digital security

12
Digital Security Jesline James! 9cc

Upload: afra

Post on 23-Feb-2016

45 views

Category:

Documents


0 download

DESCRIPTION

Digital Security. Jesline James! 9cc. Contents. The CREATORS!!!! =] What is Digital Security? How does it help? Some dangers and malicious softwares Softwares/ Devices that provide protection Some D igitally S ecure D evices - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Digital Security

Digital Security

Jesline James! 9cc

Page 2: Digital Security

Contents

The CREATORS!!!! =] What is Digital Security? How does it help? Some dangers and malicious softwares Softwares/ Devices that provide

protection Some Digitally Secure Devices Advantages and Disadvantages of some

authentication tools .

Continuation Video

Page 3: Digital Security

The CREATOR!!! =] My name is Jesline James. I’m in year 9 and I’m 14. (I like

SpongeBob, hence, the picture below). I made a presentation on Digital security because I

wanted people to know what it is and how it can help us. Nowadays more people, kids especially, are impacted badly by the internet.

Well, to make this presentation I had to collect all answers to all questions on Digital Security. Obviously, I had to research all the information relevant to the topic I have chosen and create a logo. Then, I picked out a

video to make this presentation less boring.

Back

Page 4: Digital Security

What is Digital Security (self-protection)?

Digital Security gives people the liberty

to bravely take part in daily communications through all

devices without any worries(electronic precautions to

guarantee safety. ) It is the protection of your

digital identity.

Back

Page 5: Digital Security

How does it help? Internet users are very familiar

with companies like Symantec (Norton Anti-Virus) and McAfee that provide them with protection from viruses, as well as to provide secure firewalls and protection against spyware. It prevents digital dangers.

Back

Page 6: Digital Security

Some Dangers and malicious softwares. High risk of intrusion Fraud Phishing – Stealing secret information by pretending to be a

reputable and trustworthy company. Viruses Viruses can replicate their structures infecting other files or

structures on a computer. Viruses are used to steal data. Trojan horse A Trojan horse is a general term for malicious software that

pretends to be harmless so that a user willingly downloads it. Spyware Spyware refers to programs that secretly monitors activity on a

computer system and reports that information to others without the user’s permission.

Back

Page 7: Digital Security

Softwares/ Devices that provide protection.

Anti virus softwares like: Symantec (Norton Anti-Virus) McAfee SecureDongle X Web Services ElecKey 2.0 provides software security that can

protect your software applications against piracy, tampering etc.

USB SIM Card

Back

Page 8: Digital Security

Some Digitally Secure Devices Perhaps the most famous digitally secure device is the SIM (Subscriber Identity Module) card, a device that is put in mobile phones.

Another example is Microsoft .NET card framework. It has many coded solutions to avoid common programming problems etc.

Back

Page 9: Digital Security

Advantages and Disadvantages of some authentication tools.

Pros of User ID and Password Cons of User ID and Password

Least expensive authentication method to use.

Weak and prone to numerous attacks.

No need to carry any extra hardware device.

Security depends on the users' ability to maintain the user ID and password secret.

No need to install extra software. Not fully reliable when used for making financial transactions.

User IDs and passwords can be changed at the user's choice, and most users know how to use them.

Cost of support increases with user ID and password complexity.

Back

Page 10: Digital Security

Continuation…..Pros on Digital Certificates on Smart cards and USB tokens

Cons on Digitals Certificates on Smart cards and USB tokens

Safer to use than the normal user ID or password.

Have to carry an additional smart card reading device or USB so that they can log in.

A third-party confirming authority issues the digital certificates, helping to increase user trust.

Involves additional cost, such as the certifying authority's subscription cost for issuing the digital certificates.

Difficult for non-authorized users to remove the private keywhen stored on a smart card.

Requires user training for certificate generation and use.

Back

Page 11: Digital Security

Video http://www.youtube.com/watch?

v=2ajy0s9eO-w

Back

Page 12: Digital Security

The End!!!!Thank you for

watching!