Communications, Networks, & Cyberthreats: Presented by Satriyo Adhy
Communications, Networks, & Cyberthreats: Presented by Satriyo Adhy
Communications, Networks, & Cyberthreats: Presented by Satriyo Adhy
Networks, &
Cyberthreats
presented by
Satriyo Adhy
Chapter 6
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Chapter Topics
UNIT6A:
UNIT 6A:Networks
Networks&&Wired
Wired&&Wireless
WirelessData
Data
6.1 From
6.1 Fromthe
theAnalog
Analogtotothe
theDigital
DigitalAge
Age
Introduction to Information Technology
6.2 Networks
6.2 Networks
6.3 Wired Communications
6.3 Wired Communications Data Data
6.4 Wireless
6.4 WirelessCommunications
CommunicationsMedia
Media
UNIT6B:
UNIT 6B:Cyberthreats,
Cyberthreats,Security,
Security,&&Privacy
PrivacyIssues
Issues
6.5
6.5 Cyberintruders:Trolls,
Cyberintruders: Trolls,Spies,
Spies,Hackers,
Hackers,&&Thieves
Thieves
6.6
6.6 Cyberattacks&&Malware
Cyberattacks Malware
6.7 Concerns
6.7 Concernsabout
aboutPrivacy
Privacy&&Identity
IdentityTheft
Theft 2
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Digital convergence is the gradual merger of computing and
communications into a new information environment, in
which the same information is exchanged among many kinds
Introduction to Information Technology
3
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.1 From the Analog
Introduction to Information Technology
4
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Digital
• Computers use digital signals—0s and 1s, off and on.
• All the data that a computer processes is a series of
0s and 1s.
Introduction to Information Technology
But analog data can be converted into digital form. Even though digital data is not as exact
as analog data, it is easier to manipulate. 5
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• For data transmission over telephone lines and cables, modems
are needed to convert analog data into digital data that computers
can use.
Introduction to Information Technology
6
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
7
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
6.2 Networks
8
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Network: system of interconnected computers, telephones, and/or
other communications devices that can communicate with one
another and share applications and data.
Introduction to Information Technology
• Benefits of Networks
• Share peripheral devices, such as printers, scanners, disk drives
• Share software
• Share data and information
• Better communications
• Accessing databases
• Centralized communications
• Security of information, because of improved backup systems 9
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Types of networks: WANs, MANs, & Others
•Wide area network (WAN): Communications network that covers a wide geographic
area, such as a country or the world. Most long-distance and regional telephone
Introduction to Information Technology
companies are WANs. WANs are used to connect local area networks. The best example
of a WAN is the Internet.
•Metropolitan area network (MAN): Communications network covering a city or a
suburb. Many cellphone systems are MANs.
•Local area network (LAN): Connects computers and devices in a limited geographic
area, such as one office, one building, or a group of buildings close together. LANs are
the basis for most office networks, and the organization that runs the LAN owns it. WANs
and MANs generally use a common carrier—a telecommunications company that hires
itself out to the public to provide communications transmission services—for at least part
of its connections. (A home area network is a LAN.)
(continued) 10
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UPDATE
Introduction to Information Technology
11
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Network Architecture: How Networks Are Structured
1. Client/Server
• Consists of clients, which are computers that request data, and servers, which
Introduction to Information Technology
12
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
13
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Intranets, Extranets, & VPNs: Use the Internet as their base
• Intranets—use infrastructure and standards of the Internet and the web, but
for an organization’s internal use only.
Introduction to Information Technology
18
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Network topology: The layout (shape) of a network
• Star – all nodes are connected through a central network switch
Introduction to Information Technology
19
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Star
Network
Introduction to Information Technology
21
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ring
Introduction to Information Technology
Network
22
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
Bus
Network
23
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Ethernet
• Network standard for linking all devices in a local area network
that describes how data can be sent between computers and other
Introduction to Information Technology
Media
27
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Communications media are the means of interchanging or
transmitting and receiving information.
• Twisted-Pair Wire (dial-up connections)
Introduction to Information Technology
28
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Fiber-optic cable
• Dozens or hundreds of thin strands of glass or plastic that transmit pulses of light,
Introduction to Information Technology
not electricity
• Can transmit up to 2 gigabits per second (very fast)
• Have lower error rate than twisted-pair or coax
• More expensive than twisted-pair or coax
• Lighter and more durable than twisted-pair or coax
• More difficult to tap into than twisted-pair or coax
29
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Wired connections media for the home:
• Ethernet
• Connect to PC’s Ethernet network interface card (NIC)
Introduction to Information Technology
30
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.4 Wireless
Introduction to Information Technology
Communications Media
31
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Electromagnetic spectrum of radiation is the basis of all
telecommunications signals, wired and wireless.
Introduction to Information Technology
32
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
(continued) 33
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
34
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Bandwidth: range (band) of frequencies that a transmission
medium can carry in a given period of time
Introduction to Information Technology
35
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• TC/IP (Ch. 2) is the protocol for getting wired devices connected to the
Internet
• WAP (wireless application protocol): Wireless handheld devices such
Introduction to Information Technology
36
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Five Types of Wireless Communications Media
• Infrared Transmission
• Sends signals using infrared light (TV remotes)
Introduction to Information Technology
(continued)
38
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Communications Satellites (continued)
• Can be placed at different heights: GEO, MEO, LEO
• GEO – geostationary earth orbit
Introduction to Information Technology
• 22,300 miles above earth; travel at the same speed as the earth and so appear to us to be
stationary
• Always above equator
• Transmission delay (latency) can make conversations difficult; not good for applications
requiring real-time user input
• MEO – medium-earth orbit
• 5,000 – 10,000 miles up
• LEO – low-earth orbit
• 200 – 1,000 miles up
• Has no signal delay
39
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: One-Way Communication
• GPS (Global Positioning System)
• 24 to 32 MEO satellites continuously transmitting timed radio signals to identify
Introduction to Information Technology
Earth locations
• Each satellite circles earth twice each day at 11,000 miles up
• GPS receivers pick up transmissions from up to 4 satellites and pinpoint the
receiver’s location
• Accurate within 3 – 50 feet, with a norm of 10 feet accuracy
• Not all services based on GPS technology are reliable
40
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
GPS
Introduction to Information Technology
41
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: One-Way Communication (continued)
• One-way Pagers: radio receivers that receive data sent from a special
radio transmitter
Introduction to Information Technology
• Radio transmitter sends out signals over the special frequency; pagers are
tuned to that frequency
• When a particular pager hears its own code, it receives and displays the
message
• Often used in hospitals and areas where smartphones are not allowed
42
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: Two-Way Communication
• 1G: First-Generation Cellular Service
• Analog cellphones
Introduction to Information Technology
43
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: Two-Way Communication (continued)
• 3G: Third-Generation Cellular Service
• Broadband technology
Introduction to Information Technology
• Carries data at high speeds: 144 kilobits per second up to 3.1 megabits per
second
• Accepts e-mail with attachments
• Displays color video and still pictures
• Plays music
44
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Long-Distance Wireless: Two-Way Communication (continued)
• 4G: Fourth-Generation Cellular Service
• A nationwide 4G network is in development; up to 100 megabits/second
Introduction to Information Technology
45
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cellphone
Connections
Introduction to Information Technology
46
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication
• Local Area Networks
• Range 100 – 228 feet
Introduction to Information Technology
49
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
General Wi-Fi
Network
Introduction to Information Technology
50
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication (continued)
• Personal Area Wireless
• Bluetooth
Introduction to Information Technology
51
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication (continued)
• Personal Area Wireless (continued)
• Ultra Wideband (UWB)
Introduction to Information Technology
52
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Short-Range Wireless: Two-Way Communication (continued)
• Short-Range Wireless for Home
• Insteon
Introduction to Information Technology
53
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
UNIT 6B: Cyberthreats: Trolls, Spies, & Hackers & Thieves
security.
54
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
6.5 Cyberintruders
Trolls, Spies, Hackers, & Thieves
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Trolls aren’t necessarily destructive, but they can be disruptive
on online comment boards. A troll is a person who posts
intentionally offensive, incendiary, or off-topic comments
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Malicious hackers break into computers for malicious purposes.
• Script kiddies are technically unsophisticated teenagers who use downloadable software for
perform break-ins.
Introduction to Information Technology
• Hacktivists are hacker activists who break into systems for a political or a socially motivated
purpose.
• Black-hat hackers break into computers to steal or destroy information or to use it for illegal
profit.
• Cyberterrorists attack computer systems so as to bring physical, political or financial harm to
groups, companies, or nations.
• Benign hackers (thrill-seeker hackers) illegally access computer systems simply for the
challenge of it, not to damage or steal anything; their reward is the achievement of breaking
in.
• Benevolent hackers (ethical hackers or white-hat hackers) are usually computer professionals
who break into computer systems and networks with the knowledge of their owners to expose
security flaws that can then be fixed. 57
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Thieves may be a company’s employees or suppliers or
professionals.
Introduction to Information Technology
• Employees
• Outside partners & suppliers
• Hardware thieves
• Con artists, scammers, & counterfeiters
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.6 Cyberattacks &
Introduction to Information Technology
Malware
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Networks and computer systems are susceptible to attacks by all kinds of
malware.
Introduction to Information Technology
60
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats:
• Denial of Service Attack
Introduction to Information Technology
61
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Worms
• A program that copies itself repeatedly into a computer’s memory or disk
Introduction to Information Technology
drive.
• May copy itself so much it crashes the infected computer.
• Trojan Horses
• Programs that pretend to be a useful program such as a free game or a
screensaver but that carry viruses or malicious instructions that damage your
computer or install a backdoor or spyware.
• Backdoors and spyware allow others to access your computer without your
knowledge.
62
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Rootkits
• In many computer operating systems, the “root” is an account for system
Introduction to Information Technology
administration. A “kit” is the malware secretly introduced into the computer. A rootkit
gives an attacker “super powers” over computers—for example, the ability to steal
sensitive personal information.
• Blended Threats
• A blended threat is a more sophisticated attack that bundles some of the worst aspects
of viruses, worms, Trojan horses, and other malware into one single threat. Blended
threats can use server and Internet vulnerabilities to initiate, then transmit and also
spread an attack. Blended threats are designed to use multiple modes of transport—
email, flash drives, networks, and so on.
63
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Zombies & Bots
• A botmaster uses malware to hijack hundreds to many thousands of computers and is
Introduction to Information Technology
able to remotely control them all, including the ability to update the malware and to
introduce other programs such as spyware. Hijacked computers are called zombies.
• A botnet (robot network) is a network of computers in which each computer has
been implanted with instructions to wait for commands from the person controlling
the botnet.
• Ransomeware
• A botnet may be used to install ransomeware, which holds the data on a computer or
the use of the computer hostage until a payment is made. Ransomware encrypts the
target’s files, and the attacker tells the victim to make a payment of a specified
amount to a special account to receive the decryption key.
64
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Time, Logic, & Email Bombs: A time bomb is malware programmed to “go off” at
a particular time or date. A logic bomb is “detonated” when a specific event occurs
—for example, all personnel records are erased when an electronic notation is made
that a particular person was fired. Email bombs overwhelm a person’s email account
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• Cellphone Malware
• Spread via Internet downloads, MMS attachments, and Bluetooth transfers
Introduction to Information Technology
66
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Cyberthreats (continued)
• How they spread
•
Introduction to Information Technology
68
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Online Safety (continued)
• Install antispyware software
• Encrypt financial and personal records so only you can read them
Introduction to Information Technology
69
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Online Safety (continued)
• Encryption
• Process of altering readable data into unreadable form to prevent unauthorized
Introduction to Information Technology
access
• Uses powerful mathematical ciphers to create coded messages that are difficult to break
• Unencrypted messages are known as plain text
• Encrypted text is known as cybertext
• You use an encryption key to encrypt and decrypt codded messages
70
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
6.7 Concerns about Privacy
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• The proliferation of networks and databases have put privacy
under great pressure.
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• Identity (ID) theft, or theft of identity (TOI), is a crime in
which thieves hijack your name and identity and use your
information and credit rating to get cash or buy things.
Introduction to Information Technology
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.
• If ID theft happens, contact:
• Credit card companies
Introduction to Information Technology
• Your bank
• Department of Automotive Vehicles
• Utility companies
• Phone companies
• Local police
• Federal Trade Commission
• Other organizations you belong to
© 2015 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner. This document may not be copied, scanned, duplicated, forwarded, distributed, or posted on a website, in whole or part.