Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment

Slides:



Advertisements
Similar presentations
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
Advertisements

Security & Encryption Thomas Fenske & Joseph Minter.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
Cryptography and Authentication Lab ECE4112 Group4 Joel Davis Scott Allen Quinn.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
NETWORKS Lauren Hickman Patrick McCamy Morgan Pace Noah Ryder.
Lab 3 Cookie Stealing using XSS Kara James, Chelsea Collins, Trevor Norwood, David Johnson.
E-COMMERCE SECURITY THREATS And what you can do about it.
Threats to I.T Internet security By Cameron Mundy.
1-Vulnerabilities 2-Hackers 3-Categories of attacks 4-What a malicious hacker do? 5-Security mechanisms 6-HTTP Web Servers 7-Web applications attacks.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cryptography, Authentication and Digital Signatures
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Types of Electronic Infection
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Computer Security By Duncan Hall.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Week 7 - Wednesday.  Web security – user side.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Computer Security Sample security policy Dr Alexei Vernitski.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Information Systems Design and Development Security Precautions Computing Science.
By Collin Donaldson Man in the Middle Attack: Password Sniffing and Cracking.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Tonga Institute of Higher Education IT 141: Information Systems
3.6 Fundamentals of cyber security
Security Using Armstrong Numbers and Authentication using Colors
Security Outline Encryption Algorithms Authentication Protocols
Remember that our latest topics involve a more advanced look at how webpages work
Secure Sockets Layer (SSL)
A Wireless LAN Security Protocol
Network Security.
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
Computer Security Fundamentals
Encryption
Big Picture How many ways can a system be attacked? What can we do about it?
Teaching Computing to GCSE
Welcome To : Group 1 VC Presentation
Using SSL – Secure Socket Layer
Security.
Topic 5: Communication and the Internet
PHP: Security issues FdSc Module 109 Server side scripting and
Tonga Institute of Higher Education IT 141: Information Systems
Security through Encryption
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Network Security: DNS Spoofing, SQL Injection, ARP Poisoning
Tonga Institute of Higher Education IT 141: Information Systems
Security.
AbbottLink™ - IP Address Overview
The Internet: Encryption & Public Keys
Unit 8 Network Security.
Test 3 review FTP & Cybersecurity
Module 4 System and Application Security
Fast-Track UiPath Developer Module 10: Sensitive Data Handling
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment 2 hrs/week Sept – March Presentations, poster, practical, reports Every class minute counts!

Unit 32 folder structure Assignment 1 Assignment 2 Task 1 Task 2

Recent network threats XSS - cross site scripting - hacker attempting to upload malicious code to a database or web server that when a user accesses the website, they then get infected by the code that the hacker had uploaded DNS poisoning - a hacker changes or adds a fake record into either a local machine or network computer’s host’s file. when a user tries to access a website by typing a domain name, the computer will look at the host file and redirect the user to what IP is actually recorded there, instead of going to the real website  Google hacking -  using googles indexed database and it’s search engine to locate files or access to webpage that are not usually able to be accessed SQL injection - access a websites database by running SQL commands through something that has a database input Smart fridge hack - hackers using default passwords and misconfiguration of household computers/devices and sending lots of spam emails from them Misc companies – sony playstation servers……………….

minimise security breaches policies and procedures – govern what can/can’t be done i.e. data, ual, leaving, backup etc user responsibility – down to individual to follow the guidelines Training – regular cpd physical security – cctv, guards etc risk assessment and penetration – discussion of how system can be hacked; create new policies to resolve this

cryptography techniques private key cryptography - a key that has been generated, that only the owner knows, is used with an encryption method to change the plain text into other characters that the computer has so that anyone who is trying to read the message, that do not have the private encryption key, cannot read this message public key cryptography - This public key cryptography is used whenever sending a public file you don’t need to send your private key to anyone that wants to download and read that file (which would be very unsecure) instead, you can use the public key which is available to anyone being able to use to decrypt the data or to send you a message that will be decrypted correctly DES - Data Encryption Standard. It is a US government standard encryption algorithm. DES works in blocks, rather than a stream cipher (bit by bit). It takes any plain text streams and turns them into a cipher of text that is the same length as the original text Digital signature -  turning text into a “fixed length hash value” by using varying length string. it involves a hashed value that has been encrypted with the sending computer’s private key IPSec - Internet Protocol Security. It is used for securing IP connections and the data sent to and from networks. It does this by encrypting each data packet and enforcing an authentication method to try and stop forged and faked packets from being accepted.

Main task Create an A4 poster where you explain the recent network threats Create an A4 poster where you explain how to minimise security breaches Create an A4 poster where you compare different cryptographies Submit – 22/9