Detection & prevention
Fortunately, there are many different security measures in place to help combat some of these threats.
The most commonly used are:
Biometric Measures
Biometrics - Biometrics measures physical traits. Biometrics are measures of biological quantities or patterns but also means measurements of an individual's features, such as fingerprints, that can identify or authenticate a person. Used this way, a biometric is a password that cannot be forgotten, lost or stolen.
variety of technologies
unique identifiable
identification
authentication
person’s
validate
identity
access
restricted
probability
two people
identical biological
extremely rare
mobile devices
advantages
not possible
steal
forget
part
person's biology
computer/device system
Passwords and Usernames - Is a technique of fraudulently obtaining private information, often using email or SMS.
secure password policies
ensure
not allowed
effectiveness
how many
strength
lowers
risk
security breach
do not replace
should contain
not change
default password
instruction manual
major factors
CAPTCHA
CAPTCHA - Is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. is a type of challenge–response test used in computing to determine whether or not the user is human.
program
protects websites
bots
humans
computer programs cannot
1997
distorted image
administered by a computer
contrast
human
reverse Turing test
Password Confirmations
Email Confirmations - Often, when a password is changed, a user must verify this change by clicking on a link sent to a registered email address. This can prevent hackers from changing passwords un-noticed.
sign up
verify
email verification process
not be able
activate
not impersonating
else
[email protected]
accidentally
yli
use password
does not
correct email address
limited protection
doesn't
protection
many email accounts
software
scan, identify
eliminate malware
secures
malicious infections
individual computers
gateway server
dedicated network appliance
effective
anti-spyware
phishing tools
Automatic Software Updates
common target
all
automatically updated
94% of cases
haven't updated
15% of all Office installations
hasn't received
two years
username
phishing
weak, easy-to-guess password
virus
unpatched software
AQA Computer Science Tutor
Penetration Testing