Download presentation
Presentation is loading. Please wait.
Published byNelson Palmer Modified over 9 years ago
1
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical Security
2
Lesson Objectives By the end of the lesson you will be able to: Describe what is meant by the terms user ID and password and explain why these are used Discuss the problems of data security, including problems surrounding common network environments Identify the need for encryption and authentication techniques
3
Does it matter… Large amounts of data and information are transferred easily from one computer to another. Along with being a good thing, this also causes concern over the security of information. What sort of information would you not want getting into the wrong hands?
4
Get your books out! Put today’s date and the title Network Security in the front of your books, underline them neatly with a ruler! Write down 3 methods of how data can be kept secure. Write down 2 pieces of information about yourself that you wouldn’t want anyone to have unauthorised access to.
5
Authentication Techniques These are used to check that a person accessing a network or system is genuinely the person in question. There are three main techniques used, any ideas what they are… Usernames and passwords Digital signatures Biometrics
6
Using pages 40 and 41… 1.What is a username and why must it be unique? 2.What is a password? 3.Write down 4 characteristics of a good password. 4.Write down 3 things to consider when using passwords. 5.How does biometrics work? 6.Write down 2 advantages of biometrics. 7.Write down 2 disadvantages of biometrics. 8.What is a digital signature? 9.Why are digital signatures used?
7
Encryption This is used to stop data getting into the wrong hands as it travels over the Internet. It is also used when saving personal data on laptops or removable storage devices. Encryption works by scrambling data as it’s transferred from one place to another. If any of this data gets lost or stolen, it cannot be read. Only the authorised person being sent the information will have the decryption key that allows them to unscramble the information. Why bother? Protection against hackers – a hacker could simply intercept and read your email. They could also alter data or collect personal details including credit card numbers which could be used to commit fraud.
8
When to use it… When Encryption should be used Copy and complete the diagram below using page 41 of the textbook to help you…
9
News… Using an appropriate news website of your choice, find 2 news articles relating to hacking and encryption. In your books, write a summary of the main points for each story. Discuss where the security of data was at risk and the outcome of each story.
10
Last Thing… Homework! Complete the worksheet Methods of Communication. No Homework = Detention!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.