9781435483712_PPT_ch08 - Cyber Safety Chapter 8 Working on...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Cyber Safety Chapter 8: Working on the Internet Copyright © by EC-Council All rights Objectives  Use various options and devices while working on the Internet  Work safely in Web-based and mail client e-mail systems  Send or transfer information and files safely  Transact business safely  Communicate safely  Use portable, wireless, and USB devices; media files; and third-party software safely Copyright © by EC-Council All rights Case Example  Denise considers herself to be computer savvy and uses her computer extensively for several activities  She has an e-mail alert from her telephone company to pay her telephone bill promptly and receive a 10% discount on her bill  Denise clicks the link that takes her to the familiar e- payment site  She keys in her authentication credentials and is surprised when told that her details do not match the record  She is asked to patch her system to ensure a secure transaction Copyright © by EC-Council All rights Introduction  In this chapter, we discuss how to work safely on the Internet to:  Send or transfer information and files  Transact business  Communicate via instant messaging or file-sharing and dial-in networks  Use portable, wireless, and USB devices  Use media files and third-party software Copyright © by EC-Council All rights Principles of Security  Secure information will have the following characteristics:  Confidentiality  Integrity  Availability  Nonrepudiation  Authenticity Copyright © by EC-Council All rights Encryption  Process of transforming data into an unrecognizable form by using an algorithm called a cipher and a variable value called the key  Key  Character or sequence of characters applied to text in order to encrypt or decrypt it  Decryption  Reversing the encryption process to restore the original data form Copyright © by EC-Council All rights Encryption (cont’d.)  Cipher  Algorithm for performing encryption and decryption  Series of well-defined steps that can be followed as a procedure  Cryptographic algorithm  Set of guidelines used to execute cryptographic operations such as encryption and decryption  Symmetric encryption  Uses the same cryptographic key to encrypt and decrypt the message  Asymmetric encryption  Private key and a public key are used Copyright © by EC-Council All rights Encryption (cont’d.)  Cipher  Algorithm for performing encryption and decryption  Series of well-defined steps that can be followed as a procedure  Cryptographic algorithm  Set of guidelines used to execute cryptographic...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Page1 / 34

9781435483712_PPT_ch08 - Cyber Safety Chapter 8 Working on...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online