Search Header Logo
Chapter 8 Lesson 3: Security Technologies

Chapter 8 Lesson 3: Security Technologies

Assessment

Presentation

Computers

8th Grade

Practice Problem

Medium

Created by

JOSEPHINE AGHEDO

Used 1+ times

FREE Resource

13 Slides • 14 Questions

1

Chapter 8 Lesson 3: Security Technologies

2

Introduction to Security Technologies

In this lesson, you are going to learn about some of the basic security technologies that can be applied to protect computer systems, websites, applications, communications, and files. Each of these areas has special risks that can be addressed with the right approach.

3

Multiple Choice

What is the purpose of security technologies?

1

To protect data and systems from unauthorized access and threats

2

To enhance the performance of computer networks

3

To develop robust security strategies

4

To safeguard sensitive information

4

About Usernames and Passwords

In order to begin using any device that you may have, you likely need to provide a username and password. By entering the correct combination of username and password, you can prove your identity. The operating system will then look at your identity and figure out what things you are allowed to do and see within the system.

5

Multiple Choice

Why do some secure systems have policies that require users to change passwords on a regular basis?

1
To increase user awareness about security measures.
2
To comply with industry regulations.
3
To make it more difficult for hackers to guess passwords.
4

To prevent stolen passwords from being used by unauthorized persons.

6

Administrative Rights vs Limited Rights

Users with "administrative" rights can manage all parts of the computer, make configuration changes, access all files, install and un-install software, and create other users. Other users may have more limited rights that allow them to use the existing applications, but prevent them from making any big changes to the system. Limited users can only access their own files, but can't see data belonging to other users.

7

Categorize

Options (9)

manage parts of computer

make configuration changes

access all files

install and un-install software

create other users

only access own files

can see data belonging to other users

prevented from making big changes

can't see data belonging to other users

Organize these options into the right categories

Administrative
Limited User

8

Securing Websites

Website designers have many of the same security needs as computer operating systems. In order to identify someone, a username and password is often required.

9

Fill in the Blanks

10

Designing Secure Applications

What happens when your email client receives an email with a file attachment? The email client might be written to helpfully open that email attachment automatically as you read the message. However, if the attachment contains a virus, then the email client has just infected your computer without giving you a chance to avoid the problem. This is one example of how easy it is for well-meaning software developers to create security problems within applications.

11

Multiple Select

How can programmers make sure their programs are secure?

1

Make sure all input from users is valid.

2
  1. Make sure sensitive data sent to other systems or programs is encrypted.

3

Run things with higher security authorizations than necessary.

4
  1. Avoid defining security requirements before writing any code.

12

Encrypting Data


Encryption is the process of encoding data in such a way that only programs with a secret key can recover the original data. An encryption program will translate plain data into unreadable encrypted data using an encryption algorithm and a secret key. The key is carefully kept as a secret, shared only with the programs or users that are authorized to access the data. When an authorized user wants to view the plain data, he or she will provide the secret key and a decryption algorithm will turn the encrypted data back into readable plain data.

13

Labelling

Looking at the picture, which part is the encrypted data?

Drag labels to their correct position on the image

plain dada

decryption

encrypted data

encryption

14

Secure Communications


Web browsers, web servers, and other networking applications can use a protocol called the Secure Socket Layer (SSL) or a newer version, Transport Layer Security (TLS). Two computers communicating using the SSL or TLS protocols can securely exchange a secret encryption key and then encrypt all of the data going back and forth on the network.

15

Multiple Choice

Secure Socket Layer

1

A protocol used by web browsers, web servers, and other network applications to secure network communications.

2

A protocol used by web browsers, web servers, and other network applications to expose network communications.

3

A protocol used by other firewall applications to secure network data.

4

A document used by other network applications to secure communications with the network.

16

Multiple Choice

What does the "s" in https stand for?

1
secure
2
secret
3
safe
4
server

17

Secure Communications:

The "s" stands for "secure", and using "https" means your web browser should send and receive all information using a SSL or TLS-protected channel. If you use "https" and your web browser and server cannot communicate securely for any reason, your browser should warn you that there is a problem. You can then avoid that web server until the problem is fixed.

18

Secure Wireless Networks

One of the most dangerous ways to transmit your data is over a public wireless network. Have you ever used a public Wi-Fi system at a coffee shop, bookstore, or hotel? Anyone with a wireless device can possibly read the wireless data signals that are broadcast between two computers.

19

Multiple Choice

Transmitting your data over a public wireless network is one of the most safest methods you can use.

1
True
2
Partially true
3
Depends on the location
4
False

20

Secure Wireless Networks cont.

To prevent data loss on a wireless network, you should only send sensitive data using encrypted channels like SSL or TLS. In addition, when you connect to a public network, you can usually tell your computer this is an untrusted "public" network and not a trusted "home" network. Your computer can then prevent others from connecting to hard drives, folders, and other resources that you might normally share with others in your home network.

21

Multiple Choice

You can lose data sending things through a SSL or TLS.

1
Only if the connection is slow
2
Sometimes
3
No
4
Yes

22

File Level Security

Often, applications such as word processors or spreadsheets will allow you to add file-level security to documents that you create. These applications can store the file as encrypted data that requires a secret key or password to decrypt. So, any time you open that file, you would be prompted to enter the correct password before seeing the original contents. This way, only you and those that have your secret password would be able to use the file successfully!

23

Multiple Choice

What is File-Level Security?

1
Creating backups of files to ensure their security
2

Security that can be placed on a single file or group of files on a computer or device.

3
Encrypting files to protect them from unauthorized access
4
Using antivirus software to prevent file-level security breaches

24

Multiple Choice

What is a Secret Key?

1

A secret key is a term used in music to describe a hidden note or a key on the piano.

2

A secret key is a code used to unlock a physical lock or cabinet.

3

A secret key is a password used to access a secure website and can only be used once.

4

A secret key is a value that is carefully kept as a secret shared only with programs or users that are authorized to access the data.

25

Multiple Choice

A secret sequence of characters that, when combined with a username, can be used to prove your identity.

1
password
2
key
3
code
4
passcode

26

Security Technologies:

  • Protects data and systems from unauthorized access and threats.

  • Enhances the performance of computer networks.

  • Develops robust security strategies.

  • Safeguards sensitive information.

27

Poll

How helpful was this review?

very helpful

kind of helpful

helpful, but I rather read on my own

not helpful at all

Chapter 8 Lesson 3: Security Technologies

Show answer

Auto Play

Slide 1 / 27

SLIDE