3.6 Fundamentals of cyber security

Slides:



Advertisements
Similar presentations
COMPUTER MALWARE FINAL PROJECT PROPOSAL THE WAR AGAINST CAPTCHA WITH IMPLEMENTATION OF THE WORLDS MOST ACCURATE CAPTCHA BREAKER By Huy Truong & Kathleen.
Advertisements

PGR Student Introduction to TurnitinUK OriginalityCheck Software Last updated January 2015.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
CSC 386 – Computer Security Scott Heggen. Agenda Authentication Passwords Reducing the probability of a password being guessed Reducing the probability.
Security Security comes in three forms. 1.Encryption – making data and information transmitted by one person unintelligible to anyone other than the intended.
Student Introduction to TurnitinUK OriginalityCheck Software Last updated January 2015.
CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart A Computer Program that can generate and grade test that: Most Humans.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
CAPTCHA Presented by: Sari Louis SPAM Group: Marc Gagnon, Sari Louis, Steve White University of Illinois Spring 2006.
CAPTCHA Presented By Sayani Chandra (Roll )
Human Computation CSC4170 Web Intelligence and Social Computing Tutorial 7 Tutor: Tom Chao Zhou
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Opening a bank account.
Chapter Accreditation Online System Usage Tutorial Department of Member Relations & Grants National Children’s Alliance.
Security-Authentication
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
IS1500: Introduction to Web Development
LGC Website and Customer On-line Tools LGC RESOURCE 2014.
On the Security of Picture Gesture Authentication Ziming Zhao †‡, Gail-Joon Ahn †‡, Jeong-Jin Seo †, Hongxin Hu § † Arizona State University ‡ GFS Technology.
Mrs. Beth Cueni Carnegie Mellon
CAPTCHA 1 Are you Human? (Sorry, I had to ask). CAPTCHA 2 Agenda What is CAPTCHA? Types of CAPTCHA Where to use CAPTCHAs? Guidelines when making a CAPTCHA.
intelligence study and design of intelligent agentsis the intelligence of machines and the branch of computer science that aims to create it. AI textbooks.
Section 6 Theory Software Copyright, Viruses and Hacking.
B IOMETRIC STANDARDS A N OVERVIEW OF BIOMETRICS AND IDENTITY MANAGEMENT Supervisor : Ahmed Abu Mosameh Prepared by samaher el nbahen UNIVERSITY.
Chapter 6 – Computer Viruses/Hacking and Prevention Starter Task – How can a virus effect your computer? Last Lesson: - Software Copyright & illegal Downloads.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Security PS Evaluating Password Alternatives Bruce K. Marshall, CISSP, IAM Senior Security Consultant
Data Security.
Unit 32 – Networked Systems Security
By: Steven Baker.  What is a CAPTCHA?  History of CAPTCHA  Applications of CAPTCHAs  Accessibility  Examples of CAPTCHAs  reCAPTCHA  Vulnerabilities.
Computer Security Set of slides 8 Dr Alexei Vernitski.
Information Systems Design and Development Security Precautions Computing Science.
Why Physical Biometrics is rapidly Replacing Traditional Methods of Identification at the Workplace.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
Billy Vivian Dr. Oblitey COSC  What is CAPTCHA?  History  Uses  Artificial Intelligence Relationship  reCAPTCHA  Works Cited.
CSS ONLINE CLASSES GUIDELINES CSS-2017 Sessions Contact: CSS Competition Zone Pakistan.
Cyber security. Malicious Code Social Engineering Detect and prevent.
CAPTCHA Presented by: Md.R ahim 08B21A Agenda Definition Background Motivation Applications Types of CAPTCHAs Breaking CAPTCHAs Proposed Approach.
SANDEEP MEHTA (ECE, IV Year). CAPTCHA Completely Automated Public Turing test to tell Computers and Humans Apart Invented at CMU by Luis von Ahn, Manuel.
Technical Implementation: Security Risks
The Parent Portal Version 3.0 Last Updated on 14/10/2016.
PASSWORD SECURITY A Melbourne Athenaeum Library
THE ESP GAME, AND OTHER STUFF
3.6 Fundamentals of cyber security
What this activity will show you
Security+ All-In-One Edition Chapter 1 – General Security Concepts
Patient Access Forgotten user ID
Patient access Forgotten password
Two-factor authentication
Biometrics.
The Parent Portal Version 3.1 Last Updated on 24/04/2017.
Teaching Computing to GCSE
Computer Networks Lesson 3.
Ian Ramsey C of E School GCSE ICT On the move Final steps.
Seminar Presentation on Biometrics
User access levels, Passwords, Encryption, Cipher, Key
Mrs. Beth Cueni Carnegie Mellon
Biometrics.
Setting up an online account
Unit 1.6 Systems security Lesson 4
Biometric technology.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Explain what touch develop is to your students:
The Parent Portal Version 3.1 Last Updated on 24/04/2017.
Computer Networks Lesson 3.
Operating Systems Protections
Presented By Vibhute J.B. Class : M.Sc. (CS)
G061 - Network Security.
Chapter 5 Computer Security
Presentation transcript:

3.6 Fundamentals of cyber security 3.6.2 Methods to detect and prevent cyber security threats Lesson

TIME UP Starter activity Start Look at the pictures and identify the security measures. Email confirmations to confirm identity Password systems CAPTCHA Biometrics Automatic software updates TIME UP Click on ‘Start’ to begin the three-minute timer. Start

Starter activity: Answers 2 1 Biometrics Email confirmations to confirm identity 5 CAPTCHA 4 3 Automatic software updates Password systems

Discussion Which of the security measures did you recognise? What security measures have you used before? When are these measures used? How could cyber security threats be prevented or detected using these methods?

Understand and be able to explain security measures. Objective Understand and be able to explain security measures.

Security measures Biometric measures (particularly for mobile devices) Password systems CAPTCHA (or similar) Using email confirmations to confirm a user’s identity Automatic software updates Biometrics: searchsecurity.techtarget.com/definition/biometrics Biometrics is the measurement and statistical analysis of people's physical and behavioural characteristics. The technology is mainly used for identification and access control, or for identifying individuals that are under surveillance. The basic premise of biometric authentication is that everyone is unique and an individual can be identified by his or her intrinsic physical or behavioural traits. (The term "biometrics" is derived from the Greek words "bio" meaning life and "metric" meaning to measure.) There are two main types of biometric identifiers: Physiological characteristics: The shape or composition of the body. Behavioural characteristics: The behaviour of a person. Examples of physiological characteristics used for biometric authentication include fingerprints; DNA; face, hand, retina or ear features; and odour. Behavioural characteristics are related to the pattern of the behaviour of a person, such as typing rhythm, gait, gestures and voice. Password systems This could involve setting a string password, using passwords to access a system, document or restricted area. Password hierarchy is often used in companies and different people have different settings and access levels based upon their responsibilities. en.wikipedia.org/wiki/Password **(Lots on this website about passwords) A password is a word or string of characters used for user authentication to prove identity or access approval to gain access to a resource (example: an access code is a type of password), which should be kept secret from those not allowed access. gov.uk/government/uploads/system/uploads/attachment_data/file/458857/Password_guidance_-_simplifying_your_approach.pdf – tips for an organisation using passwords CAPTCHA: captcha.net CAPTCHA: Telling Humans and Computers Apart Automatically A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot. For example, humans can read distorted text as the one shown below, but current computer programs can't: The term CAPTCHA (for Completely Automated Public Turing Test To Tell Computers and Humans Apart) was coined in 2000 by Luis von Ahn, Manuel Blum, Nicholas Hopper and John Langford of Carnegie Mellon University. Email confirmations for user identity A link is sent to a user’s registered email address which they must open and click on in order to activate an account, e.g. for a shopping account with an online store. Automatic software updates Where a newer version of the software running on your device is available. This might be automatically updated/installed. The next version of the software is not normally automatically updated. For example – A device currently runs software version 1. Update installs version 1.1. Next version available – software version 2 – but this is not automatically installed.

Security measures activity You have been employed as the Cyber Security Advisor for a local business. Create a user guide or infographic to help staff understand what security measures are and why they should use them to prevent cyber security threats. Include images to support your explanations. This could be presented in a presentation/DTP document or using software that the student chooses. The next few slides have questions on as a guide if students need more direction/support. Extra information A video on security measure examples: youtube.com/watch?v=tS5_t_11eaU&spfreload=1 Extension task: theguardian.com/public-leaders-network/2015/oct/14/how-to-stop-cyber-attacks-on-your-organisation

Security measures activity Examples of infographics: media.cutimes.com/cutimes/article/2015/02/27/cut260704031504img001.jpg gov.uk/government/publications/cyber-risk-management-a-board-level-responsibility/10-steps-summary For copyright reasons, we cannot include the infographics in the presentation. Please follow the links to see examples.

Security measures user guide – questions What are biometric measures? Why might they be used (particularly for mobile devices)? How will biometric measures prevent cyber security threats? Further reading: iritech.com/blog/mobile-biometric/

Security measures user guide – questions What are password systems? Why might they be used? Give an example of when they are used. How will password systems prevent cyber security threats? Reading on how to create strong passwords: safeandsavvy.f-secure.com/2010/03/15/how-to-create-and-remember-strong-passwords/

Security measures user guide – questions What is CAPTCHA (or similar)? Give an example of when it is used. Why is it used? How does CAPTCHA prevent or detect cyber security threats?

Security measures user guide – questions What is an email confirmation that confirms a user’s identity? Why is it used? Give an example of when it is used. How does the email confirmation prevent or detect cyber security threats?

Security measures user guide – questions What are automatic software updates? Why are they used? Give an example of when they are used. How do automatic software updates prevent or detect cyber security threats?

TIME UP Plenary – Draw quickly In pairs: Person A draws an image that represents one security measure. Person B guesses which security measure they are drawing. TIME UP Click on ‘Start’ to begin the one-minute timer. Start