Biometrics - Developing the Architecture, Api, Encryption And ...
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics...
-
Upload
nelson-palmer -
Category
Documents
-
view
213 -
download
1
Transcript of Starter How many methods of keeping data secure can you think of… Username and Password Biometrics...
![Page 1: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/1.jpg)
Starter
How many methods of keeping data securecan you think of… Username and Password
Biometrics
Digital SignatureEncryption
Access Levels
Physical Security
![Page 2: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/2.jpg)
Lesson Objectives
By the end of the lesson you will be able to:
• Describe what is meant by the terms user ID and password and explain why these are used
• Discuss the problems of data security, including problems surrounding common network environments
• Identify the need for encryption and authentication techniques
![Page 3: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/3.jpg)
Does it matter…• Large amounts of data and information are
transferred easily from one computer toanother.
• Along with being a good thing, this also causesconcern over the security of information.
• What sort of information would you not want getting into the wrong hands?
![Page 4: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/4.jpg)
Get your books out!
• Put today’s date and the title Network Security in the front of your books, underline them neatly with a ruler!
• Write down 3 methods of how data can be kept secure.
• Write down 2 pieces of information about yourself that you wouldn’t want anyone to have unauthorised access to.
![Page 5: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/5.jpg)
Authentication Techniques
• These are used to check that a person accessing a network or system is genuinely the person in question.
• There are three main techniques used, any ideas what they are…
Usernames and passwords Digital signatures Biometrics
![Page 6: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/6.jpg)
Using pages 40 and 41… 1. What is a username and why must it be unique?
2. What is a password?
3. Write down 4 characteristics of a good password.
4. Write down 3 things to consider when using passwords.
5. How does biometrics work?
6. Write down 2 advantages of biometrics.
7. Write down 2 disadvantages of biometrics.
8. What is a digital signature?
9. Why are digital signatures used?
![Page 7: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/7.jpg)
Encryption • This is used to stop data getting into the wrong hands as it travels over the Internet.
• It is also used when saving personal data on laptops or removable storage devices.
• Encryption works by scrambling data as it’s transferred from one place to another.
• If any of this data gets lost or stolen, it cannot be read.
• Only the authorised person being sent the information will have the decryption key that allows them to unscramble the information.
Why bother?
Protection against hackers – a hacker could simply intercept and read youremail. They could also alter data or collect personal details including credit card numbers which could be used to commit fraud.
![Page 8: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/8.jpg)
When to use it…
When Encryption should be used
Copy and complete the diagram below using page 41 of the textbook to help you…
![Page 9: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/9.jpg)
News…Using an appropriate news website of your choice, find 2 news articles relating to hacking and encryption.
In your books, write a summary of the main points for each story.
Discuss where the security of data was at risk and the outcome of each story.
![Page 10: Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.](https://reader035.fdocuments.in/reader035/viewer/2022072014/56649eb25503460f94bb8ca7/html5/thumbnails/10.jpg)
Last Thing… Homework!
Complete the worksheet Methods of Communication.
No Homework = Detention!