0% found this document useful (0 votes)
104 views19 pages

Internet Security: Grade 11

The document defines internet security and identifies principles and ways to prevent cyber crimes. It discusses how the internet provides global communication services and the importance of ensuring security. The five principles of internet security are defined as confidentiality, integrity, authentication, access control, and availability. Ways to prevent cyber crimes include using strong passwords, securing computers and devices, being social media savvy, installing updates, protecting data, securing wireless networks, protecting online identity, avoiding scams, and getting help from the proper authorities when needed.

Uploaded by

David
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
104 views19 pages

Internet Security: Grade 11

The document defines internet security and identifies principles and ways to prevent cyber crimes. It discusses how the internet provides global communication services and the importance of ensuring security. The five principles of internet security are defined as confidentiality, integrity, authentication, access control, and availability. Ways to prevent cyber crimes include using strong passwords, securing computers and devices, being social media savvy, installing updates, protecting data, securing wireless networks, protecting online identity, avoiding scams, and getting help from the proper authorities when needed.

Uploaded by

David
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

INTERNET SECURITY

GRADE 11
SPECIFIC OUTCOMES
At the end of the lesson, PS;
• Define internet Security
• Identify principles of Internet Security
• Ways of Preventing cyber crimes.
ANSWERS TO THE PREVIOUS EXERCISE

• Which one of these Topologies would you recommend for a modern


enterprise ?
STAR TOPOLOGY
• This topology allows easy error detection and correction.
• In the star topology, the failure of one computer does not affect the other
computers in the network.
• Star topology is easy to install.
INTERNET
• The Internet is a global facility that provides communication
services to network applications, many of which are very well-
known such as e-mail, world-wide web (www), online games,
voice over IP (VoIP), Skype, and many more.
• It is a means for data delivery from a source to a destination,
where sources and destinations can be at deferent abstraction
levels (e.g. device versus process communication)
INTERNET
• The Internet is a global facility that provides communication
services to network applications, many of which are very well-
known such as e-mail, world-wide web (www), online games,
voice over IP (VoIP), Skype, and many more.
• It is a means for data delivery from a source to a destination,
where sources and destinations can be at deferent abstraction
levels (e.g. device versus process communication)
INTERNET SECURITY
• We entrust internet with our social life (e.g. social networks), our
money (e.g. Internet banking), our health (e.g. electronic health
records) and more. The high value combined with the fact that
internet inherently connect multiple parties, each with their own
interests, means that they are a natural target for attackers. Ensuring
security of networks is thus of paramount importance. Yet what
does that exactly mean? Which security goals of which stakeholders
are important to achieve?
PRINCIPLES OF INTERNET SECURITY
• There are five Principles of Internet Security.
• Confidentiality
• Integrity
• Authentication
• Access Control
• Availability
PRINCIPLES OF INTERNET SECURITY
Confidentiality
• The principle of confidentiality specifies that only the sender
and the intended recipient should be able to access the content
of the message.
PRINCIPLES OF INTERNET SECURITY
Integrity
The confidential information sent by A to B which is accessed
by C without the permission or knowledge of A and B.
PRINCIPLES OF INTERNET SECURITY
Authentication
Authentication mechanism helps in establishing proof of
identification.
PRINCIPLES OF INTERNET SECURITY
Access Control
Access control specifies and control who can access what.
PRINCIPLES OF INTERNET SECURITY
Availability
It means that assets are accessible to authorized parties at
appropriate times.
CYBER CRIME PREVENTION TIPS
• Use Strong Passwords

• Secure your computer


o Activate your firewall Firewalls are the first line of cyber defence; they block
connections to unknown or bogus sites and will keep out some types of viruses and hackers.
o Use anti-virus/malware software Prevent viruses from infecting your computer by
installing and regularly updating anti-virus software.
o Block spyware attacks Prevent spyware from infiltrating your computer by installing
and updating anti-spyware software.
CYBER CRIME PREVENTION TIPS

• 3. Be Social-Media Savvy Make sure your social networking profiles (e.g. Facebook,
Twitter, Youtube, MSN, etc.) are set to private. Check your security settings. Be careful
what information you post online. Once it is on the Internet, it is there forever!
• 4. Secure your Mobile Devices Be aware that your mobile device is vulnerable to
viruses and hackers. Download applications from trusted sources.
• 5. Install the latest operating system updates Keep your applications and operating
system (e.g. Windows, Mac, Linux) current with the latest system updates. Turn on
automatic updates to prevent potential attacks on older software.
CYBER CRIME PREVENTION TIPS
• 6. Protect your Data Use encryption for your most sensitive files such as tax returns or
financial records, make regular back-ups of all your important data, and store it in
another location.
• 7. Secure your wireless network Wi-Fi (wireless) networks at home are vulnerable to
intrusion if they are not properly secured. Review and modify default settings. Public
Wi-Fi, a.k.a. “Hot Spots”, are also vulnerable. Avoid conducting financial or corporate
transactions on these networks.
• 8. Protect your e-identity Be cautious when giving out personal information such as
your name, address, phone number or financial information on the Internet. Make sure
that websites are secure (e.g. when making online purchases) or that you’ve enabled
privacy settings (e.g. when accessing/using social networking sites).
CYBER CRIME PREVENTION TIPS

• 9. Avoid being scammed Always think before you click on a link or file of unknown
origin. Don’t feel pressured by any emails. Check the source of the message. When in
doubt, verify the source. Never reply to emails that ask you to verify your information or
confirm your user ID or password.
• 10. Call the right person for help Don’t panic! If you are a victim, if you encounter illegal
Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or
a commercial scam, report this to your local police. If you need help with maintenance or
software installation on your computer, consult with your service provider or a certified
computer technician.
CYBER CRIME PREVENTION TIPS

• 9. Avoid being scammed Always think before you click on a link or file of unknown
origin. Don’t feel pressured by any emails. Check the source of the message. When in
doubt, verify the source. Never reply to emails that ask you to verify your information or
confirm your user ID or password.
• 10. Call the right person for help Don’t panic! If you are a victim, if you encounter illegal
Internet content (e.g. child exploitation) or if you suspect a computer crime, identity theft or
a commercial scam, report this to your local police. If you need help with maintenance or
software installation on your computer, consult with your service provider or a certified
computer technician.
Exercise
• 1. What do you understand by the term Internet Security
• 2. Critically analyze the Difference between Confidentiality and
Authentication
• 3. Identify three ways how to prevent cyber crimes when using
the internet.
THANK
YOU

You might also like