IT’s private. Ofcom report 80% of UK homes have access to the Internet 76% of UK homes have broadband 40% of UK adults use a smartphone Image by: VEER/Corina.

Slides:



Advertisements
Similar presentations
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 9 Emerging Trends and Technologies: Business, People,
Advertisements

RFID Access Control System March, 2003 Softrónica.
Protecting children online  How can you protect your child online?  Are you aware of the dangers?  Do you know what you can put in place to protect.
Biometry and Security: Secure Biometric Authentication for Weak Computational Devices Author: Zelenevskiy Vladimir Based on the research by M.J. Atallah.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
This week is anti-bullying week.
Chapter 9 Emerging Trends and Technologies: Business, People, and Technology Tomorrow Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved.
The Future of Social Networking in 2050 By Alex, Kim, Nicole, Jessie, and David.
Online applications and mobile marketing. What if we don’t have a mobile phones?  Can you imagine what the world was like without mobile phones? Say.
Opening a bank account.
Your Interactive Guide to the Digital World Discovering Computers 2012.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
GROUP 3: APRIL, DELICIA, LISA, SHEILAH.  Your child spends large amounts of time on-line, especially at night.  You find pornography on your child's.
Software. stands for electronic mail. software enables you to send an electronic message to another person anywhere in the world. The message.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Chapter 10: Authentication Guide to Computer Network Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Social impacts of the use of it By: Mohamed Abdalla.
Methods of communication
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Radio Frequency Identification By Bhagyesh Lodha Vinit Mahedia Vishnu Saran Mitesh Bhawsar.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
Exchanging information. Communication services Voice phones SMS (short messaging service) – more commonly known as texting Fax Instant messaging – real.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Alternative Input Devices Part B There will be a test on this information (both part a & b).
Safety on the internet In % of households used the internet – now over 90% What are the risks or dangers linked to using a computer?
BUSINESS B1 Information Security.
IT security By Tilly Gerlack.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
BY MOHAMMED ALQAHTANI (802.11) Security. What is ? IEEE is a set of standards carrying out WLAN computer communication in frequency bands.
Wireless Communication Methods
Securing Electronic Transactions University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Digital Citizenship. Digital Citizen  A person using IT in order to engage in society, politics, and government expectations.  “Those who use the internet.
ANTI-BULLYING AT KNIGHTLOW CYBER BULLYING. Cyber bullying: fact or fiction? 1. There are at least 7 forms of bullying that happen using technology True.
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Specialist communication channel. Sarah-Jane king.
Outline Personal Computer Desktop Computer Mobile Computers and Mobile Devices - Notebook Computer - Tablet PC - Smart Phones and PDAs - Ebook Readers.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Survey Scams Sam Roberts. What is a Survey Scam?  A scam where someone asks you to fill out a survey answering personal question, business questions,
Biometrics.
Biometric Technologies
Business Driven Technology Unit 4 Building Innovation Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
© McGraw-Hill Companies, Inc., McGraw-Hill/Irwin Chapter 9 Emerging Trends and Technologies.
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Principles of Marketing
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Biometric Devices Biometric devices use secure identification and authentication in order for someone to use the device. These devices use automated.
Physical security By Ola Abd el-latif Abbass Hassan.
INPUT AND OUTPUT DEVICES Group: 10 Batch: TIS 76 Gaby Alexander Damini Mangaj Amritpreet Singh Arunavathi Suraj Medda.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
E-safety Parent Workshop Helping to keep your children safe online.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Michael Carlino. ROADMAP -Biometrics Definition -Different types -Future -Advantages -Disadvantages -Common Biometric Report -Current Issues.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
Challenge/Response Authentication
Authentication.
GCSE ICT Revision Topic 2: Connectivity.
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
OCR GCSE ICT Data capture methods.
Presentation transcript:

IT’s private

Ofcom report 80% of UK homes have access to the Internet 76% of UK homes have broadband 40% of UK adults use a smartphone Image by: VEER/Corina Rosu : data-research/market-data/communications- market-reports/cmr12/?a=0http://stakeholders.ofcom.org.uk/market- data-research/market-data/communications- market-reports/cmr12/?a=0 Ofcom is the communications regulator in the UK and, every year, they carry out an extensive survey to find out what’s happening in the communications market. The survey asks questions about Internet-based communications, television, radio and traditional post.

Ofcom report Smartphones are being used for: online shopping (57%) social networking (30%) tweeting (23%) watching TV content or films (22%) Image by: VEER/Corina Rosu The use of the smartphone is of great significance, especially when we see Ofcom's discovery that more than four in 10 smartphone users say their phone is the most important device for accessing the Internet.

Ofcom report Image by: VEER/Corina Rosu The moment people acquire smartphones, their reliance on PCs or laptops declines, sometimes dramatically. The key thing about smartphones is that they are essentially handheld networked computers which also happen to be able to make voice calls.

Ofcom report Image by: VEER/Corina Rosu 3 different types of internet-enabled device A third of people aged 16 to 24 live in homes where mobiles are the only device used to make phone calls Online retailing increased by 30% in a year and is now worth £2.6bn a year Here are some other interesting facts from the Ofcom report.

Ofcom report Image by: VEER/Corina Rosu Other highlights: Spending on Internet advertising is now greater than on any other form of advertising: Internet £4.8bn Print £3.9bn TV £4.2bn

What does this mean? Image by: Shutterstock/KOUNADEAS IOANNHS Are there any security issues? Firstly, that the distinction between the virtual and the real world has essentially evaporated. The Internet is now part of ‘normal’ everyday life. Secondly, that people will increasingly access the Internet via devices such as smartphones and tablets. Therefore with the growth of smartphones and tablets, mobile technology is now at the heart of personal computing; thus facilitating ‘any time, anywhere’ access. So, clearly, the future's mobile.

In this lesson students are learning about: privacy issues associated with the use of mobile technology

At the end of this lesson students will be able to: recognise issues associated with access ‘any time, anywhere’ on mobile devices appreciate the importance of access control

So what are the security/privacy issues? Image by: Shutterstock/KOUNADEAS IOANNHS Mobile and wireless technologies are part of our daily lives. We trust that they just work but should we trust everything about this technology?

So what are the security/privacy issues

Some suggestions Controlling access to personal devices e.g. Biometrics: authentication techniques that rely on measurable physical characteristics that can be automatically checked, such as: face: the analysis of facial characteristics fingerprint: the analysis of an individual's unique fingerprints retina: the analysis of the capillary vessels located at the back of the eye iris: the analysis of the coloured ring that surrounds the eye's pupil signature: the analysis of the way a person signs their name vein: the analysis of pattern of veins in the back of the hand and the wrist voice: the analysis of the tone, pitch, cadence and frequency of a person's voice

The wireless medium The wireless medium is a shared resource: anyone with the right equipment can access it. Walls, doors and security guards don't stop the radio waves. You're not the only one who can see the access point announcing itself – everybody in range can use it (including those people whose devices automatically join without them knowing). Data sent over wireless is public which means anyone can see what you are doing.

Where wireless is used Home, school and public area hotspots have wireless access points for laptops or handhelds. Commercial applications such as card payment machines. Public hotspots can be dangerous – you and your digital device are visible and security is up to individual users when using public hotspots. What security can be put in place? Encryption, the secure versions of POP, SMTP and HTTP.

Personal data What is personal: phonebook, calendar, password, etc. Your daily routine: where you go, what you do, who you know. Where do you keep your personal data? PC, laptop, mobile phone, tablet? What data is somebody else keeping about you? Where do they keep it? Is your valuable data wirelessly accessible? Can anyone access it? Open access points can cause all sorts of problems that could lead to: data theft / financial harm privacy invasion others reading your , instant messages or online shopping orders identity theft theft of information about your personal contacts, e.g. phone number, address.

Bluetooth Bluetooth typical applications: Wireless headsets Contact / business card exchange Bluetooth abuse: Copying phonebook and calendar entries Initiating calls and sending text messages Denial of Service (DoS) attacks (phone becomes unusable) Special kind of phone-tapping using a phone or a hands-free car kit as a bug Track and profile individuals BlueSpam, spam via Bluetooth to your phone, companies do this Bluetooth good points: can be set to a non-visible mode only respond to known devices.

RFID – Radio Frequency Identification These are small tags/transponders which can be read wirelessly. RFID typical applications: Access control / authentication, security badge, passport / ID Item identification, customer cards, goods in warehouses (not only pallets, every single item) RFID abuse: Tracking and spying: open system, readers are cheap and publicly available. Reading range can be extended using antennas Identity theft – tag duplication.

Task