Information and Communication Technologies
Dr. Soe Winn
[email protected] +95 9 788 003 858
Chapter 08
SAFETY AND SECURITY
ICT 0417
In this chapter: you will learn
01 Safety and security when 02 Data security
using computers
03 Firewalls 04 Security protocols (SSL and TLS)
05 Encryption 06 Authentication
Covers safety and security issue when using computers in the
office or at home
Use of computers continues to expand, the health risks and
security risks continue to increase
Many of risks are associated with the internet
Poses a great risk to younger people unless they are vigilant at
Safety all times
And
Large businesses are also at risk from hackers, pharming
Security attacks and viruses
many of the precautions people and
business can take are common
sense but, equally, requires
additional knowledge to know how
to protect yourself form external
attacks, which can came from
anywhere in the world
8.1
Physical
Security
Physical Security
!
15%
Use of computers in the
20%
60% home and business world
has increased dramatically
Increase brings physical
15%
dangers, which can cause
20%
60% harm to users unless they
take some very sensible
precautions
8.1.1 Health Aspects
8.1.1 Health Aspects
Health and safety regulations
Advise that all computer systems have at least:
Tiltable and Anti-glare screens
Adjustable chairs and foot supports
Suitable lighting and uncluttered work
stations
8.1.1 Health Aspects
Keep your
eyes health
Health and safety regulations
Recommend
Frequent breaks
Frequent eye tests
Health Risks
Back and Neck Problems / Strain
Caused by sitting in front of a computer screen for long
periods in the same position
Ways of Eliminating or Minimising
Use fully adjustable chairs to give the correct
posture
Use foot rests to reduce posture problems
Use screens than can be tilted to ensure the
neck is at the correct angle
Health Risks
Repetitive Strain Injury (RSI)
Damage to fingers and wrist caused by continuous
use of a keyboard or repetitive clicking of mouse
buttons
Ways of Eliminating or Minimising
Ensure correct position is maintained
Correct angle of arms to the keyboard and mouse
Make proper use of a wrist rest when using a
mouse or a keyboard
Take regular breaks and do some exercise
Make use of ergonomic keyboards
Use voice-activated software if the user is prone
to problems when using a mouse and keyboard
Health Risks
Eyestrain
Caused by staring at a computer screen too long or
having incorrect lighting in the room
Ways of Eliminating or Minimising
Ensure that there is no screen flicker as this can
lead to eye problem
Change to LCD screens where flicker is less of a
problem than with CRT screens
Take regular breaks, and try focusing on a point
that is come distance away
Make use of anti-glare screens if lighting in the
room is incorrect or use window blinds to
reduce sunlight reflecting from the screen
Users should have their eyes tested on a regular basic, middle
vision glassed should be prescribed, if user has a persistent
problem as eye strain, dry eyes, headaches and so on
Health Risks
Headaches
Caused by incorrect lighting, screen reflections,
flickering screens and so on
Ways of Eliminating or Minimising
Use an anti-glare screen or use window blinds to
cut out reflections, incorrect lighting can cause
squinting and lead to headaches
Take regular breaks and do some exercise
Have your eyes tested regularly and use middle
vision glasses if necessary
Health Risks
Ozone Irritation
Caused by laser printers in an office area, dry skin,
respiratory problems and so on
Ways of Eliminating or Minimising
Proper ventilation should exist to remove the
ozone gas as quickly as possible
Laser printers should be housed in a designated
printer room
Change to other types of printer if necessary
example – inkject printers
8.1.2 Safety Aspects
Safety is a different issue, health is
more general
More concerned with dangers that
could lead to serious injury or even
loss of life
Safety Risks
Electrocution
The injury or killing of someone by electric shock
Ways of Eliminating or Minimising
Use an RCB (Residual Current Breaker)
Check insulation on wires regularly
Don’t allow drinks near computers
Check equipment on a regular basis
Safety Risks
Trailing Wires (Trip Hazard)
Ways of Eliminating or Minimising
Use cable ducts to make the wires safe
Cover wires and or have them neatly tucked
away, under desks and so on
Use wireless connections wherever possible,
thus elimination cables altogether
Safety Risks
Heavy Equipment Falling and
Causing Injury
Ways of Eliminating or Minimising
Use strong desks and tables to support heavy
hardware
Use large desks and tables so that hardware
isn’t too close to the edge where it can fall off
Safety Risks
Fire Risk
Ways of Eliminating or Minimising
Have a fully tested CO2 or dry fire extinguisher
nearby, not water extinguishers
Don’t cover equipment vents, causing
equipment to overheat
Make sure that the electrics used in the
hardware is fully maintained, portable
appliance testing
Ensure good ventilation in the room, again to
stop overheating of hardware
Don’t overload sockets with too many items
Change to low-voltage hardware wherever
possible, replace CRT with LCD
Individual
Has an important role to play
Needs to have a good health and
safety strategy
Regular Checks
Check the state of the wires / cables and plugs, whether
01 damaged, lose wires in the plugs, isn’t broken or cracked
02 Make sure that drinks, tea or coffee, are well away
Fix wire along walls and behind desks wherever possible
03 to remove the risk of wire coming into contact with people
Do not cover with paper or fabric, towels or sheets, since
04 theses can block ventilation holes, causing overheat, or
materials could catch fire
Regular Checks
Do not plug too many devices into an electric outlet
05 socket, overloading a socket can cause a fire
Make sure to exercise every hour or so, to prevent the
06 health risks
Carry out an ‘ergonomic assessment’ on your work
07 station, numerous online questionnaires that will enable to
check whether work station is set up properly for own
health and safety
Individual
May require to buy new chairs or
computer hardware to minimize the
impact of sitting in front of screens or
typing for long periods at a time
8.2
E-safety
Refers to safety when using the internet
Keeping personal data safe
Mobile Phone
Computer or Tablet
Games Console
Wireless Technology
Personal Data
Personal data refers to any data concerning a
living person who can be identified either from
the data itself or from the data in conjunction
with other information
Example of PD
Name
Address
Date of Birth
Medical History
Banking Details
Sensitive Personal Data
Some personal data is often referred to as sensitive personal data
Example of SPD
Ethnic Origin
Political Views
Religion
Sexual Orientation
Criminal Activity
Exercise 8a
Do some research and find out why it is important that
personal data is kept confidential. Present your notes
as an article to discuss with the rest of the class
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Don’t give out any personal information to
unknown people,
isn't possible to physically meet people so
that their motives can be fully assessed
Anyone can say anything online and difficult
to determine whether they are genuine or
not
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Don’t send people photos of yourself –
either online or via a mobile phone
Very easy for somebody to pass photos
on or even pretend to be you for a
number of reasons
Particularly large risk on social networking
sites
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Always maintain your privacy settings on
whatever device is being used online or
during communications
Privacy settings allow the user to control
which cookies are stored on their
computer or they enable the user to
decide who can view certain information
about them on, for example, a social
networking site
Exercise 8b
Evaluate your own use of email and social media /
networking sites.
Which of these e-safety strategies do you use?
Issues
Also refers to the benefits, risks and responsibilities when using ICT
When accessing the internet make sure
the websites being visited can be trusted
Two common ways of checking:
Https
Padlock
When using search engines, always
make sure the device settings are set to
‘safe search’ and the highest possible
level of security is used
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Only use websites recommended by
teachers and only use a learner-friendly
search engine
Only open emails from known sources
Is always a good idea to make sure your
internet service provider (ISP) has an
effective email filtering feature to ensure
unknown emails are placed in the spam box
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Only email people you know
Think carefully before opening any
email and never include the school’s
name or photos of a student wearing a
school uniform in any email
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Extremely important to be vigilant when
using social networking sites, instant
messaging or chat rooms
Block or report anybody who acts suspiciously
or who uses inappropriate language
Be very careful with the language used in chat
rooms
Always use a nickname and never use real
name
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Extremely important to be vigilant when
using social networking sites, instant
messaging or chat rooms
Keep private and personal data secret
Do not enter private chat rooms – stay public
The danger signs in a private chat are:
somebody sounds too good to be true, they
ask you to go to instant messaging and then to
emails, they request your telephone number
and then finally suggest that you meet
Issues
Also refers to the benefits, risks and responsibilities when using ICT
Extremely important to be vigilant when using
social networking sites, instant messaging or
chat rooms
Never arrange to meet anyone for the first time
on your own
Always tell an adult first and meet the person in
a public place
Avoid the misuse of images
Always use appropriate language
Always respect people’s confidentiality
Online Gaming
Important to be careful when using online gaming since this
carries its own risks
Many users think that all players are like-minded, no real risks
Online Gaming
Reported known risks of online gaming
Violence in the game itself, which can lead to
violent behavior in reality
Online Gaming
Reported known risks of online gaming
Predators, people who prey on others who they
see as vulnerable
Online Gaming
Reported known risks of online gaming
Cyber bullying, sending messages of an
intimidating or threatening nature
Online Gaming
Reported known risks of online gaming
Use of webcams
Online Gaming
Reported known risks of online gaming
Voice-masking technology, disguise a voice to
hide real identify
Online Gaming
Reported known risks of online gaming
Online games are also a source of cyber-attacks
on computer or mobile phones,
virus, phishing or spyware
Online Gaming
Just some idea of the risks associated with using
computers or tablets online
Indicates that gaming and the use of mobile
phones carry equal risks
Basically, any communication device has a
number of associated risks
Take simple precautions, the risks are considerably
minimized and ICT can be used to its full
Exercise 8c
Find out what safety measures should be taken when
playing games on the internet.
Write an article on these safety measures and also
include ways to minimise or remove these risks
8.3
Security of
Data
Security of Data
Any electronic device that connects to a
network, internet or mobile phone networks have
a number of security risks
Security Risks
01 Hacking 06 Spyware
02 Phishing 07 Viruses
03 Smishing 08 Spam
04 Vishing 09
Moderated and
Unmoderated Forums
05 Pharming Cookies
10
8.3.1 Hacking
Description
Gaining unauthorized access to a computer system
Can lead to identity theft or the misuse of personal
Effects
information
Data can be deleted, changed or corrupted on a user’s
computer
Use of firewalls
Use of strong , frequently changed, passwords and user IDs
Methods
Use of intrusion detection software
Use of user IDs and passwords
8.3.1 Hacking
Cracking is where someone edits the source code of
a program, allowing it to be exploited or changed for a
specific purpose
Usually done for a malicious purpose, send a user to a
fake website
Cracking is always illegal and
very damaging
8.3.1 Hacking
Use of encryption won’t stop hacking
Encryption makes the data unreadable
to the hacker but the data can still be
deleted, altered or corrupted
8.3.2 Phishing
Description
The creator sends out legitimate-looking emails to
target users
As soon as the recipient clicks on a link in the
email or attachment, they are sent to a fake
website
They are fooled into giving personal data in
replying to the email
The email often appears to come from a trusted
source, such as a bank or well-known service
provider
8.3.2 Phishing
Effects The creator of the email can gain personal
data, such as bank account data or credit
card number, from the user
This can lead to fraud or identity theft
8.3.2 Phishing
Methods
Many ISPs or web browsers filter out
phishing emails
Users should always be cautious when
opening emails or attachments
Do not click on executable attachments
that end in .exe, .bat, .com or .php
8.3.2 Phishing
Methods
Phishing emails often look legitimate by
copying large companies, such as online
store, to try to convince users that the
emails is totally authentic
8.3.2 Phishing
Malicious use refers to:
Deletion Fraud Identity Theft Selling
8.3.2 Phishing
Example of a phishing attack
A user is sent an email saying they have
ordered an item from an online store
Will be asked to click on a link to see the
order details
The link takes the user to a page that shows a
product code from a well-known company
A message such as: “if this order wasn’t made
by you, please fill out the following form to
cancel, your order in the next 24 hours’ is given
8.3.2 Phishing
Example of a phishing attack
The form will ask for details such as: Some of the key clues are that links, such as:
how to “contact us”, don’t work
Credit card number
User’s address and so on
8.3.2 Phishing
Smishing
Short for “SMS” phishing
Uses the SMS system of mobile phones to
send out fake text messages
Similar to phishing, scams often contain a URL
or telephone number embedded
Recipient will be asked to log on to the website
or make a telephone call
8.3.2 Phishing
Smishing
Will be asked to supply personal details such as:
Credit / debit card numbers
Passwords
As with phishing attacks, the text message will
appear to come from a legitimate source and
will make a claim,
Have won a prize or need to contact their
bank urgently
8.3.2 Phishing
Smishing
Most people believe that
only computers are liable
to security threats, mobile
phones are not at risk
This make smishing a
particularly dangerous
security threat to many
people
8.3.2 Phishing
Vishing
Voice mail phishing, another variation
Use a voice mail message to trick the user into
calling the telephone number contained in the
message
8.3.2 Phishing
Vishing
As all phishing attacks, user will be asked to supply personal data
thinking they are talking to a legitimate company
8.3.3 Pharming
Description
Malicious code installed on a user’s
computer or on a web server, the code
will redirect the user to a fake website
without their knowledge
The user doesn’t have to take any
action, unlike phishing
8.3.3 Pharming
Effects
The creator of the malicious code can gain personal data such as credit / debit details from users when
they visit the fake website; usually the website appears to be that of a well-known and trusted company
Can lead to fraud or
identity theft
8.3.3 Pharming
Methods
Some anti-spyware can identify and
remove pharming code from a user’s
computer
User should always be alert and look
out for clues that they are being
redirected to another website
8.3.3 Pharming
Methods
Users should always look out for clues that they
are being connected to a secure website
Should look out for https:// in the URL or use of
the padlock symbol
ACTIVITY
ACTIVITY
ACTIVITY
8.3.4 Spyware and Keylogging Software
Description
Software that gathers data by monitoring key
presses on the user’s keyboard
Gathered data is then sent back to the person
who sent the software
More info
https://www.youtube.com/watch?v=L8169DHNeQ0
8.3.4 Spyware and Keylogging Software
Effects
Spyware gives the originator access to all data
entered using a keyboard on the user’s computer
Software is able to install other spyware, read
cookie data and also change a user's default
browser
8.3.4 Spyware and Keylogging Software
Methods
Use anti-spyware to reduce the risk
User should always be alert and check for clues
that their keyboard activity is being monitored
When entering a password, for example, using
a pointing device or touch screen, to select
characters from a drop-down menu can reduce
the risk
More info
https://www.youtube.com/watch?v=_lCDg2XzEsA
8.3.4 Spyware and Keylogging Software
Methods
Banks often use drop-down menus where the user enters certain
characters from their password using a mouse or touch screen
The required characters are also changed every time the user logs
into their account to stop hackers getting the full password
Discussion
Name one of the key
logging application
and discuss about it
briefly.
Name one of the key
anti-logging application
and discuss about it
briefly.
8.3.5 Viruses
Description
Program code or software that can replicate / copy
itself with the intention of deleting or corrupting files
on a computer
Often cause the computer to malfunction, for
example, by filling up the hard drive with data
More info
https://www.youtube.com/watch?v=Ip-u5NZJiwY
8.3.5 Viruses
Effects
Can cause the computer to ‘crash’, stop function
normally or become unresponsive
For example, the user gets the ‘not responding’
message
The software can delete files or data on a computer
The software can corrupt operating system files,
making the computer run slowly or even ‘crash’
More info
https://www.youtube.com/watch?v=HvMQKffEAbk
8.3.5 Viruses
Methods
Install anti-virus software and update it
regularly
Don’t use software from unknown
sources
Be careful when opening emails or
attachments from unknown senders
8.3.5 Viruses
Methods
Backing up files won’t guard against the
effect of viruses, the virus may have
already attached itself to the files that are
being copied to the backup system
When these files are then copied back to the
computer, the virus is simply reinstalled
Discussion
Name one of the virus
and discuss about its
effect briefly.
Name one of the antivirus
application and discuss
about its characteristic
briefly.
ACTIVITY
ACTIVITY
ACTIVITY
ACTIVITY
ACTIVITY
8.3.6 Spam
Referred to as “Junk” email
Usually sent out to a recipient who is on a
mailing list or mailing group
Spammers obtain these email addresses
from chat rooms, websites, news groups and
even certain viruses that have been set up to
a user’s contacts list
8.3.6 Spam
Rarely a security risk, but can lead to “Denial of
Services”
eg. Clogging up the bandwidth on the internet
Can be link to phishing attacks or even the spread of
computer viruses
Many ISPs filter out spam or junk mail, some overactive
ISPs can filter out wanted emails that come from new
sources
8.3.6 Spam
Denial of Services
Basically an attack
on a network that is
design to slow the
network down by
flooding it with
useless traffic
More info
https://www.youtube.com/watch?v=ilhGh9CEIwM
8.3.6 Spam
Prevention Techniques
To obtain the maximum protection possible
when using the ‘junk email filter’ set the
protection level to high or to safe list only
Make sure the junk mail filter is kept up to
date
8.3.6 Spam
Prevention Techniques
Block images in HTML messages that spammers use as web beacons
8.3.6 Spam
Prevention Techniques
Web Beacon
Can be a graphic image,
linked to an external web
server, that is placed in an
HTML-formatted message
and can be used to verify that
your email address is valid
when the message is opened
and images downloaded
8.3.6 Spam
Prevention Techniques
Look out for check boxes that are
already selected when items are
bought online
Check box indicate that agreed to
sell or give your email address to
third party users
8.3.6 Spam
Prevention Techniques
Do not sign up to commercial
mailing lists
Do not reply to an email or
unsubscribe from a mailing list that
you did not explicitly sign up to in
the first place
ACTIVITY
8.3.7 Forums
Moderated and Unmoderated
An online discussion forum in which all the posts are
checked by an administrator before they are allowed
to be posted
Moderated Forum
Many users prefer this type of forum
Moderator can not only prevent spam, but can
also filter out any posts that are inappropriate,
rude or offensive, or even those that wander
off the mail topic
8.3.7 Forums
Moderated and Unmoderated
The internet is essentially an unmoderated forum
No one ‘owns’ the internet, and essentially not
policed
Only real safeguards are a voluntary cooperation
between the users and the network operators
however
Most social forums or networking groups
have a set of rules or protocols that
members are requested to follow or they
will be deleted
ACTIVITY
8.3.8 Cookies
Small files or code that are stored on a
user’s computer
Sent by a web server to a user’s computer
Each cookie is effectively a small look-up table
containing pairs of (key, data) values
eg. Surname, Jones
Music, Rock
8.3.8 Cookies
Once the cookie has been read by the code on
the web server or user’s computer, the data can
be retrieved and used to customize the web page
for each individual
Often referred to as user preferences
eg. When a user buys a book online, the
cookies remember the type of book the user chose
and the web page will then show a message such as:
Customers who bought “Cambridge IGCSE ICT” also bought “Cambridge IGCSE Computer
Science”
8.3.8 Cookies
The data gathered by cookies forms an
anonymous user profile and doesn’t contain
personal data such as passwords or credit / debit
card number
A very efficient way of carrying data from one
website session to another, or even between
sessions on related websites
Remove the need to store massive amounts of data on the web server itself, storing the data on
the web server without using cookies would also make it very difficult to retriever a user’s data
without requiring the user to login every time they visit the website
8.3.8 Cookies
Use of secure servers is always advised
A secure web server is one that supports any of
the major security protocols, such as
SSL / TLS
Encrypt and Decrypt messages to protect them
against third party eavesdropping
SSL TSL
Secure Sockets Layer Transport Sockets Layer
8.3.8 Cookies
Making purchases from a secure web server ensures that a user’s payment or personal
information can be translated into a secret code that’s difficult to break
8.4
Additional Security
of Data Online
8.1 Physical Security
8.2 E-Safety
8.3 Security of Data
Additional Security of
Data Online
Additional ways of keeping data secure when
accessing external systems, such as internet
8.4 Additional Security of Data Online
Firewalls Security Encryption Authentication
Protocols
8.4.1 Firewalls
Can be either software or hardware,
Sits between the user’s computer and an external network, for example, the internet
Filters information coming in and out of the user’s computer
Firewall
User’s
Software or Internet
Computer
Hardware
Tasks of Firewall
To examine the ‘traffic’
between a user’s
computer, or internet
network, and a public
network, for example, the
internet
https://www.youtube.com/watch?v=kDEX1HXybrU
Tasks of Firewall
Checks whether
incoming or outgoing
data meets a given
set of criteria
Tasks of Firewall
If the data fails the criteria,
the firewall will block the
traffic and give the user, or
network manager, a
warning that there may be
a security issue
Tasks of Firewall
Can be used to log all
incoming and outgoing
traffic to allow later
interrogation by the user,
or network manager
Tasks of Firewall
Criteria can be set so that
the firewall prevents
access to certain
undesirable sites, the
firewall can keep a list of all
undesirable IP addresses
Tasks of Firewall
Possible for firewalls to
help prevents viruses or
hackers entering the user’s
computer network
Tasks of Firewall
Also possible for firewalls to help prevent
hackers gaining access to the user’s
computer or network
Can be done by blocking IP addresses,
but it should be pointed out that hackers
can still have access to a computer or
network if they are using an allowed
computer
Tasks of Firewall
The user is warned if some software on their system is trying to access an external data
source, for example, an automatic software upgrade, the user is given the option of
allowing it to go ahead or request that such access is denied
Update is
available
Firewalls
Can be a hardware
interface that is located
somewhere between the
computer and the
internet connection, in
which case it is often
referred to as a gateway
Firewalls
Alternatively, the firewall
can be software installed
on a computer, in some
cases this is part of the
operating system
Firewalls
There are certain circumstances where the firewall can’t prevent potential harmful
traffic
Cannot prevent individuals,
on internal networks, using
their own modems to
bypass the firewall
Firewalls
There are certain circumstances where the firewall can’t prevent potential harmful
traffic
Employee misconduct or
carelessness cannot be
controlled by firewalls, for
example, control of
passwords or user accounts
Firewalls
There are certain circumstances where the firewall can’t prevent potential harmful
traffic
User on stand-alone
computers can choose to
disable the firewall, leaving
their computer open to
harmful traffic from the
interent
Firewalls
All issues require management
control, or personal control on a
single computer, to ensure that
the firewall is allowed to do its job
effectively
8.4.2 Security Protocols
Sets of rules used by
computers to
communicate with
each other across a
network, when using
the internet
8.4.2 Security Protocols
https://www.youtube.com/watch?v=hExRDVZHhig
2 forms of security protocols
SSL Secure Sockets Layer
A type of protocol that allows
data to be sent and received
securely over the internet
When a user logs on to a website, encryption
SSL encrypts the data – only user
computer and web server are able
to make sense of what is being
Server
transmitted
SSL Secure Sockets Layer
User will know: if SSL is being applied
Https: Padlock
SSL Secure Sockets Layer
Communicating across a network using SSL
The user’s web The web browser The web server If the web Once this
browser sends a requests that the responds by browser can image is
message so web server sending a copy authenticate received, the
shat it can identifies itself of its SSL this certificate, web server
connect with the certificate to the it sends a acknowledges
required users web message back the web
website, which is browser to the web browser and
secured by SSL server to allow the SSL-
communication encrypted two-
to being way data
transfer begins
SSL Secure Sockets Layer
Certificate
SSL certificates are small data files that
digitally bind an encryption key to an
organization's details.
When installed on a web server, it shows
as the green padlock and the https
protocol and ensures secure
connections from a web server to a web
browser
TLS Transport Layer Security
Similar to SSL but is a more
recent security system
A form of protocol that ensures
the security and privacy of data encryption
between devices and users
when communicating over the
Server
internet
TLS Transport Layer Security
Essentially designed to
provide encryption,
authentication and data
integrity in a more
effective way than its
predecessor, SSL
Data Integrity – maintaining the
accuracy and the consistency of
data
TLS Transport Layer Security
When a website and a
user communicate over
the internet, TLS is
designed to prevent a
third party hacking into
this communication and
causing problems with
data security
TLS Transport Layer Security
Is formed of two layers:
Record Protocol: Part of the communication can be used with or without
encryption, contains the data being transferred over the internet
Handshake Protocol: Permits the website and the user to authenticate each
other and to make use of encryption algorithms, a secure session between
user and website is established
TLS Transport Layer Security
Is formed of two layers:
Record Protocol:
Part of the
communication
can be used with
or without
encryption,
contains the data
being transferred
over the internet
TLS Transport Layer Security
Is formed of two layers:
Handshake Protocol:
Permits the website and the user to authenticate
each other and to make use of encryption
algorithms
A secure session between user and website is
established
TLS Transport Layer Security
Only the most recent web browsers
support both SSL and TLS, which is
why the older SSL is still used in many
cases
They both effectively do the same thing
TLS Transport Layer Security
Differences between SSL and TLS
Possible to extend TLS by adding new
authentication methods
TLS can make use of session caching, which
improves the overall performance compared
TLS to SSL
TLS separates the handshaking process from
the record protocol layer, which holds all the
data
TLS Transport Layer Security
Session Caching
When opening a TLS session, it requires a lot of
computer time, due mainly to the complex
encryption keys being used
The use of session caching can avoid the need to
utilize so much computer time for each connection
TLS can either establish a new session or attempt
to resume an existing session, using the latter can
boost system performance considerably
TLS Transport Layer Security
Session Caching
A collection of
processed data that
is kept on hand and
reused in order to
avoid costly repeated
database queries
8.4.3 Encryption
Is used primarily to protect data in case it has been
hacked or accessed illegally
While encryption won’t prevent hacking, it makes the
data meaningless unless the recipient has the
necessary decryption tools
8.4.3 Encryption
Uses a secret key that has the
capability of altering the characters
in a message
If the key is applied to a message,
its content is changed, which then
makes it unreadable unless the
recipient also has the same secret
key
When this secret key is applied to the
encrypted message, it can be read
8.4.3 Encryption
The key used to encrypt( or encode) the
message is known as the encryption key
The key used to decrypt (or decipher) the
message is known as the decryption key
When a message undergoes encryption it
becomes cypher script
The original message is Known as plain
text
8.4.3 Encryption
8.4.3 Encryption
8.4.3 Encryption
8.4.4 Authentication
Used to verify that data comes
from a secure and trusted source
Works with encryption to strengthen
internet security
8.4.4 Authentication
Password
Biometrics
Digital Certificates
Digital Certificates
A pair of files stored on a user’s computer – used in
the security of data sent over the internet
Each pair of files is divided into:
A public key : Which is known by anyone
A private key : Known to the computer user
only
Digital Certificates
example
When sending an email, the message is made more
secure by attaching a digital certificate
When the message is received, the recipient can
verify that it comes from a known or trusted source by
viewing the public key information
for more info
https://www.youtube.com/watch?v=UbMlPIgzTxc
Digital Certificates
Made up of six parts:
The sender’s email address
The name of the digital certificate owner
A serial number
Expiry date, the date range during which the
certificate is valid
Public key, used for encrypting messages
and for digital signatures
Digital signature of certificate authority (CA) - VeriSign
Digital Certificates
Operating systems and web browsers maintain
lists of trusted certificate authorities
Passwords
When logging on to a system, a bank website,
user will be asked to type in “Password”
Should be a combination of letters and
numbers that would be difficult for somebody
else to guess
Passwords
Strong passwords should contain upper case
and lower case characters as well as other
keyboard symbols, for example:
Rn5K;2mL/8
Passwords
When the password is typed in,
shows on the screen as ********,
so nobody overlooking can see
what the user has typed in
If the user’s password doesn’t
match up with the user ID then
access will be denied
Passwords
Many systems ask for the password
to be typed in twice as a verification
check
Passwords
To help protect the system, users are only
allowed to type in their password a certain
number of times –
Usually three times is the maximum
number of tries allowed, before the
system locks the user out
User will be unable to log on until the system
administrator has reset the password
Passwords
If a user forgets password when using the
internet, they can request that the password is
sent their email address
Password is never shown on the computer
screen for reasons of security
Passwords
Passwords should be changed on a
regular basis in case they become
known to another user or even a hacker
Important to prevent other people
gaining access to your password by way
of spyware or viruses
Security Risks
Passwords
Often necessary to use a user ID or log
in ID as well as password
Gives an additional security level since
the user ID and password must match
up to allow a user to gain access to
https://www.mybank.com
Biometrics
Relies on certain unique characteristics
of human beings
Fingerprint scans
Signature recognition
Retina scans
Iris recognition
Face recognition
Voice recognition
Biometrics
Used in a number of applications as a
security device.
Example
Smartphones use fingerprint matching
before they can be operated
Pharmaceutical companies use face
recognition or retina scans to allow entry
to secure areas
Biometrics
Fingerprint Scans
Compared against previously scanned
fingerprints in a database, if they match
then access is allowed
System compares patterns of “ridges”
and “valleys”, which are fairly unique
Accuracy = about 1 in 500
Use As a security method for entering a building
Biometrics
Fingerprint Scans
Fingerprints are unique, improve security since it
would be difficult to replicate
Other security devices, magnetic cards, can be lost
or even stolen, which makes them less effective
Impossible to “sign in” for else since would match up
to one person only on the database
Advantages
Can’t be misplaced, a person always has them
Biometrics
Fingerprint Scans
Relatively expensive to install and
set up
If a person’s fingers are damaged
through an injury, this can have an
effect on the scanning accuracy
Some people may regard it as in
infringement of civil liberties
Disadvantages
Biometrics
Retina Scans
Use infrared light to scan the unique pattern of blood vessels in
the retina, at the back of the eye
Rather unpleasant
technique,
requiring a person
to sit totally still for
10 to 15 seconds
while the scan
takes places
Very secure as no way to
duplicate blood vessels
patterns, accuracy is about
one in ten million
Comparison of Six Common
Biometric Techniques
Biometric Comparative Comparative Devices Social What can interfere
Technique Accuracy Cost Needed Acceptability with the procedure
Damaged Fingers,
Fingerprint scans High accuracy Medium Scanner Medium
e.g - cuts
Signature Signatures can change
Low accuracy Medium An optical pen High
recognition with time
Retina scans High accuracy High Digital camera Low Irritation of the eye
Iris recognition High accuracy High Digital camera Low Wearing of glasses
Medium-Low
Face recognition Medium Digital camera High Facial hair or glasses
accuracy
Background noise or
Voice recognition Medium accuracy Medium Microphone High
person had a cold
Comparison of Six Common
Biometric Techniques
Biometric Technique: Fingerprint scans
Comparative Accuracy: High accuracy
Comparative Cost: Medium
Devices Needed: Scanner
Social Acceptability: Medium
What can interfere with Damaged fingers
the procedure: e.g, cuts
Comparison of Six Common
Biometric Techniques
Biometric Technique: Signature recognition
Comparative Accuracy: Low accuracy
Comparative Cost: Medium
Devices Needed: An optical pen
Social Acceptability: High
What can interfere with Signatures can change
the procedure: with time
Comparison of Six Common
Biometric Techniques
Biometric Technique: Retina scans
Comparative Accuracy: High accuracy
Comparative Cost: High
Devices Needed: Digital camera
Social Acceptability: Low
What can interfere with
Irritation of the eye
the procedure:
Comparison of Six Common
Biometric Techniques
Biometric Technique: Iris recognition
Comparative Accuracy: High accuracy
Comparative Cost: High
Devices Needed: Digital camera
Social Acceptability: Low
What can interfere with
Wearing of glasses
the procedure:
Comparison of Six Common
Biometric Techniques
Biometric Technique: Face recognition
Comparative Accuracy: Medium-low accuracy
Comparative Cost: Medium
Devices Needed: Digital camera
Social Acceptability: High
What can interfere with
Facial hair or glasses
the procedure:
Comparison of Six Common
Biometric Techniques
Biometric Technique: Voice recognition
Comparative Accuracy: Medium accuracy
Comparative Cost: Medium
Devices Needed: Microphone
Social Acceptability: High
What can interfere with Background noise or
the procedure: person has a cold
Comparison of Six Common
Biometric Techniques
Fingerprint Scans
One of the most developed biometric
techniques
Very high accuracy
Very easy to use
Relatively small storage requirements for
the biometric data created
Advantages
Comparison of Six Common
Biometric Techniques
Fingerprint Scans
For some people it is very intrusive, since it is still
related to criminal identification
It can make mistakes if the skin is damaged.
E.g, cuts
Disadvantages
Comparison of Six Common
Biometric Techniques
Signature Recognition
Non-intrusive
Requires very little time to verify (above five
seconds)
Relatively low-cost technology
Advantages
Comparison of Six Common
Biometric Techniques
Signature Recognition
If individuals do not sign their
names in a consistent manner
there may be problems with
signature verification
High error rate (one in 50)
Disadvantages
Comparison of Six Common
Biometric Techniques
Retina Scans
Very high accuracy
There is no known
way to replicate a
person’s retina
Advantages
Comparison of Six Common
Biometric Techniques
Retina Scans
It is very intrusive
It can be relatively slow to verify retina
scan with stored scans
Very expensive to install and set up
Disadvantages
Comparison of Six Common
Biometric Techniques
Iris Recognition
Very high accuracy
Verification time is generally less than five
seconds
Advantages
Comparison of Six Common
Biometric Techniques
Iris Recognition
It is very intrusive
Uses a lot of memory for the data to
be stored
Very expensive to install and set up
Disadvantages
Comparison of Six Common
Biometric Techniques
Face Recognition
Non-intrusive method
Relatively inexpensive technology
Advantages
Comparison of Six Common
Biometric Techniques
Face Recognition
It is affected by changes in lighting, the
person’s hair, their age, and if the
person is wearing glasses
Disadvantages
Comparison of Six Common
Biometric Techniques
Voice Recognition
Non-intrusive method
Verification takes less than five seconds
Relatively inexpensive technology
Advantages
Comparison of Six Common
Biometric Techniques
Voice Recognition
A person’s voice can be recorded easily and used for
unauthorized access
Low accuracy
An illness, such as a cold, can change a person’s voice,
making absolute identification difficult or impossible
Disadvantages
ACTIVITY: Past Paper
ACTIVITY: Past Paper
ACTIVITY: Past Paper
Encryption
ACTIVITY: Past Paper
Encryption
ACTIVITY: Past Paper
Spam
ACTIVITY: Past Paper
Phishing Pharming
Exercise 8d
Find out which applications use each of the biometric
techniques described in this section.
Consider all the advantages and disadvantages of
each method and make conclusions about its suitability
for the applications you found
Online Credit Fraud
Online credit card fraud is still too common
Online Credit Fraud
Hackers gaining access to a user’s computer
through the use of spyware, phishing or pharming
Trick a user who is not particularly IT literate
Tricked giving personal and financial details that
enable to gain full access to a user’s account
Lead to unauthorized purchases or even removal of
money from account if it remains undetected
Online Credit Fraud
The breaking of passwords through a
number of techniques is all-too-familiar risk
If password are weak or no encryption is
used then it is a relatively easy task to break
these passwords and illegal access to bank
and credit card accounts
Online Credit Fraud
Always a good idea to type in a web address or URL rather
than ‘copy and paste it’ from an email or other website
Online Credit Fraud
Sometimes the web address / URL is altered very slightly in
the email and the user ends up visiting a fake website
Online Credit Fraud
Once visit the fake website, it is possible that they will give personal and financial details to a
fraudster without the user’s knowledge – by physically typing in the web address the user will
ensure they get it right and avoid such risks
Online Credit Fraud
If the user is using wireless technology, it is very
important for internet access to be password
controlled since it is relatively easy to tap in to
wireless networks without password protection
Online Credit Fraud
If a user logs in to an account or website in a
public place, such as airport using the
available Wi-Fi hotspots, it is necessary to be
vary vigilant,
There is always a risk that somebody is
monitoring internet usage in the area and will
try to tap in to the data that is going to and
from any computer using this wireless link
Online Credit Fraud
Even large organizations can be subject to
cybercrime, in recent years, the cloud and
some large retail companies have been the
targets for hackers, which leaves customers
very vulnerable
Online Credit Fraud
PRECAUTIONS
Always use varied and complex
passwords for all accounts
Online Credit Fraud
PRECAUTIONS
Check the accuracy of bank
accounts continually and resolve
any discrepancies immediately
Online Credit Fraud
PRECAUTIONS
Only provide personal information
on sites that have ‘https’ in the web
address or have the padlock icon in
the web browser
Online Credit Fraud
PRECAUTIONS
Don’t provide personal information
to any unsolicited requests for
information, this is often a sign of
phishing
Online Credit Fraud
PRECAUTIONS
Don’t open emails or attachments
from unknown senders
Online Credit Fraud
PRECAUTIONS
Delete any messages from your
spam folder on a regular basis
Online Credit Fraud
PRECAUTIONS
Report any suspicious phishing
activity to the company that is used
by the perpetrator
Online Credit Fraud
PRECAUTIONS
Only download software from sites
that can be trusted
Cloud Security
Several computer, especially tablets and laptops and mobile phone, manufacturers encourage
customers to store or back their files on a medium known as the cloud
Cloud Security
Users purchase cloud storage and can then access all their files, for examples, photos, videos,
music or e-books, from any device anywhere in the world
Cloud Security
Don’t need to carry memory sticks around to access the files away from home
ADVANTAGES
Cloud Security
Don’t have to pay for large storage capacity on the computer / tablet or mobile phone
ADVANTAGES
Cloud Security
Cloud is controlled by external companies, they will ensure that files are backed up and therefore
reduce the possibility of losing irreplaceable data
ADVANTAGES
Cloud Security
Ability to synchronize files ensure they are automatically updated across all devices, means that
the latest version of a file saved on a desktop PC, for example, is also available on the other
devices, such as a smartphone
ADVANTAGES
Cloud Security
Cloud storage is also ideal for collaboration purposes, it
allows several users to edit and collaborate on a single file
or document – there is no need to worry about tracking the
latest version or which user made the changes
ADVANTAGES
Cloud Security
Obvious advantages, there are still security
worries about using cloud storage
DISADVANTAGES
Cloud Security
DATA SECURITY
Companies that transfer
vast amounts of
confidential data from
their own systems to a
cloud service provider
are effectively
relinquishing control of
their own data security
DISADVANTAGES
Cloud Security
DATA SECURITY
What physical
security exists
regarding the
building where
the data is
housed?
DISADVANTAGES
Cloud Security
DATA SECURITY
How good is the
cloud service
provider’s resistance
to natural disasters
or power cuts?
DISADVANTAGES
Cloud Security
DATA SECURITY
What safeguards exist regarding personnel
who work for the cloud service company?
Can they use their authorization codes to access
confidential data for monetary purposes?
DISADVANTAGES
Cloud Security
DATA LOSS
Important and irreplaceable data could be
lost from cloud storage facilities RISK
Actions from hackers, gaining
access to accounts or
pharming attacks, could lead
to loss or corruption of data
DISADVANTAGES
Cloud Security
DATA LOSS
Users need to be certain sufficient safeguards
exist to overcome these potentially very
harmful risks
Three breaches of security involving two of the
largest cloud service providers showed why
many of the above fears make people a little
nervous of using this facility to store their
important files
DISADVANTAGES
Cloud Security
DATA LOSS
The XEN security threat, which forced several cloud
operation to reboot all their cloud servers, this was
caused by a problem in the XEN Hypervisor
HYPERVISOR
A piece of computer software,
firmware or hardware that creates
and runs virtual machines
DISADVANTAGES
Cloud Security
DATA LOSS
A recent case
where a large
cloud service
provider
permanently lost
data during a
routine backup
procedure
DISADVANTAGES
Cloud Security
DATA LOSS
The celebrity photos cloud hacking scandal,
where over 100 ‘interesting’ photos of
celebrities were leaked
Hackers had gained access to a number of
cloud accounts, which enabled them to
publish the photos on social networks and
to sell them to publishing companies
DISADVANTAGES
Cloud Security
DATA LOSS
Reasons have made
individuals and companies
nervous about using cloud
service providers
A game between hackers and
owners of online service
companies continues to simmer
DISADVANTAGES
Cloud Security
DATA LOSS
Considerable amounts of advice have
been given
Provided users are vigilant in use of
any device connected to the internet
then the possibility of being a victim of
cybercrime is considerable reduced
DISADVANTAGES
Section Break
Think Big, Start Small
THANK YOU
Insert the Subtitle of Your Presentation
We Create Quality Professional PPT Presentation
Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation. Easy to change colors, photos. Get a modern
PowerPoint Presentation that is beautifully designed.
Your Text Here Your Text Here
01 Get a modern PowerPoint Presentation 02 Get a modern PowerPoint Presentation
that is beautifully designed. that is beautifully designed.
Your Text Here Your Text Here
03 Get a modern PowerPoint Presentation 04 Get a modern PowerPoint Presentation
that is beautifully designed. that is beautifully designed.
Agenda
Style
Timeline Style
Your Text Here Your Text Here
Easy to change colors, Easy to change colors,
photos and Text. photos and Text.
2020 2022
2019 2021 2023
Your Text Here Your Text Here Your Text Here
Easy to change colors, Easy to change colors, Easy to change colors,
photos and Text. photos and Text. photos and Text.
Our Team Style
MICHAEL DOE
Example Text : Get a modern PowerPoint Presentation that is beautifully
designed. I hope and I believe that this Template will your Time, Money and
Place Your Picture Here Reputation. Easy to change colors, photos and Text. Get a modern PowerPoint
Presentation that is beautifully designed. You can simply impress your audience
and add a unique zing.
ALLPPT Work Experience
Layout 2013 ~ 2014 Text here
Example Text : Get a modern PowerPoint Presentation
Clean Text that is beautifully designed.
Slide for your 2014 ~ 2016Text here
Presentation Example Text : Get a modern PowerPoint Presentation
that is beautifully designed
/FACEBOOK www.hompageurl.com
2016 ~ 2022 Text here
Example Text Example Text Example Example Text : Get a modern PowerPoint Presentation
@TWITTER Text Example Text Example Text that is beautifully designed.
Infographic Style
Content Here Content Here
Get a modern PowerPoint Get a modern PowerPoint
Presentation that is Presentation that is
beautifully designed. beautifully designed.
Content Here Content Here
Get a modern PowerPoint Get a modern PowerPoint
Presentation that is Presentation that is
beautifully designed. beautifully designed.
ALLPPT Layout Clean Text Slide for
your Presentation. ALLPPT Layout
Clean Text Slide for your Presentation.
Content You can simply impress your audience and add
Here a unique zing and appeal to your
Presentations.
Infographic Style
Your Text Here Your Text Here
Get a modern PowerPoint Presentation that Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change Contents is beautifully designed. Easy to change
colors, photos and Text.
Contents colors, photos and Text.
Your Text Here Your Text Here
Get a modern PowerPoint Presentation that Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change
Contents is beautifully designed. Easy to change
colors, photos and Text.
Contents colors, photos and Text.
Your Text Here
Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change
colors, photos and Text. Contents
Simple Portfolio Presentation Simple Portfolio Presentation
Presentation Presentation
Portfolio Portfolio
Simple Portfolio Simple Portfolio
Portfolio Presentation Portfolio Presentation
Presentation Presentation
Portfolio Presentation Portfolio Presentation
Simple Portfolio Place Your Picture Here Send To Back Simple Portfolio
We Create
AWESOME Quality Professional
PRESENTATION Modern PowerPoint Presentation
NO.1 Presentation
Infographic Style
You can simply You can simply
impress your audience impress your audience
and add a unique zing and add a unique zing
and appeal to your and appeal to your
Presentations. Easy to Presentations. Easy to
change colors, photos. change colors, photos.
ALLPPT Layout Clean Text Slide for your
Presentation. ALLPPT Layout Clean Text
Slide for your Presentation.
You can simply You can simply
impress your audience impress your audience
and add a unique zing and add a unique zing
and appeal to your and appeal to your
Presentations. Easy to Presentations. Easy to
change colors, photos. change colors, photos.
Infographic Style
Get a modern PowerPoint
Get a modern Power
Text
Text
Point Presentation.
Presentation that is
beautifully designed.
Get a modern PowerPoint
Presentation that is
beautifully designed.
Text
Get a modern Power
Text Get a modern PowerPoint
Text
Point Presentation.
Presentation that is
beautifully designed.
EASY TO CHANGE COLORS
AWESOME We Create
Quality Professional
PRESENTATION PPT Presentation
Simple
Presentation !
Contents Here
15%
This PowerPoint Template has clean and
neutral design that can be adapted to any
20%
60% content and meets various market
segments. Get a modern PowerPoint
Presentation that is beautifully designed.
This PowerPoint Template has clean and
20% neutral design that can be adapted to any
content and meets various market
Text Here segments.
This PowerPoint Template has clean and
60% neutral design that can be adapted to any
content and meets various market
Text Here segments.
This PowerPoint Template has clean and
15% neutral design that can be adapted to any
content and meets various market
Text Here segments.
Infographic Style
100
90
80
70
60
50
40
30
20
10
0
Category 1 Category 2 Category 3 Category 4
You can simply impress your audience and add a unique
zing and appeal to your Presentations.
You can simply impress your audience and add a unique
zing and appeal to your Presentations.
You can simply impress your audience and add a unique
You can simply impress your zing and appeal to your Presentations.
Modern Presentation
32% Simple PowerPoint
audience and add a unique zing
and appeal to your Presentations. You can simply impress your audience and add a unique
zing and appeal to your Presentations.
ALLPPT Layout Clean Text Slide
for your Presentation. ALLPPT
Layout Clean Text Slide for your
Presentation.
Your Picture Here
Your Picture Here And Send To Back
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Get
a modern PowerPoint Presentation that is
beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation.
Infographic Style
1 2 3
4 5 6
7 8 9
Your Text Here Your Text Here Your Text Here Your Text Here
Get a modern Get a modern Get a modern Get a modern
PowerPoint PowerPoint PowerPoint PowerPoint
Presentation that is Presentation that is Presentation that is Presentation that is
beautifully designed. beautifully designed. beautifully designed. beautifully designed.
Infographic Style
Add Text
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Presentation. $66,800
Add Text Here
$54,000
Add Text Here
$44,600
Add Text Here
$39,200
Add Text Here
$34,400
Add Text Here
AWESOME
SLIDE
LOREM IPSUM
DOLOR SIT AMET,
LOREM IPSUM DOLOR SIT AMET,
CU USU AGAM INTEGRE IMPEDIT.
Get a modern PowerPoint Presentation that is
beautifully designed. Easy to change colors,
photos and Text. You can simply impress your
audience and add a unique zing and appeal to
your Presentations. You can simply impress
your audience and add a unique zing and
appeal to your Presentations. Easy to change
colors, photos and Text. I hope and I believe
that this Template will your Time, Money and
Reputation. I hope and I believe that this
Template will your Time, Money and Reputation.
Infographic Style
Content Here
Get a modern PowerPoint
Presentation that is beautifully
designed. I hope and I believe that this
Template will your Time.
Content Here
Get a modern PowerPoint
Presentation that is beautifully
designed. I hope and I believe that this Content Here
Template will your Time. Get a modern PowerPoint
Presentation that is beautifully
designed. I hope and I believe that this
Template will your Time.
Infographic Style
Your Text Here
01 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.
Your Text Here
02 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.
Your Text Here
03 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.
Your Text Here
04 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.
Infographic Style
Example Text : Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Tem -
plate will your Time, Money and Reputation. Easy to change colors, photos and Text.
CONTENTS HERE
You can simply impress your audience and add a unique zing and
appeal to your Reports and Presentations with our Templates. Get a
modern PowerPoint Presentation that is beautifully designed. I hope
and I believe that this Template will your Time, Money and Reputation.
Place Your Picture Here
CONTENTS HERE
You can simply impress your audience and add a unique zing and
appeal to your Reports and Presentations with our Templates. Get a
modern PowerPoint Presentation that is beautifully designed. I hope
and I believe that this Template will your Time, Money and Reputation.
CONTENTS HERE
You can simply impress your audience and add a unique zing and
appeal to your Reports and Presentations with our Templates. Get a
modern PowerPoint Presentation that is beautifully designed. I hope
and I believe that this Template will your Time, Money and Reputation.
Infographic Style
Get a modern
80%
PowerPoint
60% Presentation that is
beautifully designed.
Your Text Here
You can simply impress your audience and
You can simply impress your audience add a unique zing and appeal to your
and add a unique zing and appeal to Presentations. Get a modern PowerPoint
your Presentations. Presentation that is beautifully designed.
Easy to change colors, photos and Text. I
hope and I believe that this Template will your
45% Time, Money and Reputation. Easy to
change colors, photos and Text. Get a
Your Text Here modern PowerPoint Presentation that is
beautifully designed. You can simply impress
You can simply impress your audience your audience and add a unique zing and
and add a unique zing and appeal to appeal to your Presentations.
your Presentations.
Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change
75% colors, photos and Text. I hope and I believe
that this Template will your Time, Money and
Your Text Here Reputation. Get a modern PowerPoint
Presentation that is beautifully designed.
You can simply impress your audience
and add a unique zing and appeal to I hope and I believe that this Template will
your Presentations. your Time, Money and Reputation.
Infographic Style
Content Here
You can simply impress your audience and add a unique zing
and appeal to your Presentations. Easy to change colors,
photos and Text. Get a modern PowerPoint Presentation that
is beautifully designed.
01
Option Content Here
You can simply impress
Content Here your audience and add a
You can simply impress your audience and unique zing and appeal to
add a unique zing and appeal to your 02 04 your Presentations. Easy
Presentations. Easy to change colors, photos to change colors, photos
and Text. Get a modern PowerPoint Option Option
and Text. Get a modern
Presentation that is beautifully designed. PowerPoint Presentation
that is beautifully
designed.
03
Content Here Option
You can simply impress your audience and add a unique zing
and appeal to your Presentations. Easy to change colors,
photos and Text. Get a modern PowerPoint Presentation that
is beautifully designed.
Simple Portfolio Pre-
sentation Designed
ALLPPT Layout Clean Text Slide Get Modern
for your Presentation. Portfolio Presentation
Get a modern PowerPoint Presentation
that is beautifully designed. You can simply
impress your audience and add a unique
zing and appeal to your Presentations.
Get a modern PowerPoint Presentation
that is beautifully designed. You can simply
impress your audience and add a unique
zing and appeal to your Presentations.
Portfolio Presentation
Get Modern
Infographic Style
Your Text Here Your Text Here Your Text Here Your Text Here
Your Text Here Text Here Text Here Text Here Text Here
Your Text Here Content Content Content Content
Your Text Here Text Here Text Here Text Here Text Here
Your Text Here Content Content Content Content
Your Text Here Text Here Text Here Text Here Text Here
Your Text Here Content Content Content Content
Your Text Here Text Here Text Here Text Here Text Here
Infographic Style
Your Text Here Option A Option B Your Text Here
I hope and I believe I hope and I believe
that this Template that this Template
will your Time, will your Time,
Money and Money and
Reputation. Get a Reputation. Get a
modern PowerPoint modern PowerPoint
Presentation that is Presentation that is
beautifully Option A Option B beautifully
designed. designed.
We Create
Quality Professional Text Here
Easy to change
PPT Presentation colors.
Your Text Here
You can simply impress
your audience and add a
unique zing and appeal to
your Presentations.
Your Text Here
01 I hope and I believe that this Template will your Time, Place Your Picture Here And Send To Back
Money and Reputation .
Your Text Here
02 I hope and I believe that this Template will your Time,
Money and Reputation .
Your Text Here
03 I hope and I believe that this Template will your Time,
Money and Reputation .
Your Text Here
04 I hope and I believe that this Template will your Time,
Money and Reputation .
Infographic Style
85%
30% A I hope and I believe
that this Template will
1 your Time, Money and
I hope and I believe Reputation.
that this Template will
your Time, Money and
Reputation. B 50%
2
I hope and I believe
that this Template will
your Time, Money and
C Reputation.
3
Infographic Style
Content here
WEAKNESS Get a modern PowerPoint Presentation that is beautifully designed. hope and
I believe that this Template will your Time, Money and Reputation.
STRENGTHS You can simply
impress your
You can audience and add a
simply unique zing
impress your Content here
audience and Get a modern PowerPoint Presentation that is beautifully designed. hope and
add a unique
zing S W I believe that this Template will your Time, Money and Reputation.
O T
THREATS Content here
You can Get a modern PowerPoint Presentation that is beautifully designed. hope and
simply I believe that this Template will your Time, Money and Reputation.
OPPORTUNITIES impress your
audience and
You can simply
add a unique
impress your
zing Content here
audience and add a
unique zing Get a modern PowerPoint Presentation that is beautifully designed. hope and
I believe that this Template will your Time, Money and Reputation.
PORTFOLIO
PRESENTATION
PRESENTATION INFOGRAPHIC
Get a modern PowerPoint Presentation that is
beautifully designed. Easy to change colors, photos
and Text.
Get a modern PowerPoint Presentation that is
beautifully designed. Easy to change colors, photos
LOREM IPSUM DOLOR and Text.
SIT AMET, Get a modern PowerPoint Presentation that is
CU USU AGAM beautifully designed. Easy to change colors, photos
INTEGRE IMPEDIT. and Text.
Infographic Style
Your Text Here Your Text Here Your Text Here Your Text Here
Text Here Text Here Text Here Text Here
Text Here Text Here Text Here Text Here
Text Here Text Here Text Here Text Here
Text Here Text Here Text Here Text Here
Text Here Text Here Text Here Text Here
Text Here Text Here Text Here Text Here
$ 1200 $1000 $600 $500
Infographic Style
Content Here
You can simply impress your audience and add a
1
unique zing and appeal to your Presentations. Easy
Content Here
You can simply impress your audience and add a
4
unique zing and appeal to your Presentations. Easy
to change colors, photos and Text. to change colors, photos and Text.
Content Here
You can simply impress your audience and add a
2
unique zing and appeal to your Presentations. Easy
Content Here
You can simply impress your audience and add a
5
unique zing and appeal to your Presentations. Easy
to change colors, photos and Text. to change colors, photos and Text.
Content Here
You can simply impress your audience and add a
3
unique zing and appeal to your Presentations. Easy
Content Here
You can simply impress your audience and add a
6
unique zing and appeal to your Presentations. Easy
to change colors, photos and Text. to change colors, photos and Text.
Place Your Picture Here And Send To Back
AWESOME SLIDE
Contents_Here
Example Text : Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that
this Template will your Time, Money and Reputation. You can simply impress your audience and add a unique
zing and appeal to your Presentations.
LOREM IPSUM
Get a PowerPoint Presentation Get a PowerPoint Presentation Get a PowerPoint Presentation
DOLOR SIT AMET, Get a PowerPoint Presentation Get a PowerPoint Presentation Get a PowerPoint Presentation
CU USU AGAM Get a PowerPoint Presentation Get a PowerPoint Presentation Get a PowerPoint Presentation
INTEGRE IMPEDIT. Get a PowerPoint Presentation Get a PowerPoint Presentation Get a PowerPoint Presentation
Infographic Style
Content Here
Content Here You can simply
impress your
audience and add a
Content Here You can simply unique zing and
impress your appeal to your
audience and add a Presentations. Get a
Content Here You can simply unique zing and modern PowerPoint
impress your appeal to your Presentation that is
audience and add a Presentations. Get a beautifully designed.
You can simply
unique zing and modern PowerPoint Easy to change
impress your
appeal to your Presentation that is colors, photos and
audience and add a
Presentations. beautifully designed. Text.
unique zing.
Simple PowerPoint Simple PowerPoint Simple PowerPoint Simple PowerPoint
Simple PowerPoint Simple PowerPoint Simple PowerPoint Simple PowerPoint
Infographic Style
You can simply impress your audience and add a unique zing and appeal to your Presentations. I hope and I believe that this
Template will your Time, Money and Reputation. Easy to change colors, photos and Text. Get a modern PowerPoint Presentation
that is beautifully designed. You can simply impress your audience and add a unique zing and appeal to your Presentations. I
hope and I believe that this Template will your Time, Money and Reputation.
Text Here 20% 35% 45%
Your Text Here 50% 30% 20%
Your Content Here 65% 20% 15%
Text 60% 15% 25%
Content Here 30% 40% 30%
Content 40% 20% 40%
You can simply impress your audience and add a unique zing and appeal to your Presentations. I hope and I believe that this Template will your Time,
Money and Reputation. Easy to change colors, photos and Text. Get a modern PowerPoint Presentation that is beautifully designed. You can simply
impress your audience and add a unique zing and appeal to your Presentations.
AWESOME
SLIDE
LOREM IPSUM
DOLOR SIT AMET,
LOREM IPSUM DOLOR SIT AMET,
CU USU AGAM INTEGRE IMPEDIT.
Simple Portfolio Presentation
Presentation
Portfolio
Simple Portfolio
Portfolio Presentation
Presentation
Portfolio Presentation
Simple Portfolio
Infographic Style
Content Here
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy
to change colors, photos.
Content Here Content Here
You can simply impress your audience and add a You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy unique zing and appeal to your Presentations. Easy
to change colors, photos. to change colors, photos.
Content Here Content Here
You can simply impress your audience and add a You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy unique zing and appeal to your Presentations. Easy
to change colors, photos. to change colors, photos.
Content Here
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy
to change colors, photos.
Infographic Style
Content Here Content Here Content Here Content Here Content Here
You can simply You can simply You can simply You can simply You can simply
impress your impress your impress your impress your impress your
audience and add a audience and add a audience and add a audience and add a audience and add a
unique zing. unique zing. unique zing. unique zing. unique zing.
40% 60%
Text Here Text Here
Easy to change colors, Easy to change colors,
photos and Text. photos and Text.
Content Here Content Here
You can simply impress your audience and add a unique zing You can simply impress your audience and add a unique zing
and appeal to your Presentations. Get a modern PowerPoint and appeal to your Presentations. Get a modern PowerPoint
Presentation that is beautifully designed Presentation that is beautifully designed
Place Your Picture Here
Awesome Presentation
Simple PowerPoint
You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. Get a
modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation. You
can simply impress your audience and add a unique zing and appeal to your Presentations.
PowerPoint
Infographic Style
Your Text Here
Add Text
You can simply impress your audience and add a unique zing and appeal to your
Simple Presentations. Get a modern PowerPoint Presentation that is beautifully
PowerPoint designed. Easy to change colors, photos and Text.
Presentation
Your Text Here
You can simply impress your audience and add a unique zing and appeal to your
Presentations. Get a modern PowerPoint Presentation that is beautifully
designed. Easy to change colors, photos and Text.
Your Text Here
You can simply impress your audience and add a unique zing and appeal to your
Presentations. Get a modern PowerPoint Presentation that is beautifully
designed. Easy to change colors, photos and Text.
Add Text
Your Text Here
Simple
PowerPoint You can simply impress your audience and add a unique zing and appeal to your
Presentation Presentations. Get a modern PowerPoint Presentation that is beautifully
designed. Easy to change colors, photos and Text.
Infographic Style
Your Text Here
01
You can simply impress your audience and add a unique zing and appeal to
your Presentations. n D
ti o
Your Text Here
Op
02
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
i onC
t
Your Text Here Op
03
You can simply impress your audience and
add a unique zing and appeal to your
Presentations.
i onB
t
Op
Your Text Here
04
You can simply impress your
audience and add a unique n A
ti o
Op
zing and appeal to your
Presentations.
Column Get a modern PowerPoint Presentation that is beautifully designed. You
can simply impress your audience and add a unique zing and appeal to
your Presentations.
Style You can simply impress your audience and add a unique zing and appeal to your
Presentations. I hope and I believe that this Template will your Time, Money and Reputation.
Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors,
photos and Text. You can simply impress your audience and add a unique zing and appeal to
your Presentations. You can simply impress your audience and add a unique zing and
appeal to your Presentations. I hope and I believe that this Template will your Time, Money
and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. Easy to
change colors, photos and Text.
You can simply impress your audience and add a unique zing and appeal to your
Presentations. I hope and I believe that this Template will your Time, Money and Reputation.
Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors,
photos and Text. You can simply impress your audience and add a unique zing and appeal to
your Presentations.
You can simply impress your audience and add a unique zing and appeal to your
Presentations. I hope and I believe that this Template will your Time, Money and Reputation.
LOREM IPSUM DOLOR SIT AMET, CU
USU AGAM INTEGRE IMPEDIT.
Columns Style
We Create Example Text :
Get a modern PowerPoint Presentation
Example Text :
Get a modern PowerPoint Presentation
Quality Professional that is beautifully designed. You can simply
impress your audience and add a unique
that is beautifully designed. You can simply
impress your audience and add a unique
PPT Presentation zing and appeal to your Presentations.
Easy to change colors, photos and Text. I
zing and appeal to your Presentations.
Easy to change colors, photos and Text. I
hope and I believe that this Template will hope and I believe that this Template will
your Time, Money and Reputation. I hope your Time, Money and Reputation. I hope
Get a modern PowerPoint Presentation and I believe that this Template will your and I believe that this Template will your
that is beautifully designed. I hope and I Time, Money and Reputation. Easy to Time, Money and Reputation. Easy to
believe that this Template will your Time, change colors, photos and Text. I hope and change colors, photos and Text. I hope and
Money and Reputation. You can simply I believe that this Template will your Time, I believe that this Template will your Time,
impress your audience and add a unique Money and Reputation. Money and Reputation.
zing and appeal to your Presentations. Get
a modern PowerPoint Presentation that is
Example Text :
beautifully designed. You can simply
Get a modern PowerPoint Presentation
impress your audience and add a unique
that is beautifully designed. You can simply
zing and appeal to your Presentations.
impress your audience and add a unique
Easy to change colors, photos and Text. I
zing and appeal to your Presentations.
hope and I believe that this Template will
Easy to change colors, photos and Text. I
your Time, Money and Reputation. I hope
hope and I believe that this Template will
and I believe that this Template will your
your Time, Money and Reputation. I hope
Time, Money and Reputation. Easy to
and I believe that this Template will your
change colors, photos and Text.
Time, Money and Reputation. Easy to
change colors, photos and Text. I hope and
I hope and I believe that this Template will
I believe that this Template will your Time,
your Time, Money and Reputation.
Money and Reputation.
THANK YOU
Insert the Subtitle of Your Presentation
Fully Editable Shapes
Fully Editable Shapes
!
Fully Editable Icon Sets: A
You can Resize without
losing quality
You can Change Fill
Color &
Line Color
FREE
PPT
TEMPLATES
www.allppt.com
Fully Editable Icon Sets: B
You can Resize without
losing quality
You can Change Fill
Color &
Line Color
FREE
PPT
TEMPLATES
www.allppt.com
Fully Editable Icon Sets: C
You can Resize without
losing quality
You can Change Fill
Color &
Line Color
FREE
PPT
TEMPLATES
www.allppt.com