Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Developed by Technology Services 1:1 Laptop Initiative
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Today you will learn about… Cryptology –Encryption and decryption –Secure vs. nonsecure websites Protecting your identity online Internet safety rules.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Using internet and cell phones safely
Secure communication Informatics for economists II Jan Přichystal
Class on Security Raghu. Current state of Security Cracks appear all the time Band Aid solutions Applications are not designed properly OS designs are.
SSL By: Anthony Harris & Adam Shkoler. What is SSL? SSL stands for Secure Sockets Layer SSL is a cryptographic protocol which provides secure communications.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
How to Create (and use) Strong & Unique Passwords Larry Magid Co-director ConnectSafely.org.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
About Facebook Facebook is a social networking service launched in February 2004, owned and operated by Facebook Inc. Facebook was founded by Mark Zuckerberg.
Reliability & Desirability of Data
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Learning Aid Type Text Page 206 MGS GROUP C Svitlana Panasik.
Material being covered 3/9 Remainder of Text Chapter 6 (Q5, 6) Text Chapter 6A Material Posted 3/9 Midterm Information Introduction to Text Chapter 7.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Keeping Secrets with Digital Technology Information Assurance Program Anderson School of Management.
Types of Electronic Infection
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
An Introduction to Cryptography. What is cryptography? noun \krip- ˈ tä-grə-fē\ : the process of writing or reading secret messages or codes “Encryption”:
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Identity Theft Since 2005, there has been a dramatic increase in the occurrence of identity theft among students online.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Public Key Encryption.
The spoofed . The spoofing The link appears as (i.e NOODLEBANK.com) But actually it links to
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
PHP Secure Communications Web Technologies Computing Science Thompson Rivers University.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Activity 3 Identifying the Risks. Questions What do you do online? What sort of sites do you visit? Have you ever had a bad experience online?
By. Rules that you follow to make the internet better and safe for you and others Have to be more responsible when Using the internet!
INTRODUCTION & QUESTIONS.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Security By Meenal Mandalia. What is ? stands for Electronic Mail. much the same as a letter, only that it is exchanged in a different.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Catching Phish. If I went fishing what would I be doing? On the Internet fishing (phishing) is similar! On the internet people might want to get your.
1-way String Encryption Rainbows (a.k.a. Spectrums) Public Private Key Encryption HTTPS Encryption.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
An Introduction to Phishing and Viruses
How to use the internet safely and How to protect my personal data?
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
The Internet: Encryption & Public Keys
What devices use the internet?
Presentation transcript:

Cryptography: Keeping Your Information Safe

Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What do we use? New Technology Understanding of networks and computer systems Introduction I don’t like being sick…

What is Cryptography? Also known as secret writing The process of making and using codes to secure the exchange of information. The process or skill of communicating in or deciphering secret code or cipher.

What is a Cipher? A system of secret writing based on a key, or a set of predetermined rules or procedures The secret code used to convert information into something that is unreadable

Encryption and Decryption The process of converting ordinary information into something that is unreadable is known as encryption. The method of reversing the encrypted message by reverting the unreadable text back into its original form is known as decryption. Encryption makes it hard to understand, and decryption makes it easy again!

Caesar Cipher –One of the simplest encryption techniques –Named after Roman leader Julius Caesar who used the cipher to communicate with his generals –A type of substitution cipher where each letter in the message is replaced by a letter some fixed number of positions down the alphabet –Also known as the shift cipher, Caesar's code, or Caesars shift Over 2 thousand years ago, I created this cipher to pass onto my generals so I could win battles.

Back to Encryption Encryption is a computer based cryptographic system that is used to keep your information safe. Secure Socket Layer (SSL) & Transport Layer Security (TSL) –cryptographic protocols(or set of rules) that provide security for communications over networks such as the Internet. HTTPS is secure –Uses SSL to secure the transfer of information HTTP is not secure

Information Leak Attackers stealing information by posting fake links in Facebook and Twitter A very similar fake web site of Twitter scammed everyone who visited it. –Twitter account information was stolen by everyone who tried to login.

Problems with Internet Browsing Not all websites you visit are secured (https) – – – The information you put into these sites are not secured. –Passwords –Usernames –Personal Information Because they are not secured, others can visit and see your information or steal your username and password.

Why is Encryption Important to You? Social Networking Sites –Twitter –Facebook –MySpace Shopping Web Sites –eBay –Amazon Links s Knowing about Encryption can help you make safe decisions when interacting with non secure websites. It will also help you identify when you are being tricked into giving out valuable personal information.

Why is Encryption Important to You? Encryption rules are there for a reason. The most common way a person can steal your information is by tricking you. –You give them information by entering it into a fake website. Phishing Fake –They steal it by using a program they said you needed to download to see a video or web site. If a site says you need to download something to see a video or the site, make sure it is from a trustworthy site. If you are not sure, do not download it.

How to Stay Safe Never input personal information into a site you do not know, or is fake. Both of these sites are fake. One is asking for donations based on research, the other is from typing in facebook.com wrong. (facebok.com)

How to Stay Safe Make sure that the link you are clicking on and the URL are the same. This is a fake , asking for you to click on a link. The link you click on and the link it takes you to are different.

How to Stay Safe If you receive an that does not address you personally, delete it. –“Dear Customer” or “Hello Friend” are bad signs.

How to Stay Safe When inputting information to a site that you think is real, make sure that it is using a secure encryption protocol. Remember, https is a secure protocol.

What you can do Now Let your parents know what you learned today so that they do not make these mistakes. Ask them to look into downloading virus protection and encryption software to keep what information is stored on the computer safe.

CryptoKids! and Other Informative Sites

Questions?