Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment

Similar presentations


Presentation on theme: "Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment"— Presentation transcript:

1

2 Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
2 hrs/week Sept – March Presentations, poster, practical, reports Every class minute counts!

3 Unit 32 folder structure Assignment 1 Assignment 2 Task 1 Task 2

4 Recent network threats
XSS - cross site scripting - hacker attempting to upload malicious code to a database or web server that when a user accesses the website, they then get infected by the code that the hacker had uploaded DNS poisoning - a hacker changes or adds a fake record into either a local machine or network computer’s host’s file. when a user tries to access a website by typing a domain name, the computer will look at the host file and redirect the user to what IP is actually recorded there, instead of going to the real website  Google hacking -  using googles indexed database and it’s search engine to locate files or access to webpage that are not usually able to be accessed SQL injection - access a websites database by running SQL commands through something that has a database input Smart fridge hack - hackers using default passwords and misconfiguration of household computers/devices and sending lots of spam s from them Misc companies – sony playstation servers……………….

5 minimise security breaches
policies and procedures – govern what can/can’t be done i.e. data, ual, leaving, backup etc user responsibility – down to individual to follow the guidelines Training – regular cpd physical security – cctv, guards etc risk assessment and penetration – discussion of how system can be hacked; create new policies to resolve this

6 cryptography techniques
private key cryptography - a key that has been generated, that only the owner knows, is used with an encryption method to change the plain text into other characters that the computer has so that anyone who is trying to read the message, that do not have the private encryption key, cannot read this message public key cryptography - This public key cryptography is used whenever sending a public file you don’t need to send your private key to anyone that wants to download and read that file (which would be very unsecure) instead, you can use the public key which is available to anyone being able to use to decrypt the data or to send you a message that will be decrypted correctly DES - Data Encryption Standard. It is a US government standard encryption algorithm. DES works in blocks, rather than a stream cipher (bit by bit). It takes any plain text streams and turns them into a cipher of text that is the same length as the original text Digital signature -  turning text into a “fixed length hash value” by using varying length string. it involves a hashed value that has been encrypted with the sending computer’s private key IPSec - Internet Protocol Security. It is used for securing IP connections and the data sent to and from networks. It does this by encrypting each data packet and enforcing an authentication method to try and stop forged and faked packets from being accepted.

7 Main task Create an A4 poster where you explain the recent network threats Create an A4 poster where you explain how to minimise security breaches Create an A4 poster where you compare different cryptographies Submit – 22/9


Download ppt "Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment"

Similar presentations


Ads by Google