ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?
-
Upload
percival-lynch -
Category
Documents
-
view
220 -
download
3
Transcript of ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?
![Page 1: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/1.jpg)
ICT SECURITY SYSTEMS
![Page 2: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/2.jpg)
STARTER ACTIVITY
What makes a good password ?
![Page 3: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/3.jpg)
TODAY’S LEARNING OBJECTIVE
Understand the issues relating to the security of
ICT systems
![Page 4: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/4.jpg)
By the end of today’s lesson…
• Everyone will be able to – Identify the main issues relating to the security of ICT systems– State some of the ways ICT systems can be protected
• Most – Explain the main issues relating to the security of ICT systems– Describe ways in which ICT systems can be protected
• Some – Compare the advantages and disadvantages of ICT security
systems
![Page 5: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/5.jpg)
DUAL PASSWORDS
![Page 6: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/6.jpg)
VERIFYING PASSWORDS
![Page 7: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/7.jpg)
CAPTCHA
![Page 8: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/8.jpg)
BIOMETRIC SYSTEMS
![Page 10: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/10.jpg)
EXAM COUNTDOWN 15 March Security Systems22 March Networks29 March Mock Exam5 April Easter12 April Easter19 April Mock Results 26 April E-commerce3 May Collaborating online10 May GPS Geocaching Geo tagging17 May Exam question techniques24 May Revision and past papers31 May Revision1 June GCSE Exam
![Page 11: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/11.jpg)
RESEARCHFind a news story about ICT system security on
http://www.teach-ict.com/news Read the story.
Summarise it in 2 or 3 sentences.
Who does it effect and how?
Has the law been broken, if so which one?http://www.teach-ict.com/news/news_stories/news_moral.htm
http://www.teach-ict.com/news/news_stories/news_identity_theft.htm http://www.teach-ict.com/news/news_stories/news_cyber_threats.htm
http://www.teach-ict.com/news/news_stories/news_hacking.htm
![Page 12: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/12.jpg)
TODAY’S LEARNING OBJECTIVE
Understand the issues relating to the security of
ICT systems
![Page 13: ICT SECURITY SYSTEMS. STARTER ACTIVITY What makes a good password ?](https://reader035.fdocuments.us/reader035/viewer/2022062721/56649f225503460f94c3b0a6/html5/thumbnails/13.jpg)
By the end of today’s lesson…
• Everyone will be able to – Identify the main issues relating to the security of ICT systems– State some of the ways ICT systems can be protected
• Most – Explain the main issues relating to the security of ICT systems– Describe ways in which ICT systems can be protected
• Some – Compare the advantages and disadvantages of ICT security
systems