SlideShare a Scribd company logo
1 of 22
Anti Virus Software
A program that can be used to scan files to identify and eliminate computer
viruses and other malicious software
Scans files looking for matches with previoulsy discovered virus signatures
Anti virus software generally offers 2 modes: real-time protection, and
scheduled scans
Anti Virus Software
Infected files can be deleted or placed in quarantine
Heuristic anti virus software monitors suspicious behaviour of programs
AV software has to be regularly updated as new viruses are discovered
Passwords
Most commonly used along with username although not always e.g.
password protected file.
Passwords
Weak Passwords
Your name
Your child’s name
A pet
An easy word
123456
qwerty
admin
password
Passwords
Good practice
At least 8 chars
Does not contain username, real name, company name
Does not contain complete word
Different from other passwords
Mix of uppercase, lowercase, numbers & symbols
Biometrics
Biometrics is a way of proving identity using a unique biological trait e.g.
Fingerprint (or palm)
Retina / iris pattern
Voice recognition
Face recognition
DNA
Biometrics
Advantages:
Don’t need to remember passwords
Virtually impossible to forge
Current Uses
Airport security - used to identify passengers
Mobile devices - use fingerprint scan to access payment
Building access – used to identify authorised personnel
Schools – access, payment, registration, library books
Cars – access via fingerprint or facial recognition
Banks – ATM cash withdrawals
Encryption
Encryption is the conversion of data into a form that cannot be easily
understood by unauthorised people
Decryption is the inverse of encryption - reversing the steps of encryption in
order to get the original message
Encryption
Encryption allows us to protect data an message from anyone we do not want
to see it.
The encrypted data is known as cyphertext
Symmetric Encryption
 Same key is used to encrypt and decrypt
 Sender and receiver both know the key
Symmetric Encryption
Advantages
Faster and easier to implement that asymmetric encryption
Disadvantages
Sender and receiver need to know the key, but how do they share that
securely?
If they have a secure way of sending the key, why would they need to use
encryption…?
Asymmetric Encryption
 A pair of keys is used to encrypt the data
 Private key and public key
 Anyone can encrypt a message using a public key
 Only the holder of the private key can decrypt the message
 Asymmetric encryption is also known as public-key encryption
Asymmetric Encryption
Example
1.Aaron(the recipient) generates a pair of keys, one public and one private
2.He sends the public key to Alison (the sender)
3.Alison encrypts the message using the public key and sends it to Aaron
4.Aaron decrypts the message using the private key
Asymmetric Encryption
Advantages
No need for private key exchange
Increased security – only person with private key can decrypt
Can be used for Digital Signatures
Disadvantages
Slow – takes time to encrypt and decrypt
Could be cracked using brute force – try all possible keys
(although RSA Security claim that using a 2048 bit key would not be
crackable until around 2030).
Digital Signatures
 Used to validate the authenticity and integrity of a message or document
 Can validate the origin, identity and status of a document
 Uses asymmetric encryption, with public and private keys
Digital Signatures
1. Private key used to create a hash (a number generated from string of text)
2. Hash is sent along with document
3. Hash is decrypted with the public key – verifies the document
4. Any change/tampering of the document will mean the hash will not match
(Note that the message itself does not have to be encrypted)
Digital Certificates
 Provides identifying information to enhance user trust
 Used to encrypt communication between browser and website
 Issued by an official, trusted agency
 Digitally signed by a root certificate belonging to a trusted Certificate
Authority (CA)
 Includes information about the owner's identity e.g. name, email, address,
domain authority, certificate issue date and CA authority name.
Digital Certificates
Security Protocols
Security protocols ensure data is protected when sent across a network
Hyper Text Transfer Protocol Secure
The secure version of HTTP
Data sent between browser and the website is encrypted
Used with banks, shops, webmail etc. to encrypt credit card and other
transaction and personal details
Firewall
 Prevents unauthorised access to a private network
 Can be hardware and/or software
 All messages entering or leaving network pass through firewall which
checks to see if the meet allowed criteria
Firewall

More Related Content

What's hot

S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
Vdidv
 
Data Security
Data SecurityData Security
Data Security
backdoor
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
Jana Baxter
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
Sreerag Gopinath
 

What's hot (20)

Internet Safety Techniques
Internet Safety TechniquesInternet Safety Techniques
Internet Safety Techniques
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security threads
Cyber crime and security threadsCyber crime and security threads
Cyber crime and security threads
 
Internet security issues
Internet security issuesInternet security issues
Internet security issues
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Data Security
Data SecurityData Security
Data Security
 
What is IT security[1]
What is IT security[1]What is IT security[1]
What is IT security[1]
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
CLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITYCLASS VII COMPUTER SECURITY
CLASS VII COMPUTER SECURITY
 
02 Educators Role
02 Educators Role02 Educators Role
02 Educators Role
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 
Sreerag cs network security
Sreerag cs network securitySreerag cs network security
Sreerag cs network security
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 

Viewers also liked

Viewers also liked (20)

Sound & Video File Sizes
Sound & Video File SizesSound & Video File Sizes
Sound & Video File Sizes
 
ISDD Back Up Strategies
ISDD Back Up StrategiesISDD Back Up Strategies
ISDD Back Up Strategies
 
ISDD Media Types - File Compression
ISDD Media Types - File CompressionISDD Media Types - File Compression
ISDD Media Types - File Compression
 
Other web page aspects
Other web page aspectsOther web page aspects
Other web page aspects
 
Backing Storage
Backing StorageBacking Storage
Backing Storage
 
Searching and Sorting
Searching and SortingSearching and Sorting
Searching and Sorting
 
ISDD Sequential & Random Access
ISDD Sequential & Random AccessISDD Sequential & Random Access
ISDD Sequential & Random Access
 
Normalisation
NormalisationNormalisation
Normalisation
 
Economic Impact of Computing Science
Economic Impact of Computing ScienceEconomic Impact of Computing Science
Economic Impact of Computing Science
 
Social Impacts of Computing Science
Social Impacts of Computing ScienceSocial Impacts of Computing Science
Social Impacts of Computing Science
 
ISDD Networking & Connectivity
ISDD Networking & ConnectivityISDD Networking & Connectivity
ISDD Networking & Connectivity
 
Audio Compression
Audio CompressionAudio Compression
Audio Compression
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
 
Higher Computing Science CSS
Higher Computing Science CSSHigher Computing Science CSS
Higher Computing Science CSS
 
Entities and attributes
Entities and attributesEntities and attributes
Entities and attributes
 
Web Pages
Web PagesWeb Pages
Web Pages
 
Database structure
Database structureDatabase structure
Database structure
 
Data Dictionary
Data DictionaryData Dictionary
Data Dictionary
 
Scripting Languages
Scripting LanguagesScripting Languages
Scripting Languages
 

Similar to ISDD Security Precautions

E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
Biroja
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
Kiran Patil
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
pinkutinku26
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
Abdulaziz Mohd
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
anita maharjan
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
dpd
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
drkelleher
 

Similar to ISDD Security Precautions (20)

N5 security precautions
N5 security precautionsN5 security precautions
N5 security precautions
 
A+ Update Endpoint Encryption
A+ Update Endpoint EncryptionA+ Update Endpoint Encryption
A+ Update Endpoint Encryption
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Encryption by fastech
Encryption by fastechEncryption by fastech
Encryption by fastech
 
Technical seminar on Security
Technical seminar on Security Technical seminar on Security
Technical seminar on Security
 
Security
SecuritySecurity
Security
 
Unit v
Unit vUnit v
Unit v
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Network security & cryptography
Network security & cryptographyNetwork security & cryptography
Network security & cryptography
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
Secure payment systems
Secure payment systemsSecure payment systems
Secure payment systems
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Secure communication in Networking
Secure communication in NetworkingSecure communication in Networking
Secure communication in Networking
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Key distribution code.ppt
Key distribution code.pptKey distribution code.ppt
Key distribution code.ppt
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Digital signature service in noida
Digital signature service in noidaDigital signature service in noida
Digital signature service in noida
 
Computer Systems Security
Computer Systems SecurityComputer Systems Security
Computer Systems Security
 

More from Forrester High School

More from Forrester High School (20)

Program Design
Program DesignProgram Design
Program Design
 
Database Evaluation
Database EvaluationDatabase Evaluation
Database Evaluation
 
Testing SQL
Testing SQLTesting SQL
Testing SQL
 
SQL
SQLSQL
SQL
 
Database Query Design
Database Query DesignDatabase Query Design
Database Query Design
 
Data Dictionary
Data DictionaryData Dictionary
Data Dictionary
 
Compound Keys
Compound KeysCompound Keys
Compound Keys
 
Entity Occurrence Diagrams
Entity Occurrence DiagramsEntity Occurrence Diagrams
Entity Occurrence Diagrams
 
Entity Relationship Diagrams
Entity Relationship DiagramsEntity Relationship Diagrams
Entity Relationship Diagrams
 
Database Analysis
Database AnalysisDatabase Analysis
Database Analysis
 
Software Evaluation
Software EvaluationSoftware Evaluation
Software Evaluation
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Standard Algorithms
Standard AlgorithmsStandard Algorithms
Standard Algorithms
 
File Handling
File HandlingFile Handling
File Handling
 
Python Predefined Functions
Python Predefined FunctionsPython Predefined Functions
Python Predefined Functions
 
Python Substrings
Python SubstringsPython Substrings
Python Substrings
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Sub-programs
Sub-programsSub-programs
Sub-programs
 
Records in Python
Records in PythonRecords in Python
Records in Python
 
Parallel arrays in python
Parallel arrays in pythonParallel arrays in python
Parallel arrays in python
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 

ISDD Security Precautions

  • 1.
  • 2. Anti Virus Software A program that can be used to scan files to identify and eliminate computer viruses and other malicious software Scans files looking for matches with previoulsy discovered virus signatures Anti virus software generally offers 2 modes: real-time protection, and scheduled scans
  • 3. Anti Virus Software Infected files can be deleted or placed in quarantine Heuristic anti virus software monitors suspicious behaviour of programs AV software has to be regularly updated as new viruses are discovered
  • 4. Passwords Most commonly used along with username although not always e.g. password protected file.
  • 5. Passwords Weak Passwords Your name Your child’s name A pet An easy word 123456 qwerty admin password
  • 6. Passwords Good practice At least 8 chars Does not contain username, real name, company name Does not contain complete word Different from other passwords Mix of uppercase, lowercase, numbers & symbols
  • 7. Biometrics Biometrics is a way of proving identity using a unique biological trait e.g. Fingerprint (or palm) Retina / iris pattern Voice recognition Face recognition DNA
  • 8. Biometrics Advantages: Don’t need to remember passwords Virtually impossible to forge Current Uses Airport security - used to identify passengers Mobile devices - use fingerprint scan to access payment Building access – used to identify authorised personnel Schools – access, payment, registration, library books Cars – access via fingerprint or facial recognition Banks – ATM cash withdrawals
  • 9. Encryption Encryption is the conversion of data into a form that cannot be easily understood by unauthorised people Decryption is the inverse of encryption - reversing the steps of encryption in order to get the original message
  • 10. Encryption Encryption allows us to protect data an message from anyone we do not want to see it. The encrypted data is known as cyphertext
  • 11. Symmetric Encryption  Same key is used to encrypt and decrypt  Sender and receiver both know the key
  • 12. Symmetric Encryption Advantages Faster and easier to implement that asymmetric encryption Disadvantages Sender and receiver need to know the key, but how do they share that securely? If they have a secure way of sending the key, why would they need to use encryption…?
  • 13. Asymmetric Encryption  A pair of keys is used to encrypt the data  Private key and public key  Anyone can encrypt a message using a public key  Only the holder of the private key can decrypt the message  Asymmetric encryption is also known as public-key encryption
  • 14. Asymmetric Encryption Example 1.Aaron(the recipient) generates a pair of keys, one public and one private 2.He sends the public key to Alison (the sender) 3.Alison encrypts the message using the public key and sends it to Aaron 4.Aaron decrypts the message using the private key
  • 15. Asymmetric Encryption Advantages No need for private key exchange Increased security – only person with private key can decrypt Can be used for Digital Signatures Disadvantages Slow – takes time to encrypt and decrypt Could be cracked using brute force – try all possible keys (although RSA Security claim that using a 2048 bit key would not be crackable until around 2030).
  • 16. Digital Signatures  Used to validate the authenticity and integrity of a message or document  Can validate the origin, identity and status of a document  Uses asymmetric encryption, with public and private keys
  • 17. Digital Signatures 1. Private key used to create a hash (a number generated from string of text) 2. Hash is sent along with document 3. Hash is decrypted with the public key – verifies the document 4. Any change/tampering of the document will mean the hash will not match (Note that the message itself does not have to be encrypted)
  • 18. Digital Certificates  Provides identifying information to enhance user trust  Used to encrypt communication between browser and website  Issued by an official, trusted agency  Digitally signed by a root certificate belonging to a trusted Certificate Authority (CA)  Includes information about the owner's identity e.g. name, email, address, domain authority, certificate issue date and CA authority name.
  • 20. Security Protocols Security protocols ensure data is protected when sent across a network Hyper Text Transfer Protocol Secure The secure version of HTTP Data sent between browser and the website is encrypted Used with banks, shops, webmail etc. to encrypt credit card and other transaction and personal details
  • 21. Firewall  Prevents unauthorised access to a private network  Can be hardware and/or software  All messages entering or leaving network pass through firewall which checks to see if the meet allowed criteria