in the Internet’s case. It took several months to get everybody up and running on the new protocols. But that was a forced change. Today you can't force that change.</Remark>
                    <Remark>The only real regret I have is that I didn’t argue that we should have a larger address space for the Internet than we decided on. In 1977 I picked a thirty-two bit address space which was enough to identify up to four billion things. It's now very clear that there will be many hundreds of billions of things on the Internet in the future and we should have picked a bigger address space but at the time it was an experiment and it never dawned on me or most everyone else that we needed anything like the scale that we will ultimately require.</Remark>
                    <Speaker>SPEAKER</Speaker>
                    <Remark>Although he resists being called the father of the internet, Vint Cerf is one of its greatest pioneers. When he first sketched out his ideas for the TCP/IP protocol, did he imagine that the internetworking project would turn out the way it did?</Remark>
                    <Speaker>VINTON CERF</Speaker>
                    <Remark>Certainly not in the form which it has ultimately materialised in. Tim Berners-Lee’s world wide web is something that’s truly phenomenal at the rate at which it has been absorbed and adopted. We knew however that we were working with very powerful technology. We knew that computing and the distributed programmes that are around the network would be very, very powerful engines. We just didn’t know exactly what they were going to do at the time. Software is sort of the ultimate clay – you can make anything you want to out of software if you can figure out how to programme it and so the Internet simply underscores the possibilities by creating an endless frontier of software that sits on top of the computers in the networks that communicate. So although in detail we didn’t know how this would all evolve and economics has played a big role in the evolution. Lower cost of networking, lower cost of computing making it available to many more people. But I think we knew we were working with something that was very powerful and that ultimately might make a big difference.</Remark>
                </Transcript>
            </MediaContent>
            <Paragraph>Two key factors in the design of the internet were:</Paragraph>
            <NumberedList>
                <ListItem>The network would not have a central controlling computer. Each computer on the network would be assumed to have the same authority as every other computer.</ListItem>
                <ListItem>The network should be able to deliver information between any two computers on the network even if some of the machines in the network had failed (or given its Cold War origins, been blown to pieces). There would be a large number of alternative routes through the network, so it was not necessary for information to travel by the most direct route, instead it could travel in a roundabout route, avoiding the damaged parts of the network.</ListItem>
            </NumberedList>
            <Paragraph>In the next section, you’ll see how this works.</Paragraph>
            <Section>
                <Title>1.1 How data moves around the internet</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1008.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1008_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="078907a8" x_subtitles="ou_futurelearn_cyber_security_vid_1008.srt">
                    <Transcript>
                        <Speaker>TEACHER</Speaker>
                        <Remark>When we talk about the internet, it's very tempting to think of it as a single computer network. But in reality, it's made up of thousands of separate networks owned by governments, corporations, and individual users. The computers and links that make up the internet are built by a huge number of companies, and use a large range of different technologies to store and transmit information. The internet is made possible, because although there are a large number of different types of computer and networking equipment, they all understand a relatively small number of communications protocols.
</Remark>
                        <Remark>The two most common are the Internet Protocol, IP, which is used to transmit information. And the Transmission Control Protocol, TCP, which provides a structure for sending data over a network. The two are so important that they're often written together as TCP/IP. Since all of our computers understand the same protocols, it appears that they all belong to the same network.</Remark>
                        <Remark>The internet is made up of a hierarchy of networks all communicating through TCP/IP. The lowest tier is made up of individual users, who might be connected together in a local area network. These small networks are connected to the next tier, which is made up from internet service providers or corporate networks who provide access to internet services. These, in turn, are connected to higher tiers, such as telecommunication companies who own the all-important cables that allow data to travel around the world. The topmost part of the internet is sometimes called the internet backbone, or tier one.</Remark>
                        <Remark>Before data can be sent across the internet, the TCP is used to break it into fixed-size chunks. These are known as datagrams, but are sometimes called packets. Each datagram contains a small amount of data, as well as information needed by the internet itself, including the addresses of both the sender and the recipient and a serial number. The addressed datagrams are passed by the sender's computer to a nearby router, such as one on their home network. The local router extracts the destination address of the datagram, and looks for that destination in a table of known addresses. If the destination address is known to the router, then the datagram is sent to the destination computer. However, if the destination address isn't known to the router, it forwards the datagram to a higher-level router, which has a more comprehensive list of addresses. A datagram 1 might be forwarded all the way up to the routers on the internet's backbone.</Remark>
                        <Remark>The higher-level routers only need to examine the first part of the destination address to determine where the datagram needs to be forwarded. Once its address is found in a router's address table, the datagram can be redirected to a lower-level router, which will in turn forward it to more and more local routers until it eventually reaches its destination.</Remark>
                        <Remark>Routers constantly inform one another about their status and how busy they are. When parts of the internet become congested, or the router becomes unavailable, other routers will find new paths for datagrams that to avoid the problem. IP's ability to constantly reroute data to ensure a reliable flow of traffic means it's entirely possible for datagrams containing parts of the same file to take completely different routes across the internet.</Remark>
                        <Remark>When datagrams finally reach their destination, TCP is responsible for restoring the data to its original condition. The serial numbers on each datagram allow them to be ordered so that the data can be correctly reconstructed. TCP also allows the receiver to request new copies of missing or damaged datagrams from the sender. Between them, TCP and IP offer an extremely reliable way of sending data over what might be an unreliable network.</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1008.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1008.jpg" x_folderhash="e1d42cc2" x_contenthash="deeae35c" x_imagesrc="ou_futurelearn_cyber_security_vid_1008.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>The video explains how data is routed across a network of computers and how the internet is resilient to failures of individual computers, known as nodes of the network, or connections between computers, known as the links.</Paragraph>
                <Paragraph>Instead of using a dedicated circuit for all of the information, internet traffic is split up and may take any number of routes through the network moving from its origin to the destination by a series of hops.</Paragraph>
                <Paragraph><b>Note:</b> Early in the above the video [2:05], an example packet is shown with destination address 6.7.8.104. However, there are subsequently two separate examples of different packets being routed. In the first example, the packet is being sent to a host on the local network, 1.2.3.104 and in the second example it is being sent to a remote host, 6.7.8.101.</Paragraph>
            </Section>
            <Section>
                <Title>1.2 Introducing the datagram</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1092.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1092.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="cd5f3533" x_imagesrc="ou_futurelearn_cyber_security_fig_1092.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This is an image of a collection of envelopes of different colours.</Description>
                </Figure>
                <Paragraph>When data, such as a picture, movie or a document is sent over the internet, it is not sent as a single chunk. Instead it is split up into small, uniformly sized blocks called ‘datagrams’, also sometimes called ‘packets’.</Paragraph>
                <Paragraph>Imagine that you have a large book that you want to post to a friend, but you only have small envelopes. One way to post the book is to tear it into a number of pieces, placing each piece in a different envelope. Each envelope is addressed to the recipient. It makes sense to label each envelope with a number to tell your friend where the pages belong in the whole book. When the envelopes are put in the postal system they may all travel through the same sorting offices and arrive on the same day, or they might take different routes and arrive on different days. However, your friend should be able to recreate the book when they receive all the envelopes.</Paragraph>
                <Paragraph>A number of different datagrams are used by data travelling over the internet, but they all have a similar structure. One envelope and its contents correspond to a single datagram. The envelope (which is called the ‘header’) contains the sender and recipient’s addresses, a unique number, a date stamp and some error correction information, while the contents (called the ‘payload’) contains the actual information being delivered.</Paragraph>
                <Paragraph>The address is an IP number that you will look at later in Week 4. You can look up the details of an address by using a ‘whois’ service. For example, you could use the site <a href="https://whois.domaintools.com/">https://whois.domaintools.com/</a> and type open.ac.uk into the whois search box.</Paragraph>
                <Paragraph>In the details returned you can see: </Paragraph>
                <Paragraph><b>IP Address</b> 137.108.200.90</Paragraph>
                <Paragraph>Other details show that the domain belongs to The Open University. The IP location is in Milton Keynes, England, and is hosted on an Apache server.</Paragraph>
            </Section>
            <Section>
                <Title>1.3 Datagrams on the move</Title>
                <Paragraph>We have seen how, in theory, datagrams of information move around the internet. It’s actually possible to see this in action, often with surprising results.</Paragraph>
                <Paragraph>Each datagram is sent through a series of computer nodes that form the backbone of the Internet. There are many thousands of these nodes and often many different routes between them. Each of these nodes has an IP address. If you look up the IP address of the node using ‘whois’, some will provide a geographical location for the node. Some will provide only the country of that node, and some provide no location information.</Paragraph>
                <Paragraph>On most computer systems you can run software that will follow the route from your computer to a destination IP address, and it will return a list of the nodes that it passes through. These are usually known as ‘Traceroute’ apps. See the wikihow page for information on how to run this Traceroute tool on your computer: <a href="https://www.wikihow.com/Traceroute">https://www.wikihow.com/Traceroute</a>. </Paragraph>
                <Paragraph>Instead of looking up the ‘whois’ for each node to see where it is located, you can use an online utility that does this looking up for you and plots the results on a map. Open <a href="https://peter-thomson.com/leaflet-map-tutorial/traceroute-mapper.html">https://peter-thomson.com/leaflet-map-tutorial/traceroute-mapper.html</a> in your browser and paste in the output from  running ‘Traceroute’ on your computer.</Paragraph>
                <Activity>
                    <Heading>Activity 1 Datagrams</Heading>
                    <Timing>Allow about 15 minutes</Timing>
                    <Question>
                        <Paragraph>Spend about 10 minutes exploring the routes to some of the following Australian organisations:</Paragraph>
                        <BulletedList>
                            <ListItem><a href="http://www.usyd.edu.au/">the University of Sydney</a></ListItem>
                            <ListItem><a href="http://www.smh.com.au/">the Sydney Morning Herald newspaper</a>.</ListItem>
                        </BulletedList>
                        <Paragraph>Be warned! You might be surprised at what you find – information is not necessarily coming from where you might expect it to. Also, bear in mind that things change frequently when it comes to the internet; not only might the route be different if you look at the same destination at different times, but even the location where the information comes from might be different.</Paragraph>
                        <Paragraph>Nodes increasingly don’t provide information – a security precaution. Nodes only identify a country – or the wrong country as they are using factory defaults. The destination might also not be the original server as sites may be cached or served from multiple locations.</Paragraph>
                        <Paragraph>Now use the site <a href="https://whois.domaintools.com/">https://whois.domaintools.com/</a> to locate the <a href="http://www.smh.com.au/">Sydney Morning Herald</a>.</Paragraph>
                        <Paragraph>Not where you expected? </Paragraph>
                        <Paragraph>The information for usyd.edu.au is less informative, but shows: </Paragraph>
                        <Paragraph><b>IP Location</b> - New South Wales - Sydney - University Of Sydney</Paragraph>
                    </Question>
                    <Discussion>
                        <Paragraph>You will have discovered that the route to the <a href="http://www.smh.com.au/">Sydney Morning Herald</a> website did not terminate in Australia.</Paragraph>
                        <Paragraph>A URL ending in ‘.au’ is an Australian domain, but that doesn’t mean that the computer hosting the site has to be in Australia.</Paragraph>
                        <Paragraph>The Australian Domain Name Administrator (auDa) is responsible for licensing users of ‘.au’ names, and it has rules that require the licensees to have some connection with Australia (that is not the case with all countries; some authorities allow anyone to license their names). However, where the website is hosted – which computer the website is stored on – is a different question from who is using the URL. For example, Google (based in the USA) offers a service hosting websites (Google Sites). It’s possible to use a service with a ‘.eu’ (European) domain name, with the result that the ‘.eu’ site is in the USA.</Paragraph>
                        <Paragraph>You can look up the details of an address by using a ‘whois’ service. For example, you could use the site https://whois.domaintools.com/ and type innovations.ac.uk into the whois search box. Note that this domain is also associated with The Open University.</Paragraph>
                        <Paragraph>In addition, websites that receive heavy usage from a particular location might be cached locally – that is to say, copies of the website’s data might be temporarily stored on a computer closer to the location from which the information is being accessed. This saves making heavy use of long-distance connections.</Paragraph>
                        <Paragraph>How many stages did your information take? Did anything surprise you about the route your information took?</Paragraph>
                        <Paragraph>Use Trace Route and ‘whois’ to look up the location of other website domains that you use.</Paragraph>
                    </Discussion>
                </Activity>
            </Section>
            <Section id="wireless_networks">
                <Title>1.4 Wireless networks</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1094.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1094.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="25a9b7cb" x_imagesrc="ou_futurelearn_cyber_security_fig_1094.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 4</b></Caption>
                    <Description>The image is of a large mast with a number of satellite dishes attached to it.</Description>
                </Figure>
                <Paragraph>Early computer networks depended on wires to move their data around the world, but engineers quickly realised that it would be useful to be able to use wireless (radio) connections to create a local wireless network.</Paragraph>
                <Paragraph>Nowadays, wireless local area networks are commonplace. These wireless local networks have become known as Wi-Fi after the trademark of the Wi-Fi Alliance that certifies compatible products. If you have a laptop, tablet or smartphone, it probably has wi-fi access. Wi-fi is also being incorporated into an ever wider range of consumer goods including eBook readers, smart televisions, burglar and smoke alarms.</Paragraph>
                <Paragraph>Wi-fi enables devices such as computers and printers to be connected together wirelessly to form a local area network (LAN). Instead of the signals going through cables and wires, they are sent through the air instead as radio waves.</Paragraph>
                <Paragraph>The name ‘wi-fi’ refers in particular to wireless local area networking technology that is compliant with a particular family of standards maintained by the Institute of Electrical and Electronics Engineers (IEEE) and called the 802.11 family. You will see different variants of this standard on wireless routers, for example 802.11b, 802.11g and 802.11n.</Paragraph>
                <Paragraph>In wireless LANs, the individual laptops, mobile phones and other devices, or nodes, are usually referred to as stations, acknowledging the fact that each communicating device acts as a radio station with a transmitter and a receiver.</Paragraph>
                <Paragraph>In order to connect to a wi-fi network, a station needs to know the name of the network. This is also known as the service set identifier (or SSID) of the wireless LAN. The ‘service set’ referred to here is the set of wireless devices to be served by a particular wireless LAN.</Paragraph>
                <Paragraph>The SSID allows the nodes on a wireless LAN to distinguish themselves from nodes on other wireless LANs that may be operating in the same physical space. For example, in many airports mobile phone companies provide free wireless LAN services to their customers and use the SSID to ensure that customers connect to the appropriate wi-fi network.</Paragraph>
                <Paragraph>When you are trying to connect to an available network, you will see a list of SSIDs that are reachable from your device, some of these will have padlocks against them – more about what that means later.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>2 Is your private information really private?</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1038.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1038_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="d52c9e58" x_subtitles="ou_futurelearn_cyber_security_vid_1038.srt">
                <Transcript>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>You might think you've got pretty good online security. You've devised long and complicated passwords. You only log onto trusted Wi-Fi networks. So how could anyone access your personal data? Well it doesn't take millions of pounds worth of high tech infrastructure. It's not only state security services that can do it. Anyone, with a bit of inexpensive kit, and a little bit of know-how, could be reading your emails right now. To show how easy it is to hack into just about anyone's emails, we invited a group of students to participate in a short experiment. We promised them a free lunch and that was enough to tempt them in. And we told them it had something to do with mobile phones. We did not tell them precisely what was about to happen.</Remark>
                    <Remark>We've invited you here to ask what your mobile phone says about you. And by the time we're all finished here, I think you're going to be pretty surprised when you find out just how much information your phone is giving away about you, all the time, without you even knowing it.</Remark>
                    <Remark>While they ate some free sandwiches and, inevitably, started playing with their phones, we started the electronic eavesdropping. They had no idea what we were up to next door. What our volunteers don't know is that hidden behind this bookcase, are our tech security experts. Right now, they are using a bogus Wi-Fi network to connect to our volunteers' phones and access all kinds of personal data.</Remark>
                    <Remark>Glenn and Daniel are here to show us, and our student guinea pigs, just how easy it is to hack into their phones and start reading their emails, tracking where their phones have been, and see what they're looking at online.</Remark>
                    <Speaker>GLENN WILKINSON</Speaker>
                    <Remark>So, Rachel Powell, we've got her Mac address.</Remark>
                    <Speaker>DANIEL CUTHBERT</Speaker>
                    <Remark>Can we find her?</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>Using only a small receiver attached to their laptops, they're able to create Wi-Fi networks that look like the familiar trusted networks the students use all the time. Any of our students might have been wary if they had knowingly logged onto an insecure public network, like you might find at a bar or a coffee shop. But their phones are being tricked into automatically joining what looks like an approved and trusted network, sending all their traffic through our hackers' laptops. They had no reason to suspect anything, but while they dug into the egg and cress.</Remark>
                    <Speaker>DANIEL CUTHBERT</Speaker>
                    <Remark>Her Facebook profile is open. She shows where she lives.</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>Glen and Daniel could see their Facebook pages, check where they'd been, even read their personal emails. Whilst you've been patiently waiting for us here, we have secretly had two tech security experts in the next room trying to find out as much as they possibly can about each and every one of you, without them knowing your names. They don't know your telephone numbers, none of that. But they've still been able to glean quite a lot of information about you.</Remark>
                    <Remark>Our students are about to discover just how much. By leaving their phones switched on, they've inadvertently given away their names, online identities, and allowed access to deeply private communications. </Remark>
                    <Speaker>GLENN WILKINSON</Speaker>
                    <Remark>I'm seeing your Facebook and your email. Your Yahoo mail, it turns out, was, it's not encrypted.</Remark>
                    <Speaker>ALLIE KURTZ</Speaker>
                    <Remark>Are you going through my email?</Remark>
                    <Speaker>GLENN WILKINSON</Speaker>
                    <Remark>We can go through your inbox. At that point, we have control. So Dan was looking at, like, a sent email.</Remark>
                    <Speaker>ALLIE KURTZ</Speaker>
                    <Remark>I do know I have quite an open online profile. But to see the emails come up on the screen, that was a bit shocking, all my work emails, personal things. So that was surprising. It's, like, really scary to know that can happen.</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>And it's not just your email. Our hackers could identify the precise locations where our students' 2 phones had previously logged on to Wi-Fi networks.</Remark>
                    <Speaker>GLENN WILKINSON</Speaker>
                    <Remark>Someone went to the States and connected to a network with a unique name. So that's the only one that's in the database. So I know you've been there. And anyone from Romania or visited Romania?</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>Did you realise that the phone in your pocket was practically a GPS tracking device?</Remark>
                    <Speaker>RACHAEL PELLS</Speaker>
                    <Remark>Not to that extent. I didn't realise it was that easy to track my whereabouts, even if, you know, even if they don't have anything on me in the first place, they can just find out everything they need to know through my phone.</Remark>
                    <Speaker>GLENN WILKINSON</Speaker>
                    <Remark>We are the good guys. We are on your side. This is an example to – if we were the bad guys, we wouldn't be showing you this. We'd be clearing out your bank accounts and running for the border.</Remark>
                    <Speaker>DOMINIQUE BRUNDLER</Speaker>
                    <Remark>I had no idea, really. We were just talking, eating sandwiches. So really just surprised and shocked.</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>So at any point, somebody could be hacking into your phone and trying to access all this information about you. And you've realised there's no way you would know that was happening.</Remark>
                    <Speaker>DOMINIQUE BRUNDLER</Speaker>
                    <Remark>Yeah, basically, I will now turn off my Wi-Fi while I'm around.</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>Worried now? You should be. So how can you carry on, using convenient Wi-Fi hotspots, without giving away all your secrets?</Remark>
                    <Speaker>DANIEL CUTHBERT</Speaker>
                    <Remark>They've got to be more aware of what they're connecting to. Mobile phones and smartphones today leak out a lot of information. The way we use the internet, we give away a lot of what we're doing.</Remark>
                    <Speaker>SARAH SMITH</Speaker>
                    <Remark>You're the white hat hackers. You are doing this for good purposes. Are other people out there using technology like this without quite such good purposes?</Remark>
                    <Speaker>DANIEL CUTHBERT</Speaker>
                    <Remark>Definitely. The criminal market is abusing this kind of technology now. Advanced malware, custom viruses, et cetera. And they're going after people. They want people's email boxes. They want access to computers. Because that way you can then start doing a lot more fraud than you could do with the old fashioned style attack.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1038.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1038.jpg" x_folderhash="e1d42cc2" x_contenthash="28f1d667" x_imagesrc="ou_futurelearn_cyber_security_vid_1038.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>We all hope that the information we send wirelessly is private, but is that always the case?</Paragraph>
            <Paragraph>Channel 4 News was able to learn personal information about unsuspecting people by intercepting their, supposedly private, but in reality completely public, wireless internet signals.</Paragraph>
            <Paragraph>The attack shown in the video was possible because the hackers had set up their own wi-fi hotspot that either advertised the name of a common wireless hotspot provider, or the users chose to connect to a ‘free’ wi-fi network. The lesson here is to be careful about the public wi-fi networks you connect to, and the types of information you access using these networks.</Paragraph>
            <Section>
                <Title>2.1 Network security challenges</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1095.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1095.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="f8a718b5" x_imagesrc="ou_futurelearn_cyber_security_fig_1095.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 5</b></Caption>
                    <Description>This shows the back of a wireless router with a cable going into the port labelled 'INTERNET.</Description>
                </Figure>
                <Paragraph>Internet routers are designed to move datagrams to their destination but how secure are they?</Paragraph>
                <Paragraph>They have been programmed with strategies to overcome problems such as congestion or the failure of a part of the network. These strategies involve re-routing datagrams via any alternative path, as you saw from using Trace Route. Therefore, it is impossible to state with any assurance which route will be taken by a datagram travelling outside a local network.</Paragraph>
                <Paragraph>The datagram may travel directly, or, more probably, travel through several routers located anywhere in the world. These routers will most probably not belong to either the sender or the recipient, but a third party. In most cases this will not matter, but datagrams can be copied, and their security compromised, as they pass through a router without alerting either the sender or receiver.</Paragraph>
                <Paragraph>The process is known as packet sniffing and it has many legitimate purposes including analysing network performance and for law enforcement, but packet sniffing software is readily available to anyone who chooses to use it. In the past, packet sniffing required a computer that was wired to the network, but wireless networking means this is no longer the case.</Paragraph>
            </Section>
            <Section id="security_risks_wireless">
                <Title>2.2 Encryption in wireless networking</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1012.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1012.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0972e47c" x_imagesrc="ou_futurelearn_cyber_security_fig_1012.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>This image shows three large satellite dishes.</Description>
                </Figure>
                <Paragraph>Since wireless networks transmit data over a medium that is shared by everyone, anyone with a compatible receiver or transceiver is able to eavesdrop on the radio signals being sent.</Paragraph>
                <Paragraph>Ensuring that the eavesdropper is not able to convert these signals into the original message is a desirable security property of any wireless network, referred to as ensuring <i>confidentiality</i>. (This was one of the three security essentials we mentioned earlier, along with integrity and availability.)</Paragraph>
                <Paragraph>Another security problem with using a shared medium for transmission is that malicious users could interpose themselves between a sender and a receiver and modify the messages being exchanged or even destroy them entirely. This is sometimes called a ‘man-in-the-middle attack’, and it compromises the <i>integrity</i> of the data being transmitted across the network.</Paragraph>
                <Paragraph>Finally, an attacker could transmit lots of random data on the frequency being used by the wireless network, congesting the network and thus preventing other users from sending data. As we saw earlier in the course, this is called a ‘denial-of-service’ (DoS) attack and is an example of an attack on the <i>availability</i> of the network.</Paragraph>
                <InternalSection>
                    <Heading>How encryption can help</Heading>
                    <Paragraph>So how do wireless networks address these potential security issues?</Paragraph>
                    <Paragraph>One commonly used security mechanism is <b>encryption</b>, which can help to ensure both the <i>confidentiality</i> and the <i>integrity</i> of data. The idea of encryption is to take the information you wish to protect and transform it into a different form, such that only the people who are supposed to receive the information are able to reverse the transformation and recover the original information. This is like having a key to unlock a door; only a person with the right key can open it.</Paragraph>
                    <Paragraph>Encryption can help ensure:</Paragraph>
                    <BulletedList>
                        <ListItem><b>Confidentiality</b> – When a message is encrypted using a particular key, it can only be decrypted to recover the original information if the same key is used. This ensures that messages are confidential between the sender and the receiver.</ListItem>
                        <ListItem><b>Integrity</b> – Encryption can prevent messages from being modified without the receiver’s knowledge.</ListItem>
                        <ListItem><b>Authentication</b> – Encryption can contribute to the process of proving the identities of the sender and receiver.</ListItem>
                    </BulletedList>
                    <Paragraph>You will look at encryption and decryption in more detail next week when we explain how cryptography works.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Encryption in wi-fi</Heading>
                    <Paragraph>Since wi-fi was first introduced, a number of security techniques have been used to protect wi-fi networks from unauthorised users and to ensure that the data transmitted across them is secure. The most common methods are based on encryption, using a key known only to the nodes in the wireless network.</Paragraph>
                    <Paragraph>The first of these mechanisms was called Wired Equivalent Privacy (WEP), which (as the name suggests) aimed to provide confidentiality comparable to that of a wired network. Since 2001, a number of serious problems have been identified in WEP that allow the encryption key to be computed within a few minutes, using readily available software. Many wireless devices still support WEP to ensure compatibility with older equipment such as old modems, but wherever possible users should switch to a more modern form of encryption.</Paragraph>
                    <Paragraph>In 2018, most equipment  for Wi-Fi networks use Wi-Fi Protected Access 2 (WPA2), which uses a more secure key to encrypt the transmitted data. This security mechanism has become the default configuration for wi-fi networks, and must be supported by all wi-fi devices in order for them to be compliant with the 802.11 standard.</Paragraph>
                    <Paragraph>In 2019, new Wi-Fi devices should start to move to the WPA3 standard that will add higher levels of security. However, many public Wi-Fi networks will continue to run WPA2 and won’t provide the enhanced security.</Paragraph>
                    <Paragraph>The only way of enhancing security on public Wi-Fi networks is to use a Virtual Private Network (VPN) which we will discuss in Week 6.</Paragraph>
                    <Paragraph>In the next section you’ll consider how you might use wi-fi more securely.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>2.3 Using wireless networking securely</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1013.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1013.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="96ed3d32" x_imagesrc="ou_futurelearn_cyber_security_fig_1013.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 7</b></Caption>
                    <Description>The image shows three internet cables sitting on top of a computer keyboard.</Description>
                </Figure>
                <Paragraph>Use the network connection tool on your computer to identify how many wireless networks are within range of your current location.</Paragraph>
                <Paragraph>How many of them use secure connections? If your home wireless network is not configured to use WPA2 or WPA3, find out how to set this up and make sure to do this. The user manual for your wireless router or your internet service provider’s website should have information that will help.</Paragraph>
                <Paragraph>Consider how you connect to the internet when you are on the move. Do you connect to your home wi-fi network, your mobile service provider, the free wi-fi in a coffee shop?</Paragraph>
                <Paragraph>Go through the online services you identified in Week 1. Which ones would you choose not to access using public wireless networks? </Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>3 Why we need standards on the internet</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1096.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1096.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="212894b9" x_imagesrc="ou_futurelearn_cyber_security_fig_1096.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 8</b></Caption>
                <Description>This image is a photograph of a complicated road layout, from above.</Description>
            </Figure>
            <Paragraph>As you’ve learned, when you send data over the internet it is sent across several hierarchies of networks, using different technologies from many different providers and operated by different organisations.</Paragraph>
            <Paragraph>These networks must use a standard form of communication so information from one network can be passed across to another network.</Paragraph>
            <Paragraph>To some extent, the way any one of these separate networks works internally is nobody’s business but the owner and users of that network. However, where a network joins to other networks, where it becomes part of the internet, it has to conform to the standards of the internet.</Paragraph>
            <Paragraph>The internet is not owned by a single organisation, so there is no one authority that dictates how it works. Yet all the different people and organisations with their own networks that together make up the internet have to work to common standards, or data would be unable to move between the different networks.</Paragraph>
            <Paragraph>In the next section you’ll find out about the TCP/IP protocols.</Paragraph>
            <Section id="introducing_tcpip">
                <Title>3.1 Introducing the TCP/IP protocols</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1175.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1175.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="1223d1b6" x_imagesrc="ou_futurelearn_cyber_security_fig_1175.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>This image shows the back of a computer with multiple cables.</Description>
                </Figure>
                <Paragraph>The standards that allow different networks and differing communications equipment to talk to one another are formalised in digital rules known as ‘communications protocols’.</Paragraph>
                <Paragraph>For the internet the two most important are the Transmission Control Protocol (TCP), and the Internet Protocol (IP). They are so inextricably linked that they are often written together as TCP/IP.</Paragraph>
                <InternalSection>
                    <Heading>TCP</Heading>
                    <Paragraph>The TCP protocol is responsible for ensuring data can be sent reliably over the internet. It works through a number of software ports that act to keep data separate on the same computer – so it is possible to browse a web page, collect email and listen to streaming music at the same time.</Paragraph>
                    <Paragraph>To understand how TCP works you need to know something about ports. A port can mean different things depending on the context. A port can be a physical connection on a device such as the USB port into which you plug your printer or flash drive. But for TCP, it means a number which indicates how data is handled when it reaches its destination. Many ports represent specific protocols such as port 80 representing the well-known port of HTTP.</Paragraph>
                    <Paragraph>Common TCP ports include the following:</Paragraph>
                    <BulletedList>
                        <ListItem>port 20 and 21 – File Transfer Protocol (FTP) for sending and receiving files (port 20) and control (port 21)</ListItem>
                        <ListItem>port 22 – Secure Shell (SSH) for secure logins to computers</ListItem>
                        <ListItem>port 25 – Simple Mail Transfer Protocol (SMTP) for sending email</ListItem>
                        <ListItem>port 80 – HyperText Transfer Protocol (HTTP) for browsing web pages.</ListItem>
                    </BulletedList>
                    <Paragraph>Data being sent from an application on your computer is divided into TCP datagrams each containing the TCP port number. The TCP application running on the recipient’s computer will then examine this port number to determine which application should receive the information in the datagram.</Paragraph>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_security_week4_fig10.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_security_week4_fig10.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="be5b4808" x_imagesrc="cyber_security_week4_fig10.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                        <Caption><b>Figure 10</b></Caption>
                    </Figure>
                    <Paragraph>TCP’s second major task is ensuring that all data sent from a computer is received by its destination. It waits for acknowledgements from the remote computer, and in the event that a datagram gets lost or damaged in transit, it can resend the missing datagram. For this reason TCP is reliable – but relatively slow.</Paragraph>
                    <Paragraph>Applications where timeliness is more important than absolute accuracy – such as streaming media, video games and video conferencing – will use less reliable, but faster, protocols such as UDP (User Datagram Protocol) to send and receive their data.</Paragraph>
                    <Paragraph>If you are receiving an email, you want the whole message to arrive with no gaps, but if you are streaming a TV programme, it doesn’t greatly matter if a few datagrams get lost.</Paragraph>
                    <Paragraph>TCP is not responsible for sending and receiving information; that is performed by a second protocol – most commonly, IP, that we will look at next.</Paragraph>
                </InternalSection>
            </Section>
            <Section id="the_internet_protocol_and_ip_addresses">
                <Title>3.2 The internet protocol and IP addresses</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1098.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1098.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="da610e79" x_imagesrc="ou_futurelearn_cyber_security_fig_1098.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 11</b></Caption>
                    <Description>The image is of a lorry driving along an empty road.</Description>
                </Figure>
                <Paragraph>The Internet Protocol (known as IP) does the hard work of actually moving data across the internet. IP is only concerned with moving data, it doesn’t actually check that data actually arrives (that’s handled by TCP).</Paragraph>
                <Paragraph>When IP receives data from TCP to be sent on to the internet it wraps the TCP datagram in its own IP datagram containing a sender’s and a receiver’s address as well as some other information.</Paragraph>
                <Paragraph>When IP receives data from the internet, it removes the IP datagram information and passes it to TCP which will perform the checking of the contents and reordering of information before it can be passed through the appropriate port to an application.</Paragraph>
                <InternalSection>
                    <Heading>IP addresses</Heading>
                    <Paragraph>The internet addresses used by humans (such as www.open.edu) are purely for our convenience, as computers use numeric addresses known as ‘Internet Protocol’ addresses (or IP addresses, or sometimes IP numbers) for communication. Every computer directly connected to the internet has a unique Internet Protocol (IP) address.</Paragraph>
                    <Paragraph>There are two major forms of IP address: IPv4 and IPv6.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>IPv4 (Internet Protocol version 4)</Heading>
                    <Paragraph>This is the most familiar form of IP address consisting of four numbers, each ranging from 0 to 255, separated by full stops (periods) in the form 192.168.0.1. IPv4 has long underpinned the internet although it is now in urgent need of replacement (see below) because the number of devices connected to the internet has nearly exhausted the total number of available IPv4 addresses.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>IPv6 (Internet Protocol version 6)</Heading>
                    <Paragraph>IPv6 is a a replacement for IPv4, originally outlined in 1998, to accommodate the increasing demand for IP numbers as more people and devices were connected to the internet. It can support a theoretical 3.4×10<sup>38</sup> devices meaning it is suitable for any conceivable demand.</Paragraph>
                    <Paragraph>IPv6 is intended to replace IPv4; however this is an extremely complex process and it has taken a long time with even the most developed countries still far from completing the transition. A measure of compatibility exists in the form of IPv4-mapped IPv6 addresses where IPv4 addresses are stored in the IPv6 format.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Reserved IP numbers</Heading>
                    <Paragraph>Not all of the numbers in the IPv4 address range are actually available for use. As well as large blocks reserved for specific users in the early days of the internet, some are specifically used for ‘private’ networks outside of the internet.</Paragraph>
                    <UnNumberedList>
                        <ListItem>10.0.0.0 to 10.255.255.255</ListItem>
                        <ListItem>169.254.0.0 to 169.254.255.255</ListItem>
                        <ListItem>172.16.0.0 to 172.31.255.255</ListItem>
                        <ListItem>192.168.0.0 to 192.168.255.255</ListItem>
                    </UnNumberedList>
                    <Paragraph>Your computer will allocate itself an IP address beginning 169.254… if it is unable to connect to a local network. If you have a connection to the internet from your home your computer will almost certainly have an address beginning 192.168… In this case your network hub has a genuine IP address, your computer and other devices attached to the modem have private addresses. Your modem alters IP addresses on packets as they are sent to and from your home network and the internet.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>3.3 From numbers to names</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1099.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1099.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0715b0ae" x_imagesrc="ou_futurelearn_cyber_security_fig_1099.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 12</b></Caption>
                    <Description>This is a close up of '.uk' on a screen.</Description>
                </Figure>
                <Paragraph>When we type an address (such as www.open.edu) into a browser, the address is translated into a unique IP address by a name server, called a Domain Name Server (DNS), located somewhere on the internet. This IP address is attached to every IP datagram destined for the Open University server.</Paragraph>
                <Paragraph>As an example we will use an IP datagram belonging to an email being sent to Bob who works in the coffee bar at Big University in America (Bob’s address is bob@coffee.big.edu). The address is sorted from the most general part of the address to the most specific. First of all, the name server on the sender’s machine makes a request across the internet to a computer which holds the addresses of all American universities (most of which use .edu at the end of their address) asking for the IP number of big.edu. Assuming that big.edu exists, the .edu name server then responds with the IP number for the name server at Big University.</Paragraph>
                <Paragraph>The sender’s machine then uses that IP number to make a link to the name server at Big University and requests the IP number of the coffee shop computer used by Bob. The big.edu name server will then respond with the address of the coffee shop. The IP datagrams can then all be addressed correctly and sent into the network.</Paragraph>
                <Paragraph>Up until 2019, the DNS information requested was sent as plain text and could be intercepted even when the data being sent or requested was encrypted. From 2019, it has become possible for DNS requests to be encrypted. In Firefox browser go to Settings, then Network settings and select the enable DNS over HTTPS checkbox.</Paragraph>
                <Paragraph>Chrome 78 is also experimenting with this feature, which can be enabled by browsing to ‘chrome://flags/’ in your Chrome browser, searching for ‘dns-over-https’ and enabling. You will have to restart the browser for this change to take effect. </Paragraph>
            </Section>
            <Section>
                <Title>3.4 The internet is not the world wide web</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1165.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1165.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="2bac84f6" x_imagesrc="ou_futurelearn_cyber_security_fig_1165.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 13</b> British physicist-turned-programmer Tim Berners-Lee devised the specifications for URIs, HTTP and HTML – technologies that underpin the internet as we know it</Caption>
                </Figure>
                <Paragraph>We’ve all done it. We’ve all been browsing a website and said ‘I’m on the internet!’.</Paragraph>
                <Paragraph>This is true, but misleading, if for no other reason than the internet dates from 1982 (with its roots as far back as 1969) but the world wide web only came into being in 1990 thanks to Sir Tim Berners-Lee.</Paragraph>
                <Paragraph>Before the advent of the world wide web, not only did fewer people use the internet (it took until 1998 for 100 million people to log on for the first time), but it wasn’t anything like the world wide web we know today – almost all commands had to be typed in – often using cryptic instructions, and what you got back – if you got anything at all – was plaintext. The world wide web not only meant that it was possible to use the internet’s resources without learning a whole new language, but it allowed for rich text, graphics, animation and sound to be delivered quite literally at the click of a button.</Paragraph>
                <InternalSection>
                    <Heading>Part of the internet</Heading>
                    <Paragraph>At its simplest, the world wide web is nothing more than the part of the internet that can be accessed through the HyperText Transfer Protocol (HTTP) – another one of those standards that helps glue the internet together. HTTP allows two computers to exchange information as a series of requests (e.g. a request from your computer for a copy of the To do list page for this course) and responses (e.g. an Open University server delivers the contents of that page).</Paragraph>
                    <Paragraph>HTTP relies on TCP to set up the connection between the two machines, and it in turn uses IP to send and receive data. The most common applications that understand HTTP messages are web browsers such as the one you are using right now.</Paragraph>
                    <Paragraph>The world wide web is an example of hypertext – documents joined together using links. Every time you click on a link, HTTP is used to request a new page from a web server using TCP port 80. The content for the page is delivered to your computer, again through port 80 and interpreted by a web browser which formats the data in a human readable manner.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Designed to be open</Heading>
                    <Paragraph>The world wide web was designed from the very start to be an open environment which encouraged people to set up their own web servers and to write web pages. To encourage its uptake, all of the documentation that explains HTTP, and other standards that have grown up around the web, are publicly available to anyone wishing to develop software for the web. Likewise, the computer language used to format web documents, the HyperText Mark-up Language (HTML) is not only fully documented online, but is extremely easy to use.</Paragraph>
                    <Paragraph>Apart from the world wide web, the internet itself is used for a much wider range of services including email, instant messaging and file transfers. The internet’s flexibility comes down to the flexibility of the underlying protocols – so long as information can be stored in IP datagrams – and just about anything can – it can be moved around the internet.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Interview with Tim Berners-Lee</Heading>
                    <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_aud_1009.mp3" type="audio" x_manifest="ou_futurelearn_cyber_security_aud_1009_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="783616d5">
                        <Transcript>
                            <Speaker>NARRATOR</Speaker>
                            <Remark>In 1980, a young software consultant called Tim Berners-Lee wrote a programme called ENQUIRE. It involved the use of hypertext, links that allow users to jump directly from one computer page to another. It's sowed the intellectual seeds of an information revolution – the world wide web.</Remark>
                            <Remark>In the late 1990s, Tim gave several interviews against rather noisy backgrounds for the Open University series TheWebStory.com. </Remark>
                            <Speaker>TIM BERNERS-LEE</Speaker>
                            <Remark>The web is an abstract space of information. The web is a space of pages, of documents, of pictures, which are linked together. And the links are abstract links. Now in fact, for the web to exist, all this information about the links and about the documents is transferred over the internet. </Remark>
                            <Speaker>NARRATOR</Speaker>
                            <Remark>Tim's pioneering idea for the world wide web emerged in 1989, when he was working for CERN, the European organisation for nuclear research. </Remark>
                            <Speaker>TIM BERNERS-LEE</Speaker>
                            <Remark>I was just frustrated with a lack of interoperability, the fact that people were championing different documentation systems and help systems. And I tried experimenting with actually taking all the documents in one system and making it appear as though they were in this help system. So I looked at the mapping between the two, and eventually I realised that this little hypertext programme I'd been playing with 10 years before was, in a sense, the key, and that if you made a global hypertext system, any of these systems could be represented in terms of it. </Remark>
                            <Remark>And so suddenly, this was the answer to making any system available without disturbing it, even. That was the key thing. Without putting constraint on somebody, forcing them to use a particular machine, forcing them to store their documents in a particular format. </Remark>
                            <Remark>It just said, all right, let's not force any of those issues. Let's just second-guess them. Let's step above them, and let's say, whatever format you put your document in, let's say that it's part of the one universal space. And let's find a way of making an identifier for it. And once you had that idea, it's really pretty unstoppable. </Remark>
                            <Remark>So when I said, hey, I think we should make a completely general global hypertext system, the very proper answer at CERN was, well, that's fine, but it's not what we're here for. So in fact, it was only because my boss, Mike Sandel, who had a sort of twinkle in his eye, and thought, hm, I don't know what exactly this is about, but I have a feeling that it sounds kind of exciting. </Remark>
                            <Remark>And he said, well, why don't you spend the next couple of months – you know, I won't complain if you just go and write the programme. If Mike hadn't said that, if I'd had to go through the process of trying to get a formal project approved, it would never have happened. </Remark>
                            <Speaker>NARRATOR</Speaker>
                            <Remark>Tim's brilliant idea was to make documents located on one computer appear to be located in a window on another computer. It took Tim and his colleague Robert Cailliau two years to develop and refine the protocols that could make this happen. </Remark>
                            <Speaker>TIM BERNERS-LEE</Speaker>
                            <Remark>When you're looking at a web page and you click on a hypertext link, then hidden behind the actual text of what's written there is the identifier of some other page. When you click on it, then the programme which shows you that page looks up the identifier. An identifier's one of these things which starts with http://. </Remark>
                            <Remark>Now the http means if you want to get at this thing, this is how you do it. You take the rest of the string, the rest of the characters, and the first bit is something like www.acme.com. And that is the is name of a computer, in fact. </Remark>
                            <Remark>So the first thing you do is you go out to another computer you know which knows about the native computer and says, hey, where do I find this? And you get back a computer number, like 28.34.6.12. Something looking more like a telephone number of the other computer. Then your computer uses that to start communicating with the other computer, which has got the information. </Remark>
                            <Remark>And what it does, it sends a very simple message. It just says get, and then it gives the rest of all the other characters left. So when you look at something which says http:// – that means use hypertext transfer protocol. www.something.com – that means go to this computer. Slash, gobbledy-gook-gobbledy-gook. </Remark>
                            <Remark>Gobbledy-gook-gobbledy-gook, you don't have to understand. All you do is you know that's what you asked for. So it makes a connection and it sends a very simple command, which is get gobbledy-gook-gobbledy-gook. And the response is that the information about how to put up that page comes back across the internet, across that connection. </Remark>
                            <Remark>So it's really very simple. It's just, get me gobbledy-gook. Here's gobbledy-gook. </Remark>
                            <Speaker>NARRATOR: </Speaker>
                            <Remark>To start with, the web was limited to developments within the CERN community. Then in August 1991, Tim and his colleagues launched the first publicly available website, a milestone in the history of the internet. </Remark>
                            <Speaker>TIM BERNERS-LEE</Speaker>
                            <Remark>A lot of people ask, what was it like when the web – when it suddenly exploded? When – but it didn't. It didn't suddenly explode. What happened was that it was, for the first two years, a big, hard slog trying to persuade everybody that the idea of global hypertext was not too crazy, or too complicated, or too confusing, or too expensive, or whatever. And in fact, that it was very simple, and in fact, it would save time, et cetera. </Remark>
                            <Remark>So with my fellow evangelist and colleague, Robert Cailliau, we went around to conferences and we went and talked to people individually within the high-energy physics community – which was basically paying our salaries, remember. So I had to persuade them this was important for highenergy physics. And we, at the same time, sent our some emails and some articles to newsgroups and things. </Remark>
                            <Remark>And it was not apparent that it was going to actually make it for a long time. But the interesting thing was that when I looked at the logs of the servers – the first server was called info.cern.ch. And the load on that server, which started off serving 10, 100 hits a day in the summer of '90 – the load on that server went up exponentially during the next 12 months. </Remark>
                            <Remark>And then when I looked back the year after that and made a graph of the second 12 months, it was again exactly the same-shaped exponential curve. So after a while, I started plotting it on a log scale so that you could see it as it went up from the hundreds to the thousands to the tens of thousands. And the load on that server was just – as the time went on from the summer of '91, summer of '92, summer of '93, summer of '94 – the load on the server just went on increasing by a factor of 10 every year. </Remark>
                            <Speaker>NARRATOR</Speaker>
                            <Remark>But the growing success of the world wide web only partially realised Tim's initial dream of what might be possible. </Remark>
                            <Speaker>TIM BERNERS-LEE</Speaker>
                            <Remark>The first part of it was, wouldn't it be great if we had this universal information space, and everybody could be in equilibrium with it so they could exchange information very fluidly through it? Wouldn't this do something amazing for humankind, if we were connected through this information space? That was the dream, part one. </Remark>
                            <Remark>And the other half of the dream was, suppose you have a situation where any idea which is worth typing in, worth clicking in with a mouse, is in the web? Then maybe we should bring back the computers, the computers which have gotten out the way. The computers which have hidden, made themselves scarce, and just produced this information for us. Maybe we'll be able to use them again. Maybe we'll be able to write programmes which can analyse what on Earth our society is like, what on Earth we are trained to do. </Remark>
                            <Remark>That was the second part of the dream. And that's not there at all. So that, we need a whole lot more technology in the web. We need machine-understandable information. We need digital signature. We need a web of trust. We need logical reasoning out there on the web. That is going to be yet another revolution. </Remark>
                            <Remark>I think it's going to be as dramatic as the web phase I, if you like. And we haven't started yet. So really, if you think everything's over, you're completely wrong. This is just the start. We're just figuring out how to make these global revolutions using technology, and how to make them be a good thing for humankind. So jump on board now, because it's just speeding up.</Remark>
                            <Speaker>ANNOUNCER</Speaker>
                            <Remark>From the Open University. For more information, go to www.open.ac.uk/use.</Remark>
                        </Transcript>
                    </MediaContent>
                    <Paragraph>Listen to this interview. Towards the end, Tim Berners-Lee mentions a number of things that will be needed to make the world wide web achieve its full potential. One of these is digital signatures, which can be achieved using cryptography – our topic for next week.</Paragraph>
                    <Paragraph>Next, you have an opportunity to review your learning of the course so far in the Week 4 compulsory badge quiz.</Paragraph>
                </InternalSection>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 4 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 4. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48335">Week 4 compulsory badge quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. Which of the following statements is an <b>incorrect</b> description of the way in which data is transmitted across networks?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Data is split into chunks called datagrams</Paragraph><Feedback><Paragraph>No, try again. This is a true statement. Datagrams are also called packets. Look again at the two key design principles for the internet.</Paragraph><Paragraph>You may find <CrossRef idref="what_is_the_internet">4.1 What is the internet?</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>There is one pre-determined route that data must take</Paragraph><Feedback><Paragraph>Well done. This statement is incorrect because the internet was designed to be resilient to problems on specific routes.</Paragraph><Paragraph>You may find <CrossRef idref="what_is_the_internet">4.1 What is the internet?</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Routers are responsible for directing traffic across the network and on to its destination</Paragraph><Feedback><Paragraph>No, try again. This is a true statement. Look again at the two key design principles for the internet.</Paragraph><Paragraph>You may find <CrossRef idref="what_is_the_internet">4.1 What is the internet?</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Data travels in a series of hops</Paragraph><Feedback><Paragraph>No, try again. This is a true statement. Data does not go straight to the destination computer but travels from node to node. Look again at the two key design principles for the internet.</Paragraph><Paragraph>You may find <CrossRef idref="what_is_the_internet">4.1 What is the internet?</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. What is IEEE 802.11n?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>The only wi-fi standard</Paragraph><Feedback><Paragraph>No, try again.  There are more than one standard for wi-fi.</Paragraph><Paragraph>You may find <CrossRef idref="wireless_networks">4.1.5 Wireless networks</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>One of the older wi-fi standards</Paragraph><Feedback><Paragraph>You’re nearly right. IEEE 802.11n is one of the wi-fi standard variants, but 802.11b is the oldest example given. Try again.</Paragraph><Paragraph>You may find <CrossRef idref="wireless_networks">4.1.5 Wireless networks</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>One of the newer wi-fi standards</Paragraph><Feedback><Paragraph>Well done. IEEE 802.11n is, at the time of writing, the newest of the wi-fi standard variants in current use. Older variants are 802.11b and 802.11g.</Paragraph><Paragraph>You may find <CrossRef idref="wireless_networks">4.1.5 Wireless networks</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>The service set identifier (SSID)</Paragraph><Feedback><Paragraph>No, try again.</Paragraph><Paragraph>You may find <CrossRef idref="wireless_networks">4.1.5 Wireless networks</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. What is the currently recommended security mechanism for wi-fi networks?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Encryption</Paragraph><Feedback><Paragraph>No, try again. Encryption is certainly needed, but which type of encryption is currently recommended?</Paragraph><Paragraph>You may find <CrossRef idref="security_risks_wireless">4.2.2 Security risks of wireless networking</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>WEP</Paragraph><Feedback><Paragraph>No, try again. WEP is not the most current form of protection for wi-fi networks.</Paragraph><Paragraph>You may find <CrossRef idref="security_risks_wireless">4.2.2 Security risks of wireless networking</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>WPA2</Paragraph><Feedback><Paragraph>Well done. WPA2 is a newer and more secure form of encryption than WEP.</Paragraph><Paragraph>You may find <CrossRef idref="security_risks_wireless">4.2.2 Security risks of wireless networking</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Either WEP or WPA2</Paragraph><Feedback><Paragraph>No, try again. While some form of encryption is better than none, just one of these was specifically recommended.</Paragraph><Paragraph>You may find <CrossRef idref="security_risks_wireless">4.2.2 Security risks of wireless networking</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. Which protocol ensures that all data sent from a computer is reliably received by its destination?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>IP</Paragraph><Feedback><Paragraph>No, try again. IP stands for Internet Protocol and is only responsible for moving data; it doesn’t check that the data actually arrives.</Paragraph><Paragraph>You may find <CrossRef idref="introducing_tcpip">4.3.1 Introducing the TCP/IP protocols</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>TCP</Paragraph><Feedback><Paragraph>Well done. TCP stands for Transmission Control Protocol and this is one of TCP’s main tasks. It waits for an acknowledgement from the receiving computer that each datagram has arrived, otherwise it can resend the missing datagram.</Paragraph><Paragraph>You may find <CrossRef idref="introducing_tcpip">4.3.1 Introducing the TCP/IP protocols</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>UDP</Paragraph><Feedback><Paragraph>No, try again. UDP (User Datagram Protocol) is responsible in some types of communication for sending data, but it does not check that the datagrams have actually arrived.</Paragraph><Paragraph>You may find <CrossRef idref="introducing_tcpip">4.3.1 Introducing the TCP/IP protocols</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>HTTP</Paragraph><Feedback><Paragraph>No, try again. HTTP (HyperText Transfer Protocol) is used when browsing web pages, but it relies on other protocols to actually send the datagrams of data.</Paragraph><Paragraph>You may find <CrossRef idref="introducing_tcpip">4.3.1 Introducing the TCP/IP protocols</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>SMTP</Paragraph><Feedback><Paragraph>No, try again. SMTP (Simple Mail Transfer Protocol) is used when sending or receiving email, but it relies on other protocols to actually send the datagrams of data.</Paragraph><Paragraph>You may find <CrossRef idref="introducing_tcpip">4.3.1 Introducing the TCP/IP protocols</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. 192.168.0.1 is an example of what?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>A private IP address in IPv4 format</Paragraph><Feedback><Paragraph>Well done. This is the most familiar form of IP address which has four digits, each between 0 and 255, separated by dots. The 192.168.. subnet is reserved for private networks.</Paragraph><Paragraph>You may find <CrossRef idref="the_internet_protocol_and_ip_addresses">4.3.2 The Internet Protocol and IP addresses</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>A private IP address in IPv6 format</Paragraph><Feedback><Paragraph>No, try again. This is an IP address but you need to think again about the format.</Paragraph><Paragraph>You may find <CrossRef idref="the_internet_protocol_and_ip_addresses">4.3.2 The Internet Protocol and IP addresses</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>A public IP address in IPv4 format</Paragraph><Feedback><Paragraph>No, try again. This is an IP address but you need to think again about the format.</Paragraph><Paragraph>You may find <CrossRef idref="the_internet_protocol_and_ip_addresses">4.3.2 The Internet Protocol and IP addresses</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>A public IP address in IPv6 format</Paragraph><Feedback><Paragraph>No, try again. This is an IP address but you need to think again about the format.</Paragraph><Paragraph>You may find <CrossRef idref="the_internet_protocol_and_ip_addresses">4.3.2 The Internet Protocol and IP addresses</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 4</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1100.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1100.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="67baccc2" x_imagesrc="ou_futurelearn_cyber_security_fig_1100.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 14</b></Caption>
            </Figure>
            <Paragraph>This week you have learned the basics of computer networking and communications, gaining an understanding of how data is transmitted across the networks, including wireless networks.</Paragraph>
            <Paragraph>You are now aware of some of the networking standards that allow different devices to connect to the network and exchange information.</Paragraph>
            <Paragraph>Additionally, you have learned about the difference between the internet and the world wide web, and can describe some security problems that affect networks.</Paragraph>
            <Paragraph>You are now half way through the course. The Open University would really appreciate your feedback and suggestions for future improvement in our optional <a href="https://www.surveymonkey.co.uk/r/cyber_security_stay_safe_end">end-of-course survey</a>, which you will also have an opportunity to complete at the end of Week 8. Participation will be completely confidential and we will not pass on your details to others.</Paragraph>
            <Paragraph>You can now go to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48322">Week 5: Cryptography</a>.</Paragraph>
        </Session>
        <!--<Session id="further_reading"><Title>Further reading</Title><Paragraph><a href="http://eandt.theiet.org/magazine/2011/07/voicing-security-concerns.cfm">Network security concerns</a> An article highlighting security risks in using IP networks for voice calls from The Institution of Engineering and Technology.<EditorComment> Broken link</EditorComment></Paragraph><Paragraph><a href="http://eandt.theiet.org/magazine/2013/09/hacking-the-internet.cfm">Hacking the internet</a> An article raising awareness of cyber crime targeting infrastructure from The Institution of Engineering and Technology. <EditorComment> Broken link</EditorComment></Paragraph></Session>-->
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 5: Cryptography</UnitTitle>
        <Introduction>
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1016.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1016_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="943e756e" x_subtitles="ou_futurelearn_cyber_security_vid_1016.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Early in the course we looked at the importance of ensuring your digital information is kept secret and not tampered with. We called these goals confidentiality and integrity. This week we'll focus on a key technique called cryptography, which is concerned with securing information so that it can be transmitted safely, even over unsecured networks. You'll be learning the basic terminology of cryptography and how it can be used to achieve different security goals, including securing your emails and protecting your digital life. By the end of the week you'll also be able to explain the use of cryptography in common applications, such as the world wide web.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1016.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1016.jpg" x_folderhash="e1d42cc2" x_contenthash="0016253f" x_imagesrc="ou_futurelearn_cyber_security_vid_1016.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Cory explains the focus for this week: cryptography.</Paragraph>
            <Paragraph>Cryptography is a specialised area of mathematics concerned with protecting information so that it can be transmitted and received securely even when there is a risk that a hostile third party might intercept or modify the data. You will recognise it as it’s been mentioned before as a technique that can help with protecting information.</Paragraph>
            <Paragraph>We are now going to look at this important aspect of cyber security in a little more detail.</Paragraph>
        </Introduction>
        <Session>
            <Title>1 The secret of keeping secrets</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1101.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1101.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="fe50e702" x_imagesrc="ou_futurelearn_cyber_security_fig_1101.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 1</b></Caption>
                <Description>This is a black-and-white photograph of a number of women in an office at machines.</Description>
            </Figure>
            <Paragraph>There have been many applications of cryptography throughout history, ranging from simple ciphers used by Julius Caesar to send military orders to his generals, to the more sophisticated medieval ciphers that withstood most attacks until the late ninteenth century and the famous Enigma codes of the Second World War.</Paragraph>
            <Paragraph>The development of computers in the twentieth century allowed for far more complex means of encryption. Computers could perform:</Paragraph>
            <BulletedList>
                <ListItem>the mathematical operations that underpin all cryptography</ListItem>
                <ListItem>much more complex mathematics than could be reasonably expected of a human</ListItem>
                <ListItem>much faster than a human</ListItem>
                <ListItem>on much more data than a human could handle.</ListItem>
            </BulletedList>
            <Paragraph>Any data that could be represented in binary format, i.e. using 0s and 1s, can be encrypted by a computer. It is not an exaggeration to say that encryption makes much of the modern world possible. Some commonplace applications for cryptography include:</Paragraph>
            <BulletedList>
                <ListItem>secure banking and payments systems – cryptography ensures your money is safe when it is transferred between accounts, issued at ATMs or used to shop online</ListItem>
                <ListItem>protecting conversations made over mobile telephones</ListItem>
                <ListItem>safeguarding wireless networks that give access to the internet</ListItem>
                <ListItem>securing files on hard disks and memory sticks</ListItem>
                <ListItem>authenticating electronic documents</ListItem>
                <ListItem>electronic voting</ListItem>
                <ListItem>securing media files such as music or movies from piracy, where it is known as Digital Rights Management (DRM).</ListItem>
            </BulletedList>
            <Section id="plaintext_and_ciphertext">
                <Title>1.1 Plaintext and ciphertext</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1102.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1102.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="a0a60a1f" x_imagesrc="ou_futurelearn_cyber_security_fig_1102.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                </Figure>
                <Paragraph>As in previous weeks, there is some terminology we need to introduce:</Paragraph>
                <BulletedList>
                    <ListItem><b>plaintext</b> – information that can be directly read by humans or a machine (this article is an example of plaintext). Plaintext is a historic term pre-dating computers, when encryption was only used for hardcopy text, nowadays it is associated with many formats including music, movies and computer programs</ListItem>
                    <ListItem><b>ciphertext</b> – the encrypted data</ListItem>
                    <ListItem><b>a cipher</b> – the mathematics (or algorithm) responsible for turning plaintext into ciphertext and reverting ciphertext to plaintext (you might also see the word ‘code’ used – there is a technical difference between the two but it need not concern us now)</ListItem>
                    <ListItem><b>encryption</b> – the process of converting plaintext to ciphertext (occasionally you may see it called ‘encipherment’)</ListItem>
                    <ListItem><b>decryption</b> – the process of reverting ciphertext to plaintext (occasionally ‘decipherment’).</ListItem>
                </BulletedList>
            </Section>
            <Section id="encryption_keys">
                <Title>1.2 Encryption keys</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1103.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1103.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="666dec47" x_imagesrc="ou_futurelearn_cyber_security_fig_1103.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 3</b></Caption>
                    <Description>This is an abstract image of different coloured numbers and patterns.</Description>
                </Figure>
                <Paragraph>Keys are pieces of information that determine the output from an encryption (or decryption) process. A single cipher can produce an almost limitless number of different outputs with different key values, allowing secure communication even if the cipher itself is known to hostile third parties.</Paragraph>
                <Paragraph>It might surprise you to know that almost all ciphers are published in the scientific press or in standards documents. Having them available for widespread scrutiny allows many people to check that they are secure and do not contain weaknesses which could be exploited to compromise the security of the data encrypted using that cipher.</Paragraph>
                <Paragraph>A computer encryption key is nothing more than a string of bits where each bit can have a value of either 0 or 1. The number of possible values for a key is simply the total number of values that the key can have. So our one-bit long key can only have two possible values – 0 and 1. If we choose to have a two-bit key it could have one of four possible values – 00, 01, 10 and 11. In fact every time we increase the length of the key by one bit we double the number of possible keys – so a three-bit key has eight possible values – 000, 001, 010, 011, 100, 101, 110 and 111.</Paragraph>
                <Paragraph>The total number of keys can be written in scientific form as 2<sup>key length</sup>; so a key with a length of eight has 2<sup>8</sup> – that is 256 – values.</Paragraph>
                <Paragraph>But how long should a key be? How short is too short?</Paragraph>
                <InternalSection>
                    <Heading>The problem with short keys</Heading>
                    <Paragraph>Short keys are vulnerable to what is known as a brute force attack, just like you learned in Week 2 about passwords. A brute force attack is where a computer, or a number of computers, try every possible value for a key until they produce recognisable plaintext.</Paragraph>
                    <Paragraph>Since computers can work through key values extremely rapidly, keys must be sufficiently long that they offer a very large number of possible values.</Paragraph>
                    <Paragraph>Keys may be known to the user in the form of passwords, or they may be stored in a computer’s hardware (such as the decryption keys stored on a DVD player that allow it to play the encrypted data stored on the movie disk), or they can be generated by a computer as and when they are needed (such as conducting a secure transaction on a shopping site).</Paragraph>
                    <Paragraph>Next, you’ll learn about the key distribution problem.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>1.3 The key distribution problem</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1019.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1019_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="ecd2ad9d" x_subtitles="ou_futurelearn_cyber_security_vid_1019.srt">
                    <Transcript>
                        <Remark>Alice and Bob want to form some kind of relationship. It might be business, it could even be romantic. But whatever else, it must be confidential. The third person in this relationship is Eve. And, as her name suggests, she's an eavesdropper who wants to know what's going on between
Alice and Bob. To do that she has to intercept their information.</Remark>
                        <Remark>Alice and Bob might not even be aware that Eve exists, but she is a threat to their confidentiality. First of all, let's remind ourselves how messages are sent over the internet. So we have Alice's and Bob's computers here. Alice has created a document which she wants to send to Bob.</Remark>
                        <Remark>When you send a message across the internet, it may actually look like the message goes straight from one computer to the other. In reality, there's usually at least one more computer, such as a router or a file server in between. So now the message goes from Alice, to the computer in the middle, to Bob.</Remark>
                        <Remark>In fact, it can get even more complicated, and there may be a large number of different computers in between the two of them. Alice's message is routed from one computer to another until it reaches Bob.</Remark>
                        <Remark>We've drawn the computers in different colours because they don't belong to either Alice or Bob. They might belong to their internet service providers, their employers, or to a big telecom company. Some of the computers may be in a different country, where different laws apply. And some of them might not be trustworthy, which is where Eve comes in.</Remark>
                        <Remark>Here's the same network, except now Eve's going to join in. She will log on and then compromise one of the computers in the middle. One way she could do this is to use a packet sniffer, a piece of hardware or software that makes copies of any messages passing between Alice and Bob, and sends them to Eve. Alice and Bob won't even know these copies are being made, but Eve will have a full transcript of everything that's happening between the two of them.</Remark>
                        <Remark>Alice and Bob can protect themselves using encryption. The most obvious form of encryption is called symmetric encryption, which uses a single key to encrypt plaintext to ciphertext and decrypt ciphertext back into plaintext. Symmetric encryption has been around for thousands of years and is still important today in the form of technologies called DES, triple DES, and AES, which are widely used in financial transactions over the internet and within banks.</Remark>
                        <Remark>Let's go back to Alice and Bob. Aware that Eve wants to learn their secret, they choose to use symmetric encryption. The first thing for them to do is to generate a shared key and each to make their own copy. One way of doing this is to meet, discuss their secrets, and come up with a key. At the end of the meeting they'll each go away with their own copy of the key. Alice and Bob can now exchange secure messages, each using their own copies of the symmetric encryption key to encrypt and decrypt messages.</Remark>
                        <Remark>However, remember that Alice and Bob don't live locally. They have to travel a long distance, so meeting is not always possible. And it's entirely possible they're in a situation where it's dangerous to share a key.</Remark>
                        <Remark>An alternative is for Alice to generate a key and send it to Bob, perhaps through the post, perhaps over the internet. However, as we all know, things get lost in the post. And that could happen to our encryption key. Or perhaps Eve is waiting by Bob's post box and makes her own copy when it's delivered.</Remark>
                        <Remark>Alice might choose to generate the key herself, then give it to an armed guard, a bit like the way you might use a courier to send a valuable parcel from one part of the country to the other. Alice generates the key on her computer, hands it over to the armed guard, who then trundles across to Bob and hands the key over.</Remark>
                        <Remark>However, as you can imagine, armed guards are very expensive. Historically, the only people who could afford armed couriers to distribute encryption keys were governments and the very largest companies such as banks and international corporations. This meant that most people were completely unable to use cryptography.</Remark>
                        <Remark>Now you've seen some of the problems of symmetric cryptography, let's see how some of those problems apply to the internet.</Remark>
                        <Remark>Alice and Bob still want to share their secrets. Alice has generated a symmetric encryption key on her computer and needs to send it across the internet to Bob. There are a number of computers in between, one of which has been compromised by Eve. So when Alice sends the key across the network, it passes through the computer now belonging to Eve, who obtains a copy of the key, and so does Bob. Neither Alice or Bob know that the key has been copied. So they can carry on using it, thinking their messages are secure, but in reality Eve is reading each and every one of them.</Remark>
                        <Remark>This is called the key distribution problem. How do we keep keys in the hands of those who need them and not in the hands of criminals or those who would misuse them?</Remark>
                        <Remark>Until the early 1970s it was believed there was no solution to the key distribution problem, hence all those armed guards and couriers. The solution is called asymmetric encryption. Now there are two keys. The first key, called the public key, encrypts plaintext to ciphertext. The second key, known as the private key, decrypts ciphertext back to plaintext.</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1019.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1019.jpg" x_folderhash="e1d42cc2" x_contenthash="02a96c92" x_imagesrc="ou_futurelearn_cyber_security_vid_1019.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>Traditionally, symmetric encryption suffered one enormous shortcoming – it was necessary for either the sender or the recipient to create a key and then send it to the other party. While the key was in transit, it could be stolen or copied by a third party who would then be able to decrypt any ciphertexts encrypted with that key.</Paragraph>
                <Paragraph>Another problem is that a large number of key pairs are needed between communicating parties. This quickly becomes difficult to manage the more there are. This can be calculated as n(n-1)/2 where n is the number of communicating parties.</Paragraph>
                <Paragraph>For example, if ten parties want to communicate with each other securely they would need 45 different key pairs: 10(10-1)/2 = 45. This would increase to 4,950 if there were 100 communicating parties!</Paragraph>
                <Paragraph>This problem, called the <b>key distribution problem</b>, affected anyone wishing to use encryption until the 1970s when a method of distributing keys without actually sending the keys themselves was developed independently by GCHQ in the United Kingdom and Whitfield Diffie and Martin Hellman in the United States. The British discovery was kept secret for many years, so today the solution is known as the Diffie–Hellman key exchange method.</Paragraph>
                <Paragraph>Symmetric encryption methods have the advantage that encryption and decryption is extremely fast, making them ideal for transmitting large amounts of secure data. In the video you saw how key distribution was achieved between two people, Alice and Bob.</Paragraph>
            </Section>
            <Section id="Asymmetric_public_key">
                <Title>1.4 Asymmetric or public key cryptography</Title>
                <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1020.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1020_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="ff123cbd" x_subtitles="ou_futurelearn_cyber_security_vid_1020.srt">
                    <Transcript>
                        <Remark>Before we get into the details of how computers use asymmetric cryptography, it's worth spending some time on a small thought experiment.</Remark>
                        <Remark>Here's Alice, here's Bob. Alice has a valuable document. And Bob has gone to his local locksmith and ordered a very large number of identical padlocks, as well as a single key which can open any of those padlocks. If anyone asks Bob for a padlock, he'll send one of them through the post, but he will never give away his key.</Remark>
                        <Remark>Alice asks Bob for a padlock. When she receives it she places her valuable item into a box, closes it, then uses the padlock to lock the Box. At this point, the contents of the box are secure behind the padlock and Alice can't open the box, because she doesn't have a key. It's perfectly safe for Alice to send the box through the post because no one who gets a hold of it can open it unless they have a key. And the only key is in Bob's possession.</Remark>
                        <Remark>When both receives the box all he needs to do is use his key to open the lock, open the box, and there's the original document that Alice wanted to send him.</Remark>
                        <Remark>The boxes and padlock example should make asymmetric encryption easier to understand. The padlocks, which are given to anyone who wants one, represent the public key. The top secret key that can unlock the padlocks is the private key. We'll show the public key as a coloured key on a white background. The private key will be a white key on a coloured background. Two keys together are called a key pair, and these are normally held inside a computer on what's called a key chain.</Remark>
                        <Remark>Alice and Bob are now going to use asymmetric cryptography to exchange information. Each of them will independently generate a key pair. A public key, and a private key. The keys are generated using a whole combination of information, such as the user's name and their email address. But to ensure that they can't be created by someone else the program usually asks you to input random information, such as typing away on a keyboard, measuring the amount of traffic passing over a network, or waggling the mouse for a while.</Remark>
                        <Remark>Before they can actually use asymmetric cryptography, Alice and Bob must now exchange their public keys. Each of them sends a copy of their public key to the other. These are added to the key chains on their computers. Alice and Bob are now ready to go.</Remark>
                        <Remark>Alice creates the document she wants to send to Bob. She then, using her encryption program and a copy of Bob's public key, encrypts the document from plaintext into ciphertext. The only way it can be decrypted is using the private key held on Bob's computer. So Eve, or anyone else apart from Bob, can't get at this document no matter how hard they try, which means it's perfectly safe for Alice to send this document over the internet to Bob.</Remark>
                        <Remark>Obviously, the ciphertext needs to be turned back into plaintext. Bob also has a copy of the encryption software. So when he receives the ciphertext the program uses his private key to decrypt the document. Again, this takes a few seconds, but then he's got plaintext. Remember, he's the only person in the world with a copy of his private key, so he's the only one that can actually decrypt this document.</Remark>
                        <Remark>When Bob wants to send a message to Alice he uses his copy of her public key to encrypt the message. Alice uses her securely-stored private key to perform the decryption.</Remark>
                        <Remark>We've seen how asymmetric encryption is used in everyday practice. Now let's look at why it's secure. Remember, asymmetric cryptography uses two different keys – one to encrypt, another to decrypt.</Remark>
                        <Remark>Bob will give his public key to anyone who asks for it, but he always keeps his private key safe and secure. Alice has encrypted a document using Bob's public key and sent it to him over the internet. However, it's been intercepted by Eve, who not only has a copy of the ciphertext, but also a copy of Bob's public key. If Eve tries to decrypt the document using Bob's public key, she's in for a nasty surprise. Eve loads the ciphertext into her encryption program and then uses her copy of the public key to try and decipher it. She ends up with rubbish.</Remark>
                        <Remark>Remember, the document was encrypted with Bob's public key. It can only be decrypted with Bob's private key. And that safe and secure on his computer. No matter how hard Eve tries, she cannot decrypt this document using the public key. She will either have to steal Bob's private key, which is hopefully very secure, or she'll have to use brute force, which could take billions of years to find the correct key. The document is very, very secure.</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1020.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1020.jpg" x_folderhash="e1d42cc2" x_contenthash="7c864f07" x_imagesrc="ou_futurelearn_cyber_security_vid_1020.jpg" x_imagewidth="512" x_imageheight="288"/>
                    </Figure>
                </MediaContent>
                <Paragraph>Asymmetric cryptography, better known as public key cryptography, side-steps the key distribution problem as each user creates their own keys:</Paragraph>
                <BulletedList>
                    <ListItem>the <b>private key</b> which they keep safe and never distribute</ListItem>
                    <ListItem>the <b>public key</b> which can be sent to anyone with whom they want exchange encrypted information.</ListItem>
                </BulletedList>
                <Paragraph>Together the two keys are known as a <b>key pair</b>, which is what was used by Alice and Bob.</Paragraph>
                <Paragraph>Unlike symmetric encryption, the two keys behave differently; the public key is the only key that can decrypt ciphertext encrypted using the corresponding private key and the private key is the only key capable of decrypting files encrypted with the corresponding public key. Crucially, the value of one key cannot easily be determined from the other, so even if the public key falls into hostile hands, the value of the private key cannot be determined.</Paragraph>
                <Paragraph>Public keys can be distributed using email attachments or through public key chain servers which act as distributors for large numbers of public keys. The creator of a public key uploads their key to the key chain server and it is freely available to anyone who wants to use it.</Paragraph>
                <Paragraph>Although the mathematics behind public key cryptography is incredibly complex, the process of using it is relatively simple. To send a message using public key cryptography is simple. The sender obtains a copy of the recipient’s public key, either by email or from a key chain server, and uses it to encrypt the message. The resulting ciphertext is then sent to the recipient who uses their corresponding private key to restore the original plaintext.</Paragraph>
                <Paragraph>Public key cryptography is popular because there does not have to be any initial secure exchange of secret keys for an encrypted message to be sent (remember, users only ever exchange their public keys). However, it is generally far slower than symmetric encryption; and because of a quirk in the underlying mathematics, traditional public key cryptographic techniques require far longer keys to offer the same level of protection as symmetric encryption.</Paragraph>
                <Paragraph>A newer type of public key cryptography, known as ‘elliptic curve cryptography’, can be just as secure as symmetric encryption using similar key lengths.</Paragraph>
                <Paragraph>In the next section you’ll discover why these encryption methods aren’t used to keep the internet more secure.</Paragraph>
            </Section>
            <Section>
                <Title>1.5 Why isn’t the internet encrypted?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1020.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1020.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="021d271c" x_imagesrc="ou_futurelearn_cyber_security_fig_1020.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 4</b></Caption>
                    <Description>This is a screenshot of a web browser - our attention is drawn to 'https' at the start of a web address.</Description>
                </Figure>
                <Paragraph>Crucially, one part of everyday life that is not routinely protected by cryptography is the internet itself. The majority of emails and web pages are sent in plain view and can be intercepted and read by a malicious third party.</Paragraph>
                <Paragraph>In theory, the whole of the internet could be protected using cryptography, but this is unlikely to happen because it takes a certain amount of computer power to encrypt and decrypt information so there would be significant costs if it were to be used throughout. Also there are a range of web applications, such as reading news sites or browsing online shops, that do not involve any sensitive information and therefore do not need to use encryption.</Paragraph>
                <Paragraph>Applications running over the internet selectively use cryptography for key tasks (such as processing payments for online shopping) and users may choose to use cryptography for additional purposes (such as securing email).</Paragraph>
                <Paragraph>The data sent by many websites you visit is encrypted in transit. This is sometimes shown by a padlock symbol in the address bar of the web browser. You’ll learn more about this later in the course.</Paragraph>
                <Paragraph>Review the list of digital information and online services you compiled in Week 1 of the course. Based on the threats you associated with each item in your list, think about  some examples of how you could use cryptography to improve your security.</Paragraph>
            </Section>
        </Session>
        <Session id="putting_cryptography_to_use">
            <Title>2 Putting cryptography to use</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1105.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1105.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0b0ce76a" x_imagesrc="ou_futurelearn_cyber_security_fig_1105.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 5</b></Caption>
                <Description>In the background is a large image of a human eye. Overlaying this is a set of number ones and zeroes.</Description>
            </Figure>
            <Paragraph>So far this week you have studied the basic cryptographic techniques that can be used to protect the confidentiality and integrity of your information. Now let’s examine how these techniques can be used in practice.</Paragraph>
            <Paragraph>Transport-level encryption encrypts the text of the message between your device and the server that receives the data. One of the most common is STARTTLS. However, your messages may not be encrypted while sitting on a mail server.</Paragraph>
            <Paragraph>End-to-end encryption ensures that the message remains fully encrypted all the way from the sender to the recipient.
</Paragraph>
            <Paragraph>Many websites, such as those for internet banking and online shopping, routinely use encryption to ensure that the data sent to and from your computer is safe from eavesdroppers. However, configuring the same technologies to protect activities such as email communication can be quite difficult because the tools involved are complicated to install and configure.</Paragraph>
            <Paragraph>Most end-to-end encryption tools depend on a collection of cryptographic techniques, commonly called ‘Pretty Good Privacy’, PGP for short. PGP includes algorithms for symmetric and asymmetric cryptography. In order to help software vendors develop systems that can easily exchange encrypted information, a standard called OpenPGP was developed and agreed on by the Internet Engineering Task Force (IETF).</Paragraph>
            <Paragraph>Some examples of tools available for encrypting emails include:</Paragraph>
            <BulletedList>
                <ListItem><a href="http://www.gpg4win.org/">GPG4Win</a> – provides a set of standalone tools that can be used to encrypt and digitally sign emails, documents and other files. It provides some plug-ins to integrate these features into standard email software, such as Microsoft Outlook and Mozilla Thunderbird.</ListItem>
                <ListItem><a href="https://gpgtools.org/">GPGMail</a> – this tool is designed to integrate with the Mail software provided by Apple. It can be used to both encrypt and digitally sign your email. It is easier to configure and use than the Windows tools, but is only useful if you use a computer running OSX.</ListItem>
                <ListItem><a href="https://www.enigmail.net/">Enigmail for Thunderbird</a> – this is a plug-in for the Thunderbird email client software that works across all operating systems. However, it requires manual installation of the GNUPG software, an open source implementation of the OpenPGP standard.</ListItem>
                <ListItem><a href="http://www.mailvelope.com/">Mailvelope</a> – this is a browser plug-in that uses an implementation of the OpenPGP standard. It works with a variety of browsers and web-based email systems, such as Gmail or Yahoo Mail. However, there is a security problem with such web-based email systems. Although you may have encrypted the message from end to end, the details of the email address it is sent to, as well as who it is from, and the time the message was sent can be logged, and this metadata may compromise your security and that of the recipient.</ListItem>
            </BulletedList>
            <Paragraph>A secure email service like Protonmail or Tutanota can hide the metadata that links the sender to the recipient of the message.</Paragraph>
            <Paragraph>In its most secure usage pattern, a user logs in to ProtonMail and leaves an email message for another ProtonMail user to log in and collect. The metadata about the users is never revealed and the message is also securely encrypted from end to end.</Paragraph>
            <Paragraph>When the ProtonMail user sends an email to an external email address the metadata of the sender remains secure. ProtonMail sends an invitation to the recipient to view the encrypted message on the server. The mail service of the recipient may record that a message was sent by the ProtonMail server. If the user of ProtonMail uses the free service to send encrypted email to an outside email address they will have to send a key to the encryption to the recipient by some other means for the recipient to log in, such as a text message or phone call. This may reveal a link between sender and recipient.</Paragraph>
            <Paragraph>A paid for service with ProtonMail allows use of PGP, so that a message can be sent to an external address using the recipients public key. No link need be created between the sender and recipient. However, the subject line isn’t encrypted.</Paragraph>
            <Paragraph>In the next few sections we will explore an alternative way of using cryptography to protect your email communications.</Paragraph>
            <Section>
                <Title>2.1 Setting up a PGP email client</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_1_w5_step5_10-bannerimage.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_1_w5_step5_10-bannerimage.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="fddb9b09" x_imagesrc="cyber_1_w5_step5_10-bannerimage.tif.jpg" x_imagewidth="512" x_imageheight="384"/>
                    <Caption><b>Figure 6 </b></Caption>
                    <Description>Zoomed in shot of a computer screen with what looks like encrypted text.</Description>
                </Figure>
                <Paragraph>This section is optional. You’ll need to be able to install software on the computer you are using for this course to complete this. If you’re not able to do this then please still read through the steps so that you understand the process.</Paragraph>
                <NumberedList>
                    <ListItem><Paragraph>Select one of the PGP email clients described in the previous section and explore how to set it up and use it to send mail encrypted with PGP.</Paragraph><Paragraph>For example if you already use Thunderbird for your email client you could investigate the use of Enigmail. If you use Outlook for your emails you could investigate using Gpg4win. If you use a browser based email you can install a plugin from <a href="https://www.mailvelope.com/en/">https://www.mailvelope.com/en/</a></Paragraph><Paragraph>Follow the instructions on the Mailvelope website.</Paragraph></ListItem>
                    <ListItem><Paragraph>One of the best ways to test sending and receiving encrypted emails is to use two separate, free, web-based email accounts and open each one in a different browser. For example, use Firefox for one and Brave for the other. Install Mailvelope in both Firefox and Brave and set up one email account in Firefox and a different email account in Brave</Paragraph></ListItem>
                    <ListItem><Paragraph>Now follow the Mailvelope instructions to create and send an encrypted email from one of your accounts to the other.</Paragraph></ListItem>
                </NumberedList>
                <Paragraph/>
                <!--<Paragraph>You’ll need to be able to install software on the computer you are using for this course to complete this section. If you’re not able to do this, or don't want to, then please still read through the steps so that you understand the process.</Paragraph><Paragraph>You’ll also need Chrome web browser and a web-based email account. If you don’t have Chrome already installed on your computer, you can download it from <a href="http://www.google.com/intl/en_uk/chrome/browser/">Google Chrome</a>. Most email accounts are accessible via the web even if your email comes to your computer.</Paragraph><Paragraph>Open Chrome and go to the webstore to download <a href="https://chrome.google.com/webstore/detail/mailvelope/kajibbejlbohfaggdiogboambcijhkke?hl=en">Mailvelope</a>.</Paragraph>-->
                <Paragraph><b>Disclaimer:</b> The Open University and partners associated with this course have found this software to be robust at the time of checking. However, installing software is done at your own risk and The Open University and their partners cannot be held responsible for any resulting damage to your computer.</Paragraph>
            </Section>
            <Section>
                <Title>2.2 Sending signed and encrypted email</Title>
                <!--<Paragraph>Send your email to:</Paragraph><Paragraph><b>cybersecurity-mooc@open.ac.uk</b></Paragraph><Paragraph>You will receive an email back from us to say that we’ve successfully decrypted your message! If you don’t receive an email within 2 hours, please try again.</Paragraph>-->
                <Paragraph>Below is an optional activity.</Paragraph>
                <Activity>
                    <Heading>Activity 1 Optional activities</Heading>
                    <Timing>Allow about </Timing>
                    <Question>
                        <Paragraph>As an alternative to exchanging encrypted emails with a colleague or friends, if you have set up Mailvelope or another PGP email client you can send an encrypted email to an automated mail box at The Open University:</Paragraph>
                        <BulletedList>
                            <ListItem>First send an email that simply says ‘public key’ to: <a href="mailto:cybersecurity-mooc@open.ac.uk">cybersecurity-mooc@open.ac.uk</a></ListItem>
                            <ListItem>The server will send back an automatic reply that includes the current PGP public key for this mail box.</ListItem>
                            <ListItem><Paragraph>Again follow the instructions on the Mailvelope website, or for the PGP encryption software that you are using, use this public key to create a new email with a message ‘testing encrypted content’</Paragraph><Paragraph>Note that you need all the characters including -----BEGIN PGP PUBLIC KEY BLOCK----- and -----END PGP PUBLIC KEY BLOCK-----</Paragraph></ListItem>
                            <ListItem>Send your email to: <a href="mailto:cybersecurity-mooc@open.ac.uk">cybersecurity-mooc@open.ac.uk</a>. You will receive an email back from us to say that we’ve successfully decrypted your message! If you don’t receive an email within 2 hours, please try again.</ListItem>
                        </BulletedList>
                    </Question>
                </Activity>
                <Paragraph>To find out more about Mailvelope’s features or get help with specific problems visit <a href="https://www.mailvelope.com/help">Mailvelope help</a>.</Paragraph>
                <InternalSection>
                    <Heading>End-to-end encryption as a service</Heading>
                    <Paragraph>It can be a problem for organisations and individuals to set up the software for encrypted emails on all the devices that they use.</Paragraph>
                    <Paragraph>End-to-end encryption can be provided as a service. At the time of writing, ProtonMail and Tutanota both have a good reputation and also offer a free service.</Paragraph>
                    <Paragraph>Follow the instructions at <a href="https://protonmail.com/">https://protonmail.com/</a> or <a href="https://tutanota.com/">https://tutanota.com/</a> to set up two FREE accounts with the same service in two separate browsers. Then use these accounts to send a message from one account to the other.</Paragraph>
                </InternalSection>
                <Paragraph>In the last few sections you have explored what is involved in using cryptography to encrypt and sign email communications.</Paragraph>
                <BulletedList>
                    <ListItem>What seemed to be the hardest parts of the process?</ListItem>
                    <ListItem>What would you want to improve to make it easier?</ListItem>
                    <ListItem>How does the use of ProtonMail or Tutonota compare with the use of Mailvelope or other secure email software?</ListItem>
                </BulletedList>
                <Paragraph>You may find it useful to compare your experience with the instructions for one of the other tools mentioned in Section 2, <CrossRef idref="putting_cryptography_to_use">Putting cryptography to use</CrossRef>.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>3 Comparing different cryptographic techniques</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1113.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1113.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0ce37f1c" x_imagesrc="ou_futurelearn_cyber_security_fig_1113.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 7</b></Caption>
                <Description>This is an image of a fish.</Description>
            </Figure>
            <Paragraph>The field of modern cryptography is steadily growing with its increased use in everyday life when surfing the internet, using your card in a cash machine etc.</Paragraph>
            <Paragraph>There are hundreds of different cryptography schemes each with different applications, some of the most notable are described below.</Paragraph>
            <InternalSection>
                <Heading>DES (Data Encryption Standard)</Heading>
                <Paragraph>DES was first developed in the 1970s and was adopted by the United States National Bureau Of Standards as the US government standard for encrypting sensitive information. It is a symmetric cipher using 56-bit keys.</Paragraph>
                <Paragraph>Due to DES’s relatively small key size it was discovered that it was possible to crack the encryption with a brute force attack. Although this was a theoretical risk when first proposed, the great increases in computing power over recent years have shown that DES can be brute forced in less than a day. It was this weakness that led to official adoption of other encryption standards, such as AES, by the US government.</Paragraph>
                <Paragraph>A variant of DES, called Triple DES was developed to provide additional security, and be compatible with the previous version, without the requirement to develop a completely new cipher. Triple DES uses three rounds of DES encryption and three separate 56-bit DES keys.</Paragraph>
                <Paragraph>Triple DES was widely used in e-commerce and online payment applications, as well as securing data in Microsoft Outlook, until 2018. When this course was first written it was thought that Triple DES would remain secure from a brute force attack until at least 2030. However, it is now considered to be insecure and was deprecated by NIST (the US National Institute for Standards and Technology) in 2017.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>AES (Advanced Encryption Standard)</Heading>
                <Paragraph>The realisation that the DES standard was no longer adequate led the United States government to call for a replacement. After an open competition lasting five years, AES was adopted as a US government standard in 2001. AES uses a combination of symmetric ciphers and either 128, 192 or 256-bit keys providing enhanced security over DES. Although some potential weaknesses have been identified in AES, most are theoretical, with the encryption being easiest to break in a situation where it has not been implemented correctly rather than in the case of a brute force attack where every possible key combination must be tried.</Paragraph>
                <Paragraph>AES is now widely used in commercial applications since the underlying specification is freely available for personal or commercial use. It is used to protect archive files, encrypting computer file systems (such as Windows 2000 onwards), encrypting hard disks and for secure file transmission. Such is its importance that many microprocessors now include AES in their instruction sets to speed up encryption and decryption.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Blowfish</Heading>
                <Paragraph>Blowfish was developed in the early 1990s as a potential replacement for DES, though AES ultimately became the agreed standard form of encryption. It is a cipher supporting variable key lengths from 1 to 448 bits. To date there has been no known successful attempt to break the encryption in its full implementation, although weaknesses have been identified when Blowfish is used with relatively weak keys. The related twofish and threefish ciphers have been designed to overcome these weaknesses, although most users have switched to AES.</Paragraph>
                <Paragraph>Next, you’ll find out how cryptography is used to prove identity online.</Paragraph>
            </InternalSection>
            <Section id="using_cryptography_prove_id">
                <Title>3.1 Using cryptography to prove identity</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1109.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1109.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="3bc8efd7" x_imagesrc="ou_futurelearn_cyber_security_fig_1109.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 8</b></Caption>
                    <Description>This is an image showing a a substantial number of numbers in rows, of different colours.</Description>
                </Figure>
                <Paragraph>Cryptography isn’t just used to hide secrets, it can also be used to authenticate data sent on an insecure network – such as the internet. The process begins by checking that your copy of a piece of data is an exact match for the one you requested.</Paragraph>
                <InternalSection>
                    <Heading>Hashing</Heading>
                    <Paragraph>Hashing is the mathematical process of converting data of any size into data of fixed length known as the ‘hash’ (alternative names include message digest, hash codes, hash sums or hash values).</Paragraph>
                    <Paragraph>Hashing operates in one direction only, making it impossible to deduce the original data from the resultant hash. The intention of hashing is not to preserve the contents of the data but to create a unique identifier for every single piece of data. When a file is published on the internet, the author may choose to publish the hash value for that file. For instance, here is some information published by the GnuPG encryption software authors on their website:</Paragraph>
                </InternalSection>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1170.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1170.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="541d8c54" x_imagesrc="ou_futurelearn_cyber_security_fig_1170.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>This shows a number of letter and number combinations.</Description>
                </Figure>
                <Paragraph>Each long line of numbers and letters on the left is a hash (in this case from a hashing program called SHA-1), the text on the right is the name of the file. If you download one of these programs, you can then run your own copy of SHA-1 on your download and obtain a hash – if your file exactly matches the original the two hashes will be identical.</Paragraph>
                <Paragraph>A variation of a single bit of data between two otherwise identical files will result in vastly different hash values, so any edits to a file between two hashing operations will result in different hash values revealing that the data has been tampered with and should not be trusted.</Paragraph>
                <Paragraph>A large number of hashing algorithms have been developed; the most widespread are algorithms called MD5, SHA-1 and SHA-2. Although MD5 and SHA-1 are in common use, both have been found to be flawed. Under certain circumstances ‘collisions’ can occur where two pieces of different data can generate the same hash value (albeit under specifically controlled conditions).</Paragraph>
                <Paragraph>This weakness in the MD5 hashing algorithm has been used in malware targeting Microsoft Windows computers. Since neither algorithm can be guaranteed to generate unique hashes they can be considered ‘broken’ and should not be used. The United States government requires all hashes to be generated using the newer SHA-2 algorithm which has not shown any such weaknesses.</Paragraph>
                <Paragraph>Next, you’ll find out how digital signatures and certificates use cryptography.</Paragraph>
            </Section>
            <Section>
                <Title>3.2 Digital signatures and certificates</Title>
                <MediaContent type="video" src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_security_week5_video.mp4" width="512" x_manifest="cyber_security_week5_video_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="d1a685b0" x_subtitles="cyber_security_week5_video.srt">
                    <Transcript>
                        <Speaker>NARRATOR:</Speaker>
                        <Remark>We’ve already seen that exchanging encrypted documents using public key means that Alice and Bob each have to generate their own key pairs, comprised of a public key and a private key. Before they can exchange documents, they first need to send one another copies of their public keys. Then, Alice can send secrets to Bob by encrypting documents using Bob’s public key, and Bob can share secrets with Alice using her public key. But there’s more you can do with public key cryptography than just hiding secrets. It’s also possible to encrypt data using the private key, which might sound like a pointless thing to do.</Remark>
                        <Remark>After all, a file encrypted using Bob’s private key can be decrypted by anyone who has a copy of his public key. And Bob gives that away to anyone who asks, including evil Eve. So, if encrypting using the private key isn’t going to protect any secrets, what’s it for? Whilst the encrypted file can be decrypted by any copy of Bob’s public key, it can only have been encrypted by the corresponding private key. If Bob has obeyed the rules and not shared his private key, then the documents can only have come from Bob. Encrypting using the private key is therefore a way of authenticating data.</Remark>
                        <Remark>Now, anyone wanting data from Bob can download a copy of the encrypted document and a copy of his public key. They decrypt the file using the public key and can satisfy themselves the data is genuine. But it’s not quite as simple as that. Bob’s public key is only authenticated by his email address. If Eve can steal Bob’s email address, there is nothing to stop her generating new keys under Bob’s identity. Eve can now send false documents or malware in Bob’s name. Alice will open them, because she trusts Bob. Oh dear. Bob can prevent Eve impersonating him by certifying his public key.</Remark>
                        <Remark>Here, a so-called trusted third party, which can be another individual, a government, or a private company, will confirm that Bob’s key is genuine. To do this, Bob must prove his identity to them using personal information that isn’t readily available to Eve, such as his passport, business registration, or birth certificate. The certification body can either certify the public key itself or provide Bob with a digital certificate containing his public key.</Remark>
                        <Remark>As well as the holder’s public key, a certificate contains a unique serial number, the name of the certificate’s owner, the name of the agency that issued the certificate, the agency’s digital signature, proving it is authentic, the issue date of the certificate and the date it will expire, after which it can no longer be considered valid, and a hash value used to check that the certificate has not been altered since it was issued. As well as individual use, certificates are used to authenticate software downloads, such as those from app stores. Certificates are also used by websites who presents copies of their certificates to web browsers. The browser checks that the certificate is authentic, proving that the site is genuine.</Remark>
                        <Remark>If the certificate is invalid, the browser will warn the user they may be navigating to a page that has been hijacked, and it will offer them an opportunity to stop. Certificate holders have to be careful to renew their certificates before they expire. Otherwise, they might find users avoiding their websites or that their software downloads are not valid. This happened to Apple in November 2015, when millions of users could not update apps on their Macs. Fortunately, a new certificate was quickly issued, and everything worked again.</Remark>
                    </Transcript>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_security_week5_video.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_security_week5_video.jpg" x_folderhash="e1d42cc2" x_contenthash="f955ed07" x_imagesrc="cyber_security_week5_video.jpg" x_imagewidth="512" x_imageheight="386"/>
                    </Figure>
                </MediaContent>
                <Paragraph>Hashing can show that data has not changed in transmission, but on its own cannot demonstrate that the data originated with its supposed author. To do that, a digital signature should be used.</Paragraph>
                <Paragraph>Digital signatures use the sender’s private key to encrypt the hash. Previously, you learned how documents can be encrypted with a public key which can be used by anyone, but can only be decrypted using the corresponding private key known only to the owner.</Paragraph>
                <Paragraph>Encrypting data using the private key isn’t suitable for securing secrets (as anyone with access to the public key could decrypt it). However, it is perfectly possible to encrypt a hash using the private key so that the hash can be decrypted and compared by anyone possessing the matching public key. This can be used to provide authenticity since the encrypted hash must have been produced by the holder of the private key – hence the name digital signature.</Paragraph>
                <CaseStudy>
                    <Heading>Case study 1: Alice and Bob</Heading>
                    <Paragraph>Imagine that Alice wants to send the company’s quarterly profit statement to Bob, who works in the financial markets, for public announcement. Both Alice and Bob want confidence that the quarterly profit statement has not been intercepted by Eve en route and altered.</Paragraph>
                    <Figure>
                        <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1177.tif.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1177.tif.jpg" x_folderhash="e1d42cc2" x_contenthash="f558174e" x_imagesrc="ou_futurelearn_cyber_security_fig_1177.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                        <Caption><b>Figure 10</b></Caption>
                        <Description>This is an illustration of how Alice would send her quarterly profit statement to Bob. It shows the different stages it would go through.</Description>
                    </Figure>
                    <Paragraph>Alice will therefore produce a hash of the quarterly profit statement and then encrypt this with her private key to produce a digital signature. Alice will then include the digital signature with the quarterly profit statement and send this to Bob. Alice may also encrypt the quarterly profit statement and the encrypted hash with Bob’s public key so that all details of the message remain secret.</Paragraph>
                    <Paragraph>Upon receipt Bob will, if Alice sent the message encrypted with his public key, decrypt the message using his own private key. This will then reveal the encrypted digital signature. He will decrypt the digital signature using Alice’s corresponding public key to reveal the hash. Bob will then calculate a hash of the quarterly profit statement and then compare this with the encrypted hash that he received from Alice. If the hashes are the same then both Bob and Alice can be confident that the quarterly profit statement was not altered en route by Eve.</Paragraph>
                </CaseStudy>
                <Paragraph>Digital signatures do not provide us with complete confidence of the author or originator. Just because a digitally signed document claims to come from a person or a company it doesn’t mean that it actually did, a malicious individual could masquerade as the sender by producing their own public/private key pair and using these to produce digital signatures.</Paragraph>
                <CaseStudy>
                    <Heading>Case study 2: Alice and Bob</Heading>
                    <Paragraph>Imagine that a digitally signed business invoice arrives in Alice’s mailbox from Bob. She uses Bob’s public key from a public key server to decrypt the digital signature and validate the business invoice by comparing the hashes. Alice, assuring herself that it is Bob (as the hashes are the same), follows the instructions and transfers money to the account details in the business invoice.</Paragraph>
                    <Paragraph>A few weeks later, Alice receives an angry email from Bob because he has not been paid. After a bank investigation she finds out that she had transferred the money to Eve by mistake – so what went wrong?</Paragraph>
                    <Paragraph>It’s clear that the business invoice and the associated signature did not come from Bob, instead the signed business invoice actually came from Eve. Eve used Bob’s personal information to create a new key pair in Bob’s name and placed a copy of the public key on a public key server. Eve then used her corresponding private key to sign the business invoice and send it to Alice.</Paragraph>
                    <Paragraph>Alice, convinced that the document was a genuine business invoice from Bob (as it included what she believed to be his digital signature), followed the instructions and paid money into an account belonging to Eve – oh dear!</Paragraph>
                </CaseStudy>
                <Paragraph>Digital certificates help us overcome this problem. A digital certificate is a means of binding public keys to their owner. These are issued by Certificate Authorities (CAs) who validate the owners of public keys. The CA does this by validating (through various processes), the identity of the owner of the public key. Once it has done this it will bind the public key to a digital certificate and sign it using its private key to attest authenticity. The CA’s public key is available to all parties who need to validate the CA’s assertion of public key ownership.</Paragraph>
                <Paragraph>However, digital certificates still require a chain of trust to confirm that the certificate belongs to the person or organisation that you think it does and have not been compromised. Criminals have been known to obtain certificates that were then used to sign software that included malware. Stolen certificates have also been used to sign malware. For example, the Stuxnet code was signed with certificates that belonged to Realtek Semiconductor and JMicron Technology Corp.</Paragraph>
                <CaseStudy>
                    <Heading>Case study 3: Alice and Bob</Heading>
                    <Paragraph>So, using a Certificate Authority prevents Eve from creating a key pair of her own, and claiming that the corresponding public key is Bob’s. If Eve were to now send a business invoice appearing to be signed by Bob, when Alice uses Bob’s validated public key to try and decrypt the hash and compare them, this will not work; she would know that something was wrong, and (hopefully), not transfer money to Eve.</Paragraph>
                </CaseStudy>
                <Paragraph>Note that scams are increasingly being reported where fake invoices are being sent to businesses, or a senior manager is being impersonated to persuade people in the business to make payments to the scammer’s account.</Paragraph>
                <Paragraph>All businesses should ensure that all managers, directors etc. have private and public encryption keys, and that their public keys are stored and displayed locally to be used by everyone in the business.They must use their keys in order to sign and validate all non routine instructions for making payments. This is about the only way to avoid the scam reported by the BBC:</Paragraph>
                <Quote>
                    <Paragraph>‘Hey, the deal is done. Please wire $8m to this account to finalise the acquisition ASAP. Needs to be done before the end of the day. Thanks.’</Paragraph>
                    <Paragraph>The employee thought nothing of it and sent the funds over, ticking it off his list of jobs before heading home.</Paragraph>
                    <Paragraph>But alarm bells started to ring when the company that was being acquired called to ask why it had not received the money.</Paragraph>
                    <Paragraph>An investigation began - $8m was most definitely sent, but where to?</Paragraph>
                </Quote>
                <Paragraph>For the rest of the report see: <a href="https://www.bbc.co.uk/news/technology-49857948">https://www.bbc.co.uk/news/technology-49857948</a></Paragraph>
            </Section>
            <Section id="encrypted_network_connections">
                <Title>3.3 Encrypted network connections</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1097.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1097.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="37227fa6" x_imagesrc="ou_futurelearn_cyber_security_fig_1097.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 11</b></Caption>
                    <Description>This shows two people shaking hands (it shows their hands and part of their forearms only). There are symbols around them, for instance @, an envelope, a speech bubble and a padlock.</Description>
                </Figure>
                <Paragraph>As you learned earlier, web traffic is not encrypted by default. Web pages pass as plaintext across the internet and are vulnerable to interception.</Paragraph>
                <Paragraph>Obviously, this was a problem when companies first began to consider online shopping. At first companies had to ask customers to browse online and then make a telephone call so the company could accept credit card information.</Paragraph>
                <Paragraph>The solution came in 1995 when the web browser pioneer Netscape announced the Secure Socket Layer (SSL) protocol, which has now been replaced by Transport Layer Security (TLS)), which allows web browsers to exchange secure data. It is supported by all modern browsers and allows confidential information to be exchanged over an insecure link.</Paragraph>
                <InternalSection>
                    <Heading>TLS/SSL</Heading>
                    <Paragraph>TLS/SSL uses a combination of asymmetric and symmetric encryption to exchange data. When a web browser connects to a server and requests a secure communication the two computers first engage in what is known as a handshake and agree how future communications will be conducted, including the type of cryptography that will be used.</Paragraph>
                    <Paragraph>After agreeing how to communicate, the server transmits its own public key and a digital certificate of authenticity to the user’s computer which checks that the certificate is genuine and has not expired. If the certificate is genuine, the user’s computer then generates a master secret, encrypts it with the copy of the server’s public key and sends that to the server.</Paragraph>
                    <Paragraph>The server decrypts the encrypted master secret with its own private key. Both the server and the computer now have copies of the secret and use that to generate identical copies of a symmetric encryption key. Crucially, the key itself has not been transmitted across the network.</Paragraph>
                    <Paragraph>Each computer now informs the other that all other transactions in this session will be conducted using the symmetric key (called the session key), by sending ‘finished’ handshake messages using each other’s session keys. The two computers can now perform the secure transaction itself, including sensitive information such as bank account details, addresses, credit card numbers and receipts using the high-speed symmetric key.</Paragraph>
                    <Paragraph>At the end of the secure session, the two computers say goodbye to one another and each deletes their copies of the symmetric session key. If the user starts another secure session a completely new key will be used.</Paragraph>
                    <Paragraph>TLS/SSL is now used by most websites. It is an automatic process between the browser and the server that keeps data safe in transit. It doesn’t mean that any site is genuine. Any website, including criminal ones, can now implement TLS/SSL for free. However, its use means that end users can benefit from the confidentiality and integrity provided by cryptography without having to worry about the technical details of configuring their software or managing keys.</Paragraph>
                    <Paragraph>In the next section you’ll see TLS/SSL in action.</Paragraph>
                </InternalSection>
            </Section>
            <Section id="how_secure_your_browsing">
                <Title>3.4 How secure is your browsing?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1111.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1111.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="42efc4f2" x_imagesrc="ou_futurelearn_cyber_security_fig_1111.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 12</b></Caption>
                    <Description>This shows a padlock with a combination lock, attached to a chain.</Description>
                </Figure>
                <Paragraph>Web browsers have made it easy to determine if a website is using TLS/SSL by:</Paragraph>
                <BulletedList>
                    <ListItem>Making all secure addresses begin ‘https://’ (rather than ‘http://’) with the s standing for ‘secure’. Examples include Gmail, at <a href="https://mail.google.com/">https://mail.google.com/</a>; Google defaults to Google Safe Search at <a href="https://www.google.com/">https://www.google.com/</a>, which means that your search requests and results cannot be seen by others.</ListItem>
                    <ListItem>Showing a closed padlock symbol in or near the top of your browser window.</ListItem>
                </BulletedList>
                <Activity>
                    <Heading>Activity 2 Your own browsing security</Heading>
                    <Timing>Allow about 15 minutes</Timing>
                    <Question>
                        <Paragraph>Visit a website that you use regularly (it could be this one!) and find a page that you would expect to use a secure network connection. A common example would be your webmail account or online banking website. Use your browser’s help feature and click on the padlock icon to find out about its meaning.</Paragraph>
                        <Paragraph>Research browsing security online. You might find that your browser shows different versions of the padlock to highlight potential problems with the secure connection.</Paragraph>
                    </Question>
                </Activity>
                <InternalSection>
                    <Heading>Encrypted DNS</Heading>
                    <Paragraph>Up until 2019, the DNS information requested was sent as plain text and could be intercepted even when the data being sent or requested was encrypted. From 2019, it has become possible for DNS requests to be encrypted. In a Firefox browser go to settings, then network settings and select the enable DNS over HTTPS checkbox.</Paragraph>
                    <Paragraph>As mentioned in Week 4, Chrome 78 is also experimenting with this feature, which can be enabled by browsing to ‘<ComputerCode>chrome://flags/</ComputerCode>’ in your Chrome browser, searching for ‘dns-over-https’ and enabling this feature. You will have to restart the browser for this change to take effect. </Paragraph>
                </InternalSection>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 5 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 5. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48336">Week 5 practice quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. What is ciphertext?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Information in human- or machine-readable form</Paragraph><Feedback><Paragraph>No, this is plaintext. Try again.</Paragraph><Paragraph>You may find <CrossRef idref="plaintext_and_ciphertext">5.1.1 Plaintext and ciphertext </CrossRef>useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Information that has been encrypted</Paragraph><Feedback><Paragraph>Well done. After encryption, the plaintext information is converted into ciphertext.</Paragraph><Paragraph>You may find <CrossRef idref="plaintext_and_ciphertext">5.1.1 Plaintext and ciphertext </CrossRef>useful.</Paragraph></Feedback></Right><Wrong><Paragraph>A mathematical process for encrypting information</Paragraph><Feedback><Paragraph>No, try again. Think about the information itself.</Paragraph><Paragraph>You may find <CrossRef idref="plaintext_and_ciphertext">5.1.1 Plaintext and ciphertext </CrossRef>useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>A mathematical process for decrypting information</Paragraph><Feedback><Paragraph>No, try again. Think about the information itself.</Paragraph><Paragraph>You may find <CrossRef idref="plaintext_and_ciphertext">5.1.1 Plaintext and ciphertext </CrossRef>useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. How many possible values can an encryption key that is 5 bits long have?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>5</Paragraph><Feedback><Paragraph>No, try again. Each bit can take one of two values – 0 and 1. How many combinations of 0 and 1 can be made by a 5-digit key? Hint: with a 2-bit key we can make 2 x 2 (or 22) = 4 combinations.</Paragraph><Paragraph>You may find <CrossRef idref="encryption_keys">5.1.2 Encryption keys</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>8</Paragraph><Feedback><Paragraph>No, try again. Each bit can take one of two values – 0 and 1. We can make 8 combinations of 0 and 1 with a 3-bit key: 2 x 2 x 2 (or 23) = 8, so how many with a 5-bit key? How many combinations of 0 and 1 can be made by a 5-bit key?</Paragraph><Paragraph>You may find <CrossRef idref="encryption_keys">5.1.2 Encryption keys</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>10</Paragraph><Feedback><Paragraph>No, try again. Each bit can take one of two values – 0 and 1. How many combinations of 0 and 1 can be made by a 5-bit key? Hint: with a 2-bit key we can make 2 x 2 (or 22) = 4 combinations.</Paragraph><Paragraph>You may find <CrossRef idref="encryption_keys">5.1.2 Encryption keys</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>16</Paragraph><Feedback><Paragraph>No, try again. Each bit can take one of two values – 0 and 1. You can make 16 combinations of 0 and 1 with a 4-bit key: 2 x 2 x 2 x 2 (or 24) = 16, so how many with a 5-bit key?</Paragraph><Paragraph>You may find <CrossRef idref="encryption_keys">5.1.2 Encryption keys</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>32</Paragraph><Feedback><Paragraph>Well done. Each bit can take one of two values – 0 and 1. So if we have 5 bits, we can make 2 x 2 x 2 x 2 x 2 (or 25) = 32 combinations.</Paragraph><Paragraph>You may find <CrossRef idref="encryption_keys">5.1.2 Encryption keys</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>64</Paragraph><Feedback><Paragraph>No, try again. Each bit can take one of two values – 0 and 1. To make 64 combinations of 0 and 1 we would need a 6-bit key (2 x 2 x 2 x 2 x 2 x 2 (or 26) = 64, so how many with a 5-bit key?</Paragraph><Paragraph>You may find <CrossRef idref="encryption_keys">5.1.2 Encryption keys</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. Which of the following is a common feature of asymmetric cryptography?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Very short key lengths are used</Paragraph><Feedback><Paragraph>No, try again. Although key length has reduced in newer forms of public key cryptography, it is still characterised by relatively long keys.</Paragraph><Paragraph>You may find <CrossRef idref="Asymmetric_public_key">5.1.4 Asymmetric or public key cryptography</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Public keys can be given to anyone who wants to know, e.g. posted on a website</Paragraph><Feedback><Paragraph>Well done. The public key can be distributed to anyone with whom you want to exchange encrypted information.</Paragraph><Paragraph>You may find <CrossRef idref="Asymmetric_public_key">5.1.4 Asymmetric or public key cryptography</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>The key pair can be stored on a key chain server</Paragraph><Feedback><Paragraph>No, try again. One of the key pair should never be distributed or stored on a key chain server.</Paragraph><Paragraph>You may find <CrossRef idref="Asymmetric_public_key">5.1.4 Asymmetric or public key cryptography</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Encryption and decryption are faster than symmetric cryptography</Paragraph><Feedback><Paragraph>No, try again. Asymmetric cryptography is generally slower than symmetric cryptography.</Paragraph><Paragraph>You may find <CrossRef idref="Asymmetric_public_key">5.1.4 Asymmetric or public key cryptography</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. Which one is the correct statement?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>The SHA-2 hashing algorithm is flawed because two different data items can generate the same hash.</Paragraph><Feedback><Paragraph>No, try again. At the time of writing, SHA-2 hasn’t shown any such weaknesses and is the required hashing algorithm by the United States government.</Paragraph><Paragraph>You may find <CrossRef idref="using_cryptography_prove_id">5.3.1 Using cryptography to prove identity</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Collisions can occur in the MD-5 hashing algorithm under certain conditions.</Paragraph><Feedback><Paragraph>Well done. Although MD-5 remains in common use, this weakness has been exploited in some Windows malware.</Paragraph><Paragraph>You may find <CrossRef idref="using_cryptography_prove_id">5.3.1 Using cryptography to prove identity</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Hashing can show whether data has changed in transmission and can confirm who the original author was.</Paragraph><Feedback><Paragraph>No, try again. Hashing can show that data has not changed in transmission, but taken alone it cannot demonstrate that the data originated with its supposed author.</Paragraph><Paragraph>You may find <CrossRef idref="using_cryptography_prove_id">5.3.1 Using cryptography to prove identity</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Digital signatures are encrypted using the public key and decrypted using the private key.</Paragraph><Feedback><Paragraph>No, try again.</Paragraph><Paragraph>You may find <CrossRef idref="using_cryptography_prove_id">5.3.1 Using cryptography to prove identity</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Digital signatures are a good way of transmitting secrets.</Paragraph><Feedback><Paragraph>No, try again. Digital signatures cannot be used to transmit secrets because anyone could have a copy of the public key and use it to read the information.</Paragraph><Paragraph>You may find <CrossRef idref="using_cryptography_prove_id">5.3.1 Using cryptography to prove identity</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. How can you tell if your connection to a web page is secure? There are two possible answers.</Paragraph></Question><Interaction><MultipleChoice><Right><Paragraph>A closed padlock symbol at the top of your browser window.</Paragraph><Feedback><Paragraph>Well done. Did you also spot the other correct answer? You can also tell that SSL is being used if the web page address in your browser window uses https:// rather than http:// (the ‘s’ stands for ‘secure’).</Paragraph><Paragraph>You may find <CrossRef idref="how_secure_your_browsing">5.3.4 How secure is your browsing</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>The web page will tell you that it is secure</Paragraph><Feedback><Paragraph>No, try again. The content of a web page cannot tell you that you are securely connected to it. What else might you see in your browser window?</Paragraph><Paragraph>You may find <CrossRef idref="how_secure_your_browsing">5.3.4 How secure is your browsing</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>The word SSL will appear at the top of your browser window</Paragraph><Feedback><Paragraph>No, try again.</Paragraph><Paragraph>You may find <CrossRef idref="how_secure_your_browsing">5.3.4 How secure is your browsing</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>The address in your browser window will change from http:// to https://</Paragraph><Feedback><Paragraph>Well done. Did you also spot the other correct answer? You can also tell that SSL is being used if there is a closed padlock symbol at or near the top of your browser window. </Paragraph><Paragraph>You may find <CrossRef idref="how_secure_your_browsing">5.3.4 How secure is your browsing</CrossRef> useful.</Paragraph></Feedback></Right></MultipleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 5</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1112.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1112.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="d5210df3" x_imagesrc="ou_futurelearn_cyber_security_fig_1112.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 13</b></Caption>
                <Description>This shows a number of coloured blocks, numbered either 0 or 1, on top of each other. This collection of blocks hovers over a laptop.</Description>
            </Figure>
            <Paragraph>This week has focused on cryptography – a key security technique that allows you to ensure confidentiality and integrity of your data.</Paragraph>
            <Paragraph>You have learned how to use cryptography tools to secure your email and can explain the use of cryptography in common applications, such as the world wide web. As a result, you should now be able to identify where you could use cryptography to improve the protection of your digital life. One example of this, the use of cryptography to protect computer networks, is the topic for the next week of the course.</Paragraph>
            <Paragraph>You can now go to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48325">Week 6: Network security</a>.</Paragraph>
        </Session>
        <!--<Session id="further_reading"><Title>Further reading</Title><Paragraph><a href="http://eandt.theiet.org/magazine/2013/04/solaces-of-quantum.cfm">Quantum cryptography</a> An article about future developments in cryptography from the The Institution of Engineering and Technology.<EditorComment> Broken link</EditorComment></Paragraph></Session>-->
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 6: Network security</UnitTitle>
        <Session>
            <Title>Introduction</Title>
            <MediaContent type="video" width="512" src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1025.mp4" x_manifest="ou_futurelearn_cyber_security_vid_1025_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="4837bfc2" x_subtitles="ou_futurelearn_cyber_security_vid_1025.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Hello. You're now 6 weeks into the course. As we saw a couple of weeks back, computer networks provide the basic infrastructure for the internet and the worldwide web. Therefore, it's important to understand how these networks can be protected from attacks. Building on what you recently learned about networking and cryptography, you can now see how to protect the underlying communications networks and computers you use.</Remark>
                    <Remark>By the end of this week, you'll understand the role of firewalls and protecting networks, you'll be able to configure your own personal firewall on your computer, and you'll be able to describe how networks can be automatically monitored to detect attacks as they occur. You'll also learn how cryptography enables virtual private networks to maintain your confidentiality. When you lock your front door, you protect your valuables and personal space in the real world. Now let’s see how to do the same for your digital life.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1025.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1025.jpg" x_folderhash="e1d42cc2" x_contenthash="1e206fea" x_imagesrc="ou_futurelearn_cyber_security_vid_1025.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Your course guide, Cory, explains that earlier in the course, you looked at a range of security techniques and technologies aimed at protecting your online identity, as well as your digital information, from malware.</Paragraph>
            <Paragraph>This week explores different ways of protecting the underlying communication networks and computers we use from attack and you’ll also configure a firewall for the computers you use.</Paragraph>
        </Session>
        <Session>
            <Title>1 Firewall basics</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1026.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1026.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0c8278ff" x_imagesrc="ou_futurelearn_cyber_security_fig_1026.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 1</b></Caption>
                <Description>This is a photograph of a building on fire, with a firefighter looking on.</Description>
            </Figure>
            <Paragraph>In a building, a firewall is a reinforced masonry wall that is designed to prevent a fire spreading through the structure, allowing people time to escape. Similarly, in a computer network, a firewall is a barrier that blocks dangerous communications from spreading across a network, either from the outside world into a local network, or from one part of a local network to another.</Paragraph>
            <Paragraph>Firewalls can be supplied as dedicated network devices or they may form part of a network router. A firewall might also be included as part of a computer’s operating system.</Paragraph>
            <Paragraph>The internet existed for a long time before firewalls were invented. The first discussion of the necessary technologies took place late 1988, and came about after several attacks from organised groups of hackers and the very first malicious software.</Paragraph>
            <Paragraph>At their simplest, firewalls block network communications by looking at the addressing and protocol information in the data packet’s header. As a data packet (or datagram) arrives at the firewall’s interface, the addressing (usually IP) and protocol information (usually TCP or UDP) is compared to rules programmed into the firewall’s software. These rules can be supplied by the firewall’s manufacturer, or more often they are created by an administrator or sometimes the user.</Paragraph>
            <Paragraph>So if a packet originating from a hacker conducting a scan of your network or computer arrives at a firewall, it will inspect its addressing and protocol information and then compare this against its set of rules. If the set of rules say that packets from an unknown address (the hacker) are to be blocked, then the firewall may either discard the packet ‘silently’ or ‘close’ the connection with the hacker.</Paragraph>
            <Paragraph>Most firewalls store the state of connections to determine if they represent new or existing connections. They will only allow packets belonging to a known, active connection to pass (provided the rule set allows this). More advanced firewalls can identify the applications responsible for sending and receiving packets, allowing network managers to block applications that use excessive bandwidth – such as media players, or those widely used for distributing copyright infringing content – such as BitTorrent applications, as well as protecting from application attacks.</Paragraph>
            <Paragraph>You’ll learn what a personal firewall protects against in the next section.</Paragraph>
            <Section id="personal_firewalls">
                <Title>1.1 Personal firewalls</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1114.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1114.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="3bd333b8" x_imagesrc="ou_futurelearn_cyber_security_fig_1114.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This shows the startings of a brick wall.</Description>
                </Figure>
                <Paragraph>Most operating systems come with a firewall that is installed as part of an operating system.</Paragraph>
                <Paragraph>This firewall is only able to protect the computer it is installed on (and any devices attached to it) from an attack, so it is called a personal firewall. It is not intended to replace a network firewall which prevents attacks from outside of the network (such as from the internet).</Paragraph>
                <Paragraph>Personal firewalls are especially useful for people with portable computers which will inevitably be connected to a wide range of computer networks. While we all hope and, to some extent, trust the people responsible for maintaining these networks to maintain a safe system, we cannot be sure that these networks are not compromised. The personal firewall on our own computers therefore adds a layer of protection between our personal data and a potentially untrustworthy (but useful) network.</Paragraph>
                <Paragraph>Personal firewalls are the responsibility of individual computer users. If you have complete access to your computer’s settings then it is entirely possible to turn off the personal firewall and leave your computer vulnerable.</Paragraph>
                <Paragraph>First of all, you can check your own computer to see how well protected it is at the moment. To do this you can visit a website designed to probe your computer to see what it can access and what is blocked. The site we are using is <a href="https://www.grc.com/shieldsup">https://www.grc.com/shieldsup</a>. Read the information on that page before proceeding.</Paragraph>
                <BulletedList>
                    <ListItem>Start with the instant UpnP Exposure test probe. The response you want to see is: <i>THE EQUIPMENT AT THE TARGET IP ADDRESS DID NOT RESPOND TO OUR UPnP PROBES!</i></ListItem>
                    <ListItem>Next, the file sharing probe. The response you want is: <i>Your Internet port 139 does not appear to exist! One or more ports on this system are operating in FULL STEALTH MODE!</i> <i>Unable to connect with NetBIOS to your computer. All attempts to get any information from your computer have FAILED.</i></ListItem>
                    <ListItem>Common ports: You want to see a green ‘Stealth’ for the status of all ports.</ListItem>
                    <ListItem>All service ports: you want to see a complete green ‘Stealth’ grid of all ports</ListItem>
                    <ListItem>Messenger spam: I have mine turned off.</ListItem>
                </BulletedList>
                <Paragraph>In the next sections, you’ll learn how to check that your default personal firewall installed with your computer is running correctly. Once you have updated your firewall settings you can come back to  <a href="https://www.grc.com/shieldsup">https://www.grc.com/shieldsup</a> and see if the probes are now kept out.</Paragraph>
            </Section>
            <Section>
                <Title>1.2 Configuring your own firewall</Title>
                <Paragraph>In this section you will locate the personal firewall on your own computer and, if necessary, make modifications to its settings to provide the best possible protection.</Paragraph>
                <Paragraph>You will need to have Administrator level access to the computer you use as you will be making changes to important parts of the operating system. If you do not have these permissions, request temporary administrator rights from the machine’s owner.</Paragraph>
                <Paragraph>If your computer is in an office environment, or is supplied by your employer, please check that you are permitted to change the firewall settings before attempting this section. Many employers have preferred settings that are maintained by specialist staff and you should not attempt to change them without permission.</Paragraph>
                <Paragraph>If you have Windows 10, your firewall should be on by default. Use the information on Microsoft’s support page to check the firewall is turned on: <a href="https://support.microsoft.com/en-us/help/4028544/windows-10-turn-windows-defender-firewall-on-or-off">https://support.microsoft.com/en-us/help/4028544/windows-10-turn-windows-defender-firewall-on-or-off</a>.</Paragraph>
                <Paragraph>Apple takes responsibility for the security functions of their devices. You can read their latest information at: <a href="https://www.apple.com/business/docs/site/iOS_Security_Guide.pdf">https://www.apple.com/business/docs/site/iOS_Security_Guide.pdf</a>.</Paragraph>
                <Paragraph>If you are using Linux you have a lot of choice about which firewall to run. See these articles for more information:</Paragraph>
                <BulletedList>
                    <ListItem><a href="https://www.tecmint.com/open-source-security-firewalls-for-linux-systems/">https://www.tecmint.com/open-source-security-firewalls-for-linux-systems/</a></ListItem>
                    <ListItem><a href="https://www.techradar.com/news/best-free-linux-firewall">https://www.techradar.com/news/best-free-linux-firewall</a></ListItem>
                    <ListItem><a href="https://opensource.com/article/18/9/linux-iptables-firewalld">https://opensource.com/article/18/9/linux-iptables-firewalld</a></ListItem>
                </BulletedList>
                <InternalSection id="firewall_pc">
                    <Heading>Configuring your own firewall (Older Windows versions)</Heading>
                    <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1116.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1116_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="19ca6112" x_subtitles="ou_futurelearn_cyber_security_vid_1116.srt">
                        <Transcript>
                            <Heading><font val="'Arial'">Configuring your own firewall (PC) </font></Heading>
                            <Remark><font val="'NimbusSanL'">If you have Windows 7, go to the Start menu. Choose Control Panel, and then System And Security. </font></Remark>
                            <Remark><font val="'NimbusSanL'">One of the options is for Windows Firewall. Click it. Click Turn Windows Firewall On or Off. You may need to enter an administrator password depending on how your Windows is set up. If the firewall is not already active, click Turn on Windows Firewall for each of the network types that your computer supports. The Windows Firewall gives you a range of options depending on how much data you wish to allow through the firewall. </font></Remark>
                            <Remark><font val="'NimbusSanL'">When the firewall is first activated, the majority of applications are automatically blocked. But you can overrule this block by checking the Notify Me check box when the Windows Firewall blocks a new app. </font></Remark>
                            <Remark><font val="'NimbusSanL'">From now on, every time an application first attempts to connect to the network, Windows will prompt you, asking if you wish to give it permission to do so. Your choice is remembered by the firewall. You should only give permission if you are sure the application is safe. </font></Remark>
                            <Remark><font val="'NimbusSanL'">If you want to get maximum protection from the firewall, select the Block All Incoming Connections option, including those in the list of allowed apps. This will prevent other computers connecting to your machine unless your computer has requested data. This is a very useful option if you're travelling and using public Wi-Fi networks. </font></Remark>
                        </Transcript>
                        <Figure>
                            <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1116.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1116.jpg" x_folderhash="e1d42cc2" x_contenthash="39846f06" x_imagesrc="ou_futurelearn_cyber_security_vid_1116.jpg" x_imagewidth="512" x_imageheight="288"/>
                        </Figure>
                    </MediaContent>
                    <Paragraph>Locate the personal firewall on your own computer and, if necessary, make modifications to its settings to provide the best possible protection.</Paragraph>
                    <Paragraph>Download the <a href="https://www.open.edu/openlearn/ocw/pluginfile.php/697261/mod_resource/content/3/Configuring%20your%20own%20firewall%20%28PC%20-%20Windows%207%29.pdf">PDF</a> of these instructions to keep as reference.</Paragraph>
                    <Paragraph>You can skip the next part, unless you also own a Mac and want to configure a firewall for this as well.</Paragraph>
                </InternalSection>
                <InternalSection id="firewall_mac">
                    <Heading>Configuring your own firewall (Mac)</Heading>
                    <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1117.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1117_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="201ed4b0" x_subtitles="ou_futurelearn_cyber_security_vid_1117.srt">
                        <Transcript>
                            <Remark>On an Apple Mac, you can access the firewall using the System Preferences. Choose Security and Privacy. On the Security and Privacy Preferences pane, select the Firewall tab. If the firewall is not already enabled, click the Turn On Firewall button. You may need to click the padlock icon and provide your password to do this. Once the firewall is enabled, you can access its settings by clicking the Firewall Options button. Clicking the Block All Incoming Connections button will stop network traffic from external computers other than the traffic relating to some basic network services.</Remark>
                            <Remark>The list of software under this check box specifies the programmes that are allowed to send and receive data from the network. Software can be added to this list by clicking the Plus button underneath it. The check box to automatically allow assigned software to receive incoming connections allows those applications that have been digitally signed to send and receive data.</Remark>
                            <Remark>Finally, the Stealth Mode button can be used to prevent your computer from responding to ping messages that are sometimes used by attackers to identify potential targets. Any changes we make to the firewall settings have to be confirmed by clicking the OK button at the bottom of the window.</Remark>
                        </Transcript>
                        <Figure>
                            <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1117.jpg" width="100%" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1117.jpg" x_folderhash="e1d42cc2" x_contenthash="bac4168d" x_imagesrc="ou_futurelearn_cyber_security_vid_1117.jpg" x_imagewidth="512" x_imageheight="288"/>
                        </Figure>
                    </MediaContent>
                    <Paragraph>Locate the personal firewall on your own computer and, if necessary, make modifications to its settings to provide the best possible protection.</Paragraph>
                    <Paragraph>Download the <a href="https://www.open.edu/openlearn/ocw/pluginfile.php/697265/mod_resource/content/2/Configuring%20your%20own%20firewall%20%28Mac%29.pdf">PDF</a> of these instructions to keep as reference.</Paragraph>
                    <Paragraph>Support on the Apple website can be found here:</Paragraph>
                    <BulletedList>
                        <ListItem>About the application firewall: <a href="https://support.apple.com/en-us/HT201642">https://support.apple.com/en-us/HT201642</a></ListItem>
                        <ListItem>Change Firewall preferences on Mac: <a href="https://support.apple.com/en-gb/guide/mac-help/mh11783/10.15/mac/10.15">https://support.apple.com/en-gb/guide/mac-help/mh11783/10.15/mac/10.15</a></ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Other firewalls</Heading>
                    <Paragraph>Other firewalls are available either to download or as software packages that can be bought from retailers. Make sure that any software packages that you download have been fully evaluated by organisations that have the expertise to do such an evaluation. Apps and software that you find using a search engine, or in an Android app store may contain malware.</Paragraph>
                    <Paragraph>You may prefer to use one of these programs, but if you do, please remember:</Paragraph>
                    <BulletedList>
                        <ListItem>you should only keep one firewall running at a time since multiple firewalls will not offer significantly better protection and can interfere with one another</ListItem>
                        <ListItem>you must keep one firewall running at all times.</ListItem>
                    </BulletedList>
                    <Paragraph>Once you’ve set up your personal firewall, identify a type of traffic that you might want to allow (or deny) on your computer.</Paragraph>
                </InternalSection>
            </Section>
        </Session>
        <Session id="vpn_basics">
            <Title>2 VPN basics</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1027.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1027.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="bae95247" x_imagesrc="ou_futurelearn_cyber_security_fig_1027.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 3</b></Caption>
                <Description>This is a photograph from a film scene in which two people in the Wild West are shooting at each other.</Description>
            </Figure>
            <Paragraph>You’ve just learned how firewalls can protect individual computers and local networks from attack. Next, you’ll learn about the uses of virtual private networks (VPNs).</Paragraph>
            <Paragraph>In some ways, our local networks resemble forts sitting in the Wild West of a Hollywood movie. Inside strong walls, life goes on as normal, with data being exchanged freely between trusted machines. Meanwhile, beyond the firewall there is the lawless frontier of the internet; traffic crossing the internet must make a risky journey largely unprotected.</Paragraph>
            <Paragraph>The problem of secure data transmission is especially acute for organisations based in several physical locations, such as those who need to exchange information with sub-contractors or those with a dispersed workforce such as sales teams or home workers.</Paragraph>
            <Paragraph>Traditionally, companies invested in private communications links (usually called leased lines) whose cost might run to thousands of pounds per month. Most organisations cannot justify such an investment and in any case, leased lines cannot serve a mobile or highly dispersed workforce. So the lawless frontier of the internet is our only choice – this is where VPNs come to the rescue!</Paragraph>
            <Paragraph>A VPN, as the name implies, is a means of creating a private network across an untrusted network such as the internet. VPNs can be used for a number of different purposes such as:</Paragraph>
            <BulletedList>
                <ListItem>to securely connect isolated local area networks (LANs) across the internet</ListItem>
                <ListItem>to allow mobile users remote access to a corporate network using the internet</ListItem>
                <ListItem>to control access within an intranet environment.</ListItem>
            </BulletedList>
            <InternalSection>
                <Heading>VPN concepts for a corporate network</Heading>
                <Paragraph>VPNs are typically implemented using dedicated network devices (sometimes this might be a firewall) and software. There are two parts to the software; the first, called a <b>VPN client</b>, is installed on the computer of anyone who wants to be part of the VPN. The client is responsible for connecting users to the VPN so that it can send and receive information in a secure manner with, in this example, a corporate network. The second part is the <b>VPN server</b> which is part of a dedicated network device, usually located on the perimeter of an organisation’s network. The server software typically performs the authentication of users and route traffic to the corporate network.</Paragraph>
                <Paragraph>The VPN software creates a path known as a ‘tunnel’ between the VPN client and the VPN server. It can establish this ‘tunnel’ by using any third party or untrusted network such as the internet. Unlike other paths through the internet, information which passes through this ‘tunnel’ can be encrypted to protect it from inspection or modification. So we can use these tunnels to protect our data while it crosses the lawless frontier of the internet back to the safety of our forts!</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>VPN concepts for an open network</Heading>
                <Paragraph>Some parts of the Internet are much more dangerous than others. In particular, public wi-fi connections in cafes, hotels, airports can allow your data to be intercepted and your movements to be tracked. Some countries also routinely monitor all Internet traffic as it enters or leaves the country as well as internal traffic.</Paragraph>
                <Paragraph>A VPN service can offer a VPN client to run on your computer and VPN servers at safe locations around the world which provide a gateway onto the Internet. When you connect with your VPN client to a VPN service an encrypted tunnel connects your computer to the remote VPN server. It appears to the outside world as though your own computer is located at the VPN exit point in another country.</Paragraph>
                <Paragraph>Free VPN services are available but tend to be quite slow. If personal security is particularly important take care to use a service that doesn’t log user data in any way. ProtonVPN is an example of such a service <a href="https://protonvpn.com/">https://protonvpn.com/</a>.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>VPN concepts for a personal private network</Heading>
                <Paragraph>It is quite possible to install VPN server software on your own private computer at home, and leave it running when you are away from home. A VPN client software on your mobile device connects to your own home VPN server. An encrypted tunnel connects your mobile device wherever you are and gives you secure access to your home computer. To the outside Internet it appears as though you are accessing the Internet from home.</Paragraph>
            </InternalSection>
            <Section id="securing_tunnels">
                <Title>2.1 Securing the tunnels</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1120.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1120.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ce90d09f" x_imagesrc="ou_futurelearn_cyber_security_fig_1120.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 4</b></Caption>
                    <Description>This is an abstract image in which there is a tunnel of different photographs. </Description>
                </Figure>
                <Paragraph>The VPN path or tunnel between the VPN client and the VPN server relies on encryption to protect the data from interception or modification as it travels across the internet.</Paragraph>
                <InternalSection>
                    <Heading>Encryption</Heading>
                    <Paragraph>In a VPN, encryption and decryption is typically performed by the client and server software. Early VPN solutions used proprietary encryption techniques, but shortcomings in many of these methods has forced a switch to public encryption standards.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Authenticity and integrity</Heading>
                    <Paragraph>It is vital to ensure that information can be trusted – that it is coming from an authenticated user and that it has not been altered in transit. VPNs use a number of methods to ensure authenticity:</Paragraph>
                    <BulletedList>
                        <ListItem><b>hashes</b> (see Week 5)</ListItem>
                        <ListItem><b>digital signatures</b> (see Week 5)</ListItem>
                        <ListItem><b>message authentication codes (MACs)</b>.</ListItem>
                    </BulletedList>
                    <Paragraph>MACs are appended to messages and act as an authenticator. They are similar in principle to digital signatures, but the hash is encrypted and decrypted using the same secret key (i.e. using symmetric encryption).</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>VPN protocols</Heading>
                    <Paragraph>There are three main forms of VPN protocol currently in use:</Paragraph>
                    <SubHeading>PPTP (Point to Point Tunnelling Protocol)</SubHeading>
                    <Paragraph>PPTP was designed in a consortium led by Microsoft, which included an implementation of the protocol as a standard component of Windows NT 4. Microsoft also released PPTP as a free add-on to Windows 95 and Windows 98, allowing users of (at the time) the most popular version of Windows to access corporate networks.</Paragraph>
                    <Paragraph>PPTP proved unsuited to large companies (being limited to 255 connections per server), but more seriously, the PPTP standard did not settle on a single form of user authentication or encryption; therefore two companies could offer software supporting PPTP, yet each product would be incompatible with the other! From Windows 2000 onwards, Microsoft replaced PPTP with L2TP (see below).</Paragraph>
                    <SubHeading>L2TP (Layer 2 Tunnelling Protocol)</SubHeading>
                    <Paragraph>This is an adaptation of a VPN protocol known as L2F originally developed by Cisco to compete with PPTP. In an attempt to improve L2F, a successor was devised by a group composed of the PPTP Forum, Cisco and the Internet Engineering Task Force (IETF). L2TP combines features of both PPTP and L2F.</Paragraph>
                    <SubHeading>IPSec (Internet Protocol Security)</SubHeading>
                    <Paragraph>IPSec was designed by an international committee (<i>The Internet Engineering Task Force</i> (IETF)) in 1992 with a first draft standard published in 1995, the revised standard was published in 1998. IPSec is now the most widely supported protocol with backing from Intel, IBM, HP/Compaq and Microsoft (among others).</Paragraph>
                    <Paragraph>IPSec has gained a reputation for security thanks to its use of well-known and trusted technologies. Rather than invent new techniques for encryption, the designers of the protocol built their system on top of existing encryption technologies, which had, in themselves been subjected to intense scrutiny.</Paragraph>
                    <Paragraph>In the next section you’ll discover how secure VPN access can be.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>OpenVPN</Heading>
                    <Paragraph>This is an Open Source VPN developed in 2004 based on the SSL/TLS protocol. It is designed to be simpler to set up and operate. More information can be found at: <a href="https://community.openvpn.net/openvpn/wiki/OverviewOfOpenvpn#OpenVPNOSS">https://community.openvpn.net/openvpn/wiki/OverviewOfOpenvpn#OpenVPNOSS</a></Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>2.2 Security risks of VPN</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1121.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1121.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="35515377" x_imagesrc="ou_futurelearn_cyber_security_fig_1121.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 5</b></Caption>
                    <Description>This photograph is of an open laptop, but a beach and the sea in the background.</Description>
                </Figure>
                <Paragraph>VPNs might sound like a panacea to a number of problems as they can extend, in our example, a corporate network across a wide geographic area via the internet. However, in doing so, they raise a number of new problems.</Paragraph>
                <InternalSection>
                    <Heading>Security of remote machines</Heading>
                    <Paragraph>When a remote machine is part of a VPN it effectively creates a new frontier between the ‘secure’ corporate network and the internet. This remote machine now offers a direct route into a corporate network. Previously, it had been relatively simple to secure machines within a corporate network; now the remote user might be using their own computer, network connection, operating system and software – none of which are controlled by the organisation. Worse still, they might be sharing the machine with a number of other users, some of which might not be employed by the organisation. Perhaps the same PC is used to manage corporate documents, as well as downloading pirated music from the internet and playing video games!</Paragraph>
                    <Paragraph>The remote machines must themselves be secured from abuse. That may mean enforcing certain minimum standards with regards to operating system, antivirus software, firewalls and so on. Employers may have to stipulate that antivirus software is kept up to date, and that all patches and service packs are installed.</Paragraph>
                    <Paragraph>It might be prudent to severely limit what a remote user can access on the internal corporate network when connecting over a VPN.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Security of the VPN implementation</Heading>
                    <Paragraph>As you learned earlier, the security of various VPN implementations has come under scrutiny. Protocols themselves might be well designed and apparently secure, but the method of implementation, where programmers have taken shortcuts or offered ‘additional convenience’ to the user, may compromise the protection offered.</Paragraph>
                    <Paragraph>For instance, there are no major problems with the PPTP protocol, but Microsoft’s implementation of PPTP was found to have a number of serious defects. Microsoft’s implementation of PPTP was introduced in 1996, and hacker software exploiting weaknesses began circulating the following year. Papers describing the weaknesses appeared in 1998, it was only after publication that Microsoft addressed the most serious weaknesses in PPTP by releasing a patch (DUN 1.3), and even then some issues remained unresolved.</Paragraph>
                    <Paragraph>In addition to errors in protocol implementations, security vulnerabilities can be introduced if the design or configuration of the overall VPN solution is done incorrectly.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Security of interoperation</Heading>
                    <Paragraph>VPN is a technology with a number of competing standards, often supported by different vendors. Mixing and matching hardware and software might cause problems. Until technology matures (which is happening at a rapid rate), it might be necessary to use a single technology provider.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Security of network availability</Heading>
                    <Paragraph>Since VPNs typically rely on the internet for delivering information there are no guarantees about the reliability. The internet cannot guarantee delivery of information from one location to another.</Paragraph>
                    <Paragraph>In the next section you are invited to find out more about VPN and share your findings.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>2.3 Putting VPN to work</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1122.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1122.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="e36453c1" x_imagesrc="ou_futurelearn_cyber_security_fig_1122.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>This is a photograph of a man using a laptop.</Description>
                </Figure>
                <Paragraph>VPN technologies have a range of applications in the real world.</Paragraph>
                <Activity>
                    <Heading>Activity 1 VPN applications</Heading>
                    <Timing>Allow about 30 minutes</Timing>
                    <Question>
                        <Paragraph>Find out about some VPN applications. What are the potential security problems associated with some of the applications? </Paragraph>
                        <Paragraph>Use these articles as starting points: </Paragraph>
                        <BulletedList>
                            <ListItem><a href="https://www.pcmag.com/roundup/296955/the-best-vpn-services">https://www.pcmag.com/roundup/296955/the-best-vpn-services</a></ListItem>
                            <ListItem><a href="https://www.techradar.com/vpn/most-secure-vpns-best-encryption">https://www.techradar.com/vpn/most-secure-vpns-best-encryption</a></ListItem>
                            <ListItem><a href="https://www.techradar.com/uk/vpn/best-vpn">https://www.techradar.com/uk/vpn/best-vpn</a></ListItem>
                            <ListItem><a href="https://www.techradar.com/news/8-reasons-to-replace-your-vpn-client-with-openvpn">https://www.techradar.com/news/8-reasons-to-replace-your-vpn-client-with-openvpn</a></ListItem>
                            <ListItem><a href="https://www.vpnmentor.com/blog/understanding-five-eyes-concept/">https://www.vpnmentor.com/blog/understanding-five-eyes-concept/</a></ListItem>
                            <ListItem><a href="https://community.openvpn.net/openvpn/wiki/OverviewOfOpenvpn#OpenVPNOSS">https://community.openvpn.net/openvpn/wiki/OverviewOfOpenvpn#OpenVPNOSS</a></ListItem>
                        </BulletedList>
                        <Paragraph>Note down your thoughts in the space below.</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="act1responsehhrhfj"/>
                    </Interaction>
                </Activity>
                <InternalSection>
                    <Heading>The TOR browser</Heading>
                    <Paragraph>The TOR Browser is a web browser designed to maximise the user’s security against attacks on the communications between the user and the wider Internet. TOR stands for ‘The Onion Router’, which is a protocol where the user’s traffic is encrypted and routed through three random TOR relays that could be anywhere in the world, and these relays are changed every few minutes. The third TOR relay then sends the traffic as normal HTTPS traffic without revealing the original source.</Paragraph>
                    <Paragraph>TOR can offer security over public wi-fi. An attacker monitoring wi-fi can detect you are using TOR, but that is all.</Paragraph>
                    <Paragraph>You can use the TOR browser to access secure sites over public wi-fi. In fact, using random public wi-fi sites and the TOR browser is one of the safest ways for a journalist to send communications in a hostile environment.</Paragraph>
                    <Paragraph>By using TOR browser to access ProtonMail and send or receive an encrypted email, an attacker won’t be able to see that you are using ProtonMail to send and receive messages.</Paragraph>
                    <Paragraph>When using TOR, you should keep the following points in mind:</Paragraph>
                    <BulletedList>
                        <ListItem>only download the TOR browser from: <a href="https://www.torproject.org/">https://www.torproject.org/</a></ListItem>
                        <ListItem>don’t add any ‘addons’ to this browser, they may break the security</ListItem>
                        <ListItem>don’t use a VPN as well as TOR as this may also break some aspects of security.</ListItem>
                    </BulletedList>
                </InternalSection>
            </Section>
        </Session>
        <Session id="IDS">
            <Title>3 Intrusion detection system (IDS)</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1123.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1123.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="dfa385f1" x_imagesrc="ou_futurelearn_cyber_security_fig_1123.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 7</b></Caption>
                <Description>This is a close-up image of some toy soldiers.</Description>
            </Figure>
            <Paragraph>So what happens when there’s an attack on a computer network? Chances are that you’ve seen a movie or TV programme where the administrators rush to their keyboards and frantically begin typing, lights flash, sirens sound – it’s all very exciting – but does anything like this happen in real life?</Paragraph>
            <Paragraph>As you might suspect, the answer is, no, not really. Computer networks are regularly attacked, but the response is rarely as exciting as filmmakers would like you to believe.</Paragraph>
            <Paragraph>Intrusion detection systems (IDS) may be a dedicated device or software and are typically divided into two types depending on their responsibilities:</Paragraph>
            <BulletedList>
                <ListItem><b>Network Intrusion Detection System (NIDS)</b>, which is responsible for monitoring data passing over a network.</ListItem>
                <ListItem><b>Host Intrusion Detection System (HIDS)</b>, which is responsible for monitoring data to and from a computer.</ListItem>
            </BulletedList>
            <Paragraph>An IDS can support a network firewall. Ideally the firewall should be closed to all traffic apart from that which is known to be needed by the organisation (such as web traffic, email and FTP). An IDS can then be used to scan any traffic passing through the firewall for potential attacks using a NIDS, as well as being able to detect those coming from within – such as from a personal computer infected with malware – using a HIDS.</Paragraph>
            <Paragraph>Intrusion detection may be considered passive; it identifies that an intrusion is taking place and informs an administrator who must take appropriate action. However, they can also be reactive – as well as informing the administrator, the IDS can actively attempt to stop the intrusion, in most cases by blocking any further data packets sent by the source IP address. These systems are also referred to as an Intrusion Prevention or Protection System (IPS).</Paragraph>
            <InternalSection>
                <Heading>Weaknesses</Heading>
                <Paragraph>Automated intrusion detection systems have a number of weaknesses. They can be too sensitive, falsely reporting that an intrusion is under way, for example if a network is incorrectly configured or a buggy program begins issuing large numbers of packets.</Paragraph>
                <Paragraph>Conversely, they are sometimes not sensitive enough to certain types of attack that proceed very slowly and do not generate enough traffic data to raise the alarm. Finally, signature IDS relies on the software suppliers issuing regular updates to the list of known signatures, until the IDS receives the update it is effectively blind to the attack.</Paragraph>
                <Paragraph>In the next section you’ll learn how IDS works in practice.</Paragraph>
            </InternalSection>
            <Section>
                <Title>3.1 IDS techniques</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1124.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1124.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="94fc9d6a" x_imagesrc="ou_futurelearn_cyber_security_fig_1124.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 8</b></Caption>
                    <Description>This image shows four different colour lights.</Description>
                </Figure>
                <Paragraph>Intrusion detection typically uses one of two techniques: anomaly detection or misuse detection.</Paragraph>
                <InternalSection>
                    <Heading>Anomaly detection</Heading>
                    <Paragraph>Anomaly detection depends on the system having a model of the expected ‘normal’ network behaviour of users and applications. The basic assumption of anomaly detection is that attacks differ from normal behaviour. This approach has the advantage of being able to detect previously unknown attacks by simply looking for patterns that deviate from the expected normal behaviour.</Paragraph>
                    <Paragraph>For example, consider a user who normally logs on to his computer at 9am each weekday and spends most of the morning accessing an order processing application, before taking a break for lunch. Subsequently the user accesses a number of supplier websites each afternoon before logging off at 5pm. If the intrusion detection system logs the user accessing the system at 3am and installs new software on his machine, the anomaly detection algorithm would flag this activity as suspicious.</Paragraph>
                    <Paragraph>Of course a potential disadvantage of this approach would be that some legitimate activities might be incorrectly identified as being suspicious.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Misuse detection</Heading>
                    <Paragraph>Misuse detection depends on the system having a set of attack patterns, or ‘signatures’, against which all network activity can be compared. The patterns of normal behaviour and attacks are configured by an administrator. Whenever there is a match between users’ activities and one of the attack signatures, or a mis-match between users’ activities and a configured normal use pattern, the system will flag that an attack is underway.</Paragraph>
                    <Paragraph>This approach has the advantage of minimising the occurrences of legitimate activity being identified as being suspicious. However, it also has the disadvantage of only being able to identify attacks where there is a known pattern, so attacks of a new unknown pattern can be easily missed.</Paragraph>
                    <Paragraph>To find out more about attacks, honeypots are used.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>3.2 Honeypots</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1125.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1125.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="22f3cdbe" x_imagesrc="ou_futurelearn_cyber_security_fig_1125.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>The image shows a computer on a mouse trap.</Description>
                </Figure>
                <Paragraph>Sometimes network administrators want to study attacks, either so the attackers’ methods can be understood more fully and countermeasures prepared, or as part of an investigation that might lead to civil or criminal prosecutions.</Paragraph>
                <Paragraph>One method of safely studying an attack is to deflect attackers towards an isolated computer or network which appears to be completely legitimate, but is in fact a closely-monitored trap known as a honeypot. There, every action performed by the attacker can be recorded and analysed without risking important data.</Paragraph>
                <Paragraph>Honeypots are also used by researchers to identify new attacks that are circulating in the hacking community, as well as by anti-spam organisations which use them to identify the location and identities of spam email senders.</Paragraph>
                <Paragraph>Next, you’ll have the opportunity to review your learning in the end-of-week practice quiz.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 6 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 6. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48337">Week 6 practice quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. What is the role of a personal firewall?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>To protect the network to which your computer is attached from attacks that come from outside the network</Paragraph><Feedback><Paragraph>No, try again. A personal firewall cannot protect the whole network.</Paragraph><Paragraph>You may find <CrossRef idref="personal_firewalls">6.1.1 Personal firewalls</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>To protect your computer and the devices attached to it as an extra layer of security</Paragraph><Feedback><Paragraph>Well done. The network may have a hardware router that has a firewall as well, but installing personal firewall software gives you extra protection and helps you take responsibility for your own computer’s security.</Paragraph><Paragraph>You may find <CrossRef idref="personal_firewalls">6.1.1 Personal firewalls</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>To protect your computer so that you don’t need to use any other firewalls</Paragraph><Feedback><Paragraph>No, try again – a combination of firewalls can be more effective than just using one.</Paragraph><Paragraph>You may find <CrossRef idref="personal_firewalls">6.1.1 Personal firewalls</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>To encrypt the data coming to and from your computer</Paragraph><Feedback><Paragraph>No, try again. Encrypting network traffic is not a function of a firewall.</Paragraph><Paragraph>You may find <CrossRef idref="personal_firewalls">6.1.1 Personal firewalls</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. You are recommending a networking solution for an organisation that is based in several locations and wants to exchange data securely between those locations and with its mobile sales force. Which of the following would be the most practical option?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Leased lines</Paragraph><Feedback><Paragraph>No, try again. Leased lines can be used between different office locations, but they are expensive and of no use to mobile employees. </Paragraph></Feedback></Wrong><Wrong><Paragraph>LANs</Paragraph><Feedback><Paragraph>No, try again. A Local Area Network (LAN) can only used within one building or local area.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Encryption</Paragraph><Feedback><Paragraph>Encryption is part of the solution, but what type of network would you recommend? Try again.</Paragraph></Feedback></Wrong><Right><Paragraph>VPNs</Paragraph><Feedback><Paragraph>Well done. VPN stands for Virtual Private Network. It allows the company’s data to travel through ‘tunnels’ on the internet. This is a more economic and practical solution than private ‘leased’ lines for many organisations.</Paragraph><Paragraph>You may find <CrossRef idref="vpn_basics">6.2 VPN basics</CrossRef> useful.</Paragraph></Feedback></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. For what purpose are hashes, MACs and digital signatures used in a VPN?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>To provide authentication and ensure integrity</Paragraph><Feedback><Paragraph>Well done. You learned that throughout a VPN system it is vital to ensure that information can be trusted – that it is coming from an authenticated user (i.e. to provide authentication) and that it has not been altered in transit (i.e. to ensure integrity).</Paragraph><Paragraph>You may find <CrossRef idref="securing_tunnels">6.2.1 Securing the tunnels</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>To ensure confidentiality and availability</Paragraph><Feedback><Paragraph>No, try again..</Paragraph><Paragraph>You may find <CrossRef idref="securing_tunnels">6.2.1 Securing the tunnels</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>To ensure integrity and availability</Paragraph><Feedback><Paragraph>No, try again..</Paragraph><Paragraph>You may find <CrossRef idref="securing_tunnels">6.2.1 Securing the tunnels</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>To ensure confidentiality and provide authentication</Paragraph><Feedback><Paragraph>No, try again. Only one of these aims is correct.</Paragraph><Paragraph>You may find <CrossRef idref="securing_tunnels">6.2.1 Securing the tunnels</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. Which method of intrusion detection looks for unusual patterns of network use to warn system administrators that there might be a problem?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>NIDS</Paragraph><Feedback><Paragraph>No, try again. NIDS (Network Intrusion Detection System) is software or a device that uses different methods, including the one we are looking for.</Paragraph><Paragraph>You may find <CrossRef idref="IDS">6.3 Intrusion Detection System (IDS)</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>HIDS</Paragraph><Feedback><Paragraph>No, try again. HIDS (Host Intrusion Detection System) is software or a device that uses different methods, including the one we are looking for.</Paragraph><Paragraph>You may find <CrossRef idref="IDS">6.3 Intrusion Detection System (IDS)</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Anomaly detection</Paragraph><Feedback><Paragraph>Well done. This method looks for patterns that deviate from the expected normal behaviour, an example might be where a network is suddenly busy on a day that is usually quiet.</Paragraph><Paragraph>You may find <CrossRef idref="IDS">6.3 Intrusion Detection System (IDS)</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Misuse detection</Paragraph><Feedback><Paragraph>No, try again. Misuse detection examines network traffic agains network activity patterns identified from previous attacks. These patterns are called signatures.</Paragraph><Paragraph>You may find <CrossRef idref="IDS">6.3 Intrusion Detection System (IDS)</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Intrusion Prevention System</Paragraph><Feedback><Paragraph>No, try again. An intrusion prevention system is an extension of intrusion detection systems that takes active steps to thwart an attack once it is detected.</Paragraph><Paragraph>You may find <CrossRef idref="IDS">6.3 Intrusion Detection System (IDS)</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. What is the term used for an isolated computer that can be used by researchers to study new types of attack?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Botnet</Paragraph><Feedback><Paragraph>No, try again. The term ‘botnet’ was introduced in Week 3 when you looked at malware.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Zombie</Paragraph><Feedback><Paragraph>No, try again. The term ‘zombie’ was introduced in Week 3 when you looked at malware.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Tunnel</Paragraph><Feedback><Paragraph>No, try again. The term ‘tunnel’ was introduced in connection with VPNs earlier this week.</Paragraph></Feedback></Wrong><Right><Paragraph>Honeypot</Paragraph><Feedback><Paragraph>Well done. This is a low-risk method of identifying new attacks that are circulating in the hacking community, as well as by anti-spam organisations which use them to identify the location and identities of spam email senders.</Paragraph></Feedback></Right><Wrong><Paragraph>Misuse detection</Paragraph><Feedback><Paragraph>No, try again. Misuse detection is a technique used to identify attacks, not a way of studying how they work.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 6</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1126.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1126.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="3d94aafb" x_imagesrc="ou_futurelearn_cyber_security_fig_1126.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 10</b></Caption>
                <Description>This image shows a man, from behind, wearing a baseball cap and holding a walkie-walkie. On the back of his jumper reads 'SECURITY'.</Description>
            </Figure>
            <Paragraph>This week has focused on techniques for network level protection of your digital life.</Paragraph>
            <Paragraph>In particular you have learned the role of firewalls in protecting networks and configured a personal firewall for the computers you use. You have also learned how cryptography can be used to maintain the confidentiality, integrity and authenticity of network traffic and how networks can be automatically monitored to detect potential attacks.</Paragraph>
            <Paragraph>You can now got to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48328">Week 7: When your defences fail</a>.</Paragraph>
        </Session>
        <!--<Session id="further_reading"><Title>Further reading</Title><Paragraph><a href="http://eandt.theiet.org/magazine/2013/08/cyber-securitys-new-hard-line.cfm">Firewalls and cyber security</a> An article explaining more about firewalls from The Institution of Engineering and Technology.<EditorComment> Broken link</EditorComment></Paragraph></Session>-->
        <Session>
            <Title>Further reading</Title>
            <Paragraph>Vendors explain firewalls:</Paragraph>
            <Paragraph>Cisco: <a href="https://www.cisco.com/c/en_uk/products/security/firewalls/what-is-a-firewall.html">https://www.cisco.com/c/en_uk/products/security/firewalls/what-is-a-firewall.html</a></Paragraph>
            <Paragraph>Fortinet: <a href="https://www.fortinet.com/resources/cyberglossary/firewall.html">https://www.fortinet.com/resources/cyberglossary/firewall.html</a></Paragraph>
            <Paragraph>Checkpoint: <a href="https://www.checkpoint.com/definitions/what-is-firewall/">https://www.checkpoint.com/definitions/what-is-firewall/</a></Paragraph>
            <Paragraph>Palo Alto Networks: <a href="https://blog.fuelusergroup.org/from-first-gen-to-next-gen-the-evolution-of-the-firewall">https://blog.fuelusergroup.org/from-first-gen-to-next-gen-the-evolution-of-the-firewall</a></Paragraph>
        </Session>
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 7: When your defences fail</UnitTitle>
        <Session>
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1030.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1030_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="79df4b5e" x_subtitles="ou_futurelearn_cyber_security_vid_1030.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Over the past few weeks, we've looked at the threats to your digital information and the technologies available to protect it. Now you know how cryptography can help you keep your secrets and how to protect your network from an attack. But what if you are attacked? This week, we're going to look at what can go wrong when an attack on the security of your information is successful. Using case studies, we'll look at individuals and organisations that have been hit and see what impact it had on them.</Remark>
                    <Remark>This will help you learn to recognise the signs of an attack, arm you with the information on how to recover from a security breach, and how to stop it happening again. Just as importantly, we'll be looking at backing up your data, and the pros and cons of various approaches. 'Til next week.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1030.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1030.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="154c54cc" x_imagesrc="ou_futurelearn_cyber_security_vid_1030.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Over the past few weeks, you’ve learned about technologies that can help improve the security of your digital information. You now have an understanding of how cryptography helps keep information private and prevents information from being modified and how to protect networks from attack.</Paragraph>
            <Paragraph>But, as Cory explains, information cannot be protected by technology alone and it is important to have a good awareness of what kind of things can go wrong when an attack on your information has been successful.</Paragraph>
            <Paragraph>This week will help you to recognise the signs of an attack, to know how and where to report the problem, and to consider what you can do to recover from the security breach and stop it happening again.</Paragraph>
        </Session>
        <Session id="id_theft">
            <Title>1 Identity theft</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1044-640x360.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1044_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="c801d513" x_subtitles="ou_futurelearn_cyber_security_vid_1044-640x360.srt">
                <Transcript>
                    <Speaker>PRESENTER</Speaker>
                    <Remark>In this block of flats behind me, a hacker made tens of thousands of pounds in fraud, and all from the comfort of his own home, until he tried to push his luck a little too far. Ian Wood was using Facebook to fund a lavish lifestyle. </Remark>
                    <Speaker>DC BILLY JOHNSON</Speaker>
                    <Remark>He would generally pose as someone who wasn't himself. For example, maybe as an attractive woman and he would try and befriend men on Facebook who would look at his profile picture and say, 'Oh yeah, I'll be friends with that person'. And what they were essentially doing was allowing this man into their life.</Remark>
                    <Speaker>PRESENTER</Speaker>
                    <Remark>He discovered people often use the same usernames for different accounts online. </Remark>
                    <Speaker>DC BILLY JOHNSON</Speaker>
                    <Remark>What Ian Wood did was he used that username, type it into mainstream banking websites, and as soon as he got the message of username correct, password incorrect. Security questions. He was in play then. And he could use information from the social networking sites to try and find a way in to that bank account. </Remark>
                    <Speaker>PRESENTER</Speaker>
                    <Remark>Once in, he stole 35,000 pounds from online accounts. He then transferred the money to bogus accounts until he got cocky. </Remark>
                    <Speaker>DC BILLY JOHNSON</Speaker>
                    <Remark>As a lot of criminals do, they get more relaxed about their behaviour, and that was when he made the transfer from a bank account into his own in his name. We went to arrest him for that offence and that was when we opened the door basically to all the activity that he'd been involved in.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1044-1280x720.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1044-1280x720.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="c9d642f0" x_imagesrc="ou_futurelearn_cyber_security_vid_1044-1280x720.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Identity theft is a type of fraud in which an attacker uses stolen personal information to impersonate another person. This video shows an extreme, though by no means unique, example of the possible consequences of identity theft for an individual.</Paragraph>
            <Paragraph>Traditionally, this type of fraud was achieved by an attacker intercepting postal deliveries which contain personal information such as names, addresses, bank account details and so on. Attackers could then open credit card accounts and apply for loans in the victim’s name. Victims have had their financial security and lives ruined by identity theft.</Paragraph>
            <Paragraph>The online world has opened up a new, lucrative source of information for fraudsters. Many users have been quite relaxed about sharing their information with online services and other users, but even security conscious individuals are threatened by malware designed to sniff out personal information on a computer, or phishing attacks that persuade users to divulge personal information. Additionally, as we have seen, hacking attacks on big retailers can make millions of personal records available for potential abuse.</Paragraph>
            <Paragraph>Online identity theft is a growing threat – in 2018, it was reported by 23% of internet users in the US according to Statista (2018).</Paragraph>
            <InternalSection>
                <Heading>Preventing identity theft</Heading>
                <Paragraph>You can greatly limit your risk of online identity theft by following simple security procedures such as running an antivirus program, keeping it up to date and by not responding to phishing emails.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Detecting identity theft</Heading>
                <Paragraph>Online identity theft may pass unnoticed for some time, during which great damage can be done to your financial security. Some signs that a victim might notice are:</Paragraph>
                <BulletedList>
                    <ListItem>unexplained bank withdrawals or credit card charges</ListItem>
                    <ListItem>bills and other expected official letters don’t arrive</ListItem>
                    <ListItem>cards or cheques are declined</ListItem>
                    <ListItem>debt collectors make contact about debts the victim knows nothing about</ListItem>
                    <ListItem>they receive notice that their information was compromised by a data breach at a company where they do business or have an account</ListItem>
                    <ListItem>their bank or credit card provider makes contact about suspicious behaviour on their account.</ListItem>
                </BulletedList>
                <Paragraph>However, you cannot do much to prevent the loss of your details by other organisations that provide everything needed to steal your identity. In 2017, Equifax, one of the three major credit reporting agencies in the US, announced a data breach that affected 143 million consumers. The hackers accessed social security numbers, birthdates, addresses, and driver’s license numbers.</Paragraph>
                <Paragraph>It is worth keeping an eye on your own free credit reports to make sure nothing unexpected is being shown that might indicate identity theft.</Paragraph>
                <Paragraph>Next, you’ll learn about what data loss can mean for organisations.</Paragraph>
            </InternalSection>
            <Section id="loss_of_data">
                <Title>1.1 Loss of data</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1127.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1127.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="338107de" x_imagesrc="ou_futurelearn_cyber_security_fig_1127.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 1</b> US Army Private Chelsea (then Bradley) Manning, who was at the centre of a controversial data leak to the Wikileaks website in 2009</Caption>
                </Figure>
                <Paragraph>Data loss can mean several things ranging from the destruction and deletion of data, to making unauthorised copies that are no longer under your control.</Paragraph>
                <Paragraph>Data can be stolen by people who have direct access to a computer, such as by copying data to a flash memory drive, and also by attackers gaining access over a network connection.</Paragraph>
                <InternalSection>
                    <Heading>Insider attacks</Heading>
                    <Paragraph>The hardest attack to defend against is when an attacker has direct access to a computer, especially in an organisation where many people might have access to a single computer, and one, or more, of them might not have the organisation’s best interests at heart. Security risks posed by employees (or ex-employees) of an organisation to their employers are known as insider threats.</Paragraph>
                    <Paragraph>A 2013 Forrester survey of businesses employing two or more people in the UK, US, Canada, France and Germany found that 36% of information security breaches were caused by insiders and represented the leading threat to organisational security. These findings were supported in a survey of attendees to the Infosecurity Europe conference where 37% of respondents said the biggest threat to their information security came in the form of ‘rogue employees’. This placed insider threats ahead of cyber attacks (19%) and device security (15%).</Paragraph>
                    <Paragraph>The pattern of attacks does change with time. In 2018, according to Statista, 56% of breaches were caused by malicious outsiders, only 7% by insiders and 34% were the result of accidental loss. However, Verizon suggested that 34% of all breaches in 2018 were caused by insiders (Verizon, 2019).</Paragraph>
                    <CaseStudy>
                        <Heading>Case study: Stealing data</Heading>
                        <Paragraph>In 2012, a programmer for the Federal Reserve Bank of New York was sentenced for stealing source code used to develop the bank’s computer systems. Bo Zhang was a third party contractor for the bank with privileged access to software that was under development. He pleaded guilty to copying the code to personal computers in violation of his contract of employment although there is no evidence that he intended to share the programs with anyone.</Paragraph>
                        <Paragraph>Similarly, in 2013, the social networking game developer Zynga settled a lawsuit with a former employee, Alan Patmore, who had copied hundreds of files, including unreleased game designs, to a Dropbox cloud storage folder before taking up employment with a rival company. Patmore expressed deep regret for his actions and agreed to ensure all copies of the data were destroyed in exchange for Zynga dropping charges against him.</Paragraph>
                        <Paragraph>In 2014, the health insurance company Anthem was breached and the details of 80 million people was extracted. This has put these 80 million people at risk from targeted phishing attacks, identity theft or extortion.</Paragraph>
                        <Paragraph>In 2017, the private healthcare provider BUPA reported that 547,000 customer details were stolen by an insider and offered for sale online.</Paragraph>
                        <Paragraph>In 2019, an employee of Tesla stole extensive details of Tesla’s manufacturing systems.</Paragraph>
                        <Paragraph>India's Punjab National Bank discovered $1.8 billion in fraudulent transactions as a result of an employee obtaining a high security password.</Paragraph>
                        <Paragraph>In November 2019, Trend Micro, a global security company with over 12,000,000 customers, reported that details of 68,000 of its customers had been copied by an employee who had sold the data to criminals who, immediately started using the data in phishing attacks. The employee appears to have had detailed knowledge of the controls in place to protect that data. Trend Micro was not aware of this theft until customers started reporting phishing attacks. The information used in the phishing attacks pinpointed the source of the data, but it took a lot of time and effort to check all security systems and determine that this was an internal theft. </Paragraph>
                    </CaseStudy>
                    <Paragraph>The case of Chelsea Manning is one of the more significant insider attacks involving the loss of data. It is another example where the attacker simply copied the data and shared it with others, depriving the data owners of control over the confidentiality of the information.</Paragraph>
                    <CaseStudy>
                        <Heading>Case study: Chelsea Manning</Heading>
                        <Paragraph>Chelsea Manning (then Bradley Manning) was a United States Army soldier who leaked confidential information, including 250,000 United States diplomatic messages and 500,000 United States Army reports as well as videos of military action in Iraq, to the WikiLeaks website.</Paragraph>
                        <Paragraph>Manning obtained copies of classified materials during service in Iraq in 2009, copying them directly to a data CD disguised as a music disc, from which the materials were transferred to a laptop and then to the WikiLeaks servers for dissemination.</Paragraph>
                        <Paragraph>The reports were widely published around the world and caused enormous diplomatic embarrassment for the United States government. Manning was eventually identified after confessing in an online chat to Adrian Lamo, who informed the Army. Manning was charged with 22 offences, including that of aiding the enemy, and pleaded guilty to 10 charges. Manning was found guilty in 2013 and sentenced to 35 years in military prison.</Paragraph>
                        <Paragraph>Wikileaks continues to the present day to publish millions of documents that the owners had intended to be kept secret. </Paragraph>
                    </CaseStudy>
                    <Paragraph>The site ‘';--have i been pwned?’ (<a href="https://haveibeenpwned.com/">https://haveibeenpwned.com/</a>) publishes lists of the largest breaches and the most recent breaches at the bottom of its home page.</Paragraph>
                    <Paragraph>Next, you’ll find out about the risks of data loss.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>1.2 Risks of data loss</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1028.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1028.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="6a689406" x_imagesrc="ou_futurelearn_cyber_security_fig_1028.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This shows an empty office, with rubble on the floor and desk.</Description>
                </Figure>
                <Paragraph>As the case studies showed, there are serious consequences of losing data.</Paragraph>
                <Paragraph>These consequences can be expressed as a series of costs, such as:</Paragraph>
                <BulletedList>
                    <ListItem>the cost of recreating the lost data – either by buying new hardware and software or re-entering the lost data (which may not always be possible)</ListItem>
                    <ListItem>the cost of continuing without that data (availability)</ListItem>
                    <ListItem>the cost of informing others about the loss.</ListItem>
                </BulletedList>
                <Paragraph>The costs cannot just be expressed in terms of money. For instance, the last cost, of informing others, is not just limited to, for example, postage and email charges. A company that suffers a data loss can also suffer a loss in its reputation as a professional organisation. This problem is greatly magnified if personal data belonging to other people has been lost.</Paragraph>
                <CaseStudy>
                    <Heading>Case study: Norsk Hydro</Heading>
                    <Paragraph>In March 2019, Norsk Hydro, one of the biggest aluminium producers in the world, was targeted by a ransomware attack using LockerGoga which encrypted a wide range of files.</Paragraph>
                    <Paragraph>Norsk Hydro had detailed plans in place and was able to limit the spread of the attack and revert to manual operation. It also had secure backups of critical files. In spite of that, the latest estimates in May 2019 put the cost at between $45.6m and $51.3m.</Paragraph>
                    <Paragraph>While they were recovering from this attack, Norsk Hydro were also aware of phishing attempts being made on their trading partners that attempted to spread the malware, and to divert payments to criminal accounts.</Paragraph>
                    <Paragraph>Norsk Hydro did not pay any ransom and provided detailed updates on its response to the attack.</Paragraph>
                </CaseStudy>
                <CaseStudy>
                    <Heading>Case Study: American Medical Collection Agency (AMCA) and Quest Diagnostics</Heading>
                    <Paragraph>AMCA was a company that ran billing and payment services in the US. In August 2018, hackers gained access to its servers and remained undetected until March 2019. The data obtained by the hackers included social security numbers, some credit card and banking details and medical data. </Paragraph>
                    <Paragraph>Quest Diagnostics was a medical company that used the services of another company called Optum360 to collect payments due. Optum360 had outsourced this operation to AMCA. Quest Diagnostics was first to report the security breach after customer details were involved in many fraudulent transactions. </Paragraph>
                    <Paragraph>LabCorp, BioReference and Opko Health were other medical companies that used the services of AMCA. AMCA filed for bankruptcy but the financial impact on the medical companies that used AMCA services is not yet clear.</Paragraph>
                </CaseStudy>
                <Paragraph>The risk of data loss cannot be completely eliminated, but it can be minimised. In 2019, Verizon reported that 34% of breaches involved people inside the business, and 15% of all breaches were the result of misuse by authorised users. However, errors were the cause of 21% of all breaches. </Paragraph>
                <Paragraph>A significant number of security threats are caused inadvertently by employees who are unaware of the risks of their actions, such as copying data to external devices or websites, opening infected emails, clicking malicious links, installing software and so on. Better staff training could reduce the risk of accidental data loss.</Paragraph>
                <Paragraph>The Infosecurity Europe survey revealed that while a slight majority of companies had implemented an internal information security policy to secure computers, networks and data, only a minority had provided staff training to raise awareness of potential security risks. Another important way of minimising the effect of any loss is by backing up data – making secure copies of data either on to a separate device, to a separate disk, or even to a different location.</Paragraph>
                <Paragraph>Think about identity theft and loss of data. Have you ever been affected by these issues? How would you know? Reflect on your personal experience.</Paragraph>
                <BulletedList>
                    <ListItem>Have you checked your email on https://haveibeenpwned.com/ ?</ListItem>
                    <ListItem>How would you recover if your live data was encrypted by ransomware, or simply destroyed?</ListItem>
                </BulletedList>
            </Section>
        </Session>
        <Session id="laws_and_computers">
            <Title>2 Laws and computers</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1129.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1129.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="49db03d0" x_imagesrc="ou_futurelearn_cyber_security_fig_1129.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 3</b></Caption>
                <Description>This is a photograph of the Houses of Parliament and Big Ben in London, UK.</Description>
            </Figure>
            <Paragraph>Now that you have a broader understanding of the kind of things that can go wrong, you’ll look at some of the most important laws in the UK that help to protect us against these cyber security threats. These are the Data Protection Act 2018, the Regulation of Investigatory Powers Act 2016, the Computer Misuse Act 1990 and the Fraud Act 2006. </Paragraph>
            <Paragraph>First though, we’ll start with a brief introduction to the UK legal system. If you live outside the UK (or work with a multinational organisation) you’ll also get a chance to find out what legal frameworks exist in your own country. It is still useful to learn about the UK laws so that you can look for the equivalent in your country.</Paragraph>
            <InternalSection>
                <Heading>Criminal and civil law</Heading>
                <Paragraph>Law in Britain can be broadly divided into two categories:</Paragraph>
                <BulletedList>
                    <ListItem><b>Criminal law</b> is concerned with punishing behaviour that is considered unacceptable (murder, serious injury, fraud and so on). The majority of criminal cases are brought by the State against individuals and companies and require a high standard of proof to secure a conviction (‘beyond reasonable doubt’). Criminal cases can punish guilty parties with either fines or imprisonment, depending on the nature and severity of the offence.</ListItem>
                    <ListItem><b>Civil law</b> is concerned with disputes and these are usually brought before the court by individuals. Civil cases concern (among other things) property law, contracts and noise. There is a lower standard of proof (‘on the balance of probabilities’) than with criminal law and punishments are usually financial in nature.</ListItem>
                </BulletedList>
            </InternalSection>
            <InternalSection>
                <Heading>Bills, Acts and Laws</Heading>
                <Paragraph>An <b>Act of Parliament</b> is a law that has been approved by the British Parliament (Britain has a second type of law that has not been passed through Parliament known as Common Law).</Paragraph>
                <Paragraph>An Act starts as a draft called a <b>Bill</b> which is debated in the elected House of Commons. If it is approved, the Bill is passed to a specialist committee made up from Parliamentarians for revision. Their changes are discussed further in the House of Commons and possibly revised further.</Paragraph>
                <Paragraph>After a formal vote, the Bill passes from the House of Commons to the House of Lords for further scrutiny and possible amendments. The Lords will vote on the Bill before returning it to the House of Commons which considers their amendments. If the two houses agree (and sometimes they do not), the Bill is given Royal Assent and becomes an <b>Act</b>.</Paragraph>
                <Paragraph>Some Acts take immediate effect, but often there is a delay between enactment and implementation as there may need to be processes put in place in order to achieve compliance.</Paragraph>
                <Paragraph>So a Bill does not become law until it becomes an Act.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Keeping up with threats</Heading>
                <Paragraph>It is worth remembering that cyber security is a fast moving area and therefore, legislation is constantly being revised based on new threats and court cases. In particular, the outcomes of trials can result in changes to the interpretation of existing laws as well as prompting creation of new laws. Additionally, because cyber threats are global, they can be affected by legislation from other jurisdictions.</Paragraph>
                <CaseStudy>
                    <Heading>Case study: Gary McKinnon</Heading>
                    <Paragraph>In 2002, the British hacker Gary McKinnon was accused of ‘the biggest military computer hack of all time’ against US Department of Defence and NASA computer systems, resulting in a demand for his extradition to the United States.</Paragraph>
                    <Paragraph>McKinnon fought extradition for 10 years, including an appeal to the House of Lords and the European Court of Human Rights, until the British Government blocked extradition in late 2012. He was not prosecuted in the UK due to the logistics of moving evidence and witnesses from the United States, the passage of time and the difficulties of bringing a case in England and Wales.</Paragraph>
                </CaseStudy>
            </InternalSection>
            <Section>
                <Title>2.1 Data Protection</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1130.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1130.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="5ac24762" x_imagesrc="ou_futurelearn_cyber_security_fig_1130.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 4</b></Caption>
                    <Description>This shows a judge's gavel on top of a computer.</Description>
                </Figure>
                <Paragraph>The original Data Protection Act (DPA) became law in 1984, which established legal obligations for organisations to act responsibly with respect to personal information. This UK’s Data Protection Act 2018 (DPA 2018) replaces earlier data protection legislation to make UK law align to the requirements of the EU's General Data Protection Regulation (GDPR).</Paragraph>
                <Paragraph>GDPR replaces both national data protection legislation and a previous EU law going by the unwieldy name of Data Protection Directive 95/46/EC. GDPR provides a single set of data protection regulations across all EU member states. The introduction of a single EU-wide data protection regime is essential for any business or organisation wishing to operate across national boundaries, since differences in national data protection laws could mean that a data processing operation which was legal in one country would be illegal in another.</Paragraph>
                <Paragraph>GDPR protects EU citizens from abuses of data privacy by companies based in their own country as well as those based in member states. Additionally, any company wishing to process personal data of EU citizens, no matter where they are based in the world, will be obligated to obey GDPR. In the UK, the Information Commissioner’s Office (ICO) is the <b>Statutory Authority</b> (SA) responsible for enforcing the requirements set out in the GDPR. </Paragraph>
                <Paragraph>The DPA 2018 increases the responsibility on companies to ensure personal data is protected at all time. GDPR requires all organisations employing more than 250 people to have at least one <b>Data Protection Officer</b> (DPO) responsible for developing that organisation’s data protection policies and ensuring that it is compliant with GDPR. This represents a major change from the DPA which does not require organisations to employ DPOs.</Paragraph>
                <Paragraph>Under the older DPA legislation, businesses were encouraged to report data breaches to the Information Commissioner but were under no obligation to do so. The DPA 2018 not only forces companies to report breaches, but they must inform the SA within 72 hours of the incident being discovered (the actual breach might have taken place long before but gone undiscovered).</Paragraph>
                <InternalSection>
                    <Heading>Penalties</Heading>
                    <Paragraph>Alongside greater requirements for organisations to protect data, the GDPR increases the penalties on those that fail to do so with a set of escalating penalties:</Paragraph>
                    <BulletedList>
                        <ListItem>a written warning for relatively minor breaches, first offences or unintentional non-compliance;</ListItem>
                        <ListItem>regular data protection audits to ensure a business that experienced a breach has come into compliance with GDPR;</ListItem>
                        <ListItem>a fine up to €20 million or 4% of a business’s annual global turnover – whichever is <i>greater</i>. (Remember, the DPA has a maximum fine of just £500,000).</ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Pseudonymisation</Heading>
                    <Paragraph>One area of change in the DPA 2018 is where personal identifiers, such as a person’s name, address or social security number is replaced with a new tag to protect that person’s privacy; a process known as <b>pseudonymisation</b>. </Paragraph>
                    <Paragraph>Pseudonymisation is widely used where personal data is exchanged between organisations. An example might be a hospital patient receiving novel treatment. Their patient record containing their genuine name and address is used by their doctors, but a pseudonymised record with a random name might be shared with medical researchers.</Paragraph>
                    <Paragraph>Unfortunately, pseudonymisation is not perfect, it can be defeated relatively easily either if the original records are stored without the proper level of security, or if the algorithm that converts genuine personal data into pseudonyms is unsecured. As part of its implementation of GDPR, the DPA 2018 places new responsibilities on organisations using pseudonymisation to ensure that it is not possible to for attackers to easily deanonymise personal data.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>The right to erasure</Heading>
                    <Paragraph>Many people have previously done or said something that now causes them great embarrassment, or which harms their prospects of a settled family life or employment. In previous generations, many of these indiscretions would have been forgotten in a few years, but digital technologies, especially social media, allow people’s past failings to come back to haunt them. An example might be a petty crime, such as vandalism, committed by a child who was punished by a court whose hearing was reported by a local newspaper. A few years later, the same individual stands for public office, and is the subject of attacks over their ‘criminal history’ by political opponents and a hostile media.</Paragraph>
                    <Paragraph>A concept of ‘the right to be forgotten’ was drafted by the European Commission in 2012 which would allow people to request personal data to be removed from search engines and websites because it was untrue or no longer relevant. The GDPR has adopted a more limited ‘right to erasure’ which will allow people to have personal data removed from computers either if the data was acquired by illegal methods (such as by hacking or unauthorised disclosure), or if the privacy of the person in question is seen to be more important than the interests of the organisation storing their data.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Data protection by design and by default</Heading>
                    <Paragraph>The Data Protection Act 2018 introduces a requirement on the developers of new data processing systems that they consider the privacy implications of using the system at the outset rather than once it is complete. As part of this, the act requires data processors to process as little personal information as possible to complete a task, requires organisations to delete data when no longer needed for its original purpose and forbids data being passed to other organisations without permission.</Paragraph>
                    <Paragraph>With the principles of GDPR included in the UK's 2018 Data Protection Act, they will continue to be important requirements for systems that collect and process UK citizen's data irrespective of the UK's membership of the European Union. It is also important to note that the Act is not limited to enacting the provisions of the GDPR and that it includes aspects for data collection and processing which fall under UK national jurisdiction – such as those relating to immigration and law enforcement.</Paragraph>
                    <Paragraph>Next, you’ll learn about The Investigatory Powers Act.</Paragraph>
                </InternalSection>
            </Section>
            <Section id="RIPA">
                <Title>2.2 The Investigatory Powers Act 2016 (IPA)</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1131.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1131.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="b9b5e0a5" x_imagesrc="ou_futurelearn_cyber_security_fig_1131.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 5</b></Caption>
                    <Description>This is an image of a security camera.</Description>
                </Figure>
                <Paragraph>The Investigatory Powers Act 2016, governs the use of surveillance technologies by public bodies such as the police, the intelligence services and local authorities. It updates a previous law, the Regulation of Investigatory Powers Act 2000, which was often referred to as RIPA. </Paragraph>
                <Paragraph>Like RIPA, the Investigatory Powers Act (IPA) ensures intrusive powers are subject to strict safeguards. These covert surveillance powers include intercepting communications, using bugs, covert CCTV and undercover agents.</Paragraph>
                <Paragraph>The use of IPA is overseen by the Interception of Communications Commissioner, together with additional judicial commissioners who will be appointed to oversee different aspects of the law. The Investigatory Powers Tribunal, which comprises independent senior lawyers and members of the judiciary, can hear complaints relating to the exercise of powers under the Act.</Paragraph>
                <Paragraph>IPA allows certain public bodies to access communications records from communication providers, such as telephone companies and internet service providers, when necessary and proportionate to do so for a specific investigation. These records may include the names, addresses and telephone numbers of individuals, the time and duration of calls, the source and destination of emails and the location of mobile devices. The IPA extended the record collection powers of RIPA to include a requirement that communications companies retain up to 12 months of data on websites (but not specific webpages) visited by customers. </Paragraph>
                <Paragraph>More intrusive techniques are subject to higher levels of authorisation. Another section of IPA stipulates that the interception of the contents of a communications (such as telephone calls, emails and the details of specific webpages visited) must be authorised under a warrant issued by the Secretary of State. These include “equipment interference” warrants, which would authorize police and intelligence officials to change the operation of targeted computer systems to enable data collection or other surveillance activities, effectively ‘hacking’ these systems to support investigations.</Paragraph>
                <Paragraph>Next, you’ll find out about The Computer Misuse Act.</Paragraph>
            </Section>
            <Section id="CMA">
                <Title>2.3 The Computer Misuse Act 1990 (CMA)</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1132.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1132.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="a638d3d3" x_imagesrc="ou_futurelearn_cyber_security_fig_1132.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>This is an image of a person's hands in handcuffs. Their clenched fists rest on a computer keyboard.</Description>
                </Figure>
                <Paragraph>The Computer Misuse Act 1990 (CMA) is one of the most influential pieces of legislation relating to computers. It has been updated and amended by a number of other acts:</Paragraph>
                <BulletedList>
                    <ListItem>Criminal Justice and Public Order Act 1994</ListItem>
                    <ListItem>Criminal Justice (Terrorism and Conspiracy) Act 1998</ListItem>
                    <ListItem>Police and Justice Act 2006</ListItem>
                    <ListItem>Serious Crime Act 2015</ListItem>
                </BulletedList>
                <Paragraph>It has been the inspiration for similar laws being introduced in other countries.</Paragraph>
                <Paragraph>The CMA came about, in part, because of a 1988 case where two hackers broke into the British Telecom Prestel network and obtained access to user accounts including that of Prince Philip.</Paragraph>
                <Paragraph>Prestel was a text-based interactive information system developed by the UK Post Office in the late 1970s. Users could browse numbered pages of text (similar to the contemporaneous Ceefax and Teletext information services) on their television as well as send electronic messages to other Prestel users. Prestel services were expensive and the system did not become widely used, although Prestel technology was sold to many other telecom companies. Prestel was gradually sold off in the early 1990s as the internet became available to domestic users.</Paragraph>
                <Paragraph>The two hackers were originally tried and convicted under a law concerned with forgery and counterfeiting, but the conviction was overturned by higher courts who concluded that the Forgery and Counterfeiting Act 1981 had never been intended to be used for this purpose. This led the majority of legal experts to conclude that hacking was not actually illegal in Britain at the time.</Paragraph>
                <Paragraph>The CMA was drawn up hurriedly and was criticised at the time for not being adequately scrutinised, but its central aims have stood the test of time. The original Act introduced three new criminal offences:</Paragraph>
                <BulletedList>
                    <ListItem>unauthorised access to computer materials</ListItem>
                    <ListItem>unauthorised access with intent of committing or aiding further offences</ListItem>
                    <ListItem>unauthorised modification of computer material.</ListItem>
                </BulletedList>
                <Paragraph>Note that ‘unauthorised’ in this context means that the attacker must be aware that they are not intended to use the computer in question. So using another person’s account details, or breaking in to a computer by a password attack are clearly unauthorised use of the computer.</Paragraph>
                <Paragraph>The CMA has been amended a number of times to cover new offences including denial-of-access or denial-of-service to legitimate users (making denial-of-service attacks a criminal offence in the UK), and criminalising the creation and supply of software and hardware that might aid an attack on a computer. This not only criminalises the development of programs designed to break passwords or the development of certain types of malware, but it could potentially criminalise tools used by forensics experts to investigate computer systems which can be abused by attackers.</Paragraph>
                <Paragraph>The CMA has been successfully used in a wide range of criminal cases including denial-of-service attacks against Kent Police, Oxford University, the United States Air Force, the CIA, Sony and Nintendo; fraudulent activities in online games; illegal access and disclosure of confidential emails and personal information; theft from online banks; stalking; hoax calls to emergency telephone numbers and piracy.</Paragraph>
                <Paragraph>The next act you’ll find out about is The Fraud Act.</Paragraph>
            </Section>
            <Section>
                <Title>2.4 The Fraud Act 2006</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1133.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1133.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="2a34c429" x_imagesrc="ou_futurelearn_cyber_security_fig_1133.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 7</b></Caption>
                    <Description>The image is of a person with their hands behind their back, in handcuffs. The person is standing in front of an open laptop with graphs on the screen.</Description>
                </Figure>
                <Paragraph>The Fraud Act 2006 was introduced to simplify a notoriously complex Act of Parliament called the Theft Act.</Paragraph>
                <Paragraph>The previous law defined a large number of types of fraud, often tied to specific circumstances, that made for complex cases that were difficult to prosecute and for juries to understand. In fact, it wasn’t until 1996 that obtaining money from a fraudulent bank transfer was specifically illegal in the UK!</Paragraph>
                <Paragraph>The Fraud Act defines fraud in three ways:</Paragraph>
                <BulletedList>
                    <ListItem>false representation</ListItem>
                    <ListItem>failing to disclose information</ListItem>
                    <ListItem>abusing power.</ListItem>
                </BulletedList>
                <Paragraph>In each case, the defendant’s conduct must be dishonest with the intention of making a gain, or must cause a loss (or the risk of a loss) to another person or individual. Crucially, no actual gain or loss needs to be proved – the fraud might have been unsuccessful or it was stopped before it could take place.</Paragraph>
                <Paragraph>The Fraud Act can be used against anyone attempting to perform fraud whether or not it takes place over the internet. However, Section 11 of the Act makes specific reference to electronic fraud and can be used to prosecute in response to:</Paragraph>
                <BulletedList>
                    <ListItem>dishonestly obtaining electronic communications services such as a telephone, ISP or satellite television subscription</ListItem>
                    <ListItem>cloning mobile phones so that calls made on one handset are billed to another</ListItem>
                    <ListItem>reprogramming mobile phones to interfere with their operation or change their unique identifier information</ListItem>
                    <ListItem>breaking encryption on encrypted communications services such as subscription television services or telephone conversations.</ListItem>
                </BulletedList>
                <Paragraph>In the next section you’ll learn about Lawful Business Practice Regulations.</Paragraph>
            </Section>
            <Section>
                <Title>2.5 Lawful Business Practice Regulations</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1134.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1134.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="113c29f6" x_imagesrc="ou_futurelearn_cyber_security_fig_1134.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 8</b></Caption>
                    <Description>This is a photograph of a man at a desk using a laptop.</Description>
                </Figure>
                <Paragraph>Under UK law, employers have certain rights to monitor communications made by their employees.</Paragraph>
                <Paragraph>They are authorised to do so under the Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 SI 2000/2699 (sometimes abbreviated to IC Regs). Monitoring can take many forms including recording telephone calls, storing telephone numbers, email addresses and website addresses, storage of email and the inspection of any email attachments.</Paragraph>
                <Paragraph>The regulations exist so that employers can ensure that their networks are used in a manner that does not bring the company into disrepute (such as sending offensive emails would), be used for illegal activities (such as transmitting copyright materials without licence), or to check that company resources are not used for personal reasons.</Paragraph>
                <Paragraph>Companies may also have to monitor their networks to meet legal regulation – such as in the case of financial organisations where ‘health warnings’ must be offered to customers – and in extreme cases, monitoring may take place in support of national security.</Paragraph>
                <Paragraph>The IC Regs are an exception to the general understanding that it is unlawful to intercept any communications unless an individual or organisation is specifically authorised to do so. This is codified in RIPA – see Investigatory Powers Act 2016 (<a href="https://www.legislation.gov.uk/ukpga/2016/25/section/1/enacted">https://www.legislation.gov.uk/ukpga/2016/25/section/1/enacted</a> and <a href="https://www.gov.uk/government/collections/ripa-codes">https://www.gov.uk/government/collections/ripa-codes</a>). The IC Regs allow interception to be made under specific conditions, but only if both parties in the communications consent to it happening. Such consent may be a necessary condition of employment, or it might be an additional agreement between an employer and their employees.</Paragraph>
                <Paragraph>Monitoring of employees is an activity that must be done with care since it has the potential to erode trust between management and workers as well as being intrusive. Employers must abide by legislation including the Human Rights Act and the Data Protection Act to ensure that interceptions take place in a proportionate manner that any intercepted data is used for the correct purposes and that personal information is stored and processed appropriately.</Paragraph>
                <Paragraph>Next you can complete an activity to check what you’ve learned about cyber security and the law.</Paragraph>
            </Section>
            <Section>
                <Title>2.6 Cyber security and the law</Title>
                <Paragraph>Check what you’ve learned about cyber security and the law by completing this activity.</Paragraph>
                <Activity>
                    <Heading>Activity 1 The law</Heading>
                    <Timing>Allow about 5 minutes</Timing>
                    <Multipart>
                        <Part>
                            <Question>
                                <Paragraph>Q1. Consider a scenario:</Paragraph>
                                <Paragraph>A hacker steals the customer database of an organisation by exploiting a well-known vulnerability in their computer systems. This vulnerability hadn’t been fixed by the organisation despite the IT department being aware that there was a patch to fix the problem.</Paragraph>
                                <Paragraph>In the UK, under which of the following laws would the organisation have committed an offence?</Paragraph>
                            </Question>
                            <Interaction>
                                <SingleChoice>
                                    <Wrong>
                                        <Paragraph>Computer Misuse Act</Paragraph>
                                        <Feedback>
                                            <Paragraph>No, the organisation has not made unauthorised use of any computer systems.</Paragraph>
                                        </Feedback>
                                    </Wrong>
                                    <Right>
                                        <Paragraph>Data Protection Act</Paragraph>
                                        <Feedback>
                                            <Paragraph>Yes, in failing to patch their software against a known vulnerability, the organisation has not taken adequate measures to secure the personal data of customers and therefore failed to meet its obligations under DPA.</Paragraph>
                                        </Feedback>
                                    </Right>
                                    <Wrong>
                                        <Paragraph>RIPA</Paragraph>
                                        <Feedback>
                                            <Paragraph>No, there is no cause to use provisions from the Regulation of Investigatory Powers Act.</Paragraph>
                                            <Paragraph>You may find <CrossRef idref="laws_and_computers">2 Laws and computers</CrossRef> useful.</Paragraph>
                                        </Feedback>
                                    </Wrong>
                                    <Wrong>
                                        <Paragraph>Fraud Act</Paragraph>
                                        <Feedback>
                                            <Paragraph>No, the organisation has not committed fraud.</Paragraph>
                                            <Paragraph>You may find <CrossRef idref="laws_and_computers">7.2 Laws and computers</CrossRef> useful.</Paragraph>
                                        </Feedback>
                                    </Wrong>
                                </SingleChoice>
                            </Interaction>
                        </Part>
                        <Part>
                            <Question>
                                <Paragraph>Q2. Thinking about the same scenario:</Paragraph>
                                <Paragraph>A hacker steals the customer database of an organisation by exploiting a well-known vulnerability in their computer systems. This vulnerability hadn’t been fixed by the organisation despite the IT department being aware that there was a patch to fix the problem.</Paragraph>
                                <Paragraph>In the UK, under which of the following laws would the hacker have committed an offence?</Paragraph>
                            </Question>
                            <Interaction>
                                <SingleChoice>
                                    <Right>
                                        <Paragraph>Computer Misuse Act</Paragraph>
                                        <Feedback>
                                            <Paragraph>Yes, by gaining unauthorised access to a computer system the hacker would have committed an offence under this act.</Paragraph>
                                            <Paragraph>You may find <CrossRef idref="laws_and_computers">7.2 Laws and computers</CrossRef> useful.</Paragraph>
                                        </Feedback>
                                    </Right>
                                    <Wrong>
                                        <Paragraph>Data Protection Act</Paragraph>
                                        <Feedback>
                                            <Paragraph>No, the hacker is not bound by the provisions of the DPA.</Paragraph>
                                            <Paragraph>You may find <CrossRef idref="laws_and_computers">7.2 Laws and computers</CrossRef> useful.</Paragraph>
                                        </Feedback>
                                    </Wrong>
                                    <Wrong>
                                        <Paragraph>RIPA</Paragraph>
                                        <Feedback>
                                            <Paragraph>No, this is an act that gives law enforcement authorities the power to intercept communications as part of an investigation.</Paragraph>
                                            <Paragraph>You may find <CrossRef idref="laws_and_computers">7.2 Laws and computers</CrossRef> useful.</Paragraph>
                                        </Feedback>
                                    </Wrong>
                                    <Wrong>
                                        <Paragraph>Fraud Act</Paragraph>
                                        <Feedback>
                                            <Paragraph>No, the unauthorised access to the customer records, in itself is not fraud.</Paragraph>
                                            <Paragraph>You may find <CrossRef idref="laws_and_computers">7.2 Laws and computers</CrossRef> useful.</Paragraph>
                                        </Feedback>
                                    </Wrong>
                                </SingleChoice>
                            </Interaction>
                        </Part>
                    </Multipart>
                </Activity>
                <Paragraph>Next, you’ll think about European laws and consider laws that apply in other countries.</Paragraph>
            </Section>
            <Section>
                <Title>2.7 Cyber security in the EU</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_1_w7_f09.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_1_w7_f09.tif.jpg" x_folderhash="e1d42cc2" x_contenthash="d786ae4a" x_imagesrc="cyber_1_w7_f09.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>Image of the earth taken from space. Surrounding the earth is a layer in which a number of padlocks whicha are all linked together by small white dashed lines. </Description>
                </Figure>
                <Paragraph>In 2017, the European Union (EU) introduced a new framework for cyber security in the EU. This included a new EU Cybersecurity Agency to improve the sharing of threat intelligence and knowledge, to organise and run pan-European cyber security exercises and to ensure that all serious incidents are fully reported. It would also implement an EU-wide certification framework to ensure that all products and services in the EU are secure from cyber-attack. It is also introducing measures to combat fraud and the counterfeiting of non-cash means of payment.</Paragraph>
                <Paragraph>On 10 December 2018, the European Parliament, the Council of the EU and the Commission agreed on the Cybersecurity Act, which reinforces the mandate of the EU Agency for Cybersecurity, (European Union Agency for Network and Information and Security, ENISA) so as to better support Member States with tackling cyber security threats and attacks. The Act also establishes an EU framework for cybersecurity certification, boosting the cybersecurity of online services and consumer devices.</Paragraph>
                <Paragraph>The text of the EU Cybersecurity Act is available here: <a href="https://eur-lex.europa.eu/eli/reg/2019/881/oj">https://eur-lex.europa.eu/eli/reg/2019/881/oj</a>. An infographic of the act is available from: <a href="https://ec.europa.eu/digital-single-market/en/news/eu-cybersecurity-act-glance">https://ec.europa.eu/digital-single-market/en/news/eu-cybersecurity-act-glance</a>.</Paragraph>
                <Paragraph>In the next section, you’ll be invited to find out about similar laws in a country of interest and share your results with other learners.</Paragraph>
            </Section>
            <Section>
                <Title>2.8 What laws apply in your country?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1136.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1136.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="a184ed36" x_imagesrc="ou_futurelearn_cyber_security_fig_1136.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 10</b> British hacker Gary McKinnon, accused of accessing US Department of Defence and NASA computer systems, seen here outside the Royal Courts of Justice in January 2009 as he was fighting extradition charges</Caption>
                </Figure>
                <Paragraph>If you live or work outside the UK, or work in a multinational organisation or have links with another country, you might be wondering if there is an equivalent set of laws in your country of interest.</Paragraph>
                <Activity>
                    <Heading>Activity 2 Laws in other countries</Heading>
                    <Timing>Allow about 20 minutes</Timing>
                    <Question>
                        <Paragraph>Carry out some research into similar laws that might exist in the country you are interested in and note down the results in the space below.</Paragraph>
                        <Paragraph>Look for laws that address one of these aspects of information security:</Paragraph>
                        <BulletedList>
                            <ListItem>data protection relating to living individuals</ListItem>
                            <ListItem>misuse of computers</ListItem>
                            <ListItem>investigatory powers</ListItem>
                            <ListItem>fraud.</ListItem>
                        </BulletedList>
                        <Paragraph>Find out:</Paragraph>
                        <BulletedList>
                            <ListItem>if equivalent laws exists</ListItem>
                            <ListItem>what are they called</ListItem>
                            <ListItem>what the differences are.</ListItem>
                        </BulletedList>
                        <Paragraph>Based on your research, does it seem that the laws in other countries are similar, different or non-existent?</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="act2response"/>
                    </Interaction>
                </Activity>
            </Section>
        </Session>
        <Session>
            <Title>3 Who should you contact?</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1137.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1137.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="7d5f4ac2" x_imagesrc="ou_futurelearn_cyber_security_fig_1137.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 11</b></Caption>
                <Description>This is a close-up image of a number of credit cards.</Description>
            </Figure>
            <Paragraph>So far this week, you’ve taken a broader look at the threat landscape that was introduced in Week 1 and learned how to recognise when you’ve suffered a successful attack on your information security. You’ve also learned about the laws in the UK (and in your own country) that are in place to protect you.</Paragraph>
            <Paragraph>The rest of this week focuses on how to recover from the attack and what you can do to prevent a similar attack being successful in the future.</Paragraph>
            <Paragraph>First, let’s consider who you need to tell about the attack and what they need to know.</Paragraph>
            <InternalSection>
                <Heading>Responding to identity theft</Heading>
                <Paragraph>If you have lost important documentation (such as passports, driving licences, credit cards and cheque books) you should report them immediately to the issuer so that they can be blocked and new copies can be issued to you. You should also report their loss to the police and ask for a crime reference number.</Paragraph>
                <Paragraph>Report any unexplained transactions to your bank or credit card issuer so that they can be investigated by the company’s fraud team. You may not be liable for any losses provided that you have acted in a responsible manner and without fraudulent intent.</Paragraph>
                <Paragraph>Almost everyone in the UK has a credit report registered with a credit reference companies. A credit report is used by financial agencies to determine your suitability for financial services such as a credit card, bank loan or mortgage. Every time a user (or an impersonator) requests a new financial product, a credit search is made and included in the credit report. You can ask for a copy of your credit report from a credit reference agency (in the UK they are Callcredit, Equifax and Experian) which will list all searches made on that account, who authorised the search, what type of search was made and when it was performed.</Paragraph>
                <Paragraph>Credit reference agencies can also provide a credit report checking service (for which they may charge) which keeps a track of any changes to your credit report.</Paragraph>
                <Paragraph>For more information see <a href="http://www.actionfraud.police.uk/fraud_protection/identity_fraud">ActionFraud</a>.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Personal data and security</Heading>
                <SubHeading>If you have accidentally opened a suspicious email message</SubHeading>
                <Paragraph>Don’t click on any links and don’t open any attachments. Don’t use any links sent to you in an email to log in. Run a scan with your anti-malware software. Use links that you have previously saved in your browser bookmarks to visit any sites you need to check. Don’t be shocked into immediate action by anything you read in an email.</Paragraph>
                <SubHeading>Bank card fraud</SubHeading>
                <Paragraph>If you notice a charge on your card account that you didn’t authorise, contact your card issuer as soon as possible. It may be that you’ve paid for goods you’ve not received or are suspicious about a website you’ve used. Give the card issuer as much information as possible – the name of the website, how much you spent, when you did it and so on.</Paragraph>
                <Paragraph>The card issuer will investigate all cases of possible fraud and give you guidance which you should follow exactly. You may have legal protection, which means you’re not liable for any losses, as long as you took reasonable care and did not act fraudulently. Note that using PayPal does not give you the same legal protection as using a credit card. </Paragraph>
                <Paragraph>You should also contact the police and complete a crime report. Visit the UK Police’s website for reporting online fraud at <a href="http://www.actionfraud.police.uk/">ActionFraud</a>.</Paragraph>
                <Paragraph>Don’t respond if you get email or a phone call saying they are from your bank and they have detected fraud on your account. Don’t confirm anything! Don’t press any phone keys. Just end the call. Don’t call any number they might give you for further information. Put down the phone. Dial your saved message service or another free service just to confirm that the caller has released the phone line.</Paragraph>
                <Paragraph>Look up the contact details for your own card issuer, check your own account, and if there seems to be a problem you can call the safe number that you already have.</Paragraph>
            </InternalSection>
            <Paragraph>Next, you will find out how to get your computer working again after an attack.</Paragraph>
            <Section>
                <Title>3.1 Getting your computer working again</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1138.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1138.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="a2ebf6af" x_imagesrc="ou_futurelearn_cyber_security_fig_1138.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 12</b></Caption>
                    <Description>This shows three figurines dressed as builders on top of a computer.</Description>
                </Figure>
                <Paragraph>You’ve realised you have been the victim of a cyber security attack, you’ve reported it, now what? How do you get your computer working again? If you wait until you have been attacked you may have left it too late. Before you get attacked: </Paragraph>
                <BulletedList>
                    <ListItem>make a note of all software that you use and all licence keys. Store these separately from your computer</ListItem>
                    <ListItem>keep all your data backed up on a write only system</ListItem>
                    <ListItem>check that you can install all software and data onto a new system before you get attacked.</ListItem>
                </BulletedList>
                <SubSection>
                    <Title>Recovering from a virus or other malware</Title>
                    <Paragraph>Your aim is to update your antivirus software then isolate your computer so that the malware doesn’t spread. </Paragraph>
                    <Paragraph>On Windows 10, run the Malicious software removal tool: <a href="https://support.microsoft.com/en-us/help/4026667/windows-10-how-to-remove-malware-or-viruses">https://support.microsoft.com/en-us/help/4026667/windows-10-how-to-remove-malware-or-viruses</a>.</Paragraph>
                    <Paragraph>If you have suffered a ransomware attack you may be able to use information provided by <a href="https://www.nomoreransom.org/">https://www.nomoreransom.org/</a> to recover your data. This is a scheme set up by Europol, the Netherlands Police, McAfee and Kaspersky to analyse ransomware and identify the decryption keys to recover data (see https://www.bbc.co.uk/news/technology-49096991).</Paragraph>
                    <Paragraph>In a worst case scenario, you may need to reformat your hard drive, reinstall your operating system and reinstall your keys. You will then need to reinstall any programs you use and then your data from your secure backup files. (You have got them all safe haven’t you?)</Paragraph>
                    <Paragraph>Note that the reason for a slow running, old computer can be a build up of dust in vents, fans and internal surfaces so that the processor slows down to avoid overheating.</Paragraph>
                    <Paragraph>Once you have completed these steps, spend a few minutes thinking about how the malware might have got on to your computer. Did you visit a suspicious website, download a suspicious program or simply click on an attachment in an email message? These are common ways to receive malware, so think about what you can do differently to prevent it happening again.</Paragraph>
                </SubSection>
                <SubSection>
                    <Title>Recovering from accidentally deleting a file</Title>
                    <Paragraph>Deleting a file isn’t necessarily permanent. If you have simply moved a file to the trash can (Recycle Bin on Microsoft Windows), then you can recover it by simply dragging the file out of the trash. However, if you have since emptied the trash you will need specialised software to recover the file. The good news is that the data is still on the disk, the bad news is that the operating system cannot find it again. Fortunately, special file recovery software exists that can restore deleted files. Find out about the software available from <i>About Technology</i>’s article <a href="http://pcsupport.about.com/od/filerecovery/tp/free-file-recovery-programs.htm">19 Free Data Recovery Software Tools</a>.</Paragraph>
                    <Paragraph>Stop using the computer immediately you realise the file has been deleted. The less time that has elapsed between deleting a file and trying to recover it, the greater your chance of recovering the whole file. If significant amounts of time have passed, only a partial recovery may be possible, or it may not be possible to recover the file.</Paragraph>
                    <Paragraph>You then need to install a file recovery program (some file recovery applications can be run from an optical disk or a flash memory drive). A good selection of free file recovery applications can be found on <a href="http://pcsupport.about.com/od/filerecovery/tp/free-file-recovery-programs.htm"><i>About Technology</i></a>. Run the file recovery application once you’ve installed it.</Paragraph>
                    <Paragraph><b>Note:</b> Because of a difference between the way in which Microsoft Windows and Apple Mac OS store files on a disk, file recovery is much easier for Windows computers than Macs. A number of file recovery applications exist for the Mac, but there is much less selection than for Windows.</Paragraph>
                    <Paragraph>Once you’ve got your file back you might want to review your data backup strategy to prevent a future accident.</Paragraph>
                </SubSection>
                <SubSection>
                    <Title>Recovering from a lost computer, disk or flash memory drive containing confidential data</Title>
                    <Paragraph>The first question to ask is, was the data encrypted using a form of strong encryption? If it was, does it require a strong password to decrypt it? Is the password known only to you?</Paragraph>
                    <Paragraph>If the answer to any of these questions is ‘no’ then you may have a problem as the data is potentially vulnerable. If the lost property contains personal information, then you have an obligation to act under the Data Protection Act. Larger companies will have staff responsible for ensuring compliance with the DPA and you must get in contact with them as soon as possible so that steps can be taken to protect individuals. Alternatively, you can contact the <a href="http://ico.org.uk/for_organisations/data_protection/lose">Information Commissioner’s Office</a> for guidance.</Paragraph>
                    <Paragraph>If you have lost material containing confidential information about a company or other organisation, or which is sensitive, then you need to contact the organisation which owns the data so they can take necessary steps. In certain circumstances, this may also require the involvement of the police or security services.</Paragraph>
                    <Paragraph>If the data is securely encrypted, then the data is almost certainly safe. You should still contact the relevant authorities to inform them of the loss.</Paragraph>
                </SubSection>
                <SubSection>
                    <Title>Recovering from an operating system failure</Title>
                    <Paragraph>If you use a version of Microsoft Windows (XP or later), you could use the ‘Restore Point’ feature to revert your computer to a previous working state. Windows automatically saves its configuration daily, when it updates itself and also when certain events, such as the installation of an unsigned driver for a peripheral device, occur.</Paragraph>
                    <Paragraph>Versions of Mac OS (10.5 or later) include a feature called Time Machine, which can be used to backup both files and system configurations. If you have Time Machine enabled it is possible to restore your Mac to a previous state, with hourly backups available for the past day, daily backups for the past month and weekly backups for anything older.</Paragraph>
                    <Paragraph>In the next section, you’ll consider how to make your information less vulnerable to attack.</Paragraph>
                </SubSection>
            </Section>
            <Section>
                <Title>3.2 Making your information less vulnerable</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1139.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1139.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0d2f26ed" x_imagesrc="ou_futurelearn_cyber_security_fig_1139.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 13</b></Caption>
                    <Description>This image shows a login screen on a mobile phone.</Description>
                </Figure>
                <Paragraph>Some simple steps to make your information less vulnerable to attack in the future.</Paragraph>
                <Paragraph>User accounts and passwords help secure data so that it can only be seen and used by authenticated users. Without a user account and password, an attacker is forced to use much more time-consuming techniques to break into the machine, greatly increasing their risk of being caught.</Paragraph>
                <Paragraph>If you haven’t already done so, it is time to configure your computer and mobile devices so that they require a login or passcode when you switch them on and that they lock when left for a certain period. This will prevent anyone tampering with them or impersonating you on social media if you leave them unattended.</Paragraph>
                <Paragraph>Don’t forget to change the default password on your router as well – and keep a note of the password. A network firewall installed on a router and a personal firewall on the computer itself will stop hackers from getting into your computer. Likewise, up to date antivirus software can stop malware from deleting, encrypting or transmitting your files over the network.</Paragraph>
                <Paragraph>If you have very important files that cannot be shared, then you should consider encrypting documents when they are not actively being edited. VeraCrypt is an example of secure encryption software that can be used to secure any files containing confidential data (see https://www.veracrypt.fr/en/Home.html). </Paragraph>
                <InternalSection>
                    <Heading>User accounts</Heading>
                    <Paragraph>All modern operating systems allow for different user accounts to be created with different levels of access. These range from a guest who can only perform a small number of tasks and cannot change any important settings, through to an administrator who can install new applications, see any data on the computer and make major changes to settings. In between, are user accounts that have limited access and do not usually allow users to install new software – helping to prevent malware infections.</Paragraph>
                    <Paragraph>Even if you are the only user on a computer it can make sense to use a user account for day to day purposes, only using the administrator account as and when new software needs to be installed or the operating system is updated.  Never use an administrative account for surfing the web or opening emails.</Paragraph>
                    <Paragraph>User accounts can be used to restrict access to files, printers and other resources on a local area network.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>File permissions</Heading>
                    <Paragraph>Every file and folder on your computer has a set of permissions that tell the computer’s operating system what can be done with that file:</Paragraph>
                    <BulletedList>
                        <ListItem>write permission – the file can be edited</ListItem>
                        <ListItem>read permission – it can be copied</ListItem>
                        <ListItem>execute – the file can be executed as a program (if applicable).</ListItem>
                    </BulletedList>
                    <Paragraph>Different users have different sets of permissions – so you may have read and write access to an important document, but you can restrict others to read only (i.e. they cannot edit the file), and deny access entirely to people outside of the group.</Paragraph>
                    <Paragraph>Remember, read permission allows a file to be copied and to be read. An attacker can still then use copy and paste to copy important information from a document, or to make a copy of the original and to edit that instead.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Disabling ports</Heading>
                    <Paragraph>Almost all modern computers come with one or more USB ports through which data can be stolen using flash memory drives, a plug-in hard disk or smart phone or media player. It may be necessary to disable these ports for security reasons.</Paragraph>
                    <Paragraph>Data Loss Prevention (DLP) software can temporarily disable the USB ports, or monitor or restrict the copying of files to USB devices.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Locks</Heading>
                    <Paragraph>The easiest way to steal a large amount of data is to simply steal the computer or the database server itself. Most computers and some external devices have sockets into which a lock, usually attached to a flexible metal chain that is secured to a wall or a desk, can be attached. Also check that a locked computer prevents a thief from opening the computer and simply unplugging data drives and removing them. Any networked storage devices should be in a locked room or a locked cage secured to a wall or floor.</Paragraph>
                    <Paragraph>Obviously, if you are working in a shared environment, locking doors and windows is an obvious deterrent to attackers, as is challenging unknown individuals who might be wandering around.</Paragraph>
                    <Paragraph>In the next section, you’ll create a personal recovery plan.</Paragraph>
                </InternalSection>
            </Section>
            <Section id="protecting_data_future">
                <Title>3.3 Protecting your data for the future</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1140.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1140.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="85c2176e" x_imagesrc="ou_futurelearn_cyber_security_fig_1140.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 14</b></Caption>
                    <Description>This image shows a rusty laptop on top of some rocks near water.</Description>
                </Figure>
                <Paragraph>If you have not already done so, now is the time to consider making computer backups.</Paragraph>
                <Paragraph>Backups protect us from threats including:</Paragraph>
                <BulletedList>
                    <ListItem>accidentally deleting a file or program</ListItem>
                    <ListItem>losing disks, computers or memory cards</ListItem>
                    <ListItem>hardware failures such as a hard disk crash</ListItem>
                    <ListItem>software bugs that prevent data being written to a storage device or cause it to be corrupted as it is written</ListItem>
                    <ListItem>disasters such as fire or flooding</ListItem>
                    <ListItem>crimes including terrorism, theft and acts of sabotage such as hacking.</ListItem>
                </BulletedList>
                <Activity>
                    <Heading>Activity 3 Protection for the future</Heading>
                    <Timing>Allow about 30 minutes</Timing>
                    <Question>
                        <Paragraph>Evaluate the list of digital information that you compiled in Week 1 and decide which is the essential data and software that should be safely and securely backed up. </Paragraph>
                        <Paragraph>For each type of data you should evaluate how often it should be backed up. </Paragraph>
                        <Paragraph>For example, you don’t need to back up software like Windows 10, because you can always download it again from Microsoft. However, you do need to make sure that your Windows 10 keys are backed up as you would need these to reinstall Windows.</Paragraph>
                        <Paragraph>If you run a business and have purpose written software it might be essential to have a securely stored backup in case it needs to be reinstalled. This might need to be backed up just one time if it doesn’t change.</Paragraph>
                        <Paragraph>If you write long documents or are handling many transactions a day it could be very important not to lose any. You might want to run a system that keeps a protected backup every time data is changed. This might involve logging all changes to a database on a separate system.</Paragraph>
                        <Paragraph>A home user might decide that they want to backup all images to a separate hard drive at full resolution, and to a cloud store in reduced resolution.</Paragraph>
                    </Question>
                </Activity>
                <Paragraph>In the next sections you will look at how and where you could store your backup data.</Paragraph>
            </Section>
            <Section>
                <Title>3.4 Backup media</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1141.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1141.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="c690cd15" x_imagesrc="ou_futurelearn_cyber_security_fig_1141.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 15</b></Caption>
                    <Description>This image shows hundreds of discs in front of a computer screen.</Description>
                </Figure>
                <Paragraph>It is important and recommended that you have three copies of any important data. One copy for use, one copy as backup and one copy that is stored in a different building. Depending on the amount of data you need to backup, a range of technologies are available:</Paragraph>
                <InternalSection>
                    <Heading>Optical storage</Heading>
                    <Paragraph>Optical storage is the same technology used for CDs, DVDs and Blu-Ray.</Paragraph>
                    <Paragraph>The most common technology for optical storage is writeable DVD standards including DVD-R, DVD+R, DVD-RW, DVD+RW and DVD-RAM. Most of these DVD formats can store 4.7 GB on a single disc, although newer, so-called, dual layer discs and drives can store twice that. Blu-Ray technology offers 25 GB and dual layer (50GB) formats with three layer 100GB discs, although they are expensive.</Paragraph>
                    <Paragraph>Optical storage is much more bulky and more expensive per GB than the largest hard drives, but comparable in price to smaller hard drives.</Paragraph>
                    <SubHeading>Advantages</SubHeading>
                    <BulletedList>
                        <ListItem>Write once writable optical storage is particularly useful as protection of data against malware that encrypts data.</ListItem>
                        <ListItem>Some optical discs using gold have a very long life expectancy for archived data if stored at 50% humidity in the dark at a stable room temperature. Each disc should be in a case stored vertically.</ListItem>
                        <ListItem>Optical drives and media are extremely cheap and widespread. Most computers have an optical drive or can accept a USB driver and the discs can be bought in supermarkets.</ListItem>
                        <ListItem>There are a large number of manufacturers, so there should be no problem with future supplies of discs.</ListItem>
                        <ListItem>More modern optical disc technologies (such as Blu-Ray) also support most older types of disc such as DVD and CD.</ListItem>
                        <ListItem>The media is robust. Discs can be posted and are able to survive regular use or being dropped. They are immune to strong magnetic fields.</ListItem>
                    </BulletedList>
                    <SubHeading>Disadvantages</SubHeading>
                    <BulletedList>
                        <ListItem>Optical drives are relatively slow compared to hard disks, especially when writing data.</ListItem>
                        <ListItem>There are a large number of types of disc (especially recordable DVDs). Some of these discs are not widely supported.</ListItem>
                        <ListItem>Their capacity is relatively low compared to hard disks. A 1TB hard disk is commonplace on modern computers, so it would take more than 200 DVDs to make a complete backup of the disk. Consequently, DVDs might be best suited to making backups of key data.</ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Magnetic disks or hard drives</Heading>
                    <Paragraph>Hard drives are available to store 4TB or more. These are increasingly reliable and the best have a risk of failure of about 0.33% a year (but not when being moved around). Hard drives offer the lowest cost storage per GB. Don’t rely on magnetic discs to archive for much over 5 years – copy to new hard drives every five years.</Paragraph>
                    <Paragraph>The magnetic hard disk at the heart of most computers can also be used as a backup device. Most PCs have sufficient internal space for a second hard disk that can be devoted to backups, or a relatively cheap external hard disk can be connected to a USB or Firewire port on a computer.</Paragraph>
                    <Paragraph>More expensive disks can be connected directly to a network using Ethernet or wi-fi in which case they are known as Network-Attached Storage (NAS). Disks can be made more resilient to failure by combining several disks together with copies of data stored on multiple disks so that even if one copy is damaged or the disk fails, it is not lost forever; the most common type of this ‘redundant’ storage is called a Redundant Array of Independent Disks (RAID).</Paragraph>
                    <SubHeading>Advantages</SubHeading>
                    <BulletedList>
                        <ListItem>Disks are relatively cheap and capacities are growing rapidly.</ListItem>
                        <ListItem>External hard disks can be easily moved between computers.</ListItem>
                        <ListItem>There are many disk manufacturers, all of whose products can be used in almost any computer.</ListItem>
                        <ListItem>There are a large number of backup programs designed to be used with hard disks. Many external disks are sold with applications to ease the backup process, or offer a ‘one touch’ backup button.</ListItem>
                        <ListItem>Large hard discs are cost effective for archiving data for a few years.</ListItem>
                    </BulletedList>
                    <SubHeading>Disadvantages</SubHeading>
                    <BulletedList>
                        <ListItem>Hard disks are fragile and easily damaged if dropped or exposed to extremely high temperatures or magnetic fields.</ListItem>
                        <ListItem>If small hard disks are used once to make a backup then archived, the replacement cost is much higher than for tape or optical media.</ListItem>
                    </BulletedList>
                </InternalSection>
                <InternalSection>
                    <Heading>Solid State Disks</Heading>
                    <Paragraph>Solid State Disks (SSDs) and memory cards are storage devices that can store data in memory chips without the need for a power source. Capacities up to 1TB are available. The name is somewhat misleading because these devices don’t actually contain physical disks. They can be commonly found in the USB memory sticks used for sharing files between computers. As the technology has advanced to increase the storage capacity of SSDs they are now being used in laptops and mobile devices as substitutes for magnetic disks.</Paragraph>
                    <SubHeading>Advantages</SubHeading>
                    <Paragraph>SSDs have the same advantages as magnetic disks when compared to optical storage technologies. Some additional advantages are:</Paragraph>
                    <BulletedList>
                        <ListItem>SSDs are more robust and are unlikely to be damaged if dropped or exposed to magnetic fields.</ListItem>
                        <ListItem>It is possible to read and write data from SSDs much faster.</ListItem>
                        <ListItem>There is no noise produced when SSDs operate because they have no moving parts.</ListItem>
                    </BulletedList>
                    <SubHeading>Disdvantages</SubHeading>
                    <BulletedList>
                        <ListItem>SSDs are more expensive than equivalent capacity magnetic disks.</ListItem>
                        <ListItem>At the moment, the maximum capacity of SSDs available on the market is 1TB although this will increase as the technology advances.</ListItem>
                        <ListItem>SSDs cannot be re-written as often as magnetic discs.</ListItem>
                        <ListItem>SSDs and memory cards are only useful for short term storage of up to 5 years.</ListItem>
                    </BulletedList>
                    <Paragraph>Memory cards are available up to 128 GB, but again they do wear out if constantly being rewritten.</Paragraph>
                    <Paragraph>Next, you’ll learn about remote backups.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>3.5 Remote backups</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1142.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1142.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="31d18e20" x_imagesrc="ou_futurelearn_cyber_security_fig_1142.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 16</b></Caption>
                    <Description>This is an image of clouds in the sky.</Description>
                </Figure>
                <Paragraph>Large businesses and organisations insure themselves even further against failure by storing backups away from their centre of operation. Individual users can also make use of remote hosting, or data services such as Dropbox, GDrive and OneDrive to keep backups remote from their own devices. </Paragraph>
                <Paragraph>In the event of a disaster, there is much greater likelihood that they can return to normal operations within a short period of time – after all, it is much easier to buy new computers than recreate all of the records.</Paragraph>
                <InternalSection>
                    <Heading>Offsite backups</Heading>
                    <Paragraph>Specialised companies offer specialised facilities where companies can hire storage space or machinery to hold backups. These offsite facilities might be nothing more than an extremely secure vault where tapes or disks can be deposited; but increasingly they are large server farms connected to extremely high-speed networks. Users can copy files to these servers as if they were part of their own network; the only bottleneck is the speed of the network between the offsite facility and the user, but with fibre connections and high speed Internet, security and reliability are more important than distance from the servers.</Paragraph>
                    <Paragraph>Some of the largest suppliers of remote data services are Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Backing up to the cloud</Heading>
                    <Paragraph>For many years, offsite backup was restricted to organisations which could afford relatively large monthly fees. cloud technology allows anyone to have offsite storage, and in many cases a certain amount of storage is completely free. Most cloud services are designed for convenience, to allow users to share files between computers, and with other users, rather than specifically as backup services, but they can also offer you some additional security (especially when you encrypt files before putting them in the cloud) if your computer is stolen or stops working.</Paragraph>
                    <Paragraph>One strong word of warning if you do use the cloud as a backup, with only a few exceptions, these services will not protect you if a file is deleted. Most cloud services are synchronised – that is, when a file is deleted on your computer, the copy on the cloud server is either immediately, or very shortly afterwards, also deleted. Some cloud services also keep previous version of files each time you update a file.</Paragraph>
                    <Paragraph>Cloud backups are obviously limited by the bandwidth of your internet connection. If you have a slow uplink (that is sending data to the cloud) you may not be able to make backups of all your data in a reasonable amount of time. Instead you might have to prioritise which data is backed up to the cloud and which is stored locally. If you have a fast Internet connection, you can set up a folder to contain all the files you want to keep backed up with every small change. You can set the software for the backup service to automatically copy these files to the cloud each time a file is changed, and to sync them between your devices.</Paragraph>
                </InternalSection>
                <InternalSection>
                    <Heading>Cloud security</Heading>
                    <Paragraph>Unless you take further steps, once data is stored in the cloud you can no longer be sure that it is entirely secure from prying eyes. Most suppliers have policies claiming that your data will be secure, but they cannot provide absolute insurance from attackers, as experienced by some celebrity users of Apple’s iCloud service in 2014. You can read more about this incident, if you are interested, via the link in the Further reading section at the end of this week.</Paragraph>
                    <Paragraph>Some businesses have policies forbidding employees from storing information in the cloud as it may not be secure, or it may be stored outside the legal protection of the company’s country of origin.</Paragraph>
                    <Paragraph>Using encryption to scramble the contents is the only way you can guarantee that your data is safe in the cloud.</Paragraph>
                    <Paragraph>One of the best ways to ensure your data is encrypted as well as backed up to the cloud is to keep all your files in encrypted folders inside the folder that you backup to the cloud service. You do need to use your encryption key to open the folder you want to use – but that is good security practice for your files on your own computer.</Paragraph>
                    <Paragraph>Note that encrypting the whole drive doesn’t encrypt the files that you back up from within the drive.</Paragraph>
                    <Paragraph>In the next section, you’ll consider your own backup procedures.</Paragraph>
                </InternalSection>
            </Section>
            <Section>
                <Title>3.6 Do you backup your data?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1143.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1143.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="26131e06" x_imagesrc="ou_futurelearn_cyber_security_fig_1143.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 17</b></Caption>
                    <Description>This is an image of a USB memory stick and a memory card on top of a pile of discs.</Description>
                </Figure>
                <Paragraph>For this activity thin about how you backup your own data.</Paragraph>
                <Activity>
                    <Heading>Activity 4 Do you backup?</Heading>
                    <Timing>Allow about 15 minutes</Timing>
                    <Question>
                        <Paragraph>Write a short description of how you backup data. Describe the different technologies you use, how often you backup and what risks remain.</Paragraph>
                        <Paragraph>If you don’t perform backups, but you work for an organisation who does, briefly explain their backup procedure (you might need to talk to the person in charge of the company’s computers).</Paragraph>
                        <Paragraph>If neither of these situations applies, briefly explain what sort of backup procedures you think would offer you a reasonable amount of security.</Paragraph>
                        <Paragraph><b>Warning:</b> Do not identify your company or organisation if you discuss this with others.</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="act4"/>
                    </Interaction>
                </Activity>
                <Paragraph>In the next section, you’ll examine archiving data.</Paragraph>
            </Section>
            <Section>
                <Title>3.7 Archiving data</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1144.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1144.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="270d6566" x_imagesrc="ou_futurelearn_cyber_security_fig_1144.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 18</b></Caption>
                    <Description>This is an image of a number of devices for saving datam for instance memory cards and USB memory sticks.</Description>
                </Figure>
                <Paragraph>In a perfect world, each of us would keep a backup of every piece of data we ever use, but it is simply impractical for most of us to buy enough media to store our backups.</Paragraph>
                <Paragraph>Instead, most media are reused after a certain period of time with old backups written over by new data. Businesses, in particular, must retain backups for a number of years (for legal and tax purposes) before media can be recycled.</Paragraph>
                <Paragraph>Important files, especially those of historic or legal interest should be archived so that they are never overwritten. In many countries, it is a legal obligation for companies to archive data for auditing purposes. Governments around the world are recognising the importance of archiving data and authorising national bodies to store important digital records. In Britain, this work is managed by the National Archives and the British Library.</Paragraph>
                <Paragraph>Next, you’ll have an opportunity to review your knowledge in the end-of-week practice quiz.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>4 Week 7 quiz</Title>
            <Paragraph>This quiz allows you to test and apply your knowledge of the material in Week 7. </Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48338">Week 7 practice quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. Your bank calls to tell you they have noticed some suspicious activity on your bank account. What type of security attack would you suspect to have happened?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Data loss</Paragraph><Feedback><Paragraph>No, try again. Look back at the opening sections of Week 7.</Paragraph><Paragraph>You may find <CrossRef idref="id_theft">7.1 Identity theft</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Identity theft</Paragraph><Feedback><Paragraph>Well done. It seems likely that your bank account details may have been compromised, so you should take immediate action and speak to your bank. This may have occurred as a result of responding to a phishing email.</Paragraph><Paragraph>You may find <CrossRef idref="id_theft">7.1 Identity theft</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Cyberbullying</Paragraph><Feedback><Paragraph>No, try again. Look back at the opening of Week 7.</Paragraph><Paragraph>You may find <CrossRef idref="id_theft">7.1 Identity theft</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Trolling</Paragraph><Feedback><Paragraph>No, try again. Look back at the opening of Week 7.</Paragraph><Paragraph>You may find <CrossRef idref="id_theft">7.1 Identity theft</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. Which UK law makes it an offence to modify computer material without permission?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Data Protection Act</Paragraph><Feedback><Paragraph>No, try again. The Data Protection Act regulates the storage and processing of personal data.</Paragraph><Paragraph>You may find <CrossRef idref="CMA">7.2.3 The Computer Misuse Act 1990 (CMA)</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>RIPA</Paragraph><Feedback><Paragraph>No, try again. RIPA (Regulation of Investigatory Powers Act) regulates the use of surveillance technologies by public bodies.</Paragraph><Paragraph>You may find <CrossRef idref="CMA">7.2.3 The Computer Misuse Act 1990 (CMA)</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>Computer Misuse Act</Paragraph><Feedback><Paragraph>Well done.</Paragraph><Paragraph>You may find <CrossRef idref="CMA">7.2.3 The Computer Misuse Act 1990 (CMA)</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Fraud Act</Paragraph><Feedback><Paragraph>No, try again. The Fraud Act regulates the use of fraud to try to gain money or other assets dishonestly.</Paragraph><Paragraph>You may find <CrossRef idref="CMA">7.2.3 The Computer Misuse Act 1990 (CMA)</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. What is the specific term used to refer to the security risks posed by employees of an organisation to their employers?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Insider threat</Paragraph><Feedback><Paragraph>Well done! This type of attack is the hardest to defend against because the perpetrators already have access to the systems.</Paragraph><Paragraph>You may find <CrossRef idref="loss_of_data">7.1.1 Loss of data</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>Cybercrime</Paragraph><Feedback><Paragraph>No, this term is a general term used for all types of internet related crime. Try to find the term used to describe security risks posed by employees of an organisation to their employers.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Hacktivism</Paragraph><Feedback><Paragraph>No, this term describes those who carry out cyber attacks as a form of protest against organisations or governments. </Paragraph></Feedback></Wrong><Wrong><Paragraph>Corporate espionage</Paragraph><Feedback><Paragraph>No, corporate espionage might result from the term we are looking for.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. A friend, who is a keen amateur photographer, asks for advice on backing up her collection of digital photos as her laptop’s hard disk is nearly full.</Paragraph><Paragraph>She is worried about losing the photos of her children growing up, if her computer fails. She takes several gigabytes of photos per week and wants to have an easy way accessing the backups as well as sharing some of photos with friends. Her internet connection costs are very high for sending/receiving more than 3GB per month, and she does not want to spend a lot of money on this.</Paragraph><Paragraph>What backup solution would you recommend?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Optical storage (CD, DVD or Blu-Ray)</Paragraph><Feedback><Paragraph>This could be useful for the valuable family photos, but the collection is too big to fit on optical disks and this solution wouldn't make it easier to share some photos with friends. Try again.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Magnetic storage (external hard disk)</Paragraph><Feedback><Paragraph>Good answer, but it will not allow her to share the photos with friends. Try again.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Solid state disk</Paragraph><Feedback><Paragraph>No, try again. Solid state disks are going to be too expensive to store the amounts of data involved here.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Cloud storage</Paragraph><Feedback><Paragraph>This would be useful for sharing photos, but would not meet all the requirements because of the data limits on the internet connection. Try again.</Paragraph></Feedback></Wrong><Right><Paragraph>A combination of optical, magnetic, solid state and cloud storage</Paragraph><Feedback><Paragraph>Well done. A combination approach is probably the best solution since this friend has a number of different requirements. The photos could be stored on a series of external magnetic or solid state disks for easy access, with the valuable family photos also saved onto DVD, with one set kept offsite. A selection of photos can be stored in the Cloud for viewing by friends, and to provide some protection if the whole collection is destroyed (e.g. by fire).</Paragraph></Feedback></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. By making backups of our data, which of the following threats can we protect ourselves from?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>A hacker gaining access to our data.</Paragraph><Feedback><Paragraph>No, try again.  Keeping a backup won't prevent a hacker from accessing your data.  In fact, if you don't take steps to keep your backups safe, they be an easier target for an attacker.</Paragraph><Paragraph>You may find <CrossRef idref="protecting_data_future">7.18 Protecting your data for the future</CrossRef> useful.</Paragraph></Feedback></Wrong><Right><Paragraph>A hacker trying to sabotage your computer system by deleting or modifying critical data.</Paragraph><Feedback><Paragraph>Well done, that is correct. Having backups means you will be able to quickly undo the damage done by the hacker and get your system working normally again.</Paragraph><Paragraph>You may find <CrossRef idref="protecting_data_future">7.18 Protecting your data for the future</CrossRef> useful.</Paragraph></Feedback></Right><Wrong><Paragraph>An eavesdropper making a copy of your data as it is transmitted across the network.</Paragraph><Feedback><Paragraph>No, try again.  Making a backup can't prevent an eavesdropper copying your data when it is being sent over the network.  </Paragraph><Paragraph>You may find <CrossRef idref="protecting_data_future">7.18 Protecting your data for the future</CrossRef> useful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Ensure that your software is always updated and free from vulnerabilities</Paragraph><Feedback><Paragraph>No, try again.  Although backups can helps us recover from errors introduced into our data by software bugs, it won't help fix these bugs or keep our software updated.</Paragraph><Paragraph>You may find <CrossRef idref="protecting_data_future">7.18 Protecting your data for the future</CrossRef> useful.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 Summary of Week 7</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1146.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1146.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="fa9cd2f0" x_imagesrc="ou_futurelearn_cyber_security_fig_1146.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 19</b></Caption>
                <Description>This image shows a closed padlock.</Description>
            </Figure>
            <Paragraph>While most of this week’s learning is about how to recover from a disaster, it is worth spending a few minutes reminding yourself what can be done to minimise the risk of a breach in your security.</Paragraph>
            <Paragraph>These relatively easy measures will greatly increase your computer and mobile device security and we have covered many of them over the past few weeks:</Paragraph>
            <BulletedList>
                <ListItem>each user has their own personal accounts when using a computer which are not administrative accounts</ListItem>
                <ListItem>use strong passwords (and perhaps a password manager application)</ListItem>
                <ListItem>set your computer and mobile devices to require a login or passcode when you switch them on and when they lock after being left for a certain period</ListItem>
                <ListItem>keep your operating system and key applications up to date</ListItem>
                <ListItem>install antivirus software and keep it up to date</ListItem>
                <ListItem>protect wireless networks using modern (e.g. WPA2) encryption</ListItem>
                <ListItem>enable a personal firewall on your PC and a router firewall.</ListItem>
            </BulletedList>
            <Paragraph>You could also take these measures, which might require some assistance, or if you are in a business environment, the approval of a system administrator:</Paragraph>
            <BulletedList>
                <ListItem>encrypting your hard disk</ListItem>
                <ListItem>encrypting folders that contain confidential files, or files that will be backed up to the cloud</ListItem>
                <ListItem>using encrypted flash memory drives.</ListItem>
            </BulletedList>
            <Paragraph>Look at the list of security measures above. Do you think any of them apply to you and your computer and mobile devices? Make a note of the security measures that apply to your situation and make some notes on how you could implement them.</Paragraph>
            <Paragraph>You can now go to <a href="https://www.open.edu/openlearn/ocw/mod/oucontent/view.php?id=48329">Week 8: Managing security risks</a>.</Paragraph>
        </Session>
        <Session>
            <Title>Further reading</Title>
            <Paragraph><a href="http://www.bbc.co.uk/news/technology-29237469">Apple toughens iCloud security after celebrity breach</a></Paragraph>
            <Paragraph><a href="https://support.apple.com/en-us/HT202303">Current Icloud security overview</a></Paragraph>
        </Session>
    </Unit>
    <Unit>
        <UnitID/>
        <UnitTitle>Week 8: Managing security risks</UnitTitle>
        <Session>
            <Title>Introduction</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1031.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1031_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="08001148" x_subtitles="ou_futurelearn_cyber_security_vid_1031.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>Welcome to the final week of the course. Over the past 7 weeks we've explored different information security threats, together with the actions you can take to prevent these threats from causing harm to your digital life. We've looked at some key technologies such as networking and cryptography that underpin the activities we carry out online. We've looked at what can be done in the event of an attack from both a technological and legal standpoint.</Remark>
                    <Remark>Now we'll focus on how to assess the security risks associated with your digital life, so that you can effectively plan to protect yourself from attacks. You'll also have the opportunity to review your information security practises and review on how these might have changed as a result of what you've learned.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1031.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1031.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0fb3a073" x_imagesrc="ou_futurelearn_cyber_security_vid_1031.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Cory introduces the final week of the course.</Paragraph>
            <Paragraph>Over the past seven weeks, we have explored different cyber security threats together with actions we can take to prevent these threats from causing harm to our digital lives.</Paragraph>
            <Paragraph>This final week of the course focuses on how to assess the security risks associated with your digital life so that you can effectively plan to protect yourself from attacks.</Paragraph>
        </Session>
        <Session>
            <Title>1 Information as an asset</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1147.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1147.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="9952957b" x_imagesrc="ou_futurelearn_cyber_security_fig_1147.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 1</b></Caption>
                <Description>This image shows a number of documents.</Description>
            </Figure>
            <Paragraph>You’ll remember from Week 1 that, when thinking about computer security, it helps to think of information as an asset. Just like money in the bank, it is valuable, possibly irreplaceable, and crucially it can be lost or stolen.</Paragraph>
            <Paragraph>When we think about our assets, traditionally we consider tangible things such as money, property, machinery and so on. Increasingly, it is recognised that information itself is an asset, crucial to adding value. In today’s digital world, it is increasingly apparent that information is the most important asset, for both businesses or individuals – just think of the value of music to a media company or a games program to a video game company.</Paragraph>
            <Paragraph>Considering information as an asset allows us to create strategies for protecting information and minimising the consequences of any disaster.</Paragraph>
            <Paragraph>As you have seen earlier in this course, digital information and data assets covers everything that can be stored, processed or transmitted through digital systems. It covers all such personal, business or other digital data anywhere in the world. Since 1990, the world has moved from one where most information existed in paper formats, to one now where the world predominately transacts it business digitally.</Paragraph>
            <InternalSection>
                <Heading>Risk management</Heading>
                <Paragraph>Information security risk management assesses the value of information assets belonging to an individual or an organisation and, if appropriate, protects them on an ongoing basis.</Paragraph>
                <Paragraph>Information is stored, used and transmitted using various media; some information is tangible, paper for example, and it is relatively straightforward to put in place strategies to protect this information – such as locking filing cabinets, or restricting access to archives.</Paragraph>
                <Paragraph>On the other hand, some information is intangible, such as the ideas in employees’ minds, and is much harder to protect. Companies might try to secure information by making sure their employees are happy, or by legal means such as having contracts that prevent people leaving and going to work for a rival. However, note that some industries have blossomed simply because people could easily move and spread new ideas rapidly through many start-up businesses.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Imperatives and incentives</Heading>
                <Paragraph>Information security risk management considers the process in terms of two factors: imperatives or incentives. Imperatives are pressures that force you to act. Incentives are the rewards and opportunities that arise from acting.</Paragraph>
                <Paragraph>The imperatives for information security arise from legislation and regulation. The Computer Misuse Act and the Data Protection Act 2018, which is the UK’s implementation of the General Data Protection Regulation (GDPR), which we discussed last week, are examples of legislative imperatives. Regulatory imperatives include standards such as the Payment Card Industry Data Security Standard (PCI-DSS), which specifies how merchants should secure all card transactions.</Paragraph>
                <Paragraph>The most important incentive is trust. People and organisations are more likely to work with other people and organisations who have secured their information. Establishing this trust requires that the parties involved examine each others’ information security practices to ensure that there are adequate safeguards to protect the information. One way of doing this is to show that the organisation has satisfied the requirements of standards such as PCI-DSS or the ISO27000 family of standards for designing and implementing information security management systems.</Paragraph>
                <Paragraph>In the last few weeks, you have covered all of these aspects – you have learned about a range of threats that confront internet users, you have explored laws that have been drawn up to regulate information and you have seen how the internet is fundamentally underpinned by trust and how technologies such as encryption and signatures can help us feel secure. In the next section, you are invited to apply this to your own information assets.</Paragraph>
            </InternalSection>
            <Section>
                <Title>1.1 Your own information assets</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1049.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1049.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="42c85a34" x_imagesrc="ou_futurelearn_cyber_security_fig_1049.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 2</b></Caption>
                    <Description>This is a screenshot showing the contents of a computer desktop.</Description>
                </Figure>
                <Paragraph>In Week 1, you created a list of information assets that you possess. This was any sort of information that you store on a computer system that you use and which would be expensive, inconvenient, or impossible to replace if it was lost, damaged or stolen.</Paragraph>
                <Paragraph>Spend a few minutes reviewing your list and thinking about whether you need to add anything based on what you have learned over the past eight weeks.</Paragraph>
                <Paragraph>Lewis, a student of The Open University, did the same exercise on his own computers:</Paragraph>
                <BulletedList>
                    <ListItem>study materials – documents and data relating to his postgraduate studies</ListItem>
                    <ListItem>digital photographs – about 20,000 images taken over the last ten years</ListItem>
                    <ListItem>music – about 10,000 tracks ripped from CD or bought online</ListItem>
                    <ListItem>movies – about 200 films and TV programs</ListItem>
                    <ListItem>email – about ten years worth of correspondence</ListItem>
                    <ListItem>banking and other financial records</ListItem>
                    <ListItem>passwords and account details.</ListItem>
                </BulletedList>
                <Paragraph>Duplicates of some of these assets could be obtained if he lost the originals, for instance iTunes will allow him to download new copies of any lost music, but it would take a very long time to rebuild the entire library. Some others, such as emails and financial records could be recreated, but only by spending a lot of time asking for information from other people.</Paragraph>
                <Paragraph>Passwords could be changed and other authentication information could be recovered, but again it would take a great deal of time and inconvenience to get back to normal. If these items had been stolen, an attacker might have been able to misuse those assets. The photos would, almost certainly, be lost forever.</Paragraph>
                <Paragraph>Now look back at your own list of information assets. Does Lewis’s list prompt you to add any items to yours?</Paragraph>
                <Paragraph>Next, you will learn about risk analysis.</Paragraph>
            </Section>
            <Section>
                <Title>1.2 Risk analysis</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1149.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1149.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ffa7dffa" x_imagesrc="ou_futurelearn_cyber_security_fig_1149.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 3</b></Caption>
                    <Description>This is an image of a person climbing up a rock. The sea is in the background.</Description>
                </Figure>
                <Paragraph>We use the term ‘risk’ in everyday speech, but a whole science has grown up around the identification, analysis and management of risks. You will now look briefly at how to apply some of these ideas to identifying, assessing and reducing risks that affect the security of your information.</Paragraph>
                <Paragraph>Risk can be thought of as the chance of adverse consequences or loss occurring. Generally, risks can be identified and the likelihood of them occurring assessed.</Paragraph>
                <Paragraph>The main technique for a qualitative analysis of risk is to construct a likelihood–impact matrix in which the likelihood and impact of each risk event are assessed against a defined scale and then plotted on a two-dimensional grid. The position on the grid represents the relative significance of each risk. The simplest matrix is formed by classifying both likelihood and impact as either high or low, which leads to a 2 by 2 grid. This basic classification of a high or low value leads to the following rank order for tackling risks:</Paragraph>
                <NumberedList>
                    <ListItem>high-impact, high-likelihood risks</ListItem>
                    <ListItem>high-impact, low-likelihood risks</ListItem>
                    <ListItem>low-impact, high-likelihood risks</ListItem>
                    <ListItem>low impact, low-likelihood risks.</ListItem>
                </NumberedList>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1166.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1166.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="12937375" x_imagesrc="ou_futurelearn_cyber_security_fig_1166.tif.jpg" x_imagewidth="512" x_imageheight="342"/>
                    <Caption><b>Figure 4</b> Risk analysis grid</Caption>
                </Figure>
                <Paragraph>Low-impact, low-likelihood risks are probably not worth expending much effort on (but see the discussion of risk acceptance later this week). You can then look at these high-impact or high-likelihood risks one by one to determine whether there are ways either to reduce the impact if the risk occurs or to reduce the likelihood of the risk occurring, or both.</Paragraph>
                <Paragraph>The next stage is to apply quantitative techniques, based on a financial assessment of the impact of each of the risks, to put the risks into order, with the greatest risks at the top of the list.</Paragraph>
                <Paragraph>It is beyond the scope of this course to discuss these techniques. Sometimes it is hard to reach a decision about the importance of some risks until a corresponding response has been identified as well as any possible interactions between risk events and responses, so risk management is usually iterative in practice.</Paragraph>
                <Paragraph>Next, you’ll do some risk analysis on your information.</Paragraph>
            </Section>
            <Section>
                <Title>1.3 Risk analysis in practice</Title>
                <Paragraph>Let’s think about a practical example of how qualitative risk analysis could be done for Lewis’s information assets.</Paragraph>
                <Paragraph>Any successful attack on email, banking details and password information will have high impact and there is a high likelihood that these attacks will be targeted due to their high value. So they should go in the high-high box.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1167.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1167.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="671653ad" x_imagesrc="ou_futurelearn_cyber_security_fig_1167.tif.jpg" x_imagewidth="512" x_imageheight="342"/>
                    <Caption><b>Figure 5</b></Caption>
                    <Description>In this risk analysis grid, email, banking details and password are classified as high impact and high likelihood.</Description>
                </Figure>
                <Paragraph>An attack that affects the study materials or digital photographs will have high impact, but there is a low likelihood given that these assets have minimal financial value to an attacker. These should be placed in the high-low box.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1168.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1168.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="6797fe9f" x_imagesrc="ou_futurelearn_cyber_security_fig_1168.tif.jpg" x_imagewidth="512" x_imageheight="342"/>
                    <Caption><b>Figure 6</b></Caption>
                    <Description>In this risk analysis, study materials and digital photographs are classified as high impact but low likelihood.</Description>
                </Figure>
                <Paragraph>An attack on the digital music or videos will have low impact, since these can be downloaded again easily. However, this will have high likelihood because these assets can be easily copied and sold, this making these attractive to an attacker. Therefore, they go in the low-high box.</Paragraph>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1169.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1169.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="21a7bfa3" x_imagesrc="ou_futurelearn_cyber_security_fig_1169.tif.jpg" x_imagewidth="512" x_imageheight="342"/>
                    <Caption><b>Figure 7</b></Caption>
                    <Description>In this risk analysis, digital music and digital videos are classified as high likelihood but low impact.</Description>
                </Figure>
                <Paragraph>Conducting a risk analysis is an important part of protecting your information assets. Following Lewis’s example consider your own list of information assets and carry out a similar risk analysis to determine the impact and likelihood of attack for each type of information.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>2 Staying safe online</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1151.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1151.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="cb928d8c" x_imagesrc="ou_futurelearn_cyber_security_fig_1151.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 8</b></Caption>
                <Description>This photograph shows a man wearing protective clothing while using a laptop.</Description>
            </Figure>
            <Paragraph>There are a number of things you can do to stay safe on the internet. Like almost all parts of life, although you hear terrible stories, most people never have serious problems online. By taking a few simple steps, you can make yourself and your computer much more secure.</Paragraph>
            <InternalSection>
                <Heading>Stay up to date</Heading>
                <Paragraph>Out of date software is one of the biggest problems for computer users. Bugs that have been fixed in newer operating systems or applications may remain unresolved in previous versions, leaving you vulnerable. This is especially important in the case of operating systems, which are responsible for managing files and connecting to the internet.</Paragraph>
                <Paragraph>Check to see if your operating system is being supported by regular updates. For example, for Microsoft software you can search for your operating system at: <a href="https://support.microsoft.com/en-us/hub/4095338/microsoft-lifecycle-policy">https://support.microsoft.com/en-us/hub/4095338/microsoft-lifecycle-policy</a>.</Paragraph>
                <Paragraph>Many other applications, such as Microsoft Office, the Java programming language (used by a lot of websites), web browsers and so on, also require regular updating to fix security problems.</Paragraph>
                <Paragraph>If you are using an old operating system that is not supported by its manufacturer, or if you need an application, but your current edition is out of date, it is well worth investing in updated software. First, though, check that your computer can run the updated software, if not, it might be time for a new computer. Or consider installing a new operating system such as a free Linux OS on older equipment. Remember to backup all your data and passwords first.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Do the basics</Heading>
                <Paragraph>The basic check list:</Paragraph>
                <BulletedList>
                    <ListItem>set up a personal firewall</ListItem>
                    <ListItem>install an antivirus program (remember, Macs do need antivirus protection)</ListItem>
                    <ListItem>get used to making backups</ListItem>
                    <ListItem>set up your computer to require passwords to log in and when unlocking the screen</ListItem>
                    <ListItem>set up two-factor authentication for all important financial and social media sites</ListItem>
                    <ListItem>use a unique strong password for each website</ListItem>
                    <ListItem>use a password manager or encrypt your password folder</ListItem>
                    <ListItem>use hard disk encryption if you have it – especially on laptops.</ListItem>
                </BulletedList>
                <Paragraph>It will take a couple of hours to perform these steps, but your computer will be significantly more secure.</Paragraph>
            </InternalSection>
            <InternalSection>
                <Heading>Fix your email</Heading>
                <Paragraph>Most email applications now come with junk mail screening. If it’s not already enabled – turn it on! Your mail program will scan incoming email looking for suspicious messages that might be trying to scam you – or are just annoying spam. It puts any suspect messages into a junk mail folder where you can examine them later, just in case any genuine messages were misfiled.</Paragraph>
                <Paragraph>Most email programs will also let you train the screening process so that any messages that were missed can be treated as junk in the future.</Paragraph>
                <Paragraph>In the next section, you’ll learn some tips to improve your web browser’s security.</Paragraph>
            </InternalSection>
            <Section>
                <Title>2.1 Fix your browser</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1152.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1152.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="1231fcdd" x_imagesrc="ou_futurelearn_cyber_security_fig_1152.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 9</b></Caption>
                    <Description>This is a photograph of chocolate chip cookies.</Description>
                </Figure>
                <Paragraph>Web browsers are steadily developing enhanced security and it is a good idea to use the latest version. </Paragraph>
                <Paragraph>There are several simple things you can do to improve your web browser’s security.</Paragraph>
                <BulletedList>
                    <ListItem>Use a browser such as Brave (https://brave.com/) that is designed to put your security first.</ListItem>
                    <ListItem>Use a search engine such as duckduckgo (https://duckduckgo.com) that doesn’t track you. </ListItem>
                    <ListItem>Use a secure VPN or the TOR browser when using public wi-fi.</ListItem>
                </BulletedList>
                <Paragraph>Cookies are small pieces of data that can be used to track your use of the web and some websites host cookies belonging to organisations you know nothing about – these are called ‘third party cookies’ and they’re no use to you whatsoever. Use the tools/preferences menu in your browser to prevent the use of third party cookies.</Paragraph>
                <Paragraph>Once you have checked your settings you can test whether you can be identified by your web browser by visiting the site <a href="https://panopticlick.eff.org/">https://panopticlick.eff.org</a>. Read the information about this site and then hit the ‘Test Me’ button.</Paragraph>
                <Paragraph>The table shows the test results for a secure browser.</Paragraph>
                <Table>
                    <TableHead>Table 1 Test results for a secure browser</TableHead>
                    <tbody>
                        <tr>
                            <th>Test</th>
                            <th>Result</th>
                        </tr>
                        <tr>
                            <td>Is your browser blocking tracking ads?</td>
                            <td>Yes</td>
                        </tr>
                        <tr>
                            <td>Is your browser blocking invisible trackers?</td>
                            <td>Yes</td>
                        </tr>
                        <tr>
                            <td>Dows your blocker stop trackers that are included in the so-called ‘<b>acceptable ad</b>’ whitelist?</td>
                            <td>Yes</td>
                        </tr>
                        <tr>
                            <td>Does your browser unblock 3rd parties that promise to honour <b>Do not track</b>?</td>
                            <td>No</td>
                        </tr>
                        <tr>
                            <td>Does your browser protect from <b>fingerprinting</b>?</td>
                            <td>Your browser has a unique fingerprint</td>
                        </tr>
                    </tbody>
                </Table>
                <Paragraph>Note the result ‘your browser has a unique fingerprint’. Here are my results for this test: ‘Your browser fingerprint appears to be unique among the 224,169 tested in the past 45 days. Currently, we estimate that your browser has a fingerprint that conveys at least 17.77 bits of identifying information.’</Paragraph>
                <Paragraph>The table below shows the different attributes of the user’s browser and computer that can be detected by a web server.</Paragraph>
                <Table>
                    <TableHead>Table 2 Browser and computer attributes that can be detected by a web server</TableHead>
                    <tbody>
                        <tr>
                            <th>Browser characteristic</th>
                            <th>Bits of identifying information</th>
                            <th>One in <i><font val="Times">x</font></i> browsers have this value</th>
                            <th>Value</th>
                        </tr>
                        <tr>
                            <td>User agent</td>
                            <td>7.89</td>
                            <td>237.97</td>
                            <td>|Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36|</td>
                        </tr>
                        <tr>
                            <td>HTTP_ACCEPT headers</td>
                            <td>5.77</td>
                            <td>54.74</td>
                            <td>|text/html, */*; q=0.01 gzip, deflate, br en-GB,en-US;q=0.9,en;q=0.8|</td>
                        </tr>
                        <tr>
                            <td>Browser plugin details</td>
                            <td>5.25</td>
                            <td>38.01</td>
                            <td>Plugin 0: Chrome PDF Plugin; Portable Document Format; internal-pdf-viewer; (Portable Document Format; application/x-google-chrome-pdf; pdf). Plugin 1: Chrome PDF Viewer; ; mhjfbmdgcfjbbpaeojofohoefgiehjai; (; application/pdf; pdf).</td>
                        </tr>
                        <tr>
                            <td>Time zone</td>
                            <td>2.57</td>
                            <td>5.95</td>
                            <td>0</td>
                        </tr>
                        <tr>
                            <td>Screen size and colour depth</td>
                            <td>5.77</td>
                            <td>54.44</td>
                            <td>1920x1200x24</td>
                        </tr>
                        <tr>
                            <td>System fonts</td>
                            <td>10.32</td>
                            <td>1280.97</td>
                            <td>Andale Mono, Arial, Arial Black, Comic Sans MS, Courier, Courier New, Georgia, Helvetica, Impact, MS Gothic, MS PGothic, Times, Times New Roman, Trebuchet MS, Verdana, Wingdings 2, Wingdings 3 (via javascript)</td>
                        </tr>
                        <tr>
                            <td>Are cookies enabled?</td>
                            <td>0.24</td>
                            <td>1.18</td>
                            <td>Yes</td>
                        </tr>
                        <tr>
                            <td>Limited supercookie test</td>
                            <td>0.36</td>
                            <td>1.28</td>
                            <td>DOM localStorage: Yes, DOM sessionStorage: Yes, IE userData: No</td>
                        </tr>
                        <tr>
                            <td>Hash of canvas fingerprint</td>
                            <td>17.77</td>
                            <td>224169.0</td>
                            <td>c317936a22901617dd08dc99390e0fe1</td>
                        </tr>
                        <tr>
                            <td>Hash of WebGL fingerprint</td>
                            <td>13.45</td>
                            <td>11208.45</td>
                            <td>dd255d5c1bddffd68d8e0921e64760b1</td>
                        </tr>
                        <tr>
                            <td>DNT header enabled?</td>
                            <td>1.05</td>
                            <td>2.07</td>
                            <td>False</td>
                        </tr>
                        <tr>
                            <td>Language</td>
                            <td>3.94</td>
                            <td>15.39</td>
                            <td>en-GB</td>
                        </tr>
                        <tr>
                            <td>Platform</td>
                            <td>3.06</td>
                            <td>8.35</td>
                            <td>Linux x86_64</td>
                        </tr>
                        <tr>
                            <td>Touch support</td>
                            <td>0.69</td>
                            <td>1.61</td>
                            <td>Max touchpoints: 0; TouchEvent supported: false; onTouchStart supported: false</td>
                        </tr>
                    </tbody>
                </Table>
                <Paragraph>Each result by itself doesn’t give much information away. The screen size and colour depth suggests a desktop computer and the platform is identified as Linux. However, in combination all this information creates a digital fingerprint that might identify you wherever you browsed, even if you were pretending to be someone else and had blocked cookies. For most, that probably doesn’t matter, but, for example, a whistleblower or journalist reporting news should be aware of how hard it is to keep yourself hidden and safe.</Paragraph>
                <Activity>
                    <Heading>Activity 1 Improving your browser security</Heading>
                    <Timing>Allow about 10 minutes</Timing>
                    <Question>
                        <Paragraph>Note down in the box below how you can further improve your browser security.</Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="dsfsmtvxxz"/>
                    </Interaction>
                </Activity>
                <Paragraph>Next, you will decide what to do about the risks to your digital information and share your resolutions with your fellow learners.</Paragraph>
            </Section>
            <Section>
                <Title>2.2 Risk management in practice</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1153.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1153.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="adec10cd" x_imagesrc="ou_futurelearn_cyber_security_fig_1153.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 10</b></Caption>
                    <Description>This photograph shows three people sky diving.</Description>
                </Figure>
                <Paragraph>Having analysed the situation, the next stage is to decide what to do about the risks.</Paragraph>
                <Paragraph>For each risk to be managed, we need to identify what cost-effective countermeasures can be applied. Possible countermeasures are:</Paragraph>
                <BulletedList>
                    <ListItem><b>Avoiding the risk</b> – avoidance would mean stopping the activity that is causing the risk. For example, deleting all banking information and unsubscribing from internet banking would avoid the risks associated with the information assets related to banking.</ListItem>
                    <ListItem><b>Modifying the risk (likelihood and/or impact)</b> – this involves choosing and implementing a security mechanism that reduces the likelihood of a successful attack, or the impact that would result from such an attack. For example, installing an up to date antivirus application can prevent the attacker from using malware to gain access to the computer holding the internet banking information.</ListItem>
                    <ListItem><b>Transferring the risk to others</b> – typically involves taking out insurance to cover any losses in the event the threat materialises.</ListItem>
                    <ListItem><b>Accepting the risk</b> – would mean choosing not to implement any of these countermeasures, choosing instead to monitor the information asset for any attacks.</ListItem>
                </BulletedList>
                <Paragraph>Consider risks identified in the qualitative risk analysis. Choose one of your information assets and decide on which countermeasures you would apply in this case. </Paragraph>
            </Section>
            <Section>
                <Title>2.3 Protecting your information assets</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1154.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1154.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="d8cda6f3" x_imagesrc="ou_futurelearn_cyber_security_fig_1154.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 11</b></Caption>
                    <Description>This photograph shows a young woman sitting on the floor with her laptop. Surrounding her are poloroid images.</Description>
                </Figure>
                <Paragraph>Now you’ve done a risk analysis, it’s time to look at how we can better protect our information assets.</Paragraph>
                <Paragraph>You’ve already thought about backing up data and using encryption to protect information – but have you put any of these measures into practice?</Paragraph>
                <Paragraph>Go back to the list of information assets you used in your risk analysis. What steps have you taken to protect them? Think in terms of what you have studied on this course. For example:</Paragraph>
                <BulletedList>
                    <ListItem>Have you set up firewalls to protect your networked computers from external attack?</ListItem>
                    <ListItem>Are you protected by up to date antivirus software?</ListItem>
                    <ListItem>Are your operating system and key applications up to date?</ListItem>
                    <ListItem>Is important information protected by encryption?</ListItem>
                </BulletedList>
                <Paragraph>Note, next to each item on your list, the measure you have taken to protect it. If you have not yet implemented that measure, identify it in some way that will remind you to action it.</Paragraph>
                <Paragraph>In the next section, you are invited to create a plan for implementing and maintaining your information security.</Paragraph>
            </Section>
            <Section id="what_should_i_do_next">
                <Title>2.4 What should I do next?</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1155.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1155.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="d8c44a49" x_imagesrc="ou_futurelearn_cyber_security_fig_1155.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 12</b></Caption>
                    <Description>This image shows a number of toy soldiers.</Description>
                </Figure>
                <Paragraph>You have now taken several simple but very important steps to protect your information. Review your list of information assets and work through what else you need to do to improve your own security.</Paragraph>
                <Paragraph>Based on the risk analysis you have done for your information assets, create an information security action plan detailing the countermeasures you could implement to protect each asset.</Paragraph>
                <Paragraph>Before proceeding, you should implement at least one set of countermeasures. In time, you should implement all the countermeasures and also periodically review your risk analysis and action plan to make sure that you are maintaining your countermeasures.</Paragraph>
                <Paragraph>Some of your actions are likely to involve secure encryption and secret passwords. This can result in some significant problems for your business or family should you become incapable of handling these procedures or should you die.</Paragraph>
                <Paragraph>Business users need to analyse how the business would continue to have access to any business documents and systems while ensuring full security at all times. Other users need to evaluate what assets should remain inaccessible on their death, and which assets should be available to family or friends. For the latter, the process by which secure passwords can be passed on to others needs to be planned.</Paragraph>
                <Paragraph>Next you’ll learn about some of the recent developments in cyber security.</Paragraph>
            </Section>
            <Section>
                <Title>2.5 Tracking a moving target</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/cyber_security_week8_fig13.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/cyber_security_week8_fig13.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="ca119791" x_imagesrc="cyber_security_week8_fig13.tif.jpg" x_imagewidth="512" x_imageheight="339"/>
                    <Caption><b>Figure 13</b></Caption>
                    <Description>This photograph shows the entrance to Atlanta City Hall.</Description>
                </Figure>
                <Paragraph>Security is an ever-changing topic. New technologies are always being introduced and they bring new risks, or allow old threats to resurface in a new form.</Paragraph>
                <Paragraph>Old technologies are retired by manufacturers, potentially leaving their users exposed to danger as bugs and security weaknesses remain unaddressed. And there are new threats being discovered every day, such as the WannaCry ransomware attack of 2017 or the more recent SamSam ransomware attack that shut down services across the city of Atlanta.</Paragraph>
                <Paragraph>On 22<sup>nd</sup> March 2018, Atlanta, Georgia was hit by a cyber attack which rendered parts of the city’s government inoperable. The attack was in the form of a piece of malicious software (malware) called SamSam. This is a piece of ransomware – a program that stops users accessing their data until they pay a ransom, usually in a cryptocurrency such as Bitcoin, to receive the keys needed to unlock their data. SamSam demanded a ransom of $51,000; payable in seven days or the data would never be recoverable. Some reports say that the address needed to pay the ransom was made unavailable shortly after the attack; but in any case, there is no evidence that the city paid SamSam’s creators.</Paragraph>
                <Paragraph>The attack on Atlanta created a range of problems, it prevented citizens from paying for basic services such as water and parking; the city stopped taking employment applications; business licences could not be issued; court warrants could not be validated; and the malware crippled the city’s police computers requiring officers to hand write crime reports. As well as these direct problems, other parts of the city’s infrastructure – such as the wireless network at the gigantic Atlanta International airport – were shut down as a precautionary message. More than two weeks after the outbreak, the city was still struggling to restore some services and it is clear that some data was rendered permanently inaccessible.</Paragraph>
                <Paragraph>SamSam spreads on networked computers connected to the internet rather than through emails. Many of the computers that have been infected run Microsoft’s Remote Desktop Protocol (RDP) which allows users to connect to other computers over a network. The most vulnerable computers are those that have been misconfigured or running out-of-date software. It appears that SamSam’s owners manually attack these computers before installing SamSam – there are some suggestions that part of Atlanta’s computer systems were compromised by SamSam’s owners during 2017, although they took no action until March. Once activated, SamSam spreads rapidly across the company’s network before locking the data, ensuring that hundreds, if not thousands of computers are crippled – increasing the likelihood that the ransom will paid.</Paragraph>
                <Paragraph>Like many big organisations, Atlanta faces the problem that it cannot function without many different computer systems, managed by many different teams with unclear responsibilities. Like other organisations, Atlanta has not made adequate investment in computer security training and preventative measures to protect against security threats (the same problems were found in the NHS after the WannaCry attack). Indeed, an earlier audit had warned that the city was at risk from cyber attack, but this was not fixed.</Paragraph>
                <Paragraph>Atlanta spent more than $2.6 million on emergency measures recovering from SamSam. The cost included extra staffing, the need to buy additional computer infrastructure from Microsoft as well as consultancy fees and emergency communications.</Paragraph>
                <Paragraph>It is highly unlikely that Atlanta will be SamSam’s last victim. Its unknown developers continue to release new versions of the malware, so it is likely another organisation will be harmed. Fortunately, up-to-date antivirus software can identify and destroy most forms of SamSam, so ensure you have antivirus running on your computers and that it is receiving the latest updates.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>3 What do you do now?</Title>
            <Paragraph>As we approach the end of the course, it’s a good opportunity to reflect on what you have learned and how it has impacted your ability to protect your digital life.</Paragraph>
            <Paragraph>At the beginning of the course, you took a survey on your information security practices. We’d like you to retake it now to see how your practices have changed.</Paragraph>
            <Paragraph>Launch the <a href="https://www.open.edu/openlearn/ocw/mod/questionnaire/view.php?id=51805">survey</a> – answer the questions based on your habits <b>now</b>. There are no right or wrong answers so you should choose the answer that most closely matches the way you use your computer now that you’ve completed the course. Don’t worry, all the data is anonymous and we will not reveal individual answers.</Paragraph>
            <Paragraph>When you’ve finished you can compare your answers with those you gave at the <a href="https://www.open.edu/openlearn/ocw/mod/questionnaire/view.php?id=51804">start of the course</a>. </Paragraph>
            <Paragraph>When this course was originally run, the results were collated by the author of the course, Arosha, in his blog. You might want to take a look at those <a href="http://www.academic-marginalia.org/2014/11/cyber-security-by-rest-of-us.html">results</a>.</Paragraph>
            <Section>
                <Title>3.1 Confessional</Title>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1159.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1159.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="0181fc63" x_imagesrc="ou_futurelearn_cyber_security_fig_1159.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                    <Caption><b>Figure 14</b></Caption>
                    <Description>This shows three figurines dressed as builders on top of a disc.</Description>
                </Figure>
                <Paragraph>In Section 2.4, <CrossRef idref="what_should_i_do_next">What should I do next?</CrossRef>, we asked that you implement at least one of the countermeasures you included in your security action plan.</Paragraph>
                <Activity>
                    <Heading>Activity 2 A security problem</Heading>
                    <Timing>Allow about 20 minutes</Timing>
                    <Question>
                        <Paragraph>Use the space below to note down the details of a security problem that you spotted and took appropriate countermeasures to address. </Paragraph>
                    </Question>
                    <Interaction>
                        <FreeResponse size="paragraph" id="act1response"/>
                    </Interaction>
                </Activity>
                <Paragraph>Next, you’ll have the opportunity to review your learning from the whole course in the end-of-course compulsory badge quiz.</Paragraph>
            </Section>
        </Session>
        <Session>
            <Title>4 End-of-course quiz</Title>
            <Paragraph>You can now take the end-of-course quiz, which consolidates your understanding of all the topics you’ve studied.</Paragraph>
            <Box>
                <Paragraph><b>Complete the <a href="https://www.open.edu/openlearn/ocw/mod/quiz/view.php?id=48339">Week 8 compulsory badge quiz</a> now.</b></Paragraph>
                <Paragraph>Open the quiz in a new window or tab then come back here when you’re done.</Paragraph>
            </Box>
            <!--<Paragraph><b>TEST RULES AND GRADING</b></Paragraph><BulletedList><ListItem>You may take 3 attempts to answer each question</ListItem><ListItem>Each question has 3 points available</ListItem><ListItem>A point will be deducted for each incorrect attempt</ListItem><ListItem>You can review your total score for the test at the end</ListItem></BulletedList><Activity><Heading>Activity 1</Heading><Multipart><Part><Question><Paragraph>Q1. In Week 8, you looked at how to assess the security risks associated with your digital life based on the likelihood of them occurring and the impact if they do occur. Which of the following risks should be categorised as both high impact and high likelihood?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Any successful attack on email, banking details and password information</Paragraph><Feedback><Paragraph>Well done. These attacks are highly likely to be targeted due to their high value and could have a serious impact if the attack is successful. </Paragraph></Feedback></Right><Wrong><Paragraph>An attack on digital music or videos bought from iTunes or similar</Paragraph><Feedback><Paragraph>No, try again. This will have low impact, since these can be downloaded again easily. However, could be highly likely because these assets can be easily copied and sold, this making these attractive to an attacker.</Paragraph></Feedback></Wrong><Wrong><Paragraph>An attack that affects someone’s study materials</Paragraph><Feedback><Paragraph>No, try again. This attack will have high impact, but there is a low likelihood given that these assets have minimal financial value to an attacker.</Paragraph></Feedback></Wrong><Wrong><Paragraph>All of these</Paragraph><Feedback><Paragraph>No, try again. Think about whether each type of information has value to the attacker and how easy it would be for the individual to replace. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>None of these</Paragraph><Feedback><Paragraph>No, try again. In one of these types of attack, the loss of data could have serious consequences for the individual and be highly likely because of the potential gain for the attacker. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q2. In Week 8, you looked at different approaches to managing risks to your cyber security that you have identified and assessed. What type of risk management is involved in installing a personal firewall?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Transferring the risk</Paragraph><Feedback><Paragraph>No, try again. Unless the firewall software provides a guarantee, this would not transfer the risk to someone else. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Avoiding the risk</Paragraph><Feedback><Paragraph>No, try again. Avoiding the risk means stopping doing the risk, for example deciding not to connect to the internet – unfortunately, not practical for most people. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Accepting the risk</Paragraph><Feedback><Paragraph>No, try again. Accepting the risk means doing nothing, for example deciding not to install a firewall. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong><Right><Paragraph>Reducing the likelihood of the risk</Paragraph><Feedback><Paragraph>Well done. Installing a personal firewall reduces the risk of a successful attack happening.  </Paragraph></Feedback></Right><Wrong><Paragraph>Reducing the impact of the risk</Paragraph><Feedback><Paragraph>No, try again. Installing a personal firewall would not lessen the impact if a successful attack occurs. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q3. In Week 1, you met the acronym CIA, which stands for Confidentiality, Integrity and Availability. What definition was given for the term integrity?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Information is read only by the right people</Paragraph><Feedback><Paragraph>No, try again. This is the definition of confidentiality.</Paragraph></Feedback></Wrong><Wrong><Paragraph>The sender cannot later deny that they sent the information</Paragraph><Feedback><Paragraph>No, try again. This is the definition of non-repudiation.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Information is available to read and use whenever we want</Paragraph><Feedback><Paragraph>No, try again. This is the definition of availability.</Paragraph></Feedback></Wrong><Right><Paragraph>Information can only be modified by those that are authorised to do this</Paragraph><Feedback><Paragraph>Well done, this is the correct definition.</Paragraph></Feedback></Right><Wrong><Paragraph>The identity of the sender can be verified</Paragraph><Feedback><Paragraph>No, try again. This is the definition of authentication.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q4. In Week 1, you started to explore the threat ‘landscape’. What definition was given to the term threat?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>A type of malware</Paragraph><Feedback><Paragraph>No, try again. Malware is one example of a threat, but not the only threat. How was the term ‘threat’ defined?</Paragraph></Feedback></Wrong><Wrong><Paragraph>A point at which there is the potential for a security breach</Paragraph><Feedback><Paragraph>No, try again. This was defined as a vulnerability.</Paragraph></Feedback></Wrong><Right><Paragraph>A danger that can exploit a vulnerability</Paragraph><Feedback><Paragraph>Well done. This could be malware, phishing, the potential for data loss or anything else that could threaten your cyber security.</Paragraph></Feedback></Right><Wrong><Paragraph>An action you take to protect your information</Paragraph><Feedback><Paragraph>No, try again. This was defined as a countermeasure.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q5. In Week 2, you looked at how and why you need to ensure strong passwords are used and then at some additional security measures to support their use. When you buy something online and the vendor sends you to your bank’s website to enter an additional security number before accepting your credit card number, what technique is being used?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Chip and pin</Paragraph><Feedback><Paragraph>No, try again. This is not the correct answer – the name of the technique is needed. You may wish to look back at Week 2.</Paragraph></Feedback></Wrong><Right><Paragraph>Two-factor authentication</Paragraph><Feedback><Paragraph>Well done. Some other examples of two-factor authentication were given in Week 2.</Paragraph></Feedback></Right><Wrong><Paragraph>VPN token</Paragraph><Feedback><Paragraph>No, try again. A VPN token is another example of the same technique, but would not be issued to bank customers. You may wish to look again at Week 2.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Secure Sockets Layer</Paragraph><Feedback><Paragraph>No, try again. SSL is a method of encryption used on web pages, as indicated by a closed padlock in your browser window. You may wish to look again at Week 2.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q6. In Week 3 you met different types of malware. What definition was given of the term virus?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Self-replicating code that inserts copies of itself into specific applications and is activated when the program is first run</Paragraph><Feedback><Paragraph>Well done, this is the correct definition.</Paragraph></Feedback></Right><Wrong><Paragraph>The collective name for software that has been designed to cause damage to data, software or hardware</Paragraph><Feedback><Paragraph>No, try again. Although the term virus tends to be overused, the correct collective term is malware. There are several types of malware, such as viruses, worms and Trojans. You may wish to look again at Week 3.</Paragraph></Feedback></Wrong><Wrong><Paragraph>A self-replicating, standalone application which is designed to make copies of itself and infect as many machines as possible across a network</Paragraph><Feedback><Paragraph>No, try again. This is the definition of a worm. A virus is not a standalone application. You may wish to look again at Week 3.</Paragraph></Feedback></Wrong><Wrong><Paragraph>An application that appears legitimate, but causes damage behind the scenes</Paragraph><Feedback><Paragraph>No, try again. This is the definition of a Trojan. You may wish to look again at Week 3.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q7. In Week 4, you looked at the security of networks. Which of the following is a specific threat to the availability of a wireless network?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>An eavesdropper picking up the signals and converting these back into the original message</Paragraph><Feedback><Paragraph>No, try again. This threat does not affect availability. Remember CIA, which you met in Week 1, and look again at Week 4 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>A malicious user getting between the sender and the receiver of the messages and making changes to the messages</Paragraph><Feedback><Paragraph>No, try again. This threat does not affect availability. Remember CIA, which you met in Week 1, and look again at Week 4 if you need to.</Paragraph></Feedback></Wrong><Right><Paragraph>An attacker transmitting lots of random data on the same frequency as the wireless network to cause congestion</Paragraph><Feedback><Paragraph>Well done. This is known as a denial-of-service (DoS) attack and the congestion means the network is not available to its users.</Paragraph></Feedback></Right><Wrong><Paragraph>A man-in-the-middle attack</Paragraph><Feedback><Paragraph>No, try again.  A man-in-the-middle attack is typically used to eavesdrop on information or modify it as it is transmitted between the sender and receiver.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q8. Look at the following statements about the World Wide Web (WWW), which was discussed in Week 4. Choose the option that identifies the two <b>correct</b> statements.</Paragraph><NumberedList><ListItem>If you’re on the internet, you’re also on the World Wide Web.</ListItem><ListItem>If you’re on the World Wide Web, you’re also on the internet.</ListItem><ListItem>Web browsers use the HTTP protocol to request a web page from a web server.</ListItem><ListItem>Web browsers use the TCP protocol to request a web page from a web server.</ListItem></NumberedList></Question><Interaction><SingleChoice><Wrong><Paragraph>1 and 3 are correct</Paragraph><Feedback><Paragraph>No, try again. Remember that the internet is not just the WWW, as explained in Week 4.</Paragraph></Feedback></Wrong><Wrong><Paragraph>1 and 4 are correct</Paragraph><Feedback><Paragraph>No, try again. TCP sets up the connection but does not deal with individual web pages. Look again at Week 4 if you need to.</Paragraph></Feedback></Wrong><Right><Paragraph>2 and 3 are correct</Paragraph><Feedback><Paragraph>Well done. The WWW is only one of the functions that exist on the Internet; the HTTP protocol is used by browsers to request a web page from a web server using port 80, although TCP is used to set up the connection. </Paragraph></Feedback></Right><Wrong><Paragraph>2 and 4 are correct</Paragraph><Feedback><Paragraph>No, try again. Look again at Week 4 if you need to.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q9. In Week 5 you looked at cryptography, including the use of encryption. Which relatively recent encryption specification has been widely adopted as the ‘standard’ for symmetric cryptography?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>DES</Paragraph><Feedback><Paragraph>No, try again. With the advent of greater computing power, DES is no longer considered safe from brute force attacks. Look again at Week 5 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Triple DES</Paragraph><Feedback><Paragraph>No, try again. Although Triple DES is considered secure until at least 2030 based on projected growth of computing power, it is not the agreed standard. Look again at Week 5 if you need to.</Paragraph></Feedback></Wrong><Right><Paragraph>AES</Paragraph><Feedback><Paragraph>Well done. AES has taken over from DES as the agreed standard.</Paragraph></Feedback></Right><Wrong><Paragraph>Blowfish</Paragraph><Feedback><Paragraph>No, try again. Although Blowfish and its variants are considered relatively secure, Blowfish is not the agreed standard. Look again at Week 5 if you need to.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q10. In Week 6, you looked at Virtual Private Networks (VPNs). What type of users are most likely to use a VPN and why?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Private users to keep their information private</Paragraph><Feedback><Paragraph>No, try again. Ordinary security measures such as password protection and a personal firewall should be sufficient for a single user’s needs. Look again at Week 6 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Small organisations that are based in one location to protect their information from outside attack</Paragraph><Feedback><Paragraph>No, try again. A VPN is not necessary as long as other measures such as firewalls are taken to keep attackers out of the organisation’s internal network (LAN).</Paragraph></Feedback></Wrong><Wrong><Paragraph>Families that are spread across the globe to keep their emails and Skype calls private</Paragraph><Feedback><Paragraph>No, try again. Ordinary security measures including encryption should be sufficient for their needs. Look again at Week 6 if you need to.</Paragraph></Feedback></Wrong><Right><Paragraph>Large organisations that have several locations that need to share private information</Paragraph><Feedback><Paragraph>Well done. The Open University is one such organisation that uses VPNs to ensure privacy of their information without incurring the cost of private leased lines.</Paragraph></Feedback></Right></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q11. In Week 7, you looked at measures you can take to put things right if a cybersecurity attack on your computer is successful, and at what measures you can take now to reduce the impact of such an attack. What can you do to prevent your data being accessed in the event that your computer is stolen?</Paragraph></Question><Interaction><SingleChoice><Wrong><Paragraph>Implement user accounts with strong passwords</Paragraph><Feedback><Paragraph>While this is a useful measure to take, an attacker who has stolen the computer can bypass the password protection by accessing the hard disk directly.</Paragraph></Feedback></Wrong><Right><Paragraph>Encrypt the hard disk</Paragraph><Feedback><Paragraph>Well done. Encrypting the hard disk will make it much harder for the attacker to access the data stored on the computer.</Paragraph></Feedback></Right><Wrong><Paragraph>Install a personal firewall</Paragraph><Feedback><Paragraph>No, try again. While this is a certainly a good security measure to take, it will not protect your data from prying eyes if your computer is stolen.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Lock your computer</Paragraph><Feedback><Paragraph>No, try again. While this is a certainly a good security measure to take and may prevent your computer from being stolen, it will not protect your data from prying eyes if the thief is successful.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Install anti-virus software and keep it up to date</Paragraph><Feedback><Paragraph>No, try again. While this is a certainly a good security measure to take and may prevent your computer from being stolen, it will not protect your data from prying eyes if the thief is successful. </Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part><Part><Question><Paragraph>Q12. In Week 8, you looked at information assets. What is the most important example of an incentive, in the context of information security management?</Paragraph></Question><Interaction><SingleChoice><Right><Paragraph>Trust</Paragraph><Feedback><Paragraph>Well done.</Paragraph></Feedback></Right><Wrong><Paragraph>Legislation</Paragraph><Feedback><Paragraph>No, try again – this is an imperative, not an incentive. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Regulation</Paragraph><Feedback><Paragraph>No, try again – this is an imperative, not an incentive. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong><Wrong><Paragraph>Threats</Paragraph><Feedback><Paragraph>No, try again. Look again at Week 8 if you need to.</Paragraph></Feedback></Wrong></SingleChoice></Interaction></Part></Multipart></Activity>-->
        </Session>
        <Session>
            <Title>5 End-of-course guide and round-up</Title>
            <MediaContent src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1060.mp4" type="video" width="512" x_manifest="ou_futurelearn_cyber_security_vid_1060_1_server_manifest.xml" x_filefolderhash="e1d42cc2" x_folderhash="e1d42cc2" x_contenthash="4ae2ff72" x_subtitles="ou_futurelearn_cyber_security_vid_1060.srt">
                <Transcript>
                    <Speaker>CORY DOCTOROW</Speaker>
                    <Remark>That's it for this course. I hope you've enjoyed it and are now feeling more confident about navigating through potential risks to your online security. If you want to find out more or are curious about other courses, please head over to the Open University's website where you'll find modules related to computing in general and some focusing on different aspects of information security.</Remark>
                </Transcript>
                <Figure>
                    <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_vid_1060.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_vid_1060.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="14ad11ae" x_imagesrc="ou_futurelearn_cyber_security_vid_1060.jpg" x_imagewidth="512" x_imageheight="288"/>
                </Figure>
            </MediaContent>
            <Paragraph>Over the past eight weeks you have learned about different types of cyber security threats and techniques that can be used to counter them. You should now have a grasp of cyber security concepts such as confidentiality, integrity and availability as well as understanding the basics of cryptography, network security and security risk management.</Paragraph>
            <Paragraph>Use the below as a checklist to see how your practices have changed since taking this course.  </Paragraph>
            <BulletedList>
                <ListItem>When you start your computer, do you need to use a password to log in?</ListItem>
                <ListItem>When you leave your computer for a break, does it require you to enter a password before you can start working again?</ListItem>
                <ListItem>Do you keep your passwords for your computer in your head?</ListItem>
                <ListItem>Do you keep passwords for logging on to banking websites and social media in an encrypted folder or encrypted password manager?</ListItem>
                <ListItem>Do you use a separate unique strong password on each website?</ListItem>
                <ListItem>Do you use antivirus software on your computer?</ListItem>
                <ListItem>Do you regularly update the software you use?</ListItem>
                <ListItem>Do you use a firewall on your router or on your computer to protect you from attackers?</ListItem>
                <ListItem>Do you have backups of your important data stored somewhere other than your computer (such as on another disk drive, computer or in the cloud)?</ListItem>
            </BulletedList>
            <Paragraph>If you would like to find out more about any of the topics covered in the course we have created an area specifically for exploring more about cyber security on <a href="http://www.open.edu/openlearn/futurelearn/cyber-security">OpenLearn</a>.</Paragraph>
        </Session>
        <Session>
            <Title>6 Next steps</Title>
            <Figure>
                <Image src="https://www.open.edu/openlearn/ocw/pluginfile.php/1297367/mod_oucontent/oucontent/66193/ou_futurelearn_cyber_security_fig_1161.tif.jpg" src_uri="file:////dog/printlive/nonCourse/OpenLearn/BOC/CYBER_B1/ou_futurelearn_cyber_security_fig_1161.tif.jpg" width="100%" x_folderhash="e1d42cc2" x_contenthash="2b6d718e" x_imagesrc="ou_futurelearn_cyber_security_fig_1161.tif.jpg" x_imagewidth="512" x_imageheight="341"/>
                <Caption><b>Figure 15</b></Caption>
            </Figure>
            <Paragraph>Congratulations, you have completed the course! We hope you have enjoyed your journey into the world of cyber security.</Paragraph>
            <Paragraph>Were you inspired by the course? Would you like to continue your learning with The Open University? Then read on!</Paragraph>
            <Paragraph>If you already have a qualification in computing or relevant work experience in the field and want to specialise in cyber security, The Open University offers the following postgraduate courses:</Paragraph>
            <BulletedList>
                <ListItem><a href="http://www.open.ac.uk/postgraduate/modules/m811">M811 <i>Information security</i></a></ListItem>
                <ListItem><a href="http://www.open.ac.uk/postgraduate/modules/m812">M812 <i>Digital forensics</i></a></ListItem>
                <ListItem><a href="http://www.open.ac.uk/postgraduate/modules/t828">T828 <i>Network security</i></a>.</ListItem>
            </BulletedList>
            <Paragraph>If you don’t have a computing background but your introduction to cyber security has inspired you to learn more about computing, you may be interested in The Open University’s <a href="http://www.open.ac.uk/courses/qualifications/q62">BSc (Honours) in Computing and IT</a>, starting with <a href="http://www.open.ac.uk/courses/modules/tu100">TU100 <i>My digital life</i></a>.</Paragraph>
            <Paragraph><b>Get careers guidance</b></Paragraph>
            <Paragraph>The <a href="https://nationalcareers.service.gov.uk/find-a-course/the-skills-toolkit?utm_source=openlearn&amp;utm_medium=referral&amp;utm_campaign=skillstoolkit_completed">National Careers Service</a> can help you decide your next steps with your new skills.</Paragraph>
        </Session>
        <Session>
            <Title>Tell us what you think</Title>
            <Paragraph>Now you've come to the end of the course, we would appreciate a few minutes of your time to complete this short <a href="https://www.surveymonkey.co.uk/r/cyber_security_stay_safe_end">end-of-course survey</a> (you may have already completed this survey at the end of Week 4). We’d like to find out a bit about your experience of studying the course and what you plan to do next. We will use this information to provide better online experiences for all our learners and to share our findings with others. Participation will be completely confidential and we will not pass on your details to others.</Paragraph>
            <Paragraph>If you found this course through the Skills Toolkit launched by the UK government in April 2020 and would be willing to provide feedback on how this course has helped you, please get in touch <a href="mailto:openlearn@open.ac.uk?subject=Cyber%20security%20course%20feedback">by emailing us</a>.</Paragraph>
        </Session>
    </Unit>
    <BackMatter>
        <References>
            <Reference>Department for Digital, Culture, Media and Sport (2019) <i>Cyber Security Breaches Survey 2019</i>. Available at <a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf">https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/813599/Cyber_Security_Breaches_Survey_2019_-_Main_Report.pdf </a>(Accessed: 4 December 2019).</Reference>
            <Reference>Dragos (2019) <i>Threat Proliferation in ICS Cybersecurity: XENOTIME now targeting electric sector, in addition to oil and gas</i>. Available at: <a href="https://dragos.com/blog/industry-news/threat-proliferation-in-ics-cybersecurity-xenotime-now-targeting-electric-sector-in-addition-to-oil-and-gas/">https://dragos.com/blog/industry-news/threat-proliferation-in-ics-cybersecurity-xenotime-now-targeting-electric-sector-in-addition-to-oil-and-gas/</a> (Accessed: 4 December 2019).</Reference>
            <Reference>Sophos (2019) <i>SophosLabs 2019 Threat Report</i>. Available at: <a href="https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-2019-threat-report.pdf?la=en">https://www.sophos.com/en-us/medialibrary/PDFs/technical-papers/sophoslabs-2019-threat-report.pdf?la=en</a> (Accessed: 4 December 2019).</Reference>
            <Reference>Statista (2018) <i>Annual number of data breaches and exposed records in the United States from 2005 to 2018</i>. Available at: <a href="https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/">https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/</a> (Accessed: 4 December 2019)</Reference>
            <Reference>TechCrunch (2019a) <i>Millions of Instagram influencers had their contact data scraped and exposed</i>. Available at: <a href="https://techcrunch.com/2019/05/20/instagram-influencer-celebrity-accounts-scraped/">https://techcrunch.com/2019/05/20/instagram-influencer-celebrity-accounts-scraped/</a> (Accessed: 4 December 2019).</Reference>
            <Reference>TechCrunch (2019b) <i>A huge database of Facebook users’ phone numbers found online</i>. Available at: <a href="https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/">https://techcrunch.com/2019/09/04/facebook-phone-numbers-exposed/</a> (Accessed: 4 December 2019). </Reference>
            <Reference>TrendMicro (2019) 2019 <i>Midyear security roundup: Evasive threats, pervasive effects</i>. Available at: <a href="https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/evasive-threats-pervasive-effects">https://www.trendmicro.com/vinfo/us/security/research-and-analysis/threat-reports/roundup/evasive-threats-pervasive-effects</a> (Accessed: 4 December 2019).</Reference>
            <Reference>ZDNet (2019) <i>Database leaks data on most of Ecuador’s citizens, including 6.7 million children</i>. Available at: <a href="https://www.zdnet.com/article/database-leaks-data-on-most-of-ecuadors-citizens-including-6-7-million-children/">https://www.zdnet.com/article/database-leaks-data-on-most-of-ecuadors-citizens-including-6-7-million-children/</a> (Accessed: 4 December 2019).</Reference>
            <Reference>BBC (2019) ‘I lost £4,000 in a call centre scam’, <i>BBC News</i>, 21 October. Available at: https://www.bbc.co.uk/news/technology-50117796 (Accessed 16 December 2019). </Reference>
            <Reference>Microsoft (2019) <i>Microsoft security intelligence report</i>. Available at: https://www.microsoft.com/securityinsights (Acccessed 5 December 2019).</Reference>
            <Reference>Statista (2018) <i>Share of internet users in the United States who have been victim of online identity theft as of October 2018</i>. Available at: https://www.statista.com/statistics/763130/internet-identity-theft-usa/ (Accessed: 9 December 2019).</Reference>
            <Reference>Verizon (2019) <i>Summary of findings</i>. Available at: <a href="https://enterprise.verizon.com/resources/reports/dbir/2019/summary-of-findings/">https://enterprise.verizon.com/resources/reports/dbir/2019/summary-of-findings/</a> (Accessed 9 December 2019).</Reference>
        </References>
        <Acknowledgements>
            <Paragraph>This course was written by Arosha K. Bandara. It was last updated in December 2019.</Paragraph>
            <Paragraph>Except for third party materials and otherwise stated in the acknowledgements section, this content is made available under a 
        <a href="http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_GB">Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence</a>.
</Paragraph>
            <Paragraph> The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this course: </Paragraph>
            <Heading>Images</Heading>
            <Paragraph><b>Introduction and guidance</b></Paragraph>
            <Paragraph>Course image: <a href="https://www.flickr.com/photos/atomictaco/">Atomic Taco </a> in Flickr made available under <a href="https://creativecommons.org/licenses/by-sa/2.0/legalcode">Creative Commons Attribution-ShareAlike 2.0 Licence </a>.</Paragraph>
            <Paragraph><b>Week 1</b></Paragraph>
            <Paragraph><b>Figure 1</b> © Blend Images - Colin Anderson (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 2</b> © xxz114 (via iStock photo)</Paragraph>
            <Paragraph><b>Figure 3</b> © caracterdesign (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 4</b> © bluebird13 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 5</b> © agsandrew (via shutterstock)</Paragraph>
            <Paragraph><b>Figure 6</b> © Ryan McGinnis (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 7</b> © Jasper James (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 8</b> © Vetta Collection (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 9</b> © JGI/Tom Grill (Getty Images)</Paragraph>
            <Paragraph><b>Figure 10</b> © LeoPatrizi, sb-borg (via iStock Photo); mediaphotos (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 11</b> © Danil Melekhin (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 12</b> © Jimmy Anderson (via iStock Photo)</Paragraph>
            <Paragraph><b>Week 2</b></Paragraph>
            <Paragraph><b>Figure 1</b> © agsandrew (via Fotolia)</Paragraph>
            <Paragraph><b>Figure 2</b> © beaucroft (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 3</b> © piotr_malczyk (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 4</b> © dcdp (via iStock)</Paragraph>
            <Paragraph><b>Figure 5</b> © dsteller (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 6</b> © Garry518 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 7</b> © Andrey_Kuzmin (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 8</b> © FredFroese (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 9</b> © lek2481 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 10</b> © David Clark (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 11</b> © pagadesign (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 12</b> © Alan Uster (via Shutterstock)</Paragraph>
            <Paragraph><b>Week 3</b></Paragraph>
            <Paragraph><b>Figure 1</b> © Eraxion (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 2</b> © JordiRoy (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 3</b> © Colin Anderson (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 4</b> © vadimguzhva (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 5</b> © Carol and Mike Werner/Visuals Unlimted, Inc. (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 6</b> © Yugi Studio (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 7</b> © Stephan Zabel (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 8</b> © Trina Dalziel (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 9</b> © Andrew Levine http://commons.wikimedia.org/wiki/File:PhishingTrustedBank.png</Paragraph>
            <Paragraph><b>Figure 11</b> © Dimitri Otis (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 12</b> © enjoynz (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 13</b> © ryccio (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 14</b> © aydinmutlu (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 15</b> © John Lamb (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 16</b> © Danil Melekhin (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 18</b> © FreezeFrameStudio (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 20</b> © webking (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 21</b> © addimage (via iStock Photo)</Paragraph>
            <Paragraph><b>Week 4</b></Paragraph>
            <Paragraph><b>Figure 1</b> © Michael Smith (via Getty images)</Paragraph>
            <Paragraph><b>Figure 2</b> © bioraven (via Shutterstock)</Paragraph>
            <Paragraph><b>Figure 3</b> © Mark Horn (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 4</b> © bluebird13 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 5</b> © olhainsight (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 6</b> © powerofforever (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 7</b> © Bet_Noire (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 8</b> © Scorpions and Centaurs (via Flickr.com)</Paragraph>
            <Paragraph><b>Figure 9</b> © no_limit_pictures (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 11</b> © chrisroll (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 12</b> © Pashalgnatov (via iStock Photo) </Paragraph>
            <Paragraph><b>Figure 13</b> © Catrina Genovese (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 14</b> © John Lund (via Getty Images)</Paragraph>
            <Paragraph><b>Week 5</b></Paragraph>
            <Paragraph><b>Figure 1</b> © Bletchley Park Trust (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 2</b> © Bob Lord - Licensed under Creative Commons Attribution-Share Alike 3.0 via Wikimedia Commons - http://commons.wikimedia.org/wiki/File:Enigma-plugboard.tif.jpg#mediaviewer/File:Enigma-plugboard.tif.jpg</Paragraph>
            <Paragraph><b>Figure 3</b> © agsandrew (via Shutterstock Photos)</Paragraph>
            <Paragraph><b>Figure 5</b> © peterhowell (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 6</b> © GlobalP (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 7</b> © blackie (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 10</b> © Wavebreak (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 11</b> © choicegraphx (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 12</b> © Vertigo3d (via iStock Photo)</Paragraph>
            <Paragraph><b>Week 6</b></Paragraph>
            <Paragraph><b>Figure 1</b> © narvikk (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 2</b> © HAYKIRDI (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 3</b> © Underwood Archives (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 4</b> © vmedia84 (via Fotolia)</Paragraph>
            <Paragraph><b>Figure 5</b> © RapidEye (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 6</b> © OJO_Images (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 7</b> © belterz (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 8</b> © BaderElbert (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 9</b> © Hugh Threlfall (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 10</b> © Isantilli (via iStock Photo)</Paragraph>
            <Paragraph><b>Week 7</b></Paragraph>
            <Paragraph><b>Figure 1</b> © Alex Wong (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 2</b> © Herzstaub (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 3</b> © Mdbeckwith http://creativecommons.org/licenses/by-sa/3.0/deed.en</Paragraph>
            <Paragraph><b>Figure 4</b> © zimmytws (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 5</b> © peeterv (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 6</b> © RapidEye (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 7</b> © fstop123 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 8</b> © stayorgo (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 9</b> © Nico Elnino/Getty Images</Paragraph>
            <Paragraph><b>Figure 10</b> © Shaun Curry (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 11</b> © David Gould (via Getty Images)</Paragraph>
            <Paragraph><b>Figure 12</b> © wakila (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 13</b> © scanrail (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 14</b> © Jeff Nagy (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 15</b> © v777999 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 16</b> © Scorpions and Centaurs (via Flickr.com)</Paragraph>
            <Paragraph><b>Figure 17</b> © scyther5 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 18</b> © kirillm (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 19</b> © Mari (via iStock Photo)</Paragraph>
            <Paragraph><b>Week 8</b></Paragraph>
            <Paragraph><b>Figure 1</b> © 1joe (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 3</b> © scotto72 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 8</b> © swilmor (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 9</b> © DonNichols (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 10</b> © ishoot63 (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 11</b> © btrenkel (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 12</b> © mjutabor (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 13</b> © Geoffrey Meyer-van Voorthuijsen / flickr (<a href="https://creativecommons.org/licenses/by-nc/2.0/">Creative Commons BY-NC 2.0</a>)</Paragraph>
            <Paragraph><b>Figure 14</b> © wakila (via iStock Photo)</Paragraph>
            <Paragraph><b>Figure 15</b> © Mordolff (via iStock Photo)</Paragraph>
            <Heading>Audio visual</Heading>
            <Paragraph><b>Week 1</b></Paragraph>
            <Paragraph>1 Online, the new frontline © HM Government </Paragraph>
            <Paragraph>1.3 and 2.1 © The Open University</Paragraph>
            <Paragraph><b>Week 2</b></Paragraph>
            <Paragraph>2.1 How to pick a proper password (including transcript) © Sophos </Paragraph>
            <Paragraph><b>Week 4</b></Paragraph>
            <Paragraph>2 extract (including transcript) from Datababy:  How easy is it to become a phone  hacker? © Channel4/ITN</Paragraph>
            <Paragraph><b>Week 5</b></Paragraph>
            <Paragraph>2.1 and 2.2 © The Open University</Paragraph>
            <Paragraph><b>Week 7</b></Paragraph>
            <Paragraph>1 extract (including transcript)  from 'Inside Out’ (6/2/12) © BBC </Paragraph>
            <Paragraph>Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.</Paragraph>
            <Paragraph><b>Don't miss out:</b></Paragraph>
            <Paragraph><b>1. Join over 200,000 students, </b>currently studying with The Open University – <a href="http://www.open.ac.uk/choose/ou/open-content">http://www.open.ac.uk/choose/ou/open-content</a></Paragraph>
            <Paragraph><b>2. Enjoyed this? </b>Find out more about this topic or browse all our free course materials on OpenLearn – <a href="http://www.open.edu/openlearn">http://www.open.edu/openlearn/</a></Paragraph>
            <Paragraph><b>3. Outside the UK? </b>We have students in over a hundred countries studying online qualifications – <a href="http://www.openuniversity.edu/">http://www.openuniversity.edu/</a> – including an MBA at our triple accredited Business School.</Paragraph>
        </Acknowledgements>
    </BackMatter>
<settings>
    <numbering>
        <Session autonumber="false"/>
        <Section autonumber="false"/>
        <SubSection autonumber="false"/>
        <SubSubSection autonumber="false"/>
        <Activity autonumber="false"/>
        <Exercise autonumber="false"/>
        <Box autonumber="false"/>
        <CaseStudy autonumber="false"/>
        <Quote autonumber="false"/>
        <Extract autonumber="false"/>
        <Dialogue autonumber="false"/>
        <ITQ autonumber="false"/>
        <Reading autonumber="false"/>
        <StudyNote autonumber="false"/>
        <Example autonumber="false"/>
        <Verse autonumber="false"/>
        <SAQ autonumber="false"/>
        <KeyPoints autonumber="false"/>
        <ComputerDisplay autonumber="false"/>
        <ProgramListing autonumber="false"/>
        <Summary autonumber="false"/>
        <Tables autonumber="false"/>
        <Figures autonumber="false"/>
        <MediaContent autonumber="false"/>
        <Chemistry autonumber="false"/>
    </numbering>
    <discussion_alias>Discussion</discussion_alias>
    <session_prefix/>
<version>2020102004</version></settings></Item>
