COMPUTER PRIVACY.

Slides:



Advertisements
Similar presentations
Information Security Is for Everyone By Jill Burrington-Brown, MS, RHIA.
Advertisements

Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
Privacy By Mohammed Al-Ghamdi. Outline Introduction Privacy How to Provide Privacy Ethics Summary.
Data Exchange Packet switching  Packet switching breaks data in to packets before sending it through a network, then reassembles it at the other end –
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
E – Mail History of s What is an ? What happens when we sent an ? messages Folders Address Attachments Types of.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Security Keys, Signatures, Encryption. Slides by Jyrki Nummenmaa ‘
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Session 7 LBSC 690 Information Technology Security.
Protecting Students on the School Computer Network Enfield High School.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
NDSU Lunchbytes "Are They Really Who They Say They Are?" Digital or Electronic Signature Information Rick Johnson, Theresa Semmens, Lorna Olsen April 24,
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Encryption. What is Encryption? Encryption is the process of converting plain text into cipher text, with the goal of making the text unreadable.
Network Security – Special Topic on Skype Security.
Electronic Commerce School of Library and Information Science PGP and cryptography I. What is encryption? Cryptographic systems II. What is PGP? How does.
Internet Infrastructure Mapping the World Wide Web.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
7.6 Secure Network Security / G.Steffen1. In This Section Threats to Protection List Overview of Encrypted Processing Example.
Privacy and Security Topics From Greenlaw/Hepp, In-line/On-line: Fundamentals of the Internet and the World Wide Web 1 Introduction Known Information Software.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Electronic Commerce Semester 1 Term 1 Lecture 14.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
Comparison of Network Attacks COSC 356 Kyler Rhoades.
Internet Safety.  Ethics-moral standards or values  Netiquette-rules for proper online behavior.
Cryptography By: Nick Belhumeur. Overview What is Cryptography? What is Cryptography? 2 types of cryptosystems 2 types of cryptosystems Example of Encryption.
Secure HTTP (HTTPS) Pat Morin COMP 2405.
8 – Protecting Data and Security
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Chapter 5a - Pretty Good Privacy (PGP)
Digital Signatures.
Virtual Private Network
Unit 3 Section 6.4: Internet Security
USAGE OF CRYPTOGRAPHY IN NETWORK SECURITY
Computer Communication & Networks
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
ITIS 1210 Introduction to Web-Based Information Systems
A Wireless LAN Security Protocol
Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2
12. Encryption on the Internet
Topic 1: Data, information, knowledge and processing
Lesson 4-5 AP Computer Science Principles
Who was Alan Turing? Alan Turing played a role in deciphering the messages encrypted by the German Enigma machine. He took the lead in a team that designed.
Internet Protocol Mr. Paulk.
Societal Issues in Computing (COMP466)
ONE® Pages Training Presentation
Digital Signatures and Forms
Pooja programmer,cse department
Introduction to From the Saint Paul Public Library.
An Installation Guide of PGP on Windows 2000
Creating Your New Account From a Computer
An Introduction to Cloud Computing
Encryption and Hacking
Firewalls and Security
s.
Unit 1 Fundamentals of IT
Computer Networks Lesson 5.
Electronic Payment Security Technologies
Communicating in the IT Industry
Secure Diffie-Hellman Algorithm
Digital Signatures Network Security.
Presentation transcript:

COMPUTER PRIVACY

COMPUTER PRIVACY Everyone takes privacy in normal life for granted, computer also have privacy. When dealing with computers, security and privacy are almost synonyms. Protect computer from been hack.

THE WAYS OF COMPUTER PRIVACY Password Encryption Email Privacy

THE WAYS OF COMPUTER PRIVACY PASSWORD Not just to protect the computer but to make sure that the computer issues by authorized worker or user only.

THE WAYS OF COMPUTER PRIVACY ENCRYPTION With public key encryption there are two keys, one public and the other private. The public key needs to be known. To send a message to a friend, you uses his public key to encrypt the message. Your friend then uses his private key to decode the message after receiving it.

THE WAYS OF COMPUTER PRIVACY EMAIL PRIVACY When u send a message by email, the message is broken into packets and the packets are sent out over the Internet. The number of packets depends on the size of message. Each message has the internet address of the recipient. This means there may be some places between the packets could be intercepted and examined.

What is electronic authentication? TASK Form group of five. Discuss the topic that was given in 15 minutes. Choose a group leader and presenter to present at the end of the discussion.