SECURITY PRECAUTIONS STARTER WHATS THE QUESTION You have

  • Slides: 16
Download presentation
SECURITY PRECAUTIONS

SECURITY PRECAUTIONS

STARTER – WHAT’S THE QUESTION? • You have been given two answers to questions,

STARTER – WHAT’S THE QUESTION? • You have been given two answers to questions, you should write a suitable question to get the following answers. • 1. monitors the ingoing and outgoing traffic of a network to monitor for suspicious activity • 2. should be a mixture of letters and numbers including capital letters and symbols

SECURITY PRECAUTIONS Learning Intention: We are learning to understand how encryption and biometrics are

SECURITY PRECAUTIONS Learning Intention: We are learning to understand how encryption and biometrics are used to secure our data Success Criteria: • I can describe and explain the benefits of biometrics • I can explain the purpose of encryption • I can differentiate and explain public and private keys

BIOMETRICS • Some systems use biometric technology to ensure that only authorised users gain

BIOMETRICS • Some systems use biometric technology to ensure that only authorised users gain access to a network. • Biometric security involves storing data about: – Fingerprints – Voices – Eyes

FINGERPRINT SCAN • Your fingerprints are unique and add and extra layer of security

FINGERPRINT SCAN • Your fingerprints are unique and add and extra layer of security onto your network. • You can even get your own personal USB fingerprint scanner to add as an extra layer of security to your PC

RETINA SCAN • System scans the users eye as everyone's is unique – simples!

RETINA SCAN • System scans the users eye as everyone's is unique – simples! Ethan Hunt has to get a retina scan every time he is sent a mission! Voice recognition Although voices can be similar each person has a voice print which is unique to them

BIOMETRIC PASSPORTS Killing the need for Passwords

BIOMETRIC PASSPORTS Killing the need for Passwords

BENEFITS OF BIOMETRICS • Think: – Individually take 60 seconds to think of the

BENEFITS OF BIOMETRICS • Think: – Individually take 60 seconds to think of the benefits of biometric passwords • Pair: – Share your thoughts with your pair • Share: – Feedback to the class

CAN YOU DECODE THE MESSAGE? B 4 H 3 D 1 D 1 B

CAN YOU DECODE THE MESSAGE? B 4 H 3 D 1 D 1 B 3 C 2

ENCRYPTION Can you come up with a sentence that you think defines/describes what encryption

ENCRYPTION Can you come up with a sentence that you think defines/describes what encryption is?

ENCRYPTION Is the process of encoding information to make it unreadable to those who

ENCRYPTION Is the process of encoding information to make it unreadable to those who gain unauthorised access to it.

ENCRYPTION What I’m looking for is for you to work as a team to

ENCRYPTION What I’m looking for is for you to work as a team to learn how cryptography works and to solve some cryptograms as quickly as possible This is because throughout the world, people need to send secret messages: when communicating on the internet, when talking to spies, when having affairs….

MURDER IN THE MATHS FACULTY • In the maths faculty! • The body has

MURDER IN THE MATHS FACULTY • In the maths faculty! • The body has not yet been identified. . . • Your task is to figure out who did it, where, and with what weapon • Teams of three or four people – one minute to organise this!

ASYMMETRIC ENCRYPTION • Makes use of two paired keys: – Public Keys – Private

ASYMMETRIC ENCRYPTION • Makes use of two paired keys: – Public Keys – Private Keys • Public keys are unique to a user profile and are available to all systems trying to communicate with the users computer • Private keys are also unique to a user profile but are not available to any other computers and are not transferred from system to system

ASYMMETRIC ENCRYPTION When system A wishes to send a secure message to system B,

ASYMMETRIC ENCRYPTION When system A wishes to send a secure message to system B, it will use system B’s public key to encrypt the data. System B then uses its own private key to decrypt the data SYSTEM A SYSTEM B Draw a diagram to reflect the scenario given above

PLENARY – EXIT PASS • On an exit pass write one word that summarises

PLENARY – EXIT PASS • On an exit pass write one word that summarises today’s lesson – this should be encrypted with your Caesar Cipher Wheel with the key given underneath for it to be decoded by your teacher