Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.

Similar presentations


Presentation on theme: "Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does."— Presentation transcript:

1 Digital Security Jesline James! 9cc

2 Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does it help? How does it help?  Some dangers and malicious softwares Some dangers and malicious softwares  Softwares/ Devices that provide protection Softwares/ Devices that provide protection  Some Digitally Secure Devices Some Digitally Secure Devices  Advantages and Disadvantages of some authentication tools. Advantages and Disadvantages of some authentication tools.  Continuation Continuation  VideoVideo

3 The CREATOR!!! =]  My name is Jesline James. I’m in year 9 and I’m 14. (I like SpongeBob, hence, the picture below).  I made a presentation on Digital security because I wanted people to know what it is and how it can help us. Nowadays more people, kids especially, are impacted badly by the internet.  Well, to make this presentation I had to collect all answers to all questions on Digital Security. Obviously, I had to research all the information relevant to the topic I have chosen and create a logo. Then, I picked out a video to make this presentation less boring. Back

4 What is Digital Security (self- protection)?  Digital Security gives people the liberty to bravely take part in daily communications through all devices without any worries(electronic precautions to guarantee safety. )  It is the protection of your digital identity. Back

5 How does it help?  Internet users are very familiar with companies like Symantec (Norton Anti-Virus) and McAfee that provide them with protection from viruses, as well as to provide secure firewalls and protection against spyware. It prevents digital dangers. Back

6 Some Dangers and malicious softwares.  High risk of intrusion  Fraud  Phishing – Stealing secret information by pretending to be a reputable and trustworthy company.  Viruses  Viruses can replicate their structures infecting other files or structures on a computer. Viruses are used to steal data.  Trojan horse  A Trojan horse is a general term for malicious software that pretends to be harmless so that a user willingly downloads it.  Spyware  Spyware refers to programs that secretly monitors activity on a computer system and reports that information to others without the user’s permission. Back

7 Softwares/ Devices that provide protection. Anti virus softwares like:  Symantec (Norton Anti-Virus)  McAfee  SecureDongle X  Web Services  ElecKey 2.0 provides software security that can protect your software applications against piracy, tampering etc.  USB  SIM Card Back

8 Some Digitally Secure Devices  Perhaps the most famous digitally secure device is the SIM (Subscriber Identity Module) card, a device that is put in mobile phones.  Another example is Microsoft.NET card framework. It has many coded solutions to avoid common programming problems etc. Back

9 Advantages and Disadvantages of some authentication tools. Pros of User ID and PasswordCons of User ID and Password Least expensive authentication method to use. Weak and prone to numerous attacks. No need to carry any extra hardware device. Security depends on the users' ability to maintain the user ID and password secret. No need to install extra software.Not fully reliable when used for making financial transactions. User IDs and passwords can be changed at the user's choice, and most users know how to use them. Cost of support increases with user ID and password complexity. Back

10 Continuation….. Pros on Digital Certificates on Smart cards and USB tokens Cons on Digitals Certificates on Smart cards and USB tokens Safer to use than the normal user ID or password. Have to carry an additional smart card reading device or USB so that they can log in. A third-party confirming authority issues the digital certificates, helping to increase user trust. Involves additional cost, such as the certifying authority's subscription cost for issuing the digital certificates. Difficult for non-authorized users to remove the private key when stored on a smart card. Requires user training for certificate generation and use. Back

11 Video  http://www.youtube.com/watch?v=2ajy0 s9eO-w Back

12 The End!!!! Thank you for watching!


Download ppt "Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does."

Similar presentations


Ads by Google