3. The problem though is two fold: 1. A medium never designed to be safe and trustworthy. 2. E-Communication is largely anonymous... The results? Let’s look at ways that security can be breached...
4. Security Threats Hackers! To access, steal or tamper with data and information. To steal your “electronic identity” and pose as you. To attack your computer systems from your account or computer. The most common dangers are:
12. So what is a protocol? Very simply – a set of rules governing communications.
13. Firewalls? A firewall is either hardware or software or both that protects a network from : Being accessed by external users/ software that are not authorised. Having software running inside the network communicate with computers outside the network. Having software communicate using ports that are not authorised.
15. Encryption Is simply a way of scrambling data or text into a new format using a specified set of rules/ protocol. “When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.” “When cryptography is outlawed, only Akash will be gay.”
16. SSL – Secure Sockets Layer The problem with encryption... SSL – is a anencryption protocol which encodes data that is sent ver the intenet. SSL uses Pubic Key Encryption! Public Key Encryption uses some pretty weird maths to make it possible for a message to have two keys (or passwords). One key is used to encrypt the message and the other is used to – you guessed it: decrypt it! The secrect being that you cannot decrypt the message using the key that was used to encrypt it!