Friday, April 3rd

 

News Article Presentations, May and Kate will be presenting.

Security Mind Map

What - refer to Google video on how Google protects your data.

Read pages 90-95 in Gray (green book) and answer the following questions on school loop.
1. Define authentication.
2. Describe the three broad categories of authentication techniques.
3. Any company that stores passwords should always do what to those passwords?
4. What are some of the ways MythBusters was able to defeat fingerprint security methods?
5. List and describe the tools and techniques that hackers use to compromise systems.
6. What is a zero day exploit?
7. Complete Exercise 5-3 on page 93.
Submit these answers to school loop.

 

Homework

If you did not finish the above questions during class then complete them as homework.

 

What

3.2 Software
• Virus scan, malware detectors and removers

3.3 Networks
Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
• Physical security: for example, locks

3.4 Internet
Internet threats and security
• Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and
private keys, digital signatures
• Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

 

Why

Technology has allowed for greater access to data and information but it has also given rise to new threats thus security is a necessary issue when using technology.

 

How

By completing the security questions and exercises.