Unit 4 Lab 2

Cybersecurity




In this lab, you will learn about security risks on the internet and how data can be encoded to protect it.

Unit 4 Lab 2 Introduction

Cryptography

Unit 4 Lab 2 Section 1

Vocabulary

Click each word to view the definition.

Encryption

Encryption is the process of encoding data to prevent unauthorized access.

Decryption

Decryption is the process of decoding the data.

Symmetric Encryption

Substitution ciphers are examples of symmetric encryption because they use the same key for both encryption and decryption.

If There's Time

Unit 4 Lab 2 Section 1 If there is time

Click to access the page.

Cybersecurity

Unit 4 Lab 2 Section 2

If There's Time

Unit 4 Lab 2 Section 2 If there is time

Public Key Encryption

Unit 4 Lab 2 Section 3

Vocabulary

Click each word to view the definition.

Public key (asymmetric) encryption

Public key encryption uses a pair of keys: a public key for encryption and a private key for decryption. The sender uses the public key to encrypt the message, and receiver uses their private key to decrypt it. Public key encryption is the primary method of encryption today because of its high level of security.

Symmetric cryptography

Symmetric cryptography uses the same secret key to encode and to decode a message, and it's been around for thousands of years. Its weakness is that the key becomes another message that needs to be transmitted securely.

SSL/TLS

SSL/TLS (secure sockets layer/transport layer security) is the standard used for cryptographically secured information transfer on the Internet.

Certificate authorities

Certificate authorities are organizations that issue digital certificates to verify who owns the encryption keys used for secured communications. Instead of trusting that the website is who they say they are, you now have to trust that the Certificate Authority is reliable.

If There Is Time

Unit 4 Lab 2 Section 3 If There Is Time

Click to access the page.

Who Cares About Encryption?

Unit 4 Lab 2 Section 4

Security Risks

Unit 4 Lab 2 Section 5

Vocabulary

Click each word to view the definition.

Malware

Malware is software that was designed to harm or take partial control over your computer.

Keylogging software

Keylogging software is a kind of malware that records every key pressed by a user.

Computer virus

A computer virus is a type of malware that spreads and infects other computers. Viruses can attach themselves to legitimate programs.

Antivirus or anti-malware software

Antivirus or anti-malware software is software designed to scan your files and Internet transmissions looking for malware.

Firewall

A firewall is a security system that controls the kinds of connections that can be made between a computer or network and the outside world.

Phishing

Phishing is a common security attack in which the victim is tricked into giving up personal information or downloading malware.

DDoS(Distributed Denial of Service) attack

A DDoS (Distributed Denial of Service) attack uses a virus to flood a server with many requests from many computers at once so that users of that server are denied service.

Rogue access point

A rogue access point is a wireless access point that gives access to a secure network without the authorization of the network administrator.

Self-Check

Unit 4 Lab 2: Security Risks

What Can You Do?

Unit 4 Lab 2 Section 6