SlideShare a Scribd company logo
ISDD Security Precautions
Anti Virus Software
A program that can be used to scan files to identify and eliminate computer
viruses and other malicious software
Scans files looking for matches with previoulsy discovered virus signatures
Anti virus software generally offers 2 modes: real-time protection, and
scheduled scans
Anti Virus Software
Infected files can be deleted or placed in quarantine
Heuristic anti virus software monitors suspicious behaviour of programs
AV software has to be regularly updated as new viruses are discovered
Passwords
Most commonly used along with username although not always e.g.
password protected file.
Passwords
Weak Passwords
Your name
Your child’s name
A pet
An easy word
123456
qwerty
admin
password
Passwords
Good practice
At least 8 chars
Does not contain username, real name, company name
Does not contain complete word
Different from other passwords
Mix of uppercase, lowercase, numbers & symbols
Biometrics
Biometrics is a way of proving identity using a unique biological trait e.g.
Fingerprint (or palm)
Retina / iris pattern
Voice recognition
Face recognition
DNA
Biometrics
Advantages:
Don’t need to remember passwords
Virtually impossible to forge
Current Uses
Airport security - used to identify passengers
Mobile devices - use fingerprint scan to access payment
Building access – used to identify authorised personnel
Schools – access, payment, registration, library books
Cars – access via fingerprint or facial recognition
Banks – ATM cash withdrawals
Encryption
Encryption is the conversion of data into a form that cannot be easily
understood by unauthorised people
Decryption is the inverse of encryption - reversing the steps of encryption in
order to get the original message
Encryption
Encryption allows us to protect data an message from anyone we do not want
to see it.
The encrypted data is known as cyphertext
Symmetric Encryption
 Same key is used to encrypt and decrypt
 Sender and receiver both know the key
Symmetric Encryption
Advantages
Faster and easier to implement that asymmetric encryption
Disadvantages
Sender and receiver need to know the key, but how do they share that
securely?
If they have a secure way of sending the key, why would they need to use
encryption…?
Asymmetric Encryption
 A pair of keys is used to encrypt the data
 Private key and public key
 Anyone can encrypt a message using a public key
 Only the holder of the private key can decrypt the message
 Asymmetric encryption is also known as public-key encryption
Asymmetric Encryption
Example
1.Aaron(the recipient) generates a pair of keys, one public and one private
2.He sends the public key to Alison (the sender)
3.Alison encrypts the message using the public key and sends it to Aaron
4.Aaron decrypts the message using the private key
Asymmetric Encryption
Advantages
No need for private key exchange
Increased security – only person with private key can decrypt
Can be used for Digital Signatures
Disadvantages
Slow – takes time to encrypt and decrypt
Could be cracked using brute force – try all possible keys
(although RSA Security claim that using a 2048 bit key would not be
crackable until around 2030).
Digital Signatures
 Used to validate the authenticity and integrity of a message or document
 Can validate the origin, identity and status of a document
 Uses asymmetric encryption, with public and private keys
Digital Signatures
1. Private key used to create a hash (a number generated from string of text)
2. Hash is sent along with document
3. Hash is decrypted with the public key – verifies the document
4. Any change/tampering of the document will mean the hash will not match
(Note that the message itself does not have to be encrypted)
Digital Certificates
 Provides identifying information to enhance user trust
 Used to encrypt communication between browser and website
 Issued by an official, trusted agency
 Digitally signed by a root certificate belonging to a trusted Certificate
Authority (CA)
 Includes information about the owner's identity e.g. name, email, address,
domain authority, certificate issue date and CA authority name.
Digital Certificates
Security Protocols
Security protocols ensure data is protected when sent across a network
Hyper Text Transfer Protocol Secure
The secure version of HTTP
Data sent between browser and the website is encrypted
Used with banks, shops, webmail etc. to encrypt credit card and other
transaction and personal details
Firewall
 Prevents unauthorised access to a private network
 Can be hardware and/or software
 All messages entering or leaving network pass through firewall which
checks to see if the meet allowed criteria
Firewall

More Related Content

PPT
ISDD - Security Risks
PPT
ISDD Hacking and Viruses
PDF
How to Keep Yourself secure while browsing internet pre null meet kolkata
PPTX
Spyware
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Malware used in cybercrime
PPTX
02 Educators Role
PPTX
Malware
ISDD - Security Risks
ISDD Hacking and Viruses
How to Keep Yourself secure while browsing internet pre null meet kolkata
Spyware
Ethical hacking introduction to ethical hacking
Malware used in cybercrime
02 Educators Role
Malware

What's hot (20)

PPTX
Internet Safety Techniques
PPTX
Ethical hacking trojans, worms and spyware
PPT
S P Y W A R E4 S I K
PPT
Jeopardy
PPT
Digital Security Slide Show
PPTX
Cyber security
PPTX
Cyber crime and security threads
PPTX
Internet security issues
PPTX
Internet Securities Issues
PDF
UNDERSTANDING HACKING
PPT
Data Security
PPTX
What is IT security[1]
PPT
Cyber Crime
PPTX
Internet Security in Web 2.0
DOCX
CLASS VII COMPUTER SECURITY
PPTX
02 Educators Role
PDF
PPS
Sreerag cs network security
PPTX
Spyware risk it's time to get smart
Internet Safety Techniques
Ethical hacking trojans, worms and spyware
S P Y W A R E4 S I K
Jeopardy
Digital Security Slide Show
Cyber security
Cyber crime and security threads
Internet security issues
Internet Securities Issues
UNDERSTANDING HACKING
Data Security
What is IT security[1]
Cyber Crime
Internet Security in Web 2.0
CLASS VII COMPUTER SECURITY
02 Educators Role
Sreerag cs network security
Spyware risk it's time to get smart
Ad

Viewers also liked (20)

PPT
Sound & Video File Sizes
PPT
ISDD Back Up Strategies
PPT
ISDD Media Types - File Compression
PPT
Other web page aspects
PPT
Backing Storage
PPT
Searching and Sorting
PPT
ISDD Sequential & Random Access
PPT
Normalisation
PPTX
Economic Impact of Computing Science
PPTX
Social Impacts of Computing Science
PPT
ISDD Networking & Connectivity
PPT
Audio Compression
PPT
Entity Relationship Diagrams
PPT
Database Relationships
PPT
Higher Computing Science CSS
PPT
Entities and attributes
PPT
PPT
Database structure
PPT
Data Dictionary
PPT
Scripting Languages
Sound & Video File Sizes
ISDD Back Up Strategies
ISDD Media Types - File Compression
Other web page aspects
Backing Storage
Searching and Sorting
ISDD Sequential & Random Access
Normalisation
Economic Impact of Computing Science
Social Impacts of Computing Science
ISDD Networking & Connectivity
Audio Compression
Entity Relationship Diagrams
Database Relationships
Higher Computing Science CSS
Entities and attributes
Database structure
Data Dictionary
Scripting Languages
Ad

Similar to ISDD Security Precautions (20)

PPT
N5 security precautions
PPT
A+ Update Endpoint Encryption
PPTX
Internet Security
PPTX
Encryption by fastech
PPTX
ebusiness digital,E business signature .
PPTX
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
PPTX
Cryptography and Network Security Principles.pptx
PPT
Technical seminar on Security
PPT
Security
DOCX
PDF
Information Security Imp +Past Paper.pdf
PPTX
E-commerce- Security & Encryption
PPTX
Network security & cryptography
PPTX
Network security & cryptography
PPTX
Chapter 2 System Security.pptx
PPT
Secure payment systems
PDF
E-Commerce security
PPTX
Secure communication in Networking
PPTX
Fundamental Concept of Cryptography in Computer Security
PPT
Computer security and_privacy_2010-2011
N5 security precautions
A+ Update Endpoint Encryption
Internet Security
Encryption by fastech
ebusiness digital,E business signature .
CRYPTOGRAPHY crytopgraphy wh is sd wkd ,w d .pptx
Cryptography and Network Security Principles.pptx
Technical seminar on Security
Security
Information Security Imp +Past Paper.pdf
E-commerce- Security & Encryption
Network security & cryptography
Network security & cryptography
Chapter 2 System Security.pptx
Secure payment systems
E-Commerce security
Secure communication in Networking
Fundamental Concept of Cryptography in Computer Security
Computer security and_privacy_2010-2011

More from Forrester High School (20)

PPTX
Program Design
PPTX
Database Evaluation
PPTX
PPTX
Database Query Design
PPTX
Data Dictionary
PPTX
Compound Keys
PPTX
Entity Occurrence Diagrams
PPTX
Entity Relationship Diagrams
PPTX
Database Analysis
PPTX
Software Evaluation
PPTX
Software Testing
PPTX
Standard Algorithms
PPTX
File Handling
PPTX
Python Predefined Functions
PPTX
Python Substrings
PPTX
Variable Scope
PPTX
Sub-programs
PPTX
Records in Python
PPTX
Parallel arrays in python
Program Design
Database Evaluation
Database Query Design
Data Dictionary
Compound Keys
Entity Occurrence Diagrams
Entity Relationship Diagrams
Database Analysis
Software Evaluation
Software Testing
Standard Algorithms
File Handling
Python Predefined Functions
Python Substrings
Variable Scope
Sub-programs
Records in Python
Parallel arrays in python

Recently uploaded (20)

PDF
1_English_Language_Set_2.pdf probationary
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PPTX
20th Century Theater, Methods, History.pptx
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PPTX
Introduction to Building Materials
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Share_Module_2_Power_conflict_and_negotiation.pptx
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
1_English_Language_Set_2.pdf probationary
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
202450812 BayCHI UCSC-SV 20250812 v17.pptx
FOISHS ANNUAL IMPLEMENTATION PLAN 2025.pdf
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
History, Philosophy and sociology of education (1).pptx
Indian roads congress 037 - 2012 Flexible pavement
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
20th Century Theater, Methods, History.pptx
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Introduction to Building Materials
FORM 1 BIOLOGY MIND MAPS and their schemes
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Share_Module_2_Power_conflict_and_negotiation.pptx
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc

ISDD Security Precautions

  • 2. Anti Virus Software A program that can be used to scan files to identify and eliminate computer viruses and other malicious software Scans files looking for matches with previoulsy discovered virus signatures Anti virus software generally offers 2 modes: real-time protection, and scheduled scans
  • 3. Anti Virus Software Infected files can be deleted or placed in quarantine Heuristic anti virus software monitors suspicious behaviour of programs AV software has to be regularly updated as new viruses are discovered
  • 4. Passwords Most commonly used along with username although not always e.g. password protected file.
  • 5. Passwords Weak Passwords Your name Your child’s name A pet An easy word 123456 qwerty admin password
  • 6. Passwords Good practice At least 8 chars Does not contain username, real name, company name Does not contain complete word Different from other passwords Mix of uppercase, lowercase, numbers & symbols
  • 7. Biometrics Biometrics is a way of proving identity using a unique biological trait e.g. Fingerprint (or palm) Retina / iris pattern Voice recognition Face recognition DNA
  • 8. Biometrics Advantages: Don’t need to remember passwords Virtually impossible to forge Current Uses Airport security - used to identify passengers Mobile devices - use fingerprint scan to access payment Building access – used to identify authorised personnel Schools – access, payment, registration, library books Cars – access via fingerprint or facial recognition Banks – ATM cash withdrawals
  • 9. Encryption Encryption is the conversion of data into a form that cannot be easily understood by unauthorised people Decryption is the inverse of encryption - reversing the steps of encryption in order to get the original message
  • 10. Encryption Encryption allows us to protect data an message from anyone we do not want to see it. The encrypted data is known as cyphertext
  • 11. Symmetric Encryption  Same key is used to encrypt and decrypt  Sender and receiver both know the key
  • 12. Symmetric Encryption Advantages Faster and easier to implement that asymmetric encryption Disadvantages Sender and receiver need to know the key, but how do they share that securely? If they have a secure way of sending the key, why would they need to use encryption…?
  • 13. Asymmetric Encryption  A pair of keys is used to encrypt the data  Private key and public key  Anyone can encrypt a message using a public key  Only the holder of the private key can decrypt the message  Asymmetric encryption is also known as public-key encryption
  • 14. Asymmetric Encryption Example 1.Aaron(the recipient) generates a pair of keys, one public and one private 2.He sends the public key to Alison (the sender) 3.Alison encrypts the message using the public key and sends it to Aaron 4.Aaron decrypts the message using the private key
  • 15. Asymmetric Encryption Advantages No need for private key exchange Increased security – only person with private key can decrypt Can be used for Digital Signatures Disadvantages Slow – takes time to encrypt and decrypt Could be cracked using brute force – try all possible keys (although RSA Security claim that using a 2048 bit key would not be crackable until around 2030).
  • 16. Digital Signatures  Used to validate the authenticity and integrity of a message or document  Can validate the origin, identity and status of a document  Uses asymmetric encryption, with public and private keys
  • 17. Digital Signatures 1. Private key used to create a hash (a number generated from string of text) 2. Hash is sent along with document 3. Hash is decrypted with the public key – verifies the document 4. Any change/tampering of the document will mean the hash will not match (Note that the message itself does not have to be encrypted)
  • 18. Digital Certificates  Provides identifying information to enhance user trust  Used to encrypt communication between browser and website  Issued by an official, trusted agency  Digitally signed by a root certificate belonging to a trusted Certificate Authority (CA)  Includes information about the owner's identity e.g. name, email, address, domain authority, certificate issue date and CA authority name.
  • 20. Security Protocols Security protocols ensure data is protected when sent across a network Hyper Text Transfer Protocol Secure The secure version of HTTP Data sent between browser and the website is encrypted Used with banks, shops, webmail etc. to encrypt credit card and other transaction and personal details
  • 21. Firewall  Prevents unauthorised access to a private network  Can be hardware and/or software  All messages entering or leaving network pass through firewall which checks to see if the meet allowed criteria