Uploaded by Priyanka Chaudhary

CH 8

advertisement
CHAPTER 8
SECURITY AND ETHICS
GRADE-10 COMPUTER SCIENCE CP
SECURITY PROTOCAL
 Secure Sockets Layer (SSL) and Transport
Layer Security (TLS) are cryptographic security protocols.
 They are used to make sure that network communication
is secure.
 Their main goals are to provide data integrity and
communication privacy.
GRADE-10 COMPUTER SCIENCE CP
SSL (SECURE SOCKETS
LAYER)
 SSL stands for Secure Sockets Layer and, in short, it's the standard
technology for keeping an internet connection secure and safeguarding
any sensitive data that is being sent between two systems,
 preventing criminals from reading and modifying any information
transferred, including potential personal details.
 The two systems can be a server and a client (for example, a
shopping website and browser) or server to server (for example, an
application with personal identifiable information or with payroll
information).
GRADE-10 COMPUTER SCIENCE CP
SSL (CONT..)
 It does this by making sure that any data transferred between
users and sites, or between two systems remain impossible to
read.
 It uses encryption algorithms to scramble data in transit,
preventing hackers from reading it as it is sent over the
connection.
 This information could be anything sensitive or personal
which can include credit card numbers and other financial
information, names and addresses.
GRADE-10 COMPUTER SCIENCE CP
SSL (CONT..)
 When a user logs onto a website, SSL encrypts the data –
only the user’s computer and the web server are able to
make sense of what is being transmitted.
 A user will know if SSL is being applied when they see
https or the small padlock in thestatus bar at the top of the
screen
GRADE-10 COMPUTER SCIENCE CP
GRADE-10 COMPUTER SCIENCE CP
TLS TRANSPORT LAYER
SECURITY
 Transport Layer Security, or TLS, is a widely adopted
security protocol designed to facilitate privacy and data security
for communications over the Internet.
 A primary use case of TLS is encrypting the communication
between web applications and servers, such as web browsers
loading a website.
 TLS can also be used to encrypt other communications such
as email, messaging, and voice over IP (VoIP).
GRADE-10 COMPUTER SCIENCE CP
HOW DOES TLS WORK?
 For a website or application to use TLS, it must have a
TLS certificate installed on its origin server
 A TLS certificate is issued by a certificate authority to the
person or business that owns a domain.
 The certificate contains important information about who
owns the domain, along with the server's public key, both of
which are important for validating the server's identity.
GRADE-10 COMPUTER SCIENCE CP
 A TLS connection is initiated using a sequence known as the TLS
handshake. When a user navigates to a website that uses TLS, the TLS
handshake begins between the user's device (also known as
the client device) and the web server.
 During the TLS handshake, the user's device and the web server:
•
Specify which version of TLS (TLS 1.0, 1.2, 1.3, etc.) they will use
•
Decide on which cipher suites (see below) they will use
•
Authenticate the identity of the server using the server's TLS
certificate
•
Generate session keys for encrypting messages between them after
the handshake is complete
GRADE-10 COMPUTER SCIENCE CP
 The TLS handshake establishes a cipher suite for each
communication session. The cipher suite is a set of
algorithms that specifies details such as which
shared encryption keys, or session keys, will be used for that
particular session.
GRADE-10 COMPUTER SCIENCE CP
 The handshake also handles authentication, which usually
consists of the server proving its identity to the client. This is
done using public keys. Public keys are encryption keys that use
one-way encryption, meaning that anyone with the public key
can unscramble the data encrypted with the server's private key
to ensure its authenticity, but only the original sender can
encrypt data with the private key. The server's public key is part
of its TLS certificate.
 (read from book also)
GRADE-10 COMPUTER SCIENCE CP
T L S I S F O R M E D O F T W O L AY E R S :
 record protocol: this part of the communication can be
used with or without encryption (it contains the data being
transferred over the internet).
 handshake protocol: this permits the website and the
client (user) to authenticate each other and to make use of
encryption algorithms (a secure session between client and
website is established).
GRADE-10 COMPUTER SCIENCE CP
DIFFERENCES BETWEEN SSL AND TLS
 It is possible to extend TLS by adding new authentication
methods.
 TLS can make use of SESSION CACHING which
improves the overall performance compared to SSL
 TLS separates the handshaking process from the record
protocol (layer) which holds all the data.
GRADE-10 COMPUTER SCIENCE CP
ETHICS
 Ethics is a set of moral principles that govern the behavior of a
group or individual.
GRADE-10 COMPUTER SCIENCE CP
COMPUTER ETHICS
 Therefore, computer ethics is set of moral principles that regulate
the use of computers.
 Some common issues of computer ethics include intellectual
property rights (such as copyrighted electronic content), privacy
concerns, and how computers affect society.
 Codes of ethics published by Association for computer machinery
and IEEE-(Read from book pg-111)
GRADE-10 COMPUTER SCIENCE CP
THREE MAJOR AREAS
WHICH COMES UNDER THE
UMBRELLA OF COMPUTER
ETHICS
 INTELLECTUAL PROPERTY RIGHTS
 PRIVACY ISSUES
 EFFECT OF COMPUTERS ON SOCIETY
GRADE-10 COMPUTER SCIENCE CP
INTELLECTUAL PROPERTY
 Intellectual Property Rights. Intellectual property rightsrefers to a
person's claim on something that they have written, invented, recorded or
otherwise own. Any violation of these rights can be viewed as theft
 downloading or duplicating of any copyrighted digital media (i.e.
music, movies or software) without proper consent, and plagiarism of
any kind.
 It would be in your best interest to avoid these violations at all costs as
many of them are not just immoral, but also illegal.
GRADE-10 COMPUTER SCIENCE CP
TEN COMMANDMENTS OF
COMPUTER ETHICS
 Not use a computer to harm other people.
 Not interfere with other people's computer work.
 Not snoop around in other people's computer files.
 Not use a computer to steal.
 Not use a computer to bear false witness.
 Not copy or use proprietary software for which you have not paid.
GRADE-10 COMPUTER SCIENCE CP
TEN COMMANDMENTS OF COMPUTER
E T H I C S ( C O N T. . )
 Not use other people's computer resources without authorization or
proper compensation.
 Not appropriate other people's intellectual output.
 Think about the social consequences of the program you are writing or
the system you are designing.
 Always use a computer in ways that ensure consideration and respect
for your fellow humans.
(Written by the Computer Ethics Institute)
GRADE-10 COMPUTER SCIENCE CP
FREE SOFTWARE
 Free software is a program used and distributed at no charge to the user.
 The Free Software Foundation (FSF) developed four principles, dubbed the
“four essential freedoms,” that software must abide by in order to be considered
free software:
• The freedom to run the program and use it for any purpose;
• The freedom to study the program, including how it works, and modify
it( gives users access to the source code) to meet your preferences and needs;
• The freedom to freely redistribute the program to better help others
• The freedom to redistribute freely any copies of your modified and adapted
versions of the program to better help others.
GRADE-10 COMPUTER SCIENCE CP
FREE SOFTWARE(CONT.)
 Eg- F-spot,scribus,abiword etc
 However, most free software licenses include terms prohibiting the
sale, resale or commercial use.
 Free software is often released for promotional purposes. For
example, certain free software programs may require registration with
an email address. The software owner collects these email addresses,
which may be used to promote or sell other products.
GRADE-10 COMPUTER SCIENCE CP
FREEWARE
 Freeware is any copyrighted software, application or program that may be freely
downloaded
 Such programs are available for use at no cost to general end users.
 Freeware software can be distributed as a fully operational program for an unlimited
period.
 freeware is normally shared without including its source code. Therefore, users are
unable to make any changes to it.
 Common examples are Adobe Reader and Skype; both programs are available for
free. Another example of common freeware might be an old game, which a game
developer might choose to re-release as freeware.
GRADE-10 COMPUTER SCIENCE CP
SHAREWARE
 The concept of shareware is similar to that of freeware in that it is
originally distributed free of charge.
 However, unlike freeware, that cost-free period is usually only for a
trial period, after which the software stops being freely available until
the user pays for continued use or license
GRADE-10 COMPUTER SCIENCE CP
Freeware
About Freeware refers to software
that anyone can download from
the Internet and use for free.
Features All the features are free.
Shareware
Sharewares give users a
chance to try the software
before buying it.
Most of the times, all features
are not available, or have limited
use. To use all the features of
the software, user has to
purchase the software.
GRADE-10 COMPUTER SCIENCE CP
Freeware
Distribution Freeware programs can be
distributed free of cost.
Shareware
Shareware may or may not be
distributed freely. In many
cases, author’s permission is
needed, to distribute the
shareware.
Example Adobe PDF, Google Talk, yahoo
messenger, MSN messenger
Winzip, Cuteftp, Getright
Disadvantage You can’t sell freeware software Shareware cannot be
and modified software must be modified, and it may be
freeware.
either a cut down or
temporary version.
GRADE-10 COMPUTER SCIENCE CP
Download