You are on page 1of 5

Universidad Privada Franz Tamayo - Sede El Alto

Facultad de Ingeniería
Carrera de Ingeniería de Sistemas
GV.EA.D.08

Inglés IV
INFORMATION SECURITY

Docente: Ing. Juan Marcelo Usnayo Montes

Estudiante: Apaza Huanca Daniel

Callisaya Ramos Ronaldo

Mamani Yampara Alexander

Quispe Tonconi Jheyson Rubiño

Torrez Mamani David Ronald

Fecha: 19/10/2021

El Alto, La Paz – Bolivia

2021
INFORMATION SECURITY

1. THE LATEST IN SECURITY ON TWITCH

Hello everyone, on this occasion We'll talk about computer security. If you like
technology today, you can learn about computer security.

What happened to Twitch?

The popular live-streaming platform Twitch, owned by Amazon, has confirmed that it
has suffered a security breach.

TWITCH CONFIRMS HACKING ATTACK AND ASSURES THAT NO USER


PASSWORDS OR CREDIT CARDS HAVE BEEN EXPOSED

Last Monday 04/10/2021, there was a big data leak from Twitch, specifically a 125
GB torrent and this had been posted on the famous internet forum 4chan.

If you have an account, change your password. In addition, all the platform's source
code has been leaked since it was created.

This cost Jeff Bezos 970 million. If I were him, I would be worried. This is what was
leaked.

TOP 20 STREAMERS WHO HAVE EARNED THE MOST MONEY ON TWITCH IN


THE LAST TWO YEARS.

In the top 1 we have:

If you had that kind of money, what would you do?

If I had that kind of money, I would go on a trip.

TWITCH RELEASED A STATEMENT ON OCTOBER FIFTEENTH, (2021)

As we said previously, the incident was a result of a server configuration change that
allowed improper access by an unauthorized third party. Our team took action to fix
the configuration issue and secure our systems. If you find a mistake, I will correct it.

If twitch had been more careful, this would not have happened.
2. INFORMATION ENCRYPTION

Hello everyone, in this section we will talk about information encryption. As we know
Every day we send and receive huge amounts of information, but how do we know
that this information does not fall into the wrong hands? We must know that
information on the internet can be intercepted.

Well, in order to protect the information, cryptography emerged. But what is


cryptography? They are ways to hide messages with a password and whoever
knows the password will be able to see or decipher the message. A well known
method was that of the Cesar code.

There are two known forms of encryption: symmetric encryption and asymmetric
encryption.

In symmetric encryption the same key that is used to encrypt is used to decrypt the
message. In asymmetric encryption you have two keys, one to encrypt and the other
to decrypt the message.

Now the encryption used to encrypt information on networks is asymmetric


encryption, in the next example we have Gary and Eva so if Gary sent the message,
it was encrypted with Eva´s public key and Eva will decrypt the message with her
public key. If someone intercepts the message, he won't be able to decrypt it without
Maria's private key.

Finally, the message that Gary sends is certified with his private key, so if the
message arrives, you can authenticate that Gary sent it with his public key.
3. iShop Scam

Good morning, today we will talk about the iShop app scam.
iShop was an application for the Android system, it had been working since May of
this year.
At least 2,400 (two thousand four hundred) people were scammed by those
responsible for the application.
It was an application available for the Android system, through which the scammers
asked for different amounts of money and told them that if you invest more, you will
earn more.
4. WEB SECURITY

Hello everyone, today in this program we are going to talk about security when
surfing the internet. In this pandemic many users have made use of the internet to
work, study and download documents.

But what is the consequence of surfing the internet?

The consequences are many; because several web pages only want to steal and
hurt you and if you enter one of those web pages, you will be downloading a virus
without knowing it.

And if by your bad luck that virus enters your computer you will see how to steal all
your data such as bank accounts, personal information, photos, virtual wallets and
passwords.

For this I present the website that helps you to verify your links and not only that but
also your documents that you want to enter this website is called OPSWAT and how
does it work? !!!!very easy¡¡¡¡¡

First we enter the page of OPSWAT.

Second we enter the link of the page to which we want to enter

In this case the link of wikipedia and SCHOOL OF ENGLISH and as we can see
wikipedia does not have virus and SCHOOL OF ENGLISH does not have virus
either.

Now we chose a page that contained a virus and OPSWAT detected it. And well we
conclude with the advice of the day of navigation on the Internet.

LET'S GO WITH YOU, DANIEL, GO AHEAD WITH THE RECOMMENDATION OF


THE DAY.
5. DATA SECURITY IN SOCIAL NETWORKS

Hello everyone, today I bring you how to be safe when entering our social networks.
Everyone has them but we are not taking into account the risks we have when
entering our partner networks. Because if we misuse them, we will have problems
with our security. So today I will give some tips to enter our social networks with
minimal risk.
1. If you chat with an unknown person, do not send personal information.
2. Don't post things that could damage your reputation.
3. Save your passwords physically and not in your cloud.
4. If you are sent a request from an unknown person do not accept it, because
they will want to steal your personal information.
5. A great security option is to configure your publications so that only the people
you choose can see it.
6. And as my classmate RONALDO mentioned, avoid entering web pages that
you don't know and use the tool I mentioned.
If we comply with some security rules, we will see that we will be safer and without
worries.

VIDEO LINK:

https://drive.google.com/file/d/1sYlWg8j57i_MaCDTSDmX8-BZmUG78NXW/view?usp=
sharing

You might also like