Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Implications and Security Issues of the Internet By Neelesh Patel.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
Threats to I.T Internet security By Cameron Mundy.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
Reliability & Desirability of Data
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
CPT 123 Internet Skills Class Notes Internet Security Session A.
How to combat a range of ICT crimes Fighting Crime.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
ICT Homework- ICT Security Consultant PowerPoint.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Joseph Owen.  Aims:  To look at types of hackers  To look at different types of attacks  How to protect your network  Objectives  You will know.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
science/internet-intro
Networks. Learning Objectives: By the end of this lesson you should be able to:
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Woodland Hills School District Computer Network Acceptable Use Policy.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
Computer Security Sample security policy Dr Alexei Vernitski.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Misuses of ICT Malpractice and crime © Folens 2008.
Encryption and Hacking
Encryption and Hacking
Network and Data Security
G061 - Network Security.
IP Addresses & Ports IP Addresses – identify a device on a network
Presentation transcript:

Encryption and Hacking By Steph Garrihy

What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing the data cannot understand it. For example banks must keep their customer information private and military or government organisations do not want their secret data read. Encryption changes information from e.g. plain text that anyone can understand into encrypted information that cannot be understood. This process is carried out by encryption software with the aid of an encryption key. An encryption key is usually the same key used to encrypt the data and it is required for the reverse process, decryption which is when data is unscrambled by software using the preset key so that anyone viewing the data can now understand it.

What is Hacking? A hacker is anyone who or attempts to access a computer system by gaining access to security details. This is not necessarily illegal as if a password is forgotten, a hacker may be employed to discover or reset the password. However most people think of a hacker as someone who illegally tries to access data that they have no right to access. In the news there was a story on 13 th January 2013 about anonymous hacks MIT after Aaron Swartz’s suicide. Hacktivist group defaces university pages after the school promises a full investigation into MIT's role in events leading up to the Internet activist taking his life.

What is Key Logging? Key logging software records the keys that are used when a person types at a keyboard. The software then either immediately sends the information to another person or records it for another time. The other person who is receiving this message could use it to discover passwords! This software goes unnoticed by the user and can reveal anything that is typed on a keyboard.

What is Bank security measures? Banks have implemented modern security measures, like motion- sensing and high resolution colour security cameras, time- locked heavy vault doors, silent alarms, exploding dye packs, bait money and locator devices. Some banks supplement this protection with armed or unarmed security guards. Unauthorised users can try to access networks from outside the internet if they can’t reach a computer. When a network is connected with the internet it becomes vulnerable to outsiders who are trying to use the network by connecting it to the internet. Because more and more networks are setting up in homes and in businesses it’s important for people to try and prevent unauthorised access to a network from the internet. It is always best to use user IDs and passwords.

What is a Firewall? A firewall can be programmed by its own owner to allow only authorised computers and users to access the internet and to stop unauthorised access from outside the network. Most routers and cable “modems” include a programmable firewall and these should be configured very carefully. Careful use of firewalls and data encryption can prevent your data from being viewed or stolen and prevents others from using your internet connection with others. Anyone who is responsible for a private network that is connected to a public network needs firewall protection, so if you don’t have a network that is not private and is not connected to a public network then you may not need one.