Please enable JavaScript.
Coggle requires JavaScript to display documents.
Unit 8 (Part 4) - Coggle Diagram
Unit 8 (Part 4)
Encryption
-
illegally. While encryption won't prevent hacking, it makes the data meaningless
-
-
a message. If this key is applied to a message) its content is changed, which then
-
secret key is applied to the encrypted message, it can be read.
-
-
-
-
-
-
Digital certificate
when sending an email, the message is made more secure by
attaching a digital certifi.cate. When the message is received, the recipient can
veri$, that it comes from a known or trusted source by viewing the public key
-
-
-
-
-
-
-
-
-
AUTHENTICATION
-
-
section we will consider digital certificates, passwords and biometrics in their
-
PASSWORDS
this should be a combination of letters and numbers
that would be difficult for somebody else to guess
strong passwords
-
-
keyboard symbols, for example: RnSI!2mL/8.
-
Passwords should be changed on a regular basis in case they become known
to another user or even a hacker.
BIOMETRICS
Finger print scans
-
Images of fingerprirìts are compared against previously, scanned fingerprints
-
patterns of 'ridges' and "valleys', which are fairly unique (accuracy is about one
-
-
-
-
o everybod)¡'s fingerprints are unique, therefore this technique would improve
-
other security devices (such as magnetic cards) can be lost or even stolen,
which makes them less effective
-
-
-
disadvantages
relativelly, expensive to install aid set up
-
-
-
retina scans
-
retina (at the back of the cye ). It is a lather unpleasant technique, requiring x person
-
as nobodl, has ys¡ founcl a way to duplicate blood vessels patterns (the accuracf is
-
online credit fraud
reasons why it happens
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
o if the user is using wireless technology, it is very important for internet access to
-
-
-
-
CLOUD SEQURITY
ADVANATGES
-
-
-
-
o because the cloud is controlled by external companies, they will ensure
-
-
-
-
PC, for example, is also available on other devices, such as a smartphone
-
-
-
DISADVANATGES
-
-
attacks, for example) could lead to loss or corruption of data.
-
A digital certificate is a pair of files stored on a user's computer - these are used
in the security of data sent over the internet. Each pair of files is divided into: a public key-known by everyone and a private key-known by the computer user only