{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Safe_Computing

Safe_Computing - AB113 Information Technology Safe...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
AB113 Information Technology Safe Computing 1. Explain why security is important for both individuals and organizations. Individual - There is a need for privacy when we engage in private communications conducted over electronic means. - Do not want others to intercept our communications; tamper with or steal our information. Organizations - Businesses dependent on IT - Lax of security may cause system to be down thereby resulting in financial loss - Lax of security may result in information being stolen. - Stolen information may have competitive value. 2. Define privacy and describe the ways in which it can be threatened. Privacy is the right to be left alone when you want to be, to have control over your own possessions, and not to be observed without consent. Your privacy can be compromised by: (a) Other individuals snooping on you (b) Employers monitoring your actions (c) Businesses that collect information on your needs, preferences, and surfing practices (d) Government agencies that collect information on citizens 3. Describe the use of authentication and encryption as ways to protect privacy Authentication Account/Message accessible only to legitimates users Strong Passwords Multi-factor authentication (a) What you know (e.g. pin passwords) (b) What you have (e.g. ATM card) (c) What you are (biometrics) Biometrics - Use of physiological characteristics – fingerprints, blood vessels in iris, sound of voice, or face recognition – to provide identification. - Difficult to copy/fake Encryption Message contents transformed by combination with “key”
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Same key used to encrypt and decrypt – symmetric-key encryption
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.
  • Spring '10
  • tan
  • Pretty Good Privacy, security measures, Public Key Encryption, Information Technology Safe, business security weaknesses

{[ snackBarMessage ]}