0% found this document useful (0 votes)
11 views17 pages

Ensuring Security

This document discusses various cyber security measures to protect devices and data from malicious attacks. It describes passwords, biometric authentication using fingerprints, CAPTCHAs, email confirmations, and automatic software updates as common security methods. Passwords require a string of characters to verify identity, while biometrics use biological traits. CAPTCHAs and email confirmations ensure humans rather than bots are accessing accounts. Keeping software updated also strengthens security defenses.

Uploaded by

Maximilian Chong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views17 pages

Ensuring Security

This document discusses various cyber security measures to protect devices and data from malicious attacks. It describes passwords, biometric authentication using fingerprints, CAPTCHAs, email confirmations, and automatic software updates as common security methods. Passwords require a string of characters to verify identity, while biometrics use biological traits. CAPTCHAs and email confirmations ensure humans rather than bots are accessing accounts. Keeping software updated also strengthens security defenses.

Uploaded by

Maximilian Chong
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Ensuring Security


Learning Objectives
This chapter you will learn the methods to detect and
prevent cyber security threats.
● Understand and able you explain the following security
measures.
○ Biometric measures.
○ Password system.
○ CAPTCHA.
○ Using email confirmations to confirm a user’s identity.
○ Automatic software updates.
What is Cyber Security Protection?
● Cyber security protection is the technique of preserving
computers, servers, mobile devices, electronic systems,
networks and data from malicious attacks.

● It is also known as information technology security or


electronic information security.

● Its purpose is to protect internet-


connected users, including hardware,
software and data, from cyber attacks.
In this section you will learn about :
● Passwords

● Biometrics

● Identity Confirmation

● Software Updates
The security methods used to access computer accounts are
known as factors of authentication.
These are ways to prove that people are who they say they
are.

These factors can be divided into three sections:


something a person is - fingerprint or other biometric detail
something a person knows - passwords, PINs, secret answers
something a person has - a phone, a smart card
Ways to Prevent Cyber Attacks
● Captcha
● Biometric Measures
● Email Confirmation
● Cyber Security Protection
● Password system
● Automatic Software
Updates
Password Systems
A password is a string of characters which is used on a
computer device to authenticate a user.
Most passwords consist of several characters,
● usually letters (lower and upper case),
● numbers,
● symbols, but not spaces,
● must be at least 8 characters long.
● avoid information that may be easy to guess such as
relatives’ names or birthdays.
Biometric Measures
● Biometric measures are a feature that
identifies biological quantities of a person’s
features, such as fingerprints, that can
identify whether it is the person.
● This form of security could be a scan of a
fingerprint using the sensor built into a
button on a mobile phone, or facial
recognition to unlock a mobile device.
● This does not require a password to be
memorized.
● It is used in airports, security checks, and in
crimes.
BIOMETRICS
CAPTCHA
● CAPTCHA stands for Completely Automated Public Turing
test to tell Computers and Humans Apart.
● CAPTCHAs are tools you can use to differentiate between
real users and automated users, such as bots.
● CAPTCHAs provide challenges that are difficult for
computers to perform but relatively easy for humans. For
example, identifying stretched letters or numbers, or clicking
in a specific area.
CAPTCHA
● They prevent spamming and bots from entering the
internet.
Email Confirmation
● When a person signs up for a new account, they often
receive an email asking them to confirm that they asked
for the account to be created by clicking a specific link.

● This security feature alerts them that their email is being


used to create an account and acts as a way
for them to prove their identity to the
company they are creating the account with.
Automatic Software Updates
● By regularly updating the software on a computer, users
are as protected as they can possibly be.

● Cyber security depends on up-to-date software. Regularly


updating the software on your computer and other devices
is one of the easiest ways to protect yourself from cyber
threats.
Summary
● Cyber Security – protecting your data and device from
malicious attach.
● Authentication - The process of identifying an individual,
usually based on a username and password.
● A password is a string of characters used to verify the
identity of a user during the authentication process.
Summary
● Biometric security is a security mechanism used to
authenticate and provide access to a facility or system
based on the automatic and instant verification of an
individual's physical characteristics.

● CAPTCHA - Completely automated public Turing test to tell


computers and humans apart.
Summary
● Two-factor authentication is a second layer of security to
protect an account or system. It increases the safety of
online accounts by requiring two types of information
from the user, such as a password or PIN, an email
account, an ATM card or fingerprint, before the user can log
in.

You might also like