BP5 – encryption - Fun gym

Slides:



Advertisements
Similar presentations
Directorate of Learning Resources Accessing electronic journals from off-campus This causes lots of headaches, but dont despair, heres how to do it! If.
Advertisements

1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Opening a bank account.
By Laura Trawin.
Basics Dayton Metro Library Place photo here August 10, 2015.
Threats to I.T Internet security By Cameron Mundy.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Training PowerPoint.  Just plug into the USB port on your computer. You will find USB ports on the front or back of your computer.  If you have a laptop.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Section 4 – Computer Networks Setting up a small network.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Specialist communication channel. Sarah-Jane king.
By Demi Gardiner 8P Who’s been on your computer??
s By Jordon walker. Sending an attachment.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
Stay Safe on the computer!! This Is Emma and Jenny.They here to help you on the computer! By Rosie Pike.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Internet Safety LPM
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
science/internet-intro
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
KS2 E-Safety assembly How to be smart and keep safe online.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Communication protocols 2. HTTP Hypertext Transfer Protocol, is the protocol of World Wide Web (www) Client web browser Web server Request files Respond.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
How Secure Works Stephen Smith | November 27, 2013.
Communicating safely and appropriately online. Why do we need passwords?
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Internet Safety.
What they are and how to protect against them
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Go to youtube and search “Code.org internet videos”
How to use the internet safely and How to protect my personal data?
Methods of Securing LANs
Ways to protect yourself against hackers
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
How do we buy and sell on the Internet safely?
How to use the internet safely and How to protect my personal data?
Overview 1. Phishing Scams
Topologies, Protocols and Layers
Safe Browsing at SIIT.
What Is Tapestry? An Online learning journal system.
Topic 1: Data, information, knowledge and processing
Big Picture How many ways can a system be attacked? What can we do about it?
Security of a Local Area Network
Lesson 2- Protecting Yourself Online
BP5 – encryption - Fun gym
Internet Protocol Mr. Paulk.
COMPUTER PRIVACY.
Shopping experience! Is it safe to pay online? Ian Ramsey
Topic 5: Communication and the Internet
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
What you can do to support people to be safe online
Fun gym Cambridge Nationals R001.
Web Servers / Deployment
Encryption and Hacking
Santa’s s By……..
Lesson 2- Protecting Yourself Online
G061 - Network Security.
Presentation transcript:

BP5 – encryption - Fun gym Cambridge Nationals R001

Encryption In this section you will understand what it is and why it is important. Why am I learning this? Scenario 1 says: At the end of every month Bridget sends each instructor an email with an attached encrypted file. The file contains details of how much they earn etc.

Encryption Here’s an example of how encryption works: Bridget sends an email message to each member of staff: She encrypts the message using a special key (code) It is then sent over the internet to the member of staff If hacker tries to steal the message they would just read gobbledygook At the other end the message is decrypted by the member of staff who has an identical key Bridget used. The email is now readable.

Encryption – TASK 1 Draw out this diagram\create it in Word or Powerpoint Explain how Bridget’s email is encrypted and decrypted.

Encryption In the last section we looked at how emails\messages can be sent securely over the internet. This section will look at how we can safely access personal information on websites (i.e. logging into your bank to look at your account). Why am I learning this? Scenario 1 ALSO says: that the website contains a ‘members only’ section – that is restricted.

Encryption If you are planning to buy something from amazon which will require you to type in sensitive information over the internet (like usernames & passwords and bank details) it is very important that you check whether the connection is secure (i.e. is the data being encrypted so no one can steal your personal data) How do you know if the website is encrypting your data to stop hackers accessing it??

Encryption How do you know if the website is encrypting your data to stop hackers accessing it?? ANSWER: Check the web address:

Encryption You know that the website is secure as it will have a padlock and it should now say HTTPS

Encryption HTTPS – stands for Hypertext Transfer Protocol Secure It is used to make sure all communications are secure over the internet – that data is being encrypted as it moves from your computer to amazon or HSBC and back again etc.

Encryption In your notes tell me: What does HTTPS stands for? Explain how it would work for people logging on to the members only section of the website.

Encryption – Wireless Encryption It is highly likely that Bridget connects to the internet from the computer in her office. She will connect to the internet pretty much like you do at home (i.e. your PC connects you your router wirelessly and then off to the internet).

Encryption – Wireless Encryption If you haven’t set up wireless encryption on your PC then someone (either next door neighbour or dodgy geezer sitting in his car outside your house) could use your internet connection for free or worse still hack into your computer and steal personal information. There are 2 main options for encrypting your wireless connection: WPA & WEP.

Encryption – Wireless Encryption In your books write up why it is important for Bridget to encrypt her wireless connection? (problems that could happen etc) And what are the 2 main types available?