Unit 4 Lab 2
Cybersecurity
In this lab, you will learn about security risks on the internet and how data can be encoded to protect it.
Cryptography
Vocabulary
Click each word to view the definition.
Encryption
Encryption is the process of encoding data to prevent unauthorized access.
Decryption
Decryption is the process of decoding the data.
Symmetric Encryption
Substitution ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.
If There's Time
Click to access the page.
Cybersecurity
If There's Time
Public Key Encryption
Vocabulary
Click each word to view the definition.
Public key (asymmetric) encryption
Public key encryption uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it. Public key encryption is the primary method of encryption today because of its high level of security.
Symmetric cryptography
Symmetric cryptography uses the same secret key to encode and to decode a message, and it's been around for thousands of years. Its weakness is that the key becomes another message that needs to be transmitted securely.
SSL/TLS
SSL/TLS (secure sockets layer/transport layer security) is the standard used for cryptographically secured information transfer on the Internet.
Certificate authorities
Certificate authorities are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications. Instead of trusting that the website is who they say they are, you now have to trust that the Certificate Authority is reliable.
If There Is Time
Click to access the page.
Who Cares About Encryption?
Security Risks
Vocabulary
Click each word to view the definition.
Malware
Malware is software that was designed to harm or take partial control over your computer.
Keylogging software
Keylogging software is a kind of malware that records every key pressed by a user.
Computer virus
A computer virus is a type of malware that spreads and infects other computers. Viruses can attach themselves to legitimate programs.
Antivirus or anti-malware software
Antivirus or anti-malware software is software designed to scan your files and Internet transmissions looking for malware.
Firewall
A firewall is a security system that controls the kinds of connections that can be made between a computer or network and the outside world.
Phishing
Phishing is a common security attack in which the victim is tricked into giving up personal information or downloading malware.
DDoS(Distributed Denial of Service) attack
A DDoS (Distributed Denial of Service) attack uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.
Rogue access point
A rogue access point is a wireless access point that gives access to a secure network without the authorization of the network administrator.
Self-Check
Unit 4 Lab 2: Security Risks