Chapter 4 - 4.2 Update
Chapter 4 - 4.2 Update
Subject :ICT
Grade : 8
stolen.
All online systems can be hacked and data can be stolen when it is
stored or transmitted.
Criminals can also use spyware, which monitors users’ key presses
3
◎ Encryption is the scrambling of data into a form that cannot be
understood by unauthorised recipients.
5
Authentication
6
Passwords
7
◎ Strong passwords:
◎ should be at least eight characters long
◎ contain both numbers and letters
◎ contain both upper and lower case letters
◎ contain at least one character such as: !, $, ?, etc.
◎ never use user-identifiable items such as name, date of birth,
phone number, postcode, car registration, etc.
◎ Passwords should be changed regularly.
◎ Previous passwords must never be reused.
◎ Passwords must never be written down.
◎ Passwords must never be shared with other users.
◎ Passwords should be unpredictable so hackers cannot guess
them or try to enter them by trial and error.
8
9
Authentication can also include a variety of methods such as:
◎ biometric methods
◎ magnetic stripes
◎ smart cards
◎ physical tokens
◎ electronic tokens zero login.
10
Biometric methods
◎ Biometric methods of authentication are biological
measurements or an analysis of physical characteristics that
can be used to identify individuals.
11
◎ The information being measured needs to be universal – it should
be something that everyone possesses.
12
◎ Biometric devices tend to work in one of two main ways:
verification or identification.
◎ For verification, biometric technologies perform a comparison of
the data with a template that has previously been stored, such
as a fingerprint scan or other physical tokens such as retina, iris
or face scans, on a personal computer or electronic safe.
◎ At present, biometric systems are mainly used for:
13
14
15
Magnetic stripes
◎ Personal and security data can be encoded on the magnetic
stripe of a card and can be swiped through a reader to allow
access.
◎
◎ The magnetic stripe on the back of a credit card is split into three
tracks and they can all contain data.
◎ The first and second track hold coded information about the
cardholder’s account: the card holder’s full name, card number
and CVV value, date of expiry of the card and the code for the
country in which it was issued.
◎ The third track is not always used, but if it is, it holds details like
the currencies that are valid for use with the card.
16
Smart cards
◎ A smart card looks like a credit card in size and shape.
17
◎ There are two kinds of smart cards: contact and contactless.
◎ With contact smart cards, the smart card is inserted into the
reader, and the card’s contact plate makes physical contact with
the reader to transmit data.
◎ With contactless smart cards, the card just has to be held close
to the reader, and data is transmitted via radio waves.
18
Physical tokens
◎ A physical token allows you to access software and verify your
identity with a physical device rather than relying on
authentication codes or passwords.
◎ They are also called key fobs, security tokens or USB tokens. As
physical tokens may be lost, forgotten or stolen, some multi-
factor authentication methods use mobile phones.
19
Electronic tokens
◎ Electronic tokens can be used for electronic payments.
20
◎ When a credit card payment has been converted to a token, a
payment network such as Visa uses its secure keys to decode it
and pass the card number to the standard electronic payment
processors.
23
Anti-malware software- Malware
24
Types of malware include:
◎ virus
◎ worm
◎ Trojan (or Trojan horse)
◎ spyware
◎ adware
25
◎ Anti-malware software is software that is designed to
combat the effects (or even the installation) of malware.
26
27
◎ To prevent infection, security measures should be taken:
◎ Install anti-malware software, including ant-virus software, and
ensure that it is continually updated.
◎ The software should be used to scan all storage media to detect
and destroy or quarantine malware.
◎ The software quarantines the suspected malware if it is unable to
delete it or it is not sure if it actually is malware and waits for the
user to decide.
◎ When files are quarantined, they are placed in a folder where
they cannot interfere with any other programs.
◎ Install a firewall to ensure software is not downloaded without
your knowledge.
28
29
◎ Ensure that the operating system is up to date.
◎ Install the latest security updates.
◎ Install anti-spyware protection software that removes or blocks
spyware.
◎ Avoid opening emails and attachments from unknown sources.
◎ Scan all data files as they are downloaded.
30
Surf and download more safely:
31
Electronic-conferencing
◎ Audio-conferencing
◎ Video-conferencing
◎ Web-conferencing
32
Audio-conferencing
◎ Audio-conferencing is where people in different locations use
technology to speak to each other.
34
◎ The term web-conferencing is often used interchangeably with
video-conferencing.
◎ An important distinction between the two is the quality and
security of the live video stream and the difference in the
equipment required.
◎ Web-conferencing takes place online over public internet and
enables multiple participants to connect and work together
visually using their laptops or mobile devices.
35
◎ Web-conferencing also includes: Webcasts which involve a one-
way transmission and are non-interactive.
36
Equipment needed for video- and web-conferencing
◎ Both require input and output devices for sound and vision and a
communications link between the participants.
37
For video-conferencing
38
39
40
Thanks!
41