encryption and hacking by steph garrihy. what is encryption? encryption is when data is scrambled by...

6
Encryption and Hacking By Steph Garrihy

Upload: carmel-wiggins

Post on 05-Jan-2016

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing

Encryption and Hacking

By Steph Garrihy

Page 2: Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing

What is Encryption?• Encryption is when data is scrambled by software using a preset key so that

anyone viewing the data cannot understand it. For example banks must keep their customer information private and military or government organisations do not want their secret data read.

• Encryption changes information from e.g. plain text that anyone can understand into encrypted information that cannot be understood. This process is carried out by encryption software with the aid of an encryption key.

• An encryption key is usually the same key used to encrypt the data and it is required for the reverse process, decryption which is when data is unscrambled by software using the preset key so that anyone viewing the data can now understand it.

Page 3: Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing

What is Hacking?

A hacker is anyone who or attempts to access a computer system by gaining access to security details. This is not necessarily illegal as if a password is forgotten, a hacker may be employed to discover or reset the password.

However most people think of a hacker as someone who illegally tries to access data that they have no right to access.

In the news there was a story on 13th January 2013 about anonymous hacks MIT after Aaron Swartz’s suicide. Hacktivist group defaces university pages after the school promises a full investigation into MIT's role in events leading up to the Internet activist taking his life.

Page 4: Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing

What is Key Logging?

• Key logging software records the keys that are used when a person types at a keyboard. The software then either immediately sends the information to another person or records it for another time. The other person who is receiving this message could use it to discover passwords! This software goes unnoticed by the user and can reveal anything that is typed on a keyboard.

Page 5: Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing

What is Bank security measures?

• Banks have implemented modern security measures, like motion-sensing and high resolution colour security cameras, time-locked heavy vault doors, silent alarms, exploding dye packs, bait money and locator devices. Some banks supplement this protection with armed or unarmed security guards.

• Unauthorised users can try to access networks from outside the internet if they can’t reach a computer.

• When a network is connected with the internet it becomes vulnerable to outsiders who are trying to use the network by connecting it to the internet.

• Because more and more networks are setting up in homes and in businesses it’s important for people to try and prevent unauthorised access to a network from the internet. It is always best to use user IDs and passwords.

Page 6: Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing

What is a Firewall?

• A firewall can be programmed by its own owner to allow only authorised computers and users to access the internet and to stop unauthorised access from outside the network. Most routers and cable “modems” include a programmable firewall and these should be configured very carefully.

• Careful use of firewalls and data encryption can prevent your data from being viewed or stolen and prevents others from using your internet connection with others.

• Anyone who is responsible for a private network that is connected to a public network needs firewall protection, so if you don’t have a network that is not private and is not connected to a public network then you may not need one.