Presentation is loading. Please wait.

Presentation is loading. Please wait.

3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.

Similar presentations


Presentation on theme: "3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook."— Presentation transcript:

1 3.06 Data Encryption Unit 3 Internet Basics

2 Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook computer. Names, social security numbers, and health records of more than 26 million military veterans and their spouses were “safely” saved on its hard drive. Panic spread and the U.S. Department of Veterans Affairs then spent $3.7 million on encryption software for all of its computers, handhelds, and storage devices.

3 Introduction At the end of this lesson, student will be able to: – Explain data encryption procedures (ACOS 20)

4 Lesson Encryption puts data into a secret code and is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt (decode) it.

5 Lesson Encryption is – a means of encoding data into an unreadable series of characters with a secret key or password – making it secure for transmission.

6 Lesson The encryption software – scrambles data from a person's system so that an unauthorized user is unable to read the information. – you might have the choice of either » locking out the user after a certain number of tries » or even wipe out the data altogether

7 Lesson What is the relationship between mathematics and national security? Watch this video to find out. – Theory and Practice To view the video, enter the following username and password information exactly as it appears below. – username: access_student password: access You may want to look at the assignment for the lesson first because this video will help you answer the assigned questions.

8 Review The federal government is not the only entity interested in encryption. Most email messages you send travel over many networks—some of the networks are secure and others are not. Those email messages can pass through servers all over the Information Superhighway. Anyone with access to any of those servers can read your email messages sent in plain text. Privacy software can be purchased that will encrypt your messages to protect your credit card numbers and information snoopers can use to commit identity theft. Only your private key can decrypt the message and display its contents.

9 Task After reading this lesson and watching the lesson video, answer the 8 questions below. 1.Who is the largest employer of mathematicians in the United States? 2.Explain the science of Crytography. 3.List at least two responsibilities of the National Security Agency (NSA). 4.Explain how bank account records are protected. 5.Explain how prime numbers are involved in encryption (prime numbers are those numbers that cannot be divided by any number except themselves and one). 6.Explain the RSA System of encryption. 7.How can cipher text be converted into plain text? 8.In your own words, explain the difference between authentication and authorization. Open Microsoft Word and answer these questions in complete sentences – Save to your F Drive in your Unit 3 Folder as » 3.06 Encryption Dropbox.

10 Are you finished? You should have 15 things saved on your F Drive in your Unit 3 Folder. 1.3.01 Network Tutorial 2.3.01 How Networks Work 3.3.01 History and Internet Dropbox 4.3.02 Skills Check 3 5.3.02 Boolean QC Chart 6.3.02 How Stuff Works Brain Quiz 7.3.02 Searching the Web Dropbox 8.3.03 Intel Education 9.3.03 Tutorial for Info Power 10.3.03 Side Trip 11.3.03 Evaluating Web Sites Dropbox 12.3.04 On Guard Online Spyware Quiz 13.3.04 Practice 14.3.05 Discussion: Computer Security 15.3.06 Encryption Dropbox So, are you finished?


Download ppt "3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook."

Similar presentations


Ads by Google