Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

GCSE ICT Networks & Security..
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
CEL: Computers in Banking and Retail
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Opening a bank account.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
3.3 Internet Services. Overview Demonstrate knowledge and understanding of the following internet services and describe the advantages and disadvantages.
Website on Computer Security By: Brittany Freeman.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Information Systems Security
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Data Security.
Online Parking System.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Revision Q1: Explain the term HACKING?
Section 6 Theory Issues with information found on the Internet.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
NETWORKS (2) Mr Conti Lesson 2. Learning Objectives  By the end of this presentation we will have learned:  what a network is  the advantages and disadvantages.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Policies and Security for Internet Access
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Security of, privacy of and access to personal/confidential information/data.
Computer Security Set of slides 8 Dr Alexei Vernitski.
SLC – You tell me Web design – Using software design a website.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Information Systems Design and Development Security Precautions Computing Science.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Living in the Digital WorldChapter 2 How do we connect? This presentation will cover the following topic: How can we connect? Name:
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
8 – Protecting Data and Security
3.6 Fundamentals of cyber security
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Handling Personal Data
Year 10 ICT ECDL/ICDL IT Security.
Title: File Management Learning Intentions
Communicating in the IT Industry
G061 - Network Security.
Presentation transcript:

Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical Security

Lesson Objectives By the end of the lesson you will be able to: Describe what is meant by the terms user ID and password and explain why these are used Discuss the problems of data security, including problems surrounding common network environments Identify the need for encryption and authentication techniques

Does it matter… Large amounts of data and information are transferred easily from one computer to another. Along with being a good thing, this also causes concern over the security of information. What sort of information would you not want getting into the wrong hands?

Get your books out! Put today’s date and the title Network Security in the front of your books, underline them neatly with a ruler! Write down 3 methods of how data can be kept secure. Write down 2 pieces of information about yourself that you wouldn’t want anyone to have unauthorised access to.

Authentication Techniques These are used to check that a person accessing a network or system is genuinely the person in question. There are three main techniques used, any ideas what they are…  Usernames and passwords  Digital signatures  Biometrics

Using pages 40 and 41… 1.What is a username and why must it be unique? 2.What is a password? 3.Write down 4 characteristics of a good password. 4.Write down 3 things to consider when using passwords. 5.How does biometrics work? 6.Write down 2 advantages of biometrics. 7.Write down 2 disadvantages of biometrics. 8.What is a digital signature? 9.Why are digital signatures used?

Encryption This is used to stop data getting into the wrong hands as it travels over the Internet. It is also used when saving personal data on laptops or removable storage devices. Encryption works by scrambling data as it’s transferred from one place to another. If any of this data gets lost or stolen, it cannot be read. Only the authorised person being sent the information will have the decryption key that allows them to unscramble the information. Why bother? Protection against hackers – a hacker could simply intercept and read your . They could also alter data or collect personal details including credit card numbers which could be used to commit fraud.

When to use it… When Encryption should be used Copy and complete the diagram below using page 41 of the textbook to help you…

News… Using an appropriate news website of your choice, find 2 news articles relating to hacking and encryption. In your books, write a summary of the main points for each story. Discuss where the security of data was at risk and the outcome of each story.

Last Thing… Homework! Complete the worksheet Methods of Communication. No Homework = Detention!