Unit 1.6 Systems security Lesson 4

Slides:



Advertisements
Similar presentations
Women in Literature An introductory lesson. Equality When we ask the question, Are women equal to men? in what ways are we using the word "equal"? Discuss.
Advertisements

A Level Physics A Delivery Guide Modelling decay of charge Key Concepts.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
© OCR 2016 Motion graphs. © OCR 2016 MOTION GRAPHS LESSON ELEMENT.
© OCR 2016 H070 Topic Title H470 Topic Title Urban Futures Learner Resource 4 – Push and Pull Factors.
© OCR 2016 H070 Topic Title H470 Topic Title Rotations.
The purpose of one Christian Aid Agency
Marriage and the wedding ceremony
Learner Activity 2: Boltzmann Distribution Curves Part of the ‘Rates of reaction and the Arrhenius equation’ Topic Exploration Pack.
The Boltzmann Distribution
A Level Business Investment Appraisal Lesson Elements.
Vectors H070 Topic Title H470 Topic Title.
Burglary picture game.
China and its rulers activities
H070 Topic Title H470 Topic Title Delivery Guide (Learner Resource)
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Balancing Equations Lesson Element.
Unit 2.5 Translators and Facilities of Languages – Lesson 1
Delivery Guide Distinctive Landscapes © OCR 2017
Liberals & Conservatives FR.
Unit 2.5 Translators and Facilities of Languages – Lesson 2
H070 Topic Title H470 Topic Title Urban Futures
Glacier National Park, MT
Systems Security Keywords Protecting Systems
A Level Physics Delivery Guide.
The Maxwell–Boltzmann Distribution
Watch this video clip taken from Futurama
Unit 2.3 Robust Programs Lesson 2 - Testing Programs
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
H070 Topic Title H470 Topic Title Urban Futures
Unit 2.3 Robust Programs Lesson 1 - Defensive Design Consideration
Networks Encryption.
Big Picture How many ways can a system be attacked? What can we do about it?
Unit 1.4 Wired and Wireless Networks Lesson 2
Unit Network Topologies, protocols and layers Lesson 3
Landscapes of the UK Learner Resource 3 Comparing characteristics.
Teaching Computing to GCSE
Unit 1.4 Wired and Wireless Networks Lesson 1
Little work is accurate
Unit 1.6 Systems security Lesson 3
Unit Network Topologies, protocols and layers Lesson 2
Unit Network Topologies, protocols and layers Lesson 1
Theft picture game.
A Level Business Lesson Elements.
Electromagnetic spectrum
Combination of Transformations
Electromagnetic spectrum
User access levels, Passwords, Encryption, Cipher, Key
Unit 1.6 Systems security Lesson 2
Passwords.
An introductory lesson
Roots and Shoots Lesson Element.
Unit 1.4 Wired and Wireless Networks Lesson 3
Unit 1.3 Storage Lesson 2: Storing Data
The stack is eroded and weathered creating a stump
What makes these UK landscapes distinctive?
Unit 1.1 Systems Architecture Lesson 1
Learner Activity 2: Boltzmann Distribution Curves Part of the ‘Rates of reaction and the Arrhenius equation’ Topic Exploration Pack.
TCP/IP routing simulation
H070 Topic Title H470 Topic Title Urban Futures
Unit 1.3 Storage Lesson 1: Storage Devices
Unit 1.1 System Architecture Lesson 2
Unit 1.3 Storage Lesson 1: Storage Devices
A Level Business Investment Appraisal Lesson Elements.
Who… What… Why… When… Where… How… Could… Should….
Who… What… Why… When… Where… How… Could… Should….
What evidence is there to suggest climate change is a natural process?
G061 - Network Security.
Describing Graphs Describe the overall trend shown on the graph
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Unit 1.6 Systems security Lesson 4

This lesson covers the following from specification 1 This lesson covers the following from specification 1.6 System Security: Forms of attack Threats posed to networks: Malware Phishing People as the weak point in secure systems (social engineering) Brute force attacks DDOS Data interception and theft SQL injection Poor network policy Identifying and preventing vulnerabilities Penetration testing Network forensics Network policies Anti-malware software Firewalls User access levels Passwords Encryption

Key Words User access levels Passwords Encryption Cipher Key

Big Picture What are the benefits of encryption? Why should passwords be kept secure? Discuss with a neighbour: What things can we do to make sure our passwords are secure? List as many things as you can think of.

Learning Objectives To understand the effects of user access levels on a system To understand how and why passwords must be kept secure and the levels of complexity To learn how encryption can have a negative effect on law enforcement and investigations To understand how encryption works To demonstrate a knowledge of a cypher and its’ key.

Engagement Activity What makes a secure password? Build a list of suitable requirements for secure passwords Create a list of rules for keeping a password secure Explain why passwords should be kept secure in such a way.

User access levels Also known as system access rights Comes under system access control Allows a system administrator to set up a hierarchy of users Lower level users would have access to limited information and settings Higher level users can access the most sensitive data on the system

Activity 1 Complete Worksheet 1 Define a set of user access levels for various groups.

Passwords Typically a string of characters used to gain access to a service or system Discussion point: Are there any alternatives to character password entry (eg. Biometrics?) Research the Samsung Galaxy 8 – what security features does this device have to replace passwords?

Biometric security Can be used in addition to ‘standard’ password entry (via a keyboard) Examples include: Retina scan Fingerprint Voice Facial recognition Benefits of using biometrics?

Secure or Strong Passwords 12 characters or more The greater the characters, the stronger the password Mixture of capitals, lower case letters, numbers and symbols Short Exercise: Create some easy passwords that are NOT secure? How would you make them stronger? e.g. password123  Passw0rd123!

Protecting password-based systems Systems that use passwords often prevent against people guessing passwords non-stop (brute force) by applying rules: The time gap between entering one password and another e.g. mobile phones lock for 30 seconds after a number of incorrect attempts Limits to the number of password guesses After which the account becomes “locked” and needs Admin access Complexity requirements of passwords You can only use secure passwords when setting up your account Try creating a new account on a website and many have “password strength” indicators Password encryption Password reset policies You are forced to change your password at certain times (e.g. every 30 days)

Activity 2 Create an infographic to illustrate the importance of secure passwords Explain the elements of a secure password Piktochart.com

Encryption Where data is translated into code so that only authorised users, or users with the key can decrypt it Users must need the key in order to decrypt the coded file

Encrypted messages Reading: https://www.wired.com/2016/04/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people/ What effect would Whatsapp’s encryption policy have on British police and other security investigations?

Method of encryption – Caesar Cipher Cipher invented by Julius Caesar Designed to keep his messages secret Works by encrypting messages through movement of each letter a certain number of places to the left in the alphabet Key tells us how many places to the left the letters have been moved.

Method of encryption – Caesar Cipher Let’s say we received the message ABZOVMQBA with and the key was 3. The decrypted message would read decrypted A B Z O V M Q D E C R Y P T

Activity 3 Caesar Cipher Use template in order to write a message Swap with a partner to decrypt the message Base the groups on ability – lower ability = smaller key shift, smaller messages.

Plenary Post-it activity (small groups / pairs) Recall elements of a secure password in groups Create a secure password and explain reasons for it being secure Define user access levels for a librarian in a library If time permits, set Ceaser Cipher group task with complex key shift

OCR Resources: the small print OCR’s resources are provided to support the teaching of OCR specifications, but in no way constitute an endorsed teaching method that is required by the Board, and the decision to use them lies with the individual teacher. Whilst every effort is made to ensure the accuracy of the content, OCR cannot be held responsible for any errors or omissions within these resources. © OCR 2017 - This resource may be freely copied and distributed, as long as the OCR logo and this message remain intact and OCR is acknowledged as the originator of this work. OCR acknowledges the use of the following content: n/a Please get in touch if you want to discuss the accessibility of resources we offer to support delivery of our qualifications: resources.feedback@ocr.org.uk