9781435483712_PPT_ch08 - CyberSafety Chapter8:Workingonthe...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Cyber Safety Chapter 8: Working on the  Internet
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Copyright  ©  by EC-Council All rights  reserved. Reproduction is strictly prohibited  Objectives Use various options and devices while working on  the Internet Work safely in Web-based and mail client e-mail  systems Send or transfer information and files safely Transact business safely Communicate safely Use portable, wireless, and USB devices; media files;  and third-party software safely
Image of page 2
Copyright  ©  by EC-Council All rights  reserved. Reproduction is strictly prohibited  Case Example Denise considers herself to be computer savvy and  uses her computer extensively for several activities She has an e-mail alert from her telephone company  to pay her telephone bill promptly and receive a 10%  discount on her bill Denise clicks the link that takes her to the familiar e- payment site She keys in her authentication credentials and is  surprised when told that her details do not match the  record She is asked to patch her system to ensure a secure  transaction
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Copyright  ©  by EC-Council All rights  reserved. Reproduction is strictly prohibited  Introduction In this chapter, we discuss how to work safely on the  Internet to: Send or transfer information and files Transact business Communicate via instant messaging or file-sharing  and dial-in networks Use portable, wireless, and USB devices Use media files and third-party software
Image of page 4
Copyright  ©  by EC-Council All rights  reserved. Reproduction is strictly prohibited  Principles of Security Secure information will have the following  characteristics: Confidentiality Integrity Availability Nonrepudiation Authenticity
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Copyright  ©  by EC-Council All rights  reserved. Reproduction is strictly prohibited  Encryption Process of transforming data into an unrecognizable  form by using an algorithm called a cipher and a  variable value called the key Key Character or sequence of characters applied to text in  order to encrypt or decrypt it Decryption Reversing the encryption process to restore the  original data form
Image of page 6
Copyright   by EC-Council All rights  reserved. Reproduction is strictly prohibited  Encryption (cont’d.) Cipher Algorithm for performing encryption and decryption Series of well-defined steps that can be followed as a  procedure Cryptographic algorithm Set of guidelines used to execute cryptographic  operations such as encryption and decryption Symmetric encryption Uses the same cryptographic key to encrypt and  decrypt the message Asymmetric encryption Private key and a public key are used
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Copyright  ©  by EC-Council All rights  reserved. Reproduction is strictly prohibited  Encryption (cont’d.) Cipher
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern