3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.

Slides:



Advertisements
Similar presentations
3.03 Be an Internet Detective
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Security & Encryption Thomas Fenske & Joseph Minter.
ICHAT is the only public resource for non-fingerprint-based Michigan criminal history background checks.
3.04 Malicious Software Can Travel and Spread Unit 3 Internet Basics.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Principles of Information Security, 2nd edition1 Cryptography.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Security Awareness: Applying Practical Security in Your World
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Encryption Methods By: Michael A. Scott
Internet safety By Lydia Snowden.
Video Following is a video of what can happen if you don’t update your security settings! security.
3.02 The Information Superhighway
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Unit 3 Internet Basics 3.07 Handi Hi-Tech Tools.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
Encryption Presentation Jamie Roberts. Encryption Defined: n The process of converting messages, information, or data into a form unreadable by anyone.
Unit 19 INTERNET SECURITY
Mathematics Numbers: Factors
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Section 6 Theory Software Copyright, Viruses and Hacking.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Using a Template to Create a Resume and Sharing a Finished Document
Encryption Objective 1: Explain data encryption procedures.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Types of Electronic Infection
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
Encryption.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
By Kim Young Jun IGCSE1.  Computer network  Common types of network  Ring, bus, star and tree  Local are networks  Wide are networks  Wireless LANs.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
3.01 Networks-Travel Back in Time Unit 3 Internet Basics.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Information Systems Design and Development Security Precautions Computing Science.
Department of Computer Science Chapter 5 Introduction to Cryptography Semester 1.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Security Using Armstrong Numbers and Authentication using Colors
Attention Identity theft Definition
Topic 1: Data, information, knowledge and processing
Digital $$ Quiz Test your knowledge.
An Introduction to Cloud Computing
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

3.06 Data Encryption Unit 3 Internet Basics

Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook computer. Names, social security numbers, and health records of more than 26 million military veterans and their spouses were “safely” saved on its hard drive. Panic spread and the U.S. Department of Veterans Affairs then spent $3.7 million on encryption software for all of its computers, handhelds, and storage devices.

Introduction At the end of this lesson, student will be able to: – Explain data encryption procedures (ACOS 20)

Lesson Encryption puts data into a secret code and is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt (decode) it.

Lesson Encryption is – a means of encoding data into an unreadable series of characters with a secret key or password – making it secure for transmission.

Lesson The encryption software – scrambles data from a person's system so that an unauthorized user is unable to read the information. – you might have the choice of either » locking out the user after a certain number of tries » or even wipe out the data altogether

Lesson What is the relationship between mathematics and national security? Watch this video to find out. – Theory and Practice To view the video, enter the following username and password information exactly as it appears below. – username: access_student password: access You may want to look at the assignment for the lesson first because this video will help you answer the assigned questions.

Review The federal government is not the only entity interested in encryption. Most messages you send travel over many networks—some of the networks are secure and others are not. Those messages can pass through servers all over the Information Superhighway. Anyone with access to any of those servers can read your messages sent in plain text. Privacy software can be purchased that will encrypt your messages to protect your credit card numbers and information snoopers can use to commit identity theft. Only your private key can decrypt the message and display its contents.

Task After reading this lesson and watching the lesson video, answer the 8 questions below. 1.Who is the largest employer of mathematicians in the United States? 2.Explain the science of Crytography. 3.List at least two responsibilities of the National Security Agency (NSA). 4.Explain how bank account records are protected. 5.Explain how prime numbers are involved in encryption (prime numbers are those numbers that cannot be divided by any number except themselves and one). 6.Explain the RSA System of encryption. 7.How can cipher text be converted into plain text? 8.In your own words, explain the difference between authentication and authorization. Open Microsoft Word and answer these questions in complete sentences – Save to your F Drive in your Unit 3 Folder as » 3.06 Encryption Dropbox.

Are you finished? You should have 15 things saved on your F Drive in your Unit 3 Folder Network Tutorial How Networks Work History and Internet Dropbox Skills Check Boolean QC Chart How Stuff Works Brain Quiz Searching the Web Dropbox Intel Education Tutorial for Info Power Side Trip Evaluating Web Sites Dropbox On Guard Online Spyware Quiz Practice Discussion: Computer Security Encryption Dropbox So, are you finished?