Time
1 hour 44 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
I and welcome to lesson 1.6 of the End User Cyber Fundamentals course.
00:08
This lesson will be focused on understanding drive by downloads.
00:15
You will learn what a drive by download is and how you can protect yourself.
00:23
So what is a drive by download?
00:26
Drive by. Downloads are very dangerous as you do not have to accept or click anything for malicious software to be downloaded, and you will not even know it.
00:37
Most people do not even know about drive by downloads. They think the only way you can get malware is by clicking on a link or open an attachment.
00:46
In reality, all you have to do is visit a malicious website or infected website. Unfortunately, you may be on your favorite financial site and not even know that hackers embedded a malicious component.
01:00
In 2019 the New York Times website became a victim and was unintentionally hosting. Now where in the form off Malbert rising.
01:10
We will talk more about Malvo ties ing in the next lesson.
01:14
Drive by downloads. Take advantage off the lack of security on your computer or mobile device.
01:21
If you're Patches, operating system or APS are out of dates, you can be vulnerable to drive by downloads as they exploit thes weaknesses.
01:34
How you can protect yourself
01:37
Often you software quickly and constantly.
01:41
When a software developer releases an update, cybercriminals will rush to reverse engineer it and target Internet users who have not applied the update.
01:52
Configure your operating systems, browsers and all applications that offer it to update automatically
02:00
disabled Java Java script and flash.
02:04
Put trusted sites that require any of these on a white list.
02:10
Do not use an admin or privileged account for your daily computer activity whenever you browse the Internet. Using a privileged account, drive by downloads and other malicious software can install itself without your permission.
02:27
Keep two separate accounts on your computer.
02:30
Use a non privileged account for common day to day work and all online activities.
02:37
The majority of the time you spend on your computer does not require you toe. Have admin access.
02:44
If you need to install software
02:46
as an example,
02:47
you can either log in with the admin account or you will be prompted for admin credentials as required by the operating system.
02:59
Using your computer without administrative rights greatly reduces both the risk of a malicious software download and the potential damage should one succeed.
03:12
Do an annual digital spring cleaning
03:15
and review your computer for all unused or rarely use software and plug ins. This will greatly decrease vulnerabilities on your device and reduce the risk of an infection or an attack.
03:30
Install security software such as antivirus, anti malware, ad blocker and always use a firewall.
03:38
This could help against malware infections and can potentially protect you against hackers.
03:47
Do drive by downloads Require user interaction?
03:53
No, they do not drive by downloads. Take advantage of the lack of security on your computer or mobile device.
04:01
If you're Patches, operating system or APS are out of date, you can be vulnerable to drive by downloads as they exploit thes weaknesses.
04:15
In this lesson, we learned what drive by downloads are.
04:19
We also talked about what you can do to protect yourself.
04:25
Thank you, and I will see you in the next lesson.

Up Next

End User Cyber Fundamentals

This End User Cyber Fundamentals course covers Internet risks such as typosquatting, website spoofing, drive-by downloads, Malvertising, and how to protect yourself using security best practices.

Instructed By

Instructor Profile Image
Lisa Martino
Director, Information Security Governance, Risk & Compliance
Instructor