The Internet: Encryption & Public Keys

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Feb 25, 2003Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Mar 5, 2002Mårten Trolin1 Previous lecture More on hash functions Digital signatures Message Authentication Codes Padding.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
The internet and the WWW
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crimes.
The Internet. What is the Internet?  The Internet is a network of networks.  It gives users access to a wide variety of information from millions of.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Types of Electronic Infection
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
Public Key Encryption.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
Activity 4 Protecting Ourselves. Keeping Safe There are lots of different ways we can be at risk on the Internet. How can we protect ourselves and keep.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
science/internet-intro
Computers Are Your Future Eleventh Edition Chapter 6: The Internet and the World Wide Web Copyright © 2011 Pearson Education, Inc. Publishing as Prentice.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Computer Technology Internet, ethics, and . EthicsInternetMisc.Internet
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
BASIC CONCEPTS ON INTERNET &
Marking the Most of the Web’s Resources
Symmetric and Asymmetric Encryption
IT Security  .
Lesson 7: Public Key Cryptography Lesson 8: Rapid Research - Cybercrime Day 37.
Search Engines and Internet Resources
Software Applications for end-users
e-Health Platform End 2 End encryption
HISTORY OF COMPUTERS AND TECHNOLOGY
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Protect Your Computer Against Harmful Attacks!
Rapid Research - Cybercrime
Scams, Identity Theft, and Viruses Kelly & Caitlin
Risk of the Internet At Home
12 E-Commerce Overview.
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Modelling the internet
What is a Search Engine EIT, Author Gay Robertson, 2017.
Modelling the internet
Module 7 Questions Prepared by Mr O Seguna next.
Introduction to Networks
Cryptography and Network Security
Bethesda Cybersecurity Club
Rapid Research - Cybercrime
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Test 3 review FTP & Cybersecurity
The Internet and Electronic mail
What devices use the internet?
Wireless Spoofing Attacks on Mobile Devices
Secure Diffie-Hellman Algorithm
Lesson 2: Gathering and Organizing Information Using ICT KEY QUESTION: HOW DO YOU GATHER AND ORGANIZE INFORMATION USING THE COMPUTER AND INTERNET?
Presentation transcript:

The Internet: Encryption & Public Keys http://bit.ly/2RFlrt9 The Internet is an ____________ and ____________ system. Users exchange ______________ _______. A method to keep the data save is ______________. Encryption is _______________ or __________________ the message to _____ the original text. Decryption _________________ the message to make it readable. ________ ________ is the first known to have used encryption. He used it for ___________ purposes. A cipher is an _______________ that shifts a certain number of ______ down the alphabet. The _______ is the number of shifts in the algorithm shift. In the modern world, we use ______ bit keys to encrypt. Symmetric encryption: The sender and receiver ______ a private key. Asymmetric encryption uses a ________ key and a ________ key. Public key cryptography is the ____________ of all _______ messages on the open Internet including the security protocols ________ and ________. When you see ______ on your brower’s address bar, you know public key encryption is being used. The Internet: Cryptography, Cybersecurity, Data Search Basics Directions: Insert these pages into your abstractionJournal Watch/listen to the video linked at the top of each page Record your notes from the content presented This Photo by Unknown Author is licensed under CC BY-SA

The Internet: Cybersecurity & Crime http://bit.ly/2SL1s9R Cybercrime causes problems _____________, ____________, and in national _______________. Cybercriminals exploit ______________________ in _____________ and _____________ taking advantage of unintentional _______________ of software users. Viruses: An ______________ program that once installed _____________________________________________. Viruses can be disguised as ____________. A backdoor is a ____________ that can be used by hackers to gain entry to a system. A __________ is known as a digital army. DDoS: A distributed _____________ of ______________ attack is when a website is _____________________ with too many _______________. It is distributed when the site is ___________________________________ at once. Phishing: When _________ emails are sent to ________ people to respond with private _______________. 90% of the time a system is hacked it is because of a __________ mistake made by a ___________. Cybersecurity101 http://bit.ly/2Qy3EiT The point of the Internet originally was for super computers to _________ to _______ _____________. Networks came when computers could _________ information __________ and __________ to each other. Viruses are a form of malware. Malware is ______________ ______________ (look up – not defined on video). What are three forms of malware common today: ___________, ___________, ___________ List 3 ways to protect your online accounts and data: _________________________________________ Learn more and play game at http://www.pbs.org/wgbh/nova/labs/lab/cyber/

The Internet: How Search Works How Google Search Works http://bit.ly/2VD8rDn Search engines are asked to answer ____________ questions and terribly ______________ questions. The search engine is _______ going to the WWW to search the request in real time. The Internet is a __________ of pages connected to each other by ___________. Search engines are ____________ running a ___________ called a “____________” that _________ through pages _________ information about them and ______________ the hyperlinks. Information found by the “______________” is added to the _________ __________ which is a special database. A ______________ algorithm is used to help determine which pages might be the most useful. The ________ __________ algorithm is named for _________________ and is used to rank pages according to the quality of information based on numbers of links to that page. Search programs are always _______________ to improve their _____________ so they will return better _______. Search engines use _________ ___________ which is a type of artificial intelligence. How Google Search Works http://bit.ly/2skbSBs #1 When you do a Google Search you are not actually searching the web…..you are searching _____________ ________ of the web. Matt uses the word “fetch” to refer to what action by the spiders? The Page Rank Algorithm looks at what two things? Each page has an overall _________ to help give search results to users of Google. Google NEVER takes $$ to _______________, ____________, or ____________. Each search result includes what information? ________________________________________ And related searches And sometimes ads to the right and top of the page