Securing data during transmission and identifying physical system vulnerabilities.
Open your master Google Doc. Read the 3 specific threats below and identify the correct software prevention method for each from the options provided.
To understand how data is secured during transmission (Encryption), how systems are actively tested (Penetration Testing), and how hardware is protected physically.
The process of using an algorithm to scramble plaintext data into unreadable ciphertext. It requires a specific 'key' to decrypt it back.
Plaintext: Original, readable data.
Ciphertext: Scrambled, unreadable data after encryption has been applied.
Plaintext
Ciphertext
Employing ethical hackers to simulate cyberattacks on your own network to identify and report vulnerabilities before malicious hackers exploit them.
"White Hat" Hackers
They hack you, but with permission, to tell you how to fix the holes.
Using physical barriers to stop attackers from directly accessing hardware or server rooms (e.g., locks, keycards, CCTV, security guards).
A firewall can't stop someone walking out with the server hard drive.
Using unique physical characteristics to grant access. Examples include fingerprint scanners, facial recognition, or retina scans.
Unlike passwords, you can't easily guess, share, or forget a fingerprint.
In the exam, the biggest mistake students make is saying: "Encryption stops hackers from intercepting data."
Encryption does not stop data from being intercepted. Hackers can still 'sniff' and steal the data packets as they travel over a Wi-Fi network.
Encryption ensures that if the data is intercepted, it is completely unreadable and useless without the correct decryption key.
Think about your answer in silence. Be prepared to be cold-called.
A Caesar Cipher is a simple substitution algorithm. It shifts every letter in the plaintext by a set number of positions down the alphabet to create ciphertext.
Intercepted Packet
FRQJUDWXODWLRQV
INTEL SUGGESTS SHIFT KEY: -3
Type the intercepted packet into the terminal and apply the correct shift key to decrypt the secret password.
System Decrypted
Screenshot this green box and paste it into your Google Doc.
In your Google Doc, answer the following 4-mark OCR exam question.
To finish the lesson, complete the final exit ticket on Google Classroom to demonstrate you have met today's learning objective.
Task: Answer the exit question in full sentences:
"Explain the difference between plaintext and ciphertext, and describe the purpose of encryption during data transmission."