Module 2.2
Security Concepts
Computer most vulnerable when communicating with other computers and when
connected to Internet
Interceptions of communications
Infection of your computer
Encryption
Scrambling data into a new format using a key
Local encryption
Use encryption software to protect files on your local storage
Whole hard drive: enter key once
Individual files: enter key each time you access files (better protection computer against
malware)
Automatic encryption
Happens without you consciously choosing to use software to encrypt data
User is not aware
Digital Rights Software used to protect digital books, movies
Management Control access to content
ATM Data transferred between ATM and bank
Protect sensitive financial data
Internet Browsers Private data on Internet
HTTPS protocol
Skype Calls
Online Storage Devices Dropbox
Not even employees of company can access files
Secure Sockets Layer SSL
Confidential content
Encryption protocol which encrypts data that is sent over the Internet
Public key encryption
Private key encryption
Single secret key
Shared and kept private by sender and receiver
Public key encryption
Mathematical algorithms to create two separate keys that are mathematically linked
Private: decrypt
Public: encrypt
Security Concepts
Computer most vulnerable when communicating with other computers and when
connected to Internet
Interceptions of communications
Infection of your computer
Encryption
Scrambling data into a new format using a key
Local encryption
Use encryption software to protect files on your local storage
Whole hard drive: enter key once
Individual files: enter key each time you access files (better protection computer against
malware)
Automatic encryption
Happens without you consciously choosing to use software to encrypt data
User is not aware
Digital Rights Software used to protect digital books, movies
Management Control access to content
ATM Data transferred between ATM and bank
Protect sensitive financial data
Internet Browsers Private data on Internet
HTTPS protocol
Skype Calls
Online Storage Devices Dropbox
Not even employees of company can access files
Secure Sockets Layer SSL
Confidential content
Encryption protocol which encrypts data that is sent over the Internet
Public key encryption
Private key encryption
Single secret key
Shared and kept private by sender and receiver
Public key encryption
Mathematical algorithms to create two separate keys that are mathematically linked
Private: decrypt
Public: encrypt