Monday, April 16th

 

Introduction to Security and ITGS Guide - Chapter 5

How Google Protects Your Data - List several ways that Google protects your data.
Why is Google so serious about data protection?
If Google does a great job of protecting your data then how might a student still have their data breached?

A look inside Google's Data Center

Want a challenging and in-demand career? What about career in Computer/Network Security
Check Homework
Introduction to Malware


 

Homework

News article due Friday - article should be related to security. Submit to school loop.
News presentations Friday - Anthony and Joseph

Read pages 90-95 in Gray (green book) and answer the following questions on school loop.
1. Define authentication.
2. Describe the three broad categories of authentication techniques.
3. Any company that stores passwords should always do what to those passwords? 
4. What are some of the ways MythBusters was able to defeat fingerprint security methods?
5. List and describe the tools and techniques that hackers use to compromise systems.
6. What is a zero day exploit? 
7. Complete Exercise 5-3 on page 93.
Submit these answers to school loop.

 

What

1.2 Security
Security refers to the protection of hardware, software, machines and networks from unauthorized access.
Security measures include restricted access to machines and networks for certain employees or to prevent
access by hackers. The degree of security of information systems largely determines society’s confidence in
the information contained in the systems.

1.5 Authenticity
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is
crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is
a user login to a network. A more advanced example would be the use of encrypted digital signatures in a
business transaction or the use of watermarking on digital photographs.

Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails

Internet threats and security
• Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and
private keys, digital signatures
• Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

 

 

Why

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.

 

How

By completing the DB questions