Presentation is loading. Please wait.

Presentation is loading. Please wait.

User access levels, Passwords, Encryption, Cipher, Key

Similar presentations


Presentation on theme: "User access levels, Passwords, Encryption, Cipher, Key"— Presentation transcript:

1 User access levels, Passwords, Encryption, Cipher, Key
Keywords User access levels, Passwords, Encryption, Cipher, Key Systems Security Protecting Systems

2 Passwords 1. What are the benefits of encryption?
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1. What are the benefits of encryption? 2. Why should passwords be kept secure? Starter activity

3 Security 1.What is encryption? Read this article:
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1.What is encryption? Where data is translated into code so that only authorised users, or users with the key can decrypt it. Users must need the key in order to decrypt the coded file. Read this article: Starter activity 2. What effect would WhatsApp's encryption policy have on British police and other security investigations?

4 Security A B Z O V M Q D E C R Y P T 1.What is Caesar cypher?
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1.What is Caesar cypher? Cipher invented by Julius Caesar. Designed to keep his messages secret. Works by encrypting messages through movement of each letter a certain number of places to the left in the alphabet. Key tells us how many places to the left the letters have been moved. Let’s say we received the message ABZOVMQBA with and the key was 3. Follow up with the worksheet to create own messages with different levels of key shift. A B Z O V M Q D E C R Y P T

5 Security B R X O I O R D W W R Shift Key = 3
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. B R X O Shift Key = 3 What does this message say when decrypted? I O R D W Follow up with the worksheet to create own messages with different levels of key shift. W R

6 Security B R X O Y U L I O R D W F L A T W R T O Shift Key = 3
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. B R X O Y U L Shift Key = 3 I O R D W F L A T Follow up with the worksheet to create own messages with different levels of key shift. W R T O

7 Security 1. What are user access levels? 2. What are passwords?
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1. What are user access levels? Also known as system access rights. Comes under system access control. Allows a system administrator to set up a hierarchy of users. Lower level users would have access to limited information and settings and higher level users can access the most sensitive data on the system. 2. What are passwords? Starter activity Typically a string of characters used to gain access to a service or system. Can you think of any alternatives to character password entry?

8 Security 1.What is biometric security?
Objectives BEGINNER: Understand how user access levels effect a system. ADVANCED: Explain how encryption works and how it can have a negative effect on law enforcement and investigations. EXPERT: Demonstrate a knowledge of a cypher and its’ key. 1.What is biometric security? Examples include: Retina scan, Fingerprint, Voice and Facial recognition. Can you think of benefits of using biometrics? 2. What are the features of a strong password? 12 characters or more The greater the characters, the stronger the password - Mixture of capitals, lower case letters, numbers and symbols Starter activity


Download ppt "User access levels, Passwords, Encryption, Cipher, Key"

Similar presentations


Ads by Google