Computing
Computer Science LearnITWithMrC ⛯ Year 7 Year 8 Year 9 GCSE
Responsive image

Lesson Video

73

Lesson Tasks

  • Watch the Lesson video
    Make notes if needed.
  • Open your Learning Journal
    Complete Task 1 in your Learning Journal
  • Complete the learning activities
    Make sure you complete the book tasks in your Unit Booklet
  • Complete End of Task Assessment
    Update your learning objectives

What do I need to Learn?

0 results forGuest
I need to learn how to understand and explain biometric security measures (particularly for mobile devices)
I need to learn how to understand and explain password systems as a security measure.
I need to learn how to understand and explain CAPTCHA (or similar) as a security measure.
I need to learn how to understand and explain using email confirmations to confirm a user’s identity as a security measure.
I need to learn how to understand and explain automatic software updates as a security measure.

Key Terms

Biometrics facial recognition fingerprint recognition CAPTCHA Penetration testing White box Black box denial of service (DoS) attack

Task 1 - Detect and Prevent Cyber Security Threats Click to see more

t">

Malicious Code, figure 1

Methods to Detect and Prevent Cyber Security Threats

How can we prevent network vulnerabilities?

  • There are many methods that an organisation can use to prevent and deal with threats to network security.
  • We will cover the following methods:
    • Biometric Measures.
    • Passwords and Usernames.
    • CAPTCHA.
    • Email Confirmations.
    • Anti-Malware Software and Automatic Software Updates.

Fortunately, there are many different security measures in place to help combat some of these threats.

The most commonly used are:

  1. Biometric measures - this uses biometrics to confirm a user’s identity. Biometrics relates to the measurements of the body, and could include finger prints, facial recognition, voice recognition or even retinal scanning.
  2. Password systems - making use of passwords which are known only by those people who should access the system.
  3. CAPTCHA__ __- these are the little boxes that appear on the screen to prove you are not a robot. They include tests such as ‘select all the images of cars’ or ‘what do these words say’. The idea is to provide tasks that are very difficult for computers to perform, but relatively easy for humans. By doing this, it will stop bots from being able to repeatedly access a site to try and crack passwords.
  4. Email confirmations - most companies will send through emails to your email account where you are able to complete additional tasks. For example, in order to reset your password, you may answer a few questions online, but the password reset link (or new temporary password) will ultimately be sent to your inbox so that you can confirm the details there.
  5. Automatic software updates - by automatically updating software, the bugs that are patched in new updates of programs will be automatically (and therefore quickly) fixed before they can be exploited.


Task 2 - Biometric Measures Click to see more

Biometric Measures

Biometrics.png Biometric Measures

Biometrics - Biometrics measures physical traits. Biometrics are measures of biological
quantities or patterns but also means measurements of an individual's features, such as
fingerprints, that can identify or authenticate a person. Used this way, a biometric is
a password that cannot be forgotten, lost or stolen.
  • Biometrics covers a variety of technologies in which unique identifiable attributes of people are used for identification and authentication.
  • These include, a person’s fingerprint scan, retinal (iris) scan, face scan and voice pattern sample which can be used to validate the identity of individua seeking to control access to computers, airlines, databases and other areas which may need to be restricted.
  • The probability of two people having identical biological characteristics is extremely rare, and so these methods can be used to positively identify a person.
  • Biometric systems are often used on mobile devices and the advantages of these methods over password entry are that it is not possible to steal or forget a biometric characteristic.
  • Biometric Measures - Using some part of a person's biology to access a computer/device system, instead of using a password.
  • For example:
    • Mobile phones and tablets that unlock on scanning a fingerprint.
    • Doorbells that unlock when a person's iris or retina is scanned.
    • Voice recognition.
    • Face recognition.

Try It: Biometric Research

  • Q1: Research two biometric methods and their uses?

Task 3 - Passwords and Usernames Click to see more


Passwords_UserNames.png Passwords and Usernames

Passwords and Usernames - Is a technique of fraudulently obtaining private information,
often using email or SMS.
  • Automated procedures that ensure that secure password policies are followed to ensure that users who do not follow these procedures are not allowed into a system.
  • Password strength is a measure of the effectiveness of a password against guessing or brute-force attacks.
  • In its usual form, it estimates how many tries an attacker who does not have direct access to the password would need on average to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability.
  • Using strong passwords lowers overall risk of a security breach, but strong passwords do not replace the need for other effective security controls.
  • Passwords should contain a combination of upper and lower-case letters as well as numbers and symbols. (E.G. $tROng [email protected]$worDs).
  • Simarly, default passwords can be a problem. For example, a router's new owner might not change the default password from admin or password when they buy it. The default password is usually found in the instruction manual or on the device itself.
  • Leaving a default password is one of the major factors in compromising the security of a system.

Task 4 - CAPTCHA Click to see more

CAPTCHA.png CAPTCHA

CAPTCHA - Is an acronym for Completely Automated Public Turing test to tell Computers
and Humans Apart. is a type of challenge–response test used in computing to determine
whether or not the user is human.
  • A CAPTCHA is a program that protects websites against bots by generating and grading tests that humans can pass, but current computer programs cannot. For example, humans can read distorted text as the one shown above, but current computer programs cannot.
  • The most common type of CAPTCHA was first invented in 1997 by two groups working in parallel. This form of CAPTCHA requires that the user type the letters of a distorted image, sometimes with the addition of an obscured sequence of letters or digits that appears on the screen.
  • Because the test is administered by a computer, in contrast to the standard Turing test that is administered by a human, a CAPTCHA is sometimes described as a reverse Turing test.

  • CAPTCHAs have several applications for practical security, including (but not limited to):
    • Preventing Comment Spam in Blogs.
    • Protecting Website Registration.
    • Protecting Email Addresses From Scrapers.
    • Online Polls.
    • Preventing Dictionary Attacks.
    • Search Engine Bots.
    • Worms and Spam.

Try It: CAPTCHA

  • Q2: Even perfectly sighted individuals sometimes find CAPTCHA text very difficult or impossible to read. (a) Does the use of CAPTCHA images descriminate against any computer users? (b) And what other newer versions of CAPTCHA are available to address this issue?

Task 5 - Email Confirmations Click to see more

Password_Confirmation.png Password Confirmations

Email Confirmations - Often, when a password is changed, a user must verify this change
by clicking on a link sent to a registered email address. This can prevent hackers from
changing passwords un-noticed.
  • When you sign up for a new web service, you will sometimes be asked to verify your details through an email verification process.
  • You will not be able to complete the web service application process and activate your new account until you have verified and confirmed your email address.
  • This method is considered a best practice, to confirm the email of a new user registration, so that it can be confirmed that the individual is not impersonating someone else.
  • Suppose you had a discussion forum, and you wanted to prevent [email protected] from registering as [email protected]. Without email confirmation, [email protected] could receive unwanted email from your app.
  • Suppose the user accidentally registered as [email protected] and had not noticed the misspelling of yli.
  • They would not be able to use password recovery because the app does not have their correct email address.
  • Email confirmation provides limited protection from bots. Email confirmation doesn't provide protection from malicious users with many email accounts.

Try It: Email Confirmations

  • Q3: Have you ever been required to wait for email confirmation and click on a link to complete a registration process? Do you always complete the registration?

Task 6 - Anti-Malware Software and Automatic Software Updates Click to see more

Anti_Malware.png Anti-Malware Software

  • Anti-malware is a type of software developed to scan, identify and eliminate malware, also known as malicious software, from an infected system or network.
  • It secures an individual system or an entire business network from malicious infections that can be caused by a variety of malware that includes viruses, worms, trojans, rootkits, spyware and adware.
  • Anti-malware can be deployed on individual computers, a gateway server or even on a dedicated network appliance.
  • An effective anti-malware tool includes multiple features like anti-spyware and phishing tools to ensure complete protection.

  • Anti-Malware Software will protect a computer in three ways:
    1. It prevents harmful programs from being installed on a computer.
    2. It prevents important files, such as the operating system (OS), from being changed or deleted.
    3. If a virus does manage to install itself, the software will detect it when it performs regular virus system scans. Any viruses detected will be removed.
  • New viruses are created regularly, so it's important that any anti-virus software is regularly updated.

Automatic Software Updates

  • Popular software is a common target for hackers and malware. For example, browsers, pdf readers, application software and even operating systems.
  • These can all be automatically updated by selecting options to automatically update and install either from the operating system or from the software.
  • The top most out-of-date Windows programs installed on PCs around the world shows that in more than 94% of cases, users who have installed Adobe Shockwave, VLC Media Player, and Skype on their computers haven't updated them to the latest versions.
  • Out-of-date Microsoft Office programs are another category of applications which put their users at risk, especially given that 15% of all Office installations are Enterprise 2007, an Office version Microsoft has stopped supporting since 2017 which means that it hasn't received any bug fixes or security patches for almost two years.
  • Threats will often exist in combination. A username acquired via phishing could be used in collaboration with a weak, easy-to-guess password to introduce a virus that specifically seeks out unpatched software.

Task 7 - Cyber Security Challenge Click to see more

Click on the image below to complete a series of cybersecurity challenges.


Task 8 - End of Task Assessment Click to see more