Professional Documents
Culture Documents
Name: Cimon
Resources
Security & Ethics
Data Loss & Data Corruption – Using the diagram on page 155 as a guide re-arrange
and link up the following:
Security & Ethics
Firewalls
A Firewall is A firewall is either a software or hardware that sits between the user’s
computer and an external network to filter the information in and out
of the computer
A Firewall can carry out the following tasks:
• Examines the ‘traffic’ between the user’s computer and a public network
• Checks whether incoming or or outgoing data meets given set of criteria
• The firewall will block the ‘traffic’ and give the user a warning if the data fails the criteria
• Helps to prevent viruses or hackers entering the user’s computer
• Warns the user if some software on their system is trying to access an external data source
• Logs all incoming and outgoing ‘traffic’ to allow later interrogation by the user
Security & Ethics
A Firewall cannot:
• A firewall cannot prevent individuals, on internal networks, using their own moderns to
bypass the firewall
• Employee misconduct or carelessness cannot be controlled by firewalls
• Users on stand-alone computers can chose to disable the firewall, leaving their computer
open to harmful ‘traffic’ from the internet.
A Proxy Server Acts as an intermediary between the user and a web server
What is SSL?
SECURE SOCKETS LAYER (SSL) is a type of protocol which allows the data to
be sent and received securely over the internet.
What is TLS?
TRANSPORT LAYER SECURITY (TLS) is a form of protocol that ensures the
security and privacy data between devices and users when communicating
over the internet.
TLS can make use of Session Caching which improves the overall performance
compared to SSL
Security & Ethics
What is Encryption?
Activity 8.1
Use the following
sender and
receiver values to
check that the
system described Sender Recipient
in Table 8.1 works:
x=3 y=5
The sender uses
7^3=343 7^5=16807
the value x = 3
and receiver uses
the value y = 5
Security & Ethics
Using the internet, carry out a search for MD4 and MD5 hashing algorithm
generators (e.g. http://www.online-convert.com/).
Then try various numbers, letters and messages to see how the 128-bit code varies.
Create the MD4 hashing algorithm for your name and copy it below:
Name: Arkar
Authentication is
AUTHENTICATION is used to verify that data comes from a trusted source. It
works encryption to strengthen internet security
checked against a secure file to confirm a person who they claimed to be. The
access is denied if it is incorrect.
A DoS attack is
COMPUTER ETHICS is a set of principles set out to regulate the use of computers.
Three factors are considered:
● Intellectual Property Rights
● Privacy Issue
● Effect of computers on society
PLAIGARISM is
The ACM (Association for Computer Machinery) and IEEE (Institute of Electrical
and Electronics Engineers) have published the following code of ethics:
1. To accept responsibility in making decisions consistent with the safety, health and welfare of the public,
and to disclose promptly the factors that might endanger the public or the environment;
2. to avoid real or perceived conflicts of interest whenever possible, and to disclose them to affected parties
when they do exist;
3. To be honest and realistic in stating claims or estimates based on available data;
4. To reject bribery in all its forms;
5. To improve the understanding of technology; its appropriate application, and potential consequences;
6. To maintain and improve our technical competence and to undertake technological tasks for others only if
qualified by training or experience, or after full disclosure of pertinent limitations;
7. To seek, accept, and offer honest criticism of technical work, to acknowledge and correct errors, and to
credit properly the contributions of others;
8. To treat fairly all persons and to not engage in acts of discrimination based on race, religion, gender,
disability, age, national origin, sexual orientation, gender identity, or gender expression;
9. To avoid injuring others, their property, reputation, or employment by false or malicious action;
10. To assist colleagues and co-workers in their professional development and to support them in following
this code of ethics.
Security & Ethics
Complete the comparison table for Free Software, Freeware and Shareware
Modify source
Cost Fully functional? Expires?
code?
Users have
freedom to run,
Free There may be
copy, change or Yes No
Software a charge
adapt free
softwares
Not allowed,
Free of
Freeware developer retains Usually No
Charge
copyright
No initial Depends, some
It is fully
Sharewar charge, there features may be
protected by Yes
e may be a disabled until you
copyright laws.
charge later purchase
Security & Ethics
Feedback
Breadth Depth Understanding
□ Some aspects complete □ Basic level of depth shown □ Some work is accurate
□ Little work complete □ Little depth and detail provided □ Little work is accurate
☹😐☺ I can understand the need and how to keep data safe from unauthorised users
☹😐☺ I can show knowledge of use of passwords, firewalls, proxy servers, SSL, TLS and encryption
☹😐☺ I can appreciate appropriate security safeguards when carrying out online transactions