
Chapter 8 Lesson 3: Security Technologies
Presentation
•
Computers
•
8th Grade
•
Practice Problem
•
Medium
JOSEPHINE AGHEDO
Used 1+ times
FREE Resource
13 Slides • 14 Questions
1
Chapter 8 Lesson 3: Security Technologies
2
Introduction to Security Technologies
In this lesson, you are going to learn about some of the basic security technologies that can be applied to protect computer systems, websites, applications, communications, and files. Each of these areas has special risks that can be addressed with the right approach.
3
Multiple Choice
What is the purpose of security technologies?
To protect data and systems from unauthorized access and threats
To enhance the performance of computer networks
To develop robust security strategies
To safeguard sensitive information
4
About Usernames and Passwords
In order to begin using any device that you may have, you likely need to provide a username and password. By entering the correct combination of username and password, you can prove your identity. The operating system will then look at your identity and figure out what things you are allowed to do and see within the system.
5
Multiple Choice
Why do some secure systems have policies that require users to change passwords on a regular basis?
To prevent stolen passwords from being used by unauthorized persons.
6
Administrative Rights vs Limited Rights
Users with "administrative" rights can manage all parts of the computer, make configuration changes, access all files, install and un-install software, and create other users. Other users may have more limited rights that allow them to use the existing applications, but prevent them from making any big changes to the system. Limited users can only access their own files, but can't see data belonging to other users.
7
Categorize
manage parts of computer
make configuration changes
access all files
install and un-install software
create other users
only access own files
can see data belonging to other users
prevented from making big changes
can't see data belonging to other users
Organize these options into the right categories
8
Securing Websites
Website designers have many of the same security needs as computer operating systems. In order to identify someone, a username and password is often required.
9
Fill in the Blanks
10
Designing Secure Applications
What happens when your email client receives an email with a file attachment? The email client might be written to helpfully open that email attachment automatically as you read the message. However, if the attachment contains a virus, then the email client has just infected your computer without giving you a chance to avoid the problem. This is one example of how easy it is for well-meaning software developers to create security problems within applications.
11
Multiple Select
How can programmers make sure their programs are secure?
Make sure all input from users is valid.
Make sure sensitive data sent to other systems or programs is encrypted.
Run things with higher security authorizations than necessary.
Avoid defining security requirements before writing any code.
12
Encrypting Data
Encryption is the process of encoding data in such a way that only programs with a secret key can recover the original data. An encryption program will translate plain data into unreadable encrypted data using an encryption algorithm and a secret key. The key is carefully kept as a secret, shared only with the programs or users that are authorized to access the data. When an authorized user wants to view the plain data, he or she will provide the secret key and a decryption algorithm will turn the encrypted data back into readable plain data.
13
Labelling
Looking at the picture, which part is the encrypted data?
plain dada
decryption
encrypted data
encryption
14
Secure Communications
Web browsers, web servers, and other networking applications can use a protocol called the Secure Socket Layer (SSL) or a newer version, Transport Layer Security (TLS). Two computers communicating using the SSL or TLS protocols can securely exchange a secret encryption key and then encrypt all of the data going back and forth on the network.
15
Multiple Choice
Secure Socket Layer
A protocol used by web browsers, web servers, and other network applications to secure network communications.
A protocol used by web browsers, web servers, and other network applications to expose network communications.
A protocol used by other firewall applications to secure network data.
A document used by other network applications to secure communications with the network.
16
Multiple Choice
What does the "s" in https stand for?
17
Secure Communications:
The "s" stands for "secure", and using "https" means your web browser should send and receive all information using a SSL or TLS-protected channel. If you use "https" and your web browser and server cannot communicate securely for any reason, your browser should warn you that there is a problem. You can then avoid that web server until the problem is fixed.
18
Secure Wireless Networks
One of the most dangerous ways to transmit your data is over a public wireless network. Have you ever used a public Wi-Fi system at a coffee shop, bookstore, or hotel? Anyone with a wireless device can possibly read the wireless data signals that are broadcast between two computers.
19
Multiple Choice
Transmitting your data over a public wireless network is one of the most safest methods you can use.
20
Secure Wireless Networks cont.
To prevent data loss on a wireless network, you should only send sensitive data using encrypted channels like SSL or TLS. In addition, when you connect to a public network, you can usually tell your computer this is an untrusted "public" network and not a trusted "home" network. Your computer can then prevent others from connecting to hard drives, folders, and other resources that you might normally share with others in your home network.
21
Multiple Choice
You can lose data sending things through a SSL or TLS.
22
File Level Security
Often, applications such as word processors or spreadsheets will allow you to add file-level security to documents that you create. These applications can store the file as encrypted data that requires a secret key or password to decrypt. So, any time you open that file, you would be prompted to enter the correct password before seeing the original contents. This way, only you and those that have your secret password would be able to use the file successfully!
23
Multiple Choice
What is File-Level Security?
Security that can be placed on a single file or group of files on a computer or device.
24
Multiple Choice
What is a Secret Key?
A secret key is a term used in music to describe a hidden note or a key on the piano.
A secret key is a code used to unlock a physical lock or cabinet.
A secret key is a password used to access a secure website and can only be used once.
A secret key is a value that is carefully kept as a secret shared only with programs or users that are authorized to access the data.
25
Multiple Choice
A secret sequence of characters that, when combined with a username, can be used to prove your identity.
26
Security Technologies:
Protects data and systems from unauthorized access and threats.
Enhances the performance of computer networks.
Develops robust security strategies.
Safeguards sensitive information.
27
Poll
How helpful was this review?
very helpful
kind of helpful
helpful, but I rather read on my own
not helpful at all
Chapter 8 Lesson 3: Security Technologies
Show answer
Auto Play
Slide 1 / 27
SLIDE
Similar Resources on Wayground
19 questions
MICROBIT MAKECODE -YR8
Presentation
•
8th Grade
20 questions
INFORMATIKA 9
Presentation
•
9th Grade
21 questions
ICT or Computer Science?
Presentation
•
7th - 8th Grade
18 questions
L8 Tiết 18 Ôn tập Quản lý kiến thức truyền thông
Presentation
•
8th Grade
20 questions
Solving Equations
Presentation
•
8th Grade
20 questions
Human Dependency on Resources
Presentation
•
8th Grade
20 questions
Transformations
Presentation
•
8th Grade
20 questions
Author's Purpose and Perspective Review
Presentation
•
8th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
8 questions
Amoeba Sister Asexual vs Sexual Reproduction
Interactive video
•
8th Grade
15 questions
Pythagorean Theorem Word Problems Quizizz
Quiz
•
8th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
4 questions
Spring Break rest and recharge
Presentation
•
6th - 8th Grade
20 questions
Scatter Plots and Line of Best Fit
Quiz
•
8th Grade
19 questions
Introduction to Properties of Waves
Presentation
•
6th - 8th Grade
16 questions
Interactions within Ecosystems
Presentation
•
6th - 8th Grade