User access levels, Passwords, Encryption, Cipher, Key

Slides:



Advertisements
Similar presentations
1 Identification Who are you? How do I know you are who you say you are?
Advertisements

Computer Science 101 Data Encryption And Computer Networks.
Cryptology Terminology and Early History. Cryptology Terms Cryptology –The science of concealing the meaning of messages and the discovery of the meaning.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer Forensics By: Stephanie DeRoche Benjamin K. Ertley.
Cryptography & Encryption Secret Codes & The Advance of Technology.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Computer Security coursework 2 Dr Alexei Vernitski.
Computer encryption is… Based on the science of cryptography.
Encryption Objective 1: Explain data encryption procedures.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Security and Secret Messages. Agenda Information Assurance Program Value of Information Secret Messages –Steganography –Caesar Cypher –Keyword.
Password Security Review Your password is the last line of defense. Keep your data safe with good password practices. Mikio Olin Kevin Matteson.
Welcome Topic : Security.
L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Vigenére Cipher Kimberly Chiffens & Maria Jannelli.
Encryption Name : Maryam Mohammed Alshami ID:H
Introduction to Cryptography Lecture 4. Caesar Cipher Gaius Julius Caesar (100 B.C.- 44 B.C.) General Politician Dictator of Rome Creator of Caesar Cipher.
How the internet works Cryptography. LO: Define the terms encryption and decryption Construct a secure message using encryption LO: Define the terms encryption.
Unit 32 – Networked Systems Security
@Yuan Xue CS 285 Network Security Cryptography Overview and Classical Encryption Algorithms Fall 2012 Yuan Xue.
Encryption with Keys and Passwords
Digital Divide, Privacy, and Cyber Security
Key words: Secure | Password | Character
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Chapter One: Mastering the Basics of Security
Encryption.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Systems Security Keywords Protecting Systems
3.6 Fundamentals of cyber security
Topologies, Protocols and Layers
Whatcha doin'? Aims: To understand the Caesar Cipher.
Cryptography CS Principles January 19, 2017.
Basic Encryption Methods
Chapter-2 Classical Encryption Techniques.
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Introduction to security goals and usage of cryptographic algorithms
Networks Encryption.
Lesson 4-5 AP Computer Science Principles
Topic 3: Data Encryption.
Intro to Computer Science CS1510
Setting up an online account
Unit 1.6 Systems security Lesson 4
Passwords.
Encryption and Decryption
Cryptography “The Secret Code Language”
Intro to Computer Science CS1510
Unit 4: Lesson 6: Encryption With Keys and Passwords
Cryptography and Network Security
Simple Encryption- Lesson 5
Cryptography Cryptography is derived from the Green word ‘kryptos’
Enigma, Cyphers and Encryption
Fun with Cryptography The Science of Secrecy.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Network and Data Security
Homework #1 Chap. 1, 3, 4 J. H. Wang Oct. 2, 2018.
Authentication Chapter 2.
GCSE COMPUTER SCIENCE Topic 3 - Data 3.10 Encryption.
Hill Cipher The Hill Cipher uses matrix multiplication to encrypt a message. First, you need to assign two numbers to each letter in the alphabet and also.
Double Transpositions
Operating Systems Concepts
G061 - Network Security.
Symmetric Encryption or conventional / private-key / single-key
Chapter Goals Define cryptography
Variables, Constants, Assign.
NET 311D Information Security
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

User access levels, Passwords, Encryption, Cipher, Key Keywords User access levels, Passwords, Encryption, Cipher, Key Systems Security Protecting Systems

Passwords 1. What are the benefits of encryption? Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1. What are the benefits of encryption? 2. Why should passwords be kept secure? Starter activity

Security 1.What is encryption? Read this article: Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1.What is encryption? Where data is translated into code so that only authorised users, or users with the key can decrypt it. Users must need the key in order to decrypt the coded file. Read this article: Starter activity 2. What effect would WhatsApp's encryption policy have on British police and other security investigations?

Security A B Z O V M Q D E C R Y P T 1.What is Caesar cypher? Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1.What is Caesar cypher? Cipher invented by Julius Caesar. Designed to keep his messages secret. Works by encrypting messages through movement of each letter a certain number of places to the left in the alphabet. Key tells us how many places to the left the letters have been moved. Let’s say we received the message ABZOVMQBA with and the key was 3. Follow up with the worksheet to create own messages with different levels of key shift. A B Z O V M Q D E C R Y P T

Security B R X O I O R D W W R Shift Key = 3 Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. B R X O Shift Key = 3 What does this message say when decrypted? I O R D W Follow up with the worksheet to create own messages with different levels of key shift. W R

Security B R X O Y U L I O R D W F L A T W R T O Shift Key = 3 Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. B R X O Y U L Shift Key = 3 I O R D W F L A T Follow up with the worksheet to create own messages with different levels of key shift. W R T O

Security 1. What are user access levels? 2. What are passwords? Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1. What are user access levels? Also known as system access rights. Comes under system access control. Allows a system administrator to set up a hierarchy of users. Lower level users would have access to limited information and settings and higher level users can access the most sensitive data on the system. 2. What are passwords? Starter activity Typically a string of characters used to gain access to a service or system. Can you think of any alternatives to character password entry?

Security 1.What is biometric security? Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1.What is biometric security? Examples include: Retina scan, Fingerprint, Voice and Facial recognition. Can you think of benefits of using biometrics? 2. What are the features of a strong password? 12 characters or more The greater the characters, the stronger the password - Mixture of capitals, lower case letters, numbers and symbols Starter activity