4.2.1 Network Issues and Communication [Autosaved].pptx

TeenaSharma73 17 views 65 slides May 06, 2024
Slide 1
Slide 1 of 65
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65

About This Presentation

IGCSE chapter4


Slide Content

THOUGHT FOR THE DAY

Starter – Guess the word game Guess the word Game.ppt

Security of computer networks

Why do we need to secure our networks and online systems?

Why do we need to secure our networks and online systems?

Why do we need to secure our networks and online systems? Networks should be protected against data interception and theft. Data traffic in LAN’S and WAN’s can be intercepted All networks must be kept secure so that data is not corrupted or stolen.

Define passive attack

Define passive attack

Define passive attack Hackers use packet analyzers or 'packet sniffers' to intercept the data packets, which are then analyzed and their data is decoded(converting code into plaintext) . The criminals can therefore steal sensitive data such as logins, passwords, credit card numbers and PINs. As there is no change to the network data or systems, it is called a 'passive attack'. (only collecting information but not modifying data)

Network Protection Different ways to protect data

Network Protection Different ways to protect data Encryption Firewalls Authentication Passwords Biometric methods Magnetic stripes Physical tokens Electronic tokens Zero login

Encryption When data is transferred electronically, it can be encrypted to keep it secure.

  Define Encryption. Encryption is the scrambling of data into a form that cannot be understood by unauthorized recipients. The encrypted data must be decrypted back to its original form to make it readable

  Define encrypted and decrypted   Encrypted: The process of turning information into a form that only the intended recipient can decrypt and read. Decrypted: The process of recovering the original text from the encrypted text.  

Asymmetric encryption:

Asymmetric encryption: It is a method of encryption which employs two different keys – a public key and a private key. A private key can decrypt messages encrypted with the corresponding public key. The public key is freely available and is used to encrypt a message for the person who then decrypts it with their private key.

Asymmetric encryption: Example: Bank provides public key to the customer(to encrypt data) and keeping private for its own purpose to decrypt data.

Plenary: Exit Ticket Summarize the terms and write one sentence about each one of them.

  Firewalls:

  Firewalls: It can be either software or hardware devices that protect against unauthorized access to a network/internet. Eg. It can inspect the incoming packets and reject those that are from IP addresses not on a trusted list and block communication to certain external IP addresses .

Authentication

Authentication Authentication is a process used to verify that data comes from a secure and trusted source. It works with encryption to strengthen internet security.

Define Password A password is a secret word or phrase that is used to authenticate a user so that they can gain access.

Methods to protect passwords: Strong passwords - (A password that is difficult to detect by humans and computer programs) • Strong passwords should contain: at least eight characters long both numbers and letters both upper and lower case letters at least one special character( !, $, ?, etc.)

never use user-identifiable items( name, date of birth, phone number, postal code, car registration, etc.) Passwords should not be changed regularly. Previous passwords must never be reused. Passwords can be written down anywhere. Passwords must never be shared with other users. Passwords should be predictable so hackers can guess them or try to enter them by trial and error.

never use user-identifiable items( name, date of birth, phone number, postal code, car registration, etc.) Passwords should be changed regularly. Previous passwords must never be reused. Passwords must never be written down. Passwords must never be shared with other users. Passwords should be unpredictable so hackers cannot guess them or try to enter them by trial and error. never use user-identifiable items( name, date of birth, phone number, postal code, car registration, etc.) Passwords should not be changed regularly. Previous passwords must never be reused. Passwords can be written down anywhere. Passwords must never be shared with other users. Passwords should be predictable so hackers can guess them or try to enter them by trial and error.

Weak passwords : Easily guessed or discovered by hackers. They will try things such as dates of birth, names of relatives, favorite sports teams, etc. in different combinations.

Weak passwords : Easily guessed or discovered by hackers. They will try things such as dates of birth, names of relatives, favorite sports teams, etc. in different combinations. Run anti-spyware – a software to make sure that your passwords aren't being relayed back to whoever put the spyware(malware) on your computer. A nti-spyware software must be kept up-to-date.

List out different Authentication methods: 1-Biometric methods 2-Magnetic stripes. 3-Smart cards 4-Physical tokens 5-Electronic tokens 6-Zero login

Common methods of biometric authorization include: Physiological biometric: It is a data relates to physical aspect of a person’s body retina scans Fingerprint mapping Facial recognition blood vessel patterns in hands and arms Behavioural biometric: Includes signatures, handwriting analysis and voice pattern recognition.

Magnetic Stripe: Magnetic stripe reader reads data contained on the magnetic stripe cards by pulling the card through magnetic stripe reader. This is known as swiping . Then the data is sent to computer for processing. Data contained includes - name, ID number, gender and date of birth .

Magnetic stripes

Magnetic stripes Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a magnetic stripe reader to allow access. The magnetic stripe which contains data on the back of a credit card is split into three tracks.

Magnetic stripes The first and second track hold coded information about the cardholder's account: card holder's full name, card number and CVV value(Card Verification Value), date of expiry of the card code for the country in which it was issued. The third track - holds details like the currencies that are valid for use with the card.

Smart cards A smart card is a plastic card with a built-in processor contains a computer chip and when it is held near a reader, data can be transferred to allow the owner to be authenticated for access to a computer system.

Two kinds of smart cards: contact and contactless. Contact smart cards - the smart card is inserted into the reader, then the card's contact plate makes physical contact with the reader to transmit data. The user then enters the associated PIN . Contactless smart cards – The user has to held the card just close to the reader, and data is transmitted via radio waves.

Physical token A key fob is the small handheld remote control device that controls a remote keyless entry system.

Physical token( dongles ) A physical token allows you to access software and verify your identity with a physical device rather than relying on authentication codes or passwords. They are also called key fobs, security tokens or USB tokens.

Why do we use multi-factor authentication methods and how it works?

Why do we use multi-factor authentication methods and how it works?

Why do we use multi-factor authentication methods and how it works? Multi-factor authentication methods use mobile phones in the absence of physical tokens(may be lost, forgotten or stolen). The user has to enter their knowledge factor(password) and the server sends a text message containing an access code ( One Time Password or OTP ) to their registered mobile phone. The code can be used once within a certain time limit.

Electronic tokens

Electronic tokens

Electronic tokens Electronic tokens are called as cryptocurrencies which acts a medium of exchange between people and businesses. It can be used for electronic payments where the credit card number is converted to a string of random characters that have no value. Then the payment network (Visa/Master Card/American Express) uses its secure keys to decode and pass the card number to the standard electronic payment processors. Importantly, merchants themselves cannot decode a token. Converting a token back to a card number requires access to the encryption keys, which are typically stored in military-grade security .

Zero login

Zero login Using artificial intelligence, technologies are being developed so that users can be authenticated by how they behave but not by a password or physical features. This is called zero login . Its main difference is that complex passwords or other documentation will not be required for identification. Our smart devices will be smart and secure enough to recognise facial features , voice, movements and other ways, in which a person is unique, to use as identification. How you swipe and type , where you are and when you work are all unique to you. Every time a user requests access, a new authenticating message is generated. Hence, no credentials are fixed within the passwordless platform so there is nothing for an attacker to steal. The motion sensor in your phone recognize you

Explain the ways how biometric devices work? Verification Identification Screening

Explain the ways how biometric devices work? Verification: Biometric technologies perform a comparison of the data with a template that has previously been stored, such as a fingerprint scan or other physical tokens such as retina, iris or face scans, on a personal computer or electronic safe(locker). To make sure a person is who they say they are :

Explain the ways how biometric devices work? Identification: To identify a person in a crowd.  

Explain the ways how biometric devices work? Screening: To match a person who may be on a ‘watch list’ for security purposes.

Plenary – Exit Ticket Write all the concepts learnt today in your notebook

Thank you
Tags