Cie CH 8
Cie CH 8
When accessing the internet make sure the websites being visited can be trusted (check https is used)
Use of firewalls
How to protect: Use of strong password
Use of intrusion detection software
Phishing
The attacker sends out legitimate email to target users.
The attacker can gain personal data such as bank account and credit card
number and can lead to identity theft.
Short for SMS phishing Uses the SMS system of mobile phone to If the recipient click the message, it is
send out fake text messages redirected to fake website or ask to make
a telephone call.
Vishing
• This uses a voice mail message to trick the
user into calling the phone number
contained in the message.
Pharming
• This is malicious code installed on a user's
computer, the code will redirect the user to
a fake website without their knowledge
Viruses
Viruses
This is software that gathers data by monitoring key presses on user's keyboard.
Spyware gives the originator access to all data entered using a keyboard.
Digital Certificates
Authentication Method: Passwords
Biometrics
Biometrics
• Fingerprint scans
• Signature recognition
• Retina scans
• Iris recognition
• Face recognition
• Voice recognition
Fingerprint scanning techniques
Advantages Disadvantages
• Fingerprints are unique • Relatively expensive to install
• Other security devices (such as and setup
magnetic cards) can be lost • If fingers are damaged, it can
• It would be impossible to ‘sign effect on scanning accuracy
in’ for somebody • Some people may regard it as
• Fingerprint can’t be misplaced and infringement of civil liberties
Signature recognition
Advantages Disadvantages
• Non-intrusive • High error rate
• Require very little time to verify • If individuals do not sign their
• Relatively low-cost technology name in a consistent manner
there may be problems with
verification
Retina scans
• Retina scans use infrared light to scan the unique pattern of blood
vessels in the retina.
• It is very secure as nobody has yet found a way to duplicate blood
vessels patterns.
Retina Scans
Advantages Disadvantages
• Very high accuracy • It is very intrusive
• There is no way to replicate a • It can be relatively slow to verify
person’s retina • Very expensive to install and
setup
Iris recognition
Advantages Disadvantages
• Very high accuracy • Very intrusive
• Verification times is less than • Uses a lot of memory for the
five seconds data to be stored
• Very expensive to install and
setup
Face recognition
Advantages Disadvantages
• Non-intrusive method • It is affected by changes in
• Inexpensive technology lighting, the person’s hair, age,
and if the person is wearing
glasses
Voice recognition
Advantages Disadvantages
• Non-intrusive method • A person’s voice can be recorded
• Verification takes less than five easily and used for unauthorised
seconds access
• Inexpensive technology • Low accuracy
• An illness, such as cold, can
change voice, making
identifcation difficult
Digital certificates
• A digital certificate is a pair of files stored on a user's computer -
these are used in the security of data sent over the internet.
• Each pair of files is divided into:
• a public key (which is known by anyone)
• a private key (known to the computer user only).
Digital certificates
• The digital certificate is made up of six parts:
• the sender's email address
• the name of the digital certificate owner
• a serial number
• expiry date (the date range during which the certificate is
valid)
• public key (used for encrypting messages and for digital
signatures)
• digital signature of certificate authority
Security protocols
• Security Protocols:
• Sets of rules used by computers to communicate with each other across
a network when using the internet
• Secure Sockets Layer (SSL)
• SSL allows data to be sent and received securely over the Internet.
• HTTPS (or) small padlock in the status bar
• Transport Layer Security (TLS)
Communication across a network using SSL
1. The user's web browser sends a message to web server by SSL
2. The user's web browser request that the web server identifies itself
3. The web server responds by a copy for SSL certificate to user's web browser
4. If the web browser can authenticate this certificate, web server allow to
communicate
5. The web server acknowledges the web browser and SSL data transfer begins
acknowledges
Transport layer security (TLS)
The key used to encrypt the message is known as the encryption key
The key used to decrypt the message is known as the decryption key
Encryption key
Encryption process Cypher text
Plain text
Original plain text: Hello
Encryption Key: 123
Cypher text: Hello+123 > #$%^123456*(&)_^%xxxx34568
Firewall
User's Computer Internet
(Software or Hardware)
Tasks carry out by firewall
• To examine the traffic between a user's computer and a public network
• Checks whether incoming or outgoing data meets a given set of criteria
• If data fails the criteria, the firewall will block the traffic and give the user a
warning that there may be a security issue
• The firewall can be used to log all incoming and outgoing traffic
• Firewall prevents access to certain undesirable sites
• Firewalls help prevent virus or hackers entering the user's computer
network
• Firewall prevents hackers gaining access to user's computer
Two-factor authentication
• is a form of verification which requires two methods of
authentication to verify who a user is
Password
• Should be a combination of letters and numbers that would be difficult for
somebody else to guess
• Strong passwords should contain upper case and lower-case characters, as
well as numbers and other keyboard symbols, for example: Rn5K;2mL/8.
• To help protect the system, users are only allowed to type in their
password a certain number of times
• Usually, three times is the maximum number of tries allowed
• The password is never shown on the computer screen for reasons of
security.
• Passwords should be changed on a regular basis in case they become
known to another user or even a hacker.
• it is important to prevent other people gaining access to your password by
way of spyware or viruses