3.06 data encryption unit 3 internet basics. introduction in may of 2006, an analyst with the u.s....

10
3.06 Data Encryption 3.06 Data Encryption Unit 3 Unit 3 Internet Basics Internet Basics

Upload: cory-hunter

Post on 02-Jan-2016

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

3.06 Data Encryption3.06 Data Encryption

Unit 3 Unit 3 Internet BasicsInternet Basics

Page 2: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Introduction• In May of 2006, an analyst with the U.S. Department of Veterans Affairs

was robbed of his notebook computer. • Names, social security numbers, and health records of more than 26

million military veterans and their spouses were “safely” saved on its hard drive.

• Panic spread and the U.S. Department of Veterans Affairs then spent $3.7 million on encryption software for all of its computers, handhelds, and storage devices.

Page 3: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Introduction• At the end of this lesson, student will be able to:

– Explain data encryption procedures (ACOS 20)

Page 4: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Lesson

Encryption puts data into a secret code and is the most effective way to achieve data security.

To read an encrypted file, you must have access to a secret key or password that enables you to decrypt (decode) it.

Page 5: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Lesson• Encryption is

– a means of encoding data • into an unreadable series of characters with a secret key or

password – making it secure for transmission.

Page 6: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Lesson

• The encryption software – scrambles data from a person's system

• so that an unauthorized user is unable to read the information.– you might have the choice of either

» locking out the user after a certain number of tries » or even wipe out the data altogether

Page 7: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Lesson• What is the relationship between mathematics and national security?• Watch this video to find out.

– Theory and Practice• To view the video, enter the following username and password

information exactly as it appears below. – username: access_student

password: access

• You may want to look at the assignment for the lesson first because this video will help you answer the assigned questions.

Page 8: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Review• The federal government is not the only entity interested in encryption. • Most email messages you send travel over many networks—some of the networks

are secure and others are not. • Those email messages can pass through servers all over the Information

Superhighway. • Anyone with access to any of those servers can read your email messages sent in

plain text. • Privacy software can be purchased that will encrypt your messages to protect your

credit card numbers and information snoopers can use to commit identity theft. • Only your private key can decrypt the message and display its contents.

Page 9: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Task

• After reading this lesson and watching the lesson video, answer the 8 questions below. 1. Who is the largest employer of mathematicians in the United States? 2. Explain the science of Crytography.3. List at least two responsibilities of the National Security Agency (NSA). 4. Explain how bank account records are protected. 5. Explain how prime numbers are involved in encryption (prime numbers are those

numbers that cannot be divided by any number except themselves and one). 6. Explain the RSA System of encryption. 7. How can cipher text be converted into plain text? 8. In your own words, explain the difference between authentication and authorization.

• Open Microsoft Word and answer these questions in complete sentences– Save to your F Drive in your Unit 3 Folder as

» 3.06 Encryption Dropbox.

Page 10: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook

Are you finished?• You should have 15 things saved on your F Drive in your Unit 3

Folder.1. 3.01 Network Tutorial2. 3.01 How Networks Work3. 3.01 History and Internet Dropbox4. 3.02 Skills Check 35. 3.02 Boolean QC Chart6. 3.02 How Stuff Works Brain Quiz7. 3.02 Searching the Web Dropbox8. 3.03 Intel Education9. 3.03 Tutorial for Info Power10. 3.03 Side Trip11. 3.03 Evaluating Web Sites Dropbox12. 3.04 On Guard Online Spyware Quiz13. 3.04 Practice14. 3.05 Discussion: Computer Security15. 3.06 Encryption Dropbox

• So, are you finished?