3.06 data encryption unit 3 internet basics. introduction in may of 2006, an analyst with the u.s....
TRANSCRIPT
![Page 1: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/1.jpg)
3.06 Data Encryption3.06 Data Encryption
Unit 3 Unit 3 Internet BasicsInternet Basics
![Page 2: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/2.jpg)
Introduction• In May of 2006, an analyst with the U.S. Department of Veterans Affairs
was robbed of his notebook computer. • Names, social security numbers, and health records of more than 26
million military veterans and their spouses were “safely” saved on its hard drive.
• Panic spread and the U.S. Department of Veterans Affairs then spent $3.7 million on encryption software for all of its computers, handhelds, and storage devices.
![Page 3: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/3.jpg)
Introduction• At the end of this lesson, student will be able to:
– Explain data encryption procedures (ACOS 20)
![Page 4: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/4.jpg)
Lesson
Encryption puts data into a secret code and is the most effective way to achieve data security.
To read an encrypted file, you must have access to a secret key or password that enables you to decrypt (decode) it.
![Page 5: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/5.jpg)
Lesson• Encryption is
– a means of encoding data • into an unreadable series of characters with a secret key or
password – making it secure for transmission.
![Page 6: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/6.jpg)
Lesson
• The encryption software – scrambles data from a person's system
• so that an unauthorized user is unable to read the information.– you might have the choice of either
» locking out the user after a certain number of tries » or even wipe out the data altogether
![Page 7: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/7.jpg)
Lesson• What is the relationship between mathematics and national security?• Watch this video to find out.
– Theory and Practice• To view the video, enter the following username and password
information exactly as it appears below. – username: access_student
password: access
• You may want to look at the assignment for the lesson first because this video will help you answer the assigned questions.
![Page 8: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/8.jpg)
Review• The federal government is not the only entity interested in encryption. • Most email messages you send travel over many networks—some of the networks
are secure and others are not. • Those email messages can pass through servers all over the Information
Superhighway. • Anyone with access to any of those servers can read your email messages sent in
plain text. • Privacy software can be purchased that will encrypt your messages to protect your
credit card numbers and information snoopers can use to commit identity theft. • Only your private key can decrypt the message and display its contents.
![Page 9: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/9.jpg)
Task
• After reading this lesson and watching the lesson video, answer the 8 questions below. 1. Who is the largest employer of mathematicians in the United States? 2. Explain the science of Crytography.3. List at least two responsibilities of the National Security Agency (NSA). 4. Explain how bank account records are protected. 5. Explain how prime numbers are involved in encryption (prime numbers are those
numbers that cannot be divided by any number except themselves and one). 6. Explain the RSA System of encryption. 7. How can cipher text be converted into plain text? 8. In your own words, explain the difference between authentication and authorization.
• Open Microsoft Word and answer these questions in complete sentences– Save to your F Drive in your Unit 3 Folder as
» 3.06 Encryption Dropbox.
![Page 10: 3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook](https://reader036.vdocuments.us/reader036/viewer/2022082818/56649ee55503460f94bf48cc/html5/thumbnails/10.jpg)
Are you finished?• You should have 15 things saved on your F Drive in your Unit 3
Folder.1. 3.01 Network Tutorial2. 3.01 How Networks Work3. 3.01 History and Internet Dropbox4. 3.02 Skills Check 35. 3.02 Boolean QC Chart6. 3.02 How Stuff Works Brain Quiz7. 3.02 Searching the Web Dropbox8. 3.03 Intel Education9. 3.03 Tutorial for Info Power10. 3.03 Side Trip11. 3.03 Evaluating Web Sites Dropbox12. 3.04 On Guard Online Spyware Quiz13. 3.04 Practice14. 3.05 Discussion: Computer Security15. 3.06 Encryption Dropbox
• So, are you finished?