Keeping computers safe


There is always going to be someone who wants what you've got. In this section, we will look at the security threats that computer systems face and ways in which we can work to minimise them.

We are learning ...
  • About firewalls
  • About hacking
  • About symmetric and asymmetric encryption
  • About malware
  • About biometric security
So that we can ...
  • Describe how firewalls work
    - packet filtering
    - proxy servers
    - stateful inspection
  • Discuss hacking
    - Black hat
    - White hat
    - Penetration testing
  • Describe the process of symmetric and asymmetric (private / public) key exchange
  • Explain how digital certificates and digital signatures are obtained and used
  • Discuss worms, trojans and viruses
    - The vulnerabilities they exploit
    - How code quality, monitoring and protection and be used to address these issues
  • Describe security methods that can be used to protect networks
    - Biometric technology

Activity Threats - an introduction



Activity Firewalls

[Notes for this section]

Task Title
Resources

[Instructions]

OUTCOME : [Outcomes of the task]


Activity Hacking 


Task Title
Resources

[Instructions]

OUTCOME : [Outcomes of the task]


Activity Symmetric and Asymmetric Encryption



https://drive.google.com/file/d/0B83yXMOilskaM0VoTHp3V3BXV0E/view?usp=drive_web
Pretty Good Privacy (Click to enlarge)



Task Title
Resources

[Instructions]

OUTCOME : [Outcomes of the task]


Activity Malware 

An all too common story ...

Malware is an abbreviated word meaning 'malicious software'. Malware is specifically designed to damage computer systems without permissions or, often knowledge, of the owner.

Task Be careful what you search for ...

Only ever research computer security topics on reputable websites ...
  • Remote Access Trojan (RAT)
  • Botnet
  • Browser based malware (often hidden as browser helper objects)
  • Ransomware

OUTCOME : [Outcomes of the task]


REMOTE ACCESS TROJAN OR RAT
A malware program that includes a back door for administrative control over the target computer. RATs are usually downloaded invisibly with a user-request program - such as game or sent as an email attachment.

BOTNET
(also known as a zombie army) is a number of internet computers that, although their owners are unaware of it, have been set up to forward transmissions (including spam or viruses) to other computers on the internet.

BROWSER BASED MALWARE
(also known as "Man in the browser") is a security attack where the perpetrator installs a trojan horse on a victim's computer that is capable of modifying that user's web transactions as they occur in real time.

RANSOMWARE
A form of computer malware that restricts access to your computer or its information, while demanding you pay a ransom to get access back.

POS MALWARE
A malicious software expressly written to steal customer payment data - especially credit card data - from retail checkout.

Task Title
Resources

[Instructions]

OUTCOME : [Outcomes of the task]

http://www.bbc.co.uk/search?q=Cyber+Security

Activity Biometric Security 

[Notes for this section]

Task Title
Resources

[Instructions]

OUTCOME : [Outcomes of the task]


Extension Activities 

https://www.youtube.com/watch?v=wXB-V_Keiu8
https://www.youtube.com/watch?v=GSIDS_lvRv4

What's next?

Before you hand your book in for checking, make sure you have completed all the work required and that your book is tidy and organised. Your book will be checked to make sure it is complete and you will be given a spicy grade for effort.

END OF TOPIC ASSESSMENT