Search Header Logo
[F2ICT] Security of data

[F2ICT] Security of data

Assessment

Presentation

Computers

8th - 10th Grade

Practice Problem

Medium

Created by

Andy tsui

Used 9+ times

FREE Resource

16 Slides • 8 Questions

1

[F2ICT] Security of data

By Andy tsui

2

Objectives

Additional data security threats

Some methods to protect / prevent loss from security threat​

Subject | Subject

Some text here about the topic of discussion

3

Multiple Select

Computer virus ....

1

Replicate itself automatically

2

will infect human

3

Usually do no harm to computer

4

You can install anti-virus to prevent

4

Computer Virus

  • Is a computer program that copy itself

  • Can leads to corrupting data or causing malfunction of a computer

  • Install Anti-virus s​oftware to detect / remove

  • Do not use software from unknown source​

5

Spam (email)

  • Spam email is usually email that sent to a mass group of address

  • Sometimes just advertisement but may contains malicious software

  • Avoid signing to mailing lists

  • Nowadays most email service provide spam filter

Subject | Subject

Some text here about the topic of discussion

6

Multiple Choice

Keylogger collects key presses and send back to the hacker through network. Which of the following measure can stop this?

1

Anti virus

2

Strong password

3

Firewall

4

spam filter

7

Multiple Select

Hacking is gaining unauthorised access to a system. What can help to prevent?

1

firewall

2

strong password

3

anti virus

4

backup

8

9

Open Ended

After watching the video, briefly explain how a firewall works, with your own words.

10

Firewall

  • Firewall is either software or hardware

  • Inspect all the data going in or​ out of a network (or computer)

  • Users can define some "rules" for the firewall to allow or block certain pattern of data

Subject | Subject

Some text here about the topic of discussion

media

11

media

​Firewall sits in between your computer and the rest of the Internet

12

13

Open Ended

What is encryption?

14

Encryption

  • Altering the characters in a message into meaningless data

  • Using algorithm and encryption key

  • Interceptor cannot understand the message

Subject | Subject

Some text here about the topic of discussion

15

media
  • ​Plaintext - unencrypted data (original)

  • Key - a secret "formula" for ​encrypt and decrypt

  • Ciphertext - encrypted message​

16

Digital Certificate

  • Function of Digital certificate is similar to an ID Card, but apply to websites or individuals online

  • Certificate is sign by a third party authority - some organisation you can trust

Subject | Subject

Some text here about the topic of discussion

17

TLS (Transport layer security)

  • TLS is a set of rule (protocol) to ensure a website is safe to use

  • it combines the followings:

    • Verifying digital certificate

    • Establishing encr​yption of data

Subject | Subject

Some text here about the topic of discussion

18

media

If you see the padlock, that means the connection is secure - TLS in action!

19

Poll

Which of the following methods you are using to login to your smartphone?

I don't use any

Face ID

Fingerprint

PIN

Pattern

20

Authentication

When logging in to a system, you need to:

  • Tell the system who you are

  • Prove that you are that person​

  • e.g. Username and password​

Subject | Subject

Some text here about the topic of discussion

21

Open Ended

Suggest some rules for strong password

22

Biometrics

Biometrics relies on unique characteristic on human being:

e.g.

  • Face ID (Facial features)

  • Finger print​

Subject | Subject

Some text here about the topic of discussion

23

Open Ended

What other biometrics features can be used in authentication?

24

Conclusion

Security threats

Security measure

Authentication techniques​

Subject | Subject

Some text here about the topic of discussion

[F2ICT] Security of data

By Andy tsui

Show answer

Auto Play

Slide 1 / 24

SLIDE