You are on page 1of 11

Cryptography

• Cryptography - is a method of storing and transmitting data in a form


that only those it is intended for can read and process.
• It is a science of protecting information by encoding it into an
unreadable format.
• Cryptography is an effective way of protecting sensitive information as
it is stored on media or transmitted through network communication
paths.
• Encryption- It is the process of converting plain text into an
unreadable form (cipher text). It is when you keep the information
through a secret code that only you and another recipient know.
• Decryption – It is the process of converting unreadable form (cipher
text )into a plain text. It is changing the secret code back to its
original form.

• PURPOSE OF CRYTORAPHY AND SECURITY


• 1. Confidentiality of information.
• It ensures that only authorized person can view the information.
• 2. Integrity of the information.
• It ensures that the information is correct and no unauthorized person
or malicious software has altered the data. Enccrypted information
cannot be changed except by authorized users who have the key.
3. Authenticity guarantee of the sender.
-It provides proof of the genuineness of the user.
-Cryptography can prove that the sender was legitimate and not
an impostor.
4. Access Control of the data.
-It ensures that data is accessible to authorized users.
-Authorized users are provided the decryption key to access the
information.
5. Non-repudiation.
-It proves that a user performed an action.
-Cryptography prevents an individual from fraudulently denying that
they were involved in a transaction.

ELECTRONIC SECURITY
6. Personal Security- Make your password so hard to guess.
- Make a very strong password and do not allow google or any app to
remember your password.
2. Search Engines- All search engines track your search history and build
profiles as your personalized data.
3. Bluetooth.
- Be sure to switch off your Bluetooth always.
- Switch it on when you need it only.
- Anybody can get your data when your Bluetooth is on and not
secured.
4. Location Services.
- If not necessary don’t let anybody locate where you are.
5. Social Networking.
- Do not put your birthday, passwords, identification card, and
important details about you.
- Set your privacy settings to your friends only.
6. Cloud Services.
- Protect your files in the cloud with strict sharing capabilities.
Always check to ensure that people you share your link can have an
access to view and edit your files.
- Do not upload in the cloud pictures that can lead to your credit cards and
ATM cards.
7. Web Browsing.
- Do not click advertisement that pop-up in your browsers.
- Be conscious and aware to links that will ask information about you.
8. File Storage.
- If you have important information in your hard disk and USB Flash Disk,be
sure to use the software True Crypt.
9. Email.
- All “free” email and webmail services can trace your messages.
- To keep the content of your messages private, delete it after receiving it.
- Save and delete to assure that you keep your messages to yourself.
10. Encryption.
-Use software that will encrypt and decrypt your hard drive.
- File Vault for Windows and Open PGP can encrypt, depcrypt,
sign and verify emails.

• Information Security is important especially if it will affect personal


information of your parents, your school, and yourself.
• It is better to practice to be secured than to be sorry.
Activity: Secret Code
• Decrypt the code. Write the text by looking at the code.
A B C D E F G H I J K L M
1 2 3 4 5 6 7 8 9 10 11 12 13
N O P Q R S T U V W X Y Z
14 15 16 17 18 19 20 21 22 23 24 25 26

1. 3.
4 – 5 – 3 – 15 – 4 – 5 11 – 5 – 25
2. 4.
19 – 5 – 3 – 18 – 5 – 20 5 – 14 – 3 – 18 – 25 – 16 - 20
5. 8.
3 – 18 – 25 – 16 – 20 – 15 – 7 – 18 16 – 18 – 9 – 22 – 1 – 20 – 5
- 1 - 16 – 8 – 25
6. 9.
5 – 14 – 3 – 15 – 4 – 5 4 – 5 – 3 – 18 – 25 – 16 – 20
7. 10.

13 – 5 – 19 – 19 – 1 – 7 – 5 1 – 21 – 20 – 8 – 5 – 14 – 20 – 9 –
3

You might also like