Starter – Guess the word game Guess the word Game.ppt
Security of computer networks
Why do we need to secure our networks and online systems?
Why do we need to secure our networks and online systems?
Why do we need to secure our networks and online systems? Networks should be protected against data interception and theft. Data traffic in LAN’S and WAN’s can be intercepted All networks must be kept secure so that data is not corrupted or stolen.
Define passive attack
Define passive attack
Define passive attack Hackers use packet analyzers or 'packet sniffers' to intercept the data packets, which are then analyzed and their data is decoded(converting code into plaintext) . The criminals can therefore steal sensitive data such as logins, passwords, credit card numbers and PINs. As there is no change to the network data or systems, it is called a 'passive attack'. (only collecting information but not modifying data)
Network Protection Different ways to protect data
Network Protection Different ways to protect data Encryption Firewalls Authentication Passwords Biometric methods Magnetic stripes Physical tokens Electronic tokens Zero login
Encryption When data is transferred electronically, it can be encrypted to keep it secure.
Define Encryption. Encryption is the scrambling of data into a form that cannot be understood by unauthorized recipients. The encrypted data must be decrypted back to its original form to make it readable
Define encrypted and decrypted Encrypted: The process of turning information into a form that only the intended recipient can decrypt and read. Decrypted: The process of recovering the original text from the encrypted text.
Asymmetric encryption:
Asymmetric encryption: It is a method of encryption which employs two different keys – a public key and a private key. A private key can decrypt messages encrypted with the corresponding public key. The public key is freely available and is used to encrypt a message for the person who then decrypts it with their private key.
Asymmetric encryption: Example: Bank provides public key to the customer(to encrypt data) and keeping private for its own purpose to decrypt data.
Plenary: Exit Ticket Summarize the terms and write one sentence about each one of them.
Firewalls:
Firewalls: It can be either software or hardware devices that protect against unauthorized access to a network/internet. Eg. It can inspect the incoming packets and reject those that are from IP addresses not on a trusted list and block communication to certain external IP addresses .
Authentication
Authentication Authentication is a process used to verify that data comes from a secure and trusted source. It works with encryption to strengthen internet security.
Define Password A password is a secret word or phrase that is used to authenticate a user so that they can gain access.
Methods to protect passwords: Strong passwords - (A password that is difficult to detect by humans and computer programs) • Strong passwords should contain: at least eight characters long both numbers and letters both upper and lower case letters at least one special character( !, $, ?, etc.)
never use user-identifiable items( name, date of birth, phone number, postal code, car registration, etc.) Passwords should not be changed regularly. Previous passwords must never be reused. Passwords can be written down anywhere. Passwords must never be shared with other users. Passwords should be predictable so hackers can guess them or try to enter them by trial and error.
never use user-identifiable items( name, date of birth, phone number, postal code, car registration, etc.) Passwords should be changed regularly. Previous passwords must never be reused. Passwords must never be written down. Passwords must never be shared with other users. Passwords should be unpredictable so hackers cannot guess them or try to enter them by trial and error. never use user-identifiable items( name, date of birth, phone number, postal code, car registration, etc.) Passwords should not be changed regularly. Previous passwords must never be reused. Passwords can be written down anywhere. Passwords must never be shared with other users. Passwords should be predictable so hackers can guess them or try to enter them by trial and error.
Weak passwords : Easily guessed or discovered by hackers. They will try things such as dates of birth, names of relatives, favorite sports teams, etc. in different combinations.
Weak passwords : Easily guessed or discovered by hackers. They will try things such as dates of birth, names of relatives, favorite sports teams, etc. in different combinations. Run anti-spyware – a software to make sure that your passwords aren't being relayed back to whoever put the spyware(malware) on your computer. A nti-spyware software must be kept up-to-date.
List out different Authentication methods: 1-Biometric methods 2-Magnetic stripes. 3-Smart cards 4-Physical tokens 5-Electronic tokens 6-Zero login
Common methods of biometric authorization include: Physiological biometric: It is a data relates to physical aspect of a person’s body retina scans Fingerprint mapping Facial recognition blood vessel patterns in hands and arms Behavioural biometric: Includes signatures, handwriting analysis and voice pattern recognition.
Magnetic Stripe: Magnetic stripe reader reads data contained on the magnetic stripe cards by pulling the card through magnetic stripe reader. This is known as swiping . Then the data is sent to computer for processing. Data contained includes - name, ID number, gender and date of birth .
Magnetic stripes
Magnetic stripes Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a magnetic stripe reader to allow access. The magnetic stripe which contains data on the back of a credit card is split into three tracks.
Magnetic stripes The first and second track hold coded information about the cardholder's account: card holder's full name, card number and CVV value(Card Verification Value), date of expiry of the card code for the country in which it was issued. The third track - holds details like the currencies that are valid for use with the card.
Smart cards A smart card is a plastic card with a built-in processor contains a computer chip and when it is held near a reader, data can be transferred to allow the owner to be authenticated for access to a computer system.
Two kinds of smart cards: contact and contactless. Contact smart cards - the smart card is inserted into the reader, then the card's contact plate makes physical contact with the reader to transmit data. The user then enters the associated PIN . Contactless smart cards – The user has to held the card just close to the reader, and data is transmitted via radio waves.
Physical token A key fob is the small handheld remote control device that controls a remote keyless entry system.
Physical token( dongles ) A physical token allows you to access software and verify your identity with a physical device rather than relying on authentication codes or passwords. They are also called key fobs, security tokens or USB tokens.
Why do we use multi-factor authentication methods and how it works?
Why do we use multi-factor authentication methods and how it works?
Why do we use multi-factor authentication methods and how it works? Multi-factor authentication methods use mobile phones in the absence of physical tokens(may be lost, forgotten or stolen). The user has to enter their knowledge factor(password) and the server sends a text message containing an access code ( One Time Password or OTP ) to their registered mobile phone. The code can be used once within a certain time limit.
Electronic tokens
Electronic tokens
Electronic tokens Electronic tokens are called as cryptocurrencies which acts a medium of exchange between people and businesses. It can be used for electronic payments where the credit card number is converted to a string of random characters that have no value. Then the payment network (Visa/Master Card/American Express) uses its secure keys to decode and pass the card number to the standard electronic payment processors. Importantly, merchants themselves cannot decode a token. Converting a token back to a card number requires access to the encryption keys, which are typically stored in military-grade security .
Zero login
Zero login Using artificial intelligence, technologies are being developed so that users can be authenticated by how they behave but not by a password or physical features. This is called zero login . Its main difference is that complex passwords or other documentation will not be required for identification. Our smart devices will be smart and secure enough to recognise facial features , voice, movements and other ways, in which a person is unique, to use as identification. How you swipe and type , where you are and when you work are all unique to you. Every time a user requests access, a new authenticating message is generated. Hence, no credentials are fixed within the passwordless platform so there is nothing for an attacker to steal. The motion sensor in your phone recognize you
Explain the ways how biometric devices work? Verification Identification Screening
Explain the ways how biometric devices work? Verification: Biometric technologies perform a comparison of the data with a template that has previously been stored, such as a fingerprint scan or other physical tokens such as retina, iris or face scans, on a personal computer or electronic safe(locker). To make sure a person is who they say they are :
Explain the ways how biometric devices work? Identification: To identify a person in a crowd.
Explain the ways how biometric devices work? Screening: To match a person who may be on a ‘watch list’ for security purposes.
Plenary – Exit Ticket Write all the concepts learnt today in your notebook