SlideShare a Scribd company logo
1 of 22
Anti Virus Software
A program that can be used to scan files to identify and eliminate computer
viruses and other malicious software
Scans files looking for matches with previoulsy discovered virus signatures
Anti virus software generally offers 2 modes: real-time protection, and
scheduled scans
Anti Virus Software
Infected files can be deleted or placed in quarantine
Heuristic anti virus software monitors suspicious behaviour of programs
AV software has to be regularly updated as new viruses are discovered
Passwords
Most commonly used along with username although not always e.g.
password protected file.
Passwords
Weak Passwords
Your name
Your child’s name
A pet
An easy word
123456
qwerty
admin
password
Passwords
Good practice
At least 8 chars
Does not contain username, real name, company name
Does not contain complete word
Different from other passwords
Mix of uppercase, lowercase, numbers & symbols
Biometrics
Biometrics is a way of proving identity using a unique biological trait e.g.
Fingerprint (or palm)
Retina / iris pattern
Voice recognition
Face recognition
DNA
Biometrics
Advantages:
Don’t need to remember passwords
Virtually impossible to forge
Current Uses
Airport security - used to identify passengers
Mobile devices - use fingerprint scan to access payment
Building access – used to identify authorised personnel
Schools – access, payment, registration, library books
Cars – access via fingerprint or facial recognition
Banks – ATM cash withdrawals
Encryption
Encryption is the conversion of data into a form that cannot be easily
understood by unauthorised people
Decryption is the inverse of encryption - reversing the steps of encryption in
order to get the original message
Encryption
Encryption allows us to protect data an message from anyone we do not want
to see it.
The encrypted data is known as cyphertext
Symmetric Encryption
 Same key is used to encrypt and decrypt
 Sender and receiver both know the key
Symmetric Encryption
Advantages
Faster and easier to implement that asymmetric encryption
Disadvantages
Sender and receiver need to know the key, but how do they share that
securely?
If they have a secure way of sending the key, why would they need to use
encryption…?
Asymmetric Encryption
 A pair of keys is used to encrypt the data
 Private key and public key
 Anyone can encrypt a message using a public key
 Only the holder of the private key can decrypt the message
 Asymmetric encryption is also known as public-key encryption
Asymmetric Encryption
Example
1.Aaron(the recipient) generates a pair of keys, one public and one private
2.He sends the public key to Alison (the sender)
3.Alison encrypts the message using the public key and sends it to Aaron
4.Aaron decrypts the message using the private key
Asymmetric Encryption
Advantages
No need for private key exchange
Increased security – only person with private key can decrypt
Can be used for Digital Signatures
Disadvantages
Slow – takes time to encrypt and decrypt
Could be cracked using brute force – try all possible keys
(although RSA Security claim that using a 2048 bit key would not be
crackable until around 2030).
Digital Signatures
 Used to validate the authenticity and integrity of a message or document
 Can validate the origin, identity and status of a document
 Uses asymmetric encryption, with public and private keys
Digital Signatures
1. Private key used to create a hash (a number generated from string of text)
2. Hash is sent along with document
3. Hash is decrypted with the public key – verifies the document
4. Any change/tampering of the document will mean the hash will not match
(Note that the message itself does not have to be encrypted)
Digital Certificates
 Provides identifying information to enhance user trust
 Used to encrypt communication between browser and website
 Issued by an official, trusted agency
 Digitally signed by a root certificate belonging to a trusted Certificate
Authority (CA)
 Includes information about the owner's identity e.g. name, email, address,
domain authority, certificate issue date and CA authority name.
Digital Certificates
Security Protocols
Security protocols ensure data is protected when sent across a network
Hyper Text Transfer Protocol Secure
The secure version of HTTP
Data sent between browser and the website is encrypted
Used with banks, shops, webmail etc. to encrypt credit card and other
transaction and personal details
Firewall
 Prevents unauthorised access to a private network
 Can be hardware and/or software
 All messages entering or leaving network pass through firewall which
checks to see if the meet allowed criteria
Firewall

More Related Content

What's hot

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
Data Security
Data SecurityData Security
Data Security
backdoor
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
 

What's hot (20)

Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Data Security
Data SecurityData Security
Data Security
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 

Viewers also liked

Viewers also liked (20)

Sound & Video File Sizes
Sound & Video File SizesSound & Video File Sizes
Sound & Video File Sizes
 
ISDD Back Up Strategies
ISDD Back Up StrategiesISDD Back Up Strategies
ISDD Back Up Strategies
 
ISDD Media Types - File Compression
ISDD Media Types - File CompressionISDD Media Types - File Compression
ISDD Media Types - File Compression
 
Other web page aspects
Other web page aspectsOther web page aspects
Other web page aspects
 
Backing Storage
Backing StorageBacking Storage
Backing Storage
 
Searching and Sorting
Searching and SortingSearching and Sorting
Searching and Sorting
 
ISDD Sequential & Random Access
ISDD Sequential & Random AccessISDD Sequential & Random Access
ISDD Sequential & Random Access
 
Normalisation
NormalisationNormalisation
Normalisation
 
Economic Impact of Computing Science
Economic Impact of Computing ScienceEconomic Impact of Computing Science
Economic Impact of Computing Science
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Science
 
ISDD Networking & Connectivity
ISDD Networking & ConnectivityISDD Networking & Connectivity
ISDD Networking & Connectivity
 
Audio Compression
Audio CompressionAudio Compression
Audio Compression
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
 
Higher Computing Science CSS
Higher Computing Science CSSHigher Computing Science CSS
Higher Computing Science CSS
 
Entities and attributes
Entities and attributesEntities and attributes
Entities and attributes
 
Web Pages
Web PagesWeb Pages
Web Pages
 
Database structure
Database structureDatabase structure
Database structure
 
Data Dictionary
Data DictionaryData Dictionary
Data Dictionary
 
Scripting Languages
Scripting LanguagesScripting Languages
Scripting Languages
 

Similar to ISDD Security Precautions

E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Kiran Patil
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
pinkutinku26
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
Abdulaziz Mohd
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
anita maharjan
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
drkelleher
 

Similar to ISDD Security Precautions (20)

N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security
SecuritySecurity
Security
 
Unit v
Unit vUnit v
Unit v
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 

More from Forrester High School

More from Forrester High School (20)

Program Design
Program DesignProgram Design
Program Design
 
Database Evaluation
Database EvaluationDatabase Evaluation
Database Evaluation
 
Testing SQL
Testing SQLTesting SQL
Testing SQL
 
SQL
SQLSQL
SQL
 
Database Query Design
Database Query DesignDatabase Query Design
Database Query Design
 
Data Dictionary
Data DictionaryData Dictionary
Data Dictionary
 
Compound Keys
Compound KeysCompound Keys
Compound Keys
 
Entity Occurrence Diagrams
Entity Occurrence DiagramsEntity Occurrence Diagrams
Entity Occurrence Diagrams
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Database Analysis
Database AnalysisDatabase Analysis
Database Analysis
 
Software Evaluation
Software EvaluationSoftware Evaluation
Software Evaluation
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Standard Algorithms
Standard AlgorithmsStandard Algorithms
Standard Algorithms
 
File Handling
File HandlingFile Handling
File Handling
 
Python Predefined Functions
Python Predefined FunctionsPython Predefined Functions
Python Predefined Functions
 
Python Substrings
Python SubstringsPython Substrings
Python Substrings
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Sub-programs
Sub-programsSub-programs
Sub-programs
 
Records in Python
Records in PythonRecords in Python
Records in Python
 
Parallel arrays in python
Parallel arrays in pythonParallel arrays in python
Parallel arrays in python
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

ISDD Security Precautions

  • 1.
  • 2. Anti Virus Software A program that can be used to scan files to identify and eliminate computer viruses and other malicious software Scans files looking for matches with previoulsy discovered virus signatures Anti virus software generally offers 2 modes: real-time protection, and scheduled scans
  • 3. Anti Virus Software Infected files can be deleted or placed in quarantine Heuristic anti virus software monitors suspicious behaviour of programs AV software has to be regularly updated as new viruses are discovered
  • 4. Passwords Most commonly used along with username although not always e.g. password protected file.
  • 5. Passwords Weak Passwords Your name Your child’s name A pet An easy word 123456 qwerty admin password
  • 6. Passwords Good practice At least 8 chars Does not contain username, real name, company name Does not contain complete word Different from other passwords Mix of uppercase, lowercase, numbers & symbols
  • 7. Biometrics Biometrics is a way of proving identity using a unique biological trait e.g. Fingerprint (or palm) Retina / iris pattern Voice recognition Face recognition DNA
  • 8. Biometrics Advantages: Don’t need to remember passwords Virtually impossible to forge Current Uses Airport security - used to identify passengers Mobile devices - use fingerprint scan to access payment Building access – used to identify authorised personnel Schools – access, payment, registration, library books Cars – access via fingerprint or facial recognition Banks – ATM cash withdrawals
  • 9. Encryption Encryption is the conversion of data into a form that cannot be easily understood by unauthorised people Decryption is the inverse of encryption - reversing the steps of encryption in order to get the original message
  • 10. Encryption Encryption allows us to protect data an message from anyone we do not want to see it. The encrypted data is known as cyphertext
  • 11. Symmetric Encryption  Same key is used to encrypt and decrypt  Sender and receiver both know the key
  • 12. Symmetric Encryption Advantages Faster and easier to implement that asymmetric encryption Disadvantages Sender and receiver need to know the key, but how do they share that securely? If they have a secure way of sending the key, why would they need to use encryption…?
  • 13. Asymmetric Encryption  A pair of keys is used to encrypt the data  Private key and public key  Anyone can encrypt a message using a public key  Only the holder of the private key can decrypt the message  Asymmetric encryption is also known as public-key encryption
  • 14. Asymmetric Encryption Example 1.Aaron(the recipient) generates a pair of keys, one public and one private 2.He sends the public key to Alison (the sender) 3.Alison encrypts the message using the public key and sends it to Aaron 4.Aaron decrypts the message using the private key
  • 15. Asymmetric Encryption Advantages No need for private key exchange Increased security – only person with private key can decrypt Can be used for Digital Signatures Disadvantages Slow – takes time to encrypt and decrypt Could be cracked using brute force – try all possible keys (although RSA Security claim that using a 2048 bit key would not be crackable until around 2030).
  • 16. Digital Signatures  Used to validate the authenticity and integrity of a message or document  Can validate the origin, identity and status of a document  Uses asymmetric encryption, with public and private keys
  • 17. Digital Signatures 1. Private key used to create a hash (a number generated from string of text) 2. Hash is sent along with document 3. Hash is decrypted with the public key – verifies the document 4. Any change/tampering of the document will mean the hash will not match (Note that the message itself does not have to be encrypted)
  • 18. Digital Certificates  Provides identifying information to enhance user trust  Used to encrypt communication between browser and website  Issued by an official, trusted agency  Digitally signed by a root certificate belonging to a trusted Certificate Authority (CA)  Includes information about the owner's identity e.g. name, email, address, domain authority, certificate issue date and CA authority name.
  • 20. Security Protocols Security protocols ensure data is protected when sent across a network Hyper Text Transfer Protocol Secure The secure version of HTTP Data sent between browser and the website is encrypted Used with banks, shops, webmail etc. to encrypt credit card and other transaction and personal details
  • 21. Firewall  Prevents unauthorised access to a private network  Can be hardware and/or software  All messages entering or leaving network pass through firewall which checks to see if the meet allowed criteria