Wednesday, April 18th

 

Paper 1 Exam - Complete Question #3 - all parts, time yourself

Once you finish the exam complete the Is Hacking a Crime? questions. Show these to your instructor for teacher check.

Complete Malware Presentation

Homework Check

Biometrics - do they work?

A Web of Threats - the flip side of living in a connected world.

Complete System Security lab - work in pairs for this lab.

Hacking Crimes - you decide. Presentation Groups

How to NOT get Hacked

The Worst Case Hack Attack

Today is the last day for any DB makeup labs

 

Homework

News article due Friday - article should be related to security. Submit to school loop.
News presentations Friday - Anthony and Joseph

Read pages 96-103 in Gray (green book) and answer the following questions on school loop.
1. What is the most common technique used by anti-virus software to identify viruses? What is vital for this method to work properly?
2. What is real time scanning?
3. What is a zombie computer and how might a computer be compromised in this way?
4. Describe a Drive-by Download.z
5. Of the ways to protect yourself, which to you feel are the most important? List the top three.
6. What are some of the impacts of spam?
7. What are the characteristics of a typical spam message?


Begin your review for the IB exam - use the IB Guide as your check off list.

 

What

1.2 Security
Security refers to the protection of hardware, software, machines and networks from unauthorized access.
Security measures include restricted access to machines and networks for certain employees or to prevent
access by hackers. The degree of security of information systems largely determines society’s confidence in
the information contained in the systems.

1.5 Authenticity
Authenticity means establishing a user’s identity beyond reasonable doubt. Authenticating the user is
crucial in many scenarios, particularly in business and legal matters. A simple example of authentication is
a user login to a network. A more advanced example would be the use of encrypted digital signatures in a
business transaction or the use of watermarking on digital photographs.

Network administration
• Electronic security: for example, authorized access, levels of access, biometrics, login, password,
firewalls, proxy server, encryption, secure socket layer (SSL), audit trails

Internet threats and security
• Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and
private keys, digital signatures
• Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

 

Why

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.

 

How

By completing the DB questions

 

p1q3k