1 / 0

ITGS Security

ITGS Security. Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray. Computer Security. The process of protecting hardware, software and data from unauthorized access. Allows authorized users to do their work. Discuss.

kapono
Télécharger la présentation

ITGS Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ITGS Security

    Based on the textbook “Information Technology in a Global Society for the IB Diploma” by Stuart Gray
  2. Computer Security The process of protecting hardware, software and data from unauthorized access. Allows authorized users to do their work.
  3. Discuss What are some types of computer security risks you have encountered or heard about?
  4. Authentication Requires users to price their identity so a system knows they are authorized users. Passwords PINs Security Tokens Review page 91 – How does password authentication work?
  5. Biometrics The process of using part of a person’s body to identify them. Fingerprints Iris patterns Face shape Voice patterns These have a clear advantage over passwords because body parts cannot be lost, stolen or forgotten.
  6. Biometrics Continued False negative – If a system fails to recognize a user. False positive – when an unauthorized user is mistakenly allowed access because the system mistakes them as the user.
  7. Activity #1 Review Page 93 in the ITGS textbook and look at exercise 5-2 and the pictures: What are 5 measurements that a biometric system might take from the parts of the body shown. What problems might arise with this system in the short term? Long term? How unique is each measurement likely to be? What might be appropriate places to use this system.
  8. Hacking Also called cracking Gaining unauthorized access to computer systems. Can you name some recent hacking events?
  9. Security Updates Software vendors release patches for their system which offer updates or fixes for performance or security problems.
  10. Malicious Software Viruses – programs designed to replicate themselves and cause damage to computer systems. Worms – similar to viruses but spread without any user interaction. Trojan horses – trick the user into downloading and running them. Spyware – monitor’s the user’s activities without their knowledge. Rootkits – infect a computer systems as the administrator user. Very difficult to detect and remove. Check out the infamous computer viruses on Page 97 of the textbook.
  11. Computer Security and the Law Computer Misuse Act (1990) – a UK law governing unauthorized access to computer systems. Gaining unauthorized access to a computer system Same as above in order to commit further crime Unauthorized modifications of data stored on a computer Additions to the act in 2006 to include Denial of Service attacks.
  12. Spam (not the ham) Refers to the unwanted messages that are sent to many users at once. Spam bots Spam filters(image spam) Web bugs Review Spotting Spam on Page 102 in the textbook.
  13. Phishing Emails that attempt to impersonate a genuine organization in order to fool the user to provide sensitive personal data (i.e. accounts, passwords, usernames). Smishing Vishing Pharming (DNS Poisoning) Leads to identity theft
  14. Identity Theft Stealing someone’s personal data in order to impersonate them. In the US in 2009 – 10 million people were victims of identity theft.
  15. Encryption Protects data from unauthorized access when it is sent over a network. Uses encryption keys Secret keys History of encryption dates back to 140 BC in Ancient Greece. Digital Certificate – can be used to authenticate the sender of a message. Review page 109 of the textbook.
  16. Security Wireless security Service Set Identifier (SSID) Physical security Kensington locks
More Related