0% found this document useful (0 votes)
37 views274 pages

IGCSE-CIE-ICT-Chapter08 - 3ed

This chapter discusses safety and security in the use of information and communication technologies, focusing on health risks associated with prolonged computer use, such as repetitive strain injuries and eyestrain, as well as safety risks like electrocution and fire hazards. It emphasizes the importance of precautions, such as ergonomic setups and regular checks, to mitigate these risks. Additionally, it covers e-safety issues related to personal data protection and the risks of online interactions, including phishing and hacking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views274 pages

IGCSE-CIE-ICT-Chapter08 - 3ed

This chapter discusses safety and security in the use of information and communication technologies, focusing on health risks associated with prolonged computer use, such as repetitive strain injuries and eyestrain, as well as safety risks like electrocution and fire hazards. It emphasizes the importance of precautions, such as ergonomic setups and regular checks, to mitigate these risks. Additionally, it covers e-safety issues related to personal data protection and the risks of online interactions, including phishing and hacking.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 274

Information and Communication Technologies

Dr. Soe Winn


[email protected]
+95 9 788 003 858

Chapter 08

SAFETY AND SECURITY

ICT 0417
In this chapter: you will learn

01 Safety and security when 02 Data security


using computers

03 Firewalls 04 Security protocols (SSL and TLS)

05 Encryption 06 Authentication
Covers safety and security issue when using computers in the
office or at home

Use of computers continues to expand, the health risks and


security risks continue to increase

Many of risks are associated with the internet

Poses a great risk to younger people unless they are vigilant at


Safety all times
And
Large businesses are also at risk from hackers, pharming
Security attacks and viruses
many of the precautions people and
business can take are common
sense but, equally, requires
additional knowledge to know how
to protect yourself form external
attacks, which can came from
anywhere in the world
8.1
Physical
Security
Physical Security
!
15%
Use of computers in the
20%
60% home and business world
has increased dramatically

Increase brings physical


15%
dangers, which can cause
20%
60% harm to users unless they
take some very sensible
precautions
8.1.1 Health Aspects
8.1.1 Health Aspects

Health and safety regulations


Advise that all computer systems have at least:

Tiltable and Anti-glare screens

Adjustable chairs and foot supports

Suitable lighting and uncluttered work


stations
8.1.1 Health Aspects

Keep your
eyes health

Health and safety regulations


Recommend

Frequent breaks

Frequent eye tests


Health Risks

Back and Neck Problems / Strain


Caused by sitting in front of a computer screen for long
periods in the same position

Ways of Eliminating or Minimising

Use fully adjustable chairs to give the correct


posture

Use foot rests to reduce posture problems

Use screens than can be tilted to ensure the


neck is at the correct angle
Health Risks
Repetitive Strain Injury (RSI)
Damage to fingers and wrist caused by continuous
use of a keyboard or repetitive clicking of mouse
buttons

Ways of Eliminating or Minimising

Ensure correct position is maintained


Correct angle of arms to the keyboard and mouse
Make proper use of a wrist rest when using a
mouse or a keyboard
Take regular breaks and do some exercise
Make use of ergonomic keyboards
Use voice-activated software if the user is prone
to problems when using a mouse and keyboard
Health Risks
Eyestrain
Caused by staring at a computer screen too long or
having incorrect lighting in the room

Ways of Eliminating or Minimising


Ensure that there is no screen flicker as this can
lead to eye problem

Change to LCD screens where flicker is less of a


problem than with CRT screens

Take regular breaks, and try focusing on a point


that is come distance away

Make use of anti-glare screens if lighting in the


room is incorrect or use window blinds to
reduce sunlight reflecting from the screen

Users should have their eyes tested on a regular basic, middle


vision glassed should be prescribed, if user has a persistent
problem as eye strain, dry eyes, headaches and so on
Health Risks
Headaches
Caused by incorrect lighting, screen reflections,
flickering screens and so on

Ways of Eliminating or Minimising


Use an anti-glare screen or use window blinds to
cut out reflections, incorrect lighting can cause
squinting and lead to headaches

Take regular breaks and do some exercise

Have your eyes tested regularly and use middle


vision glasses if necessary
Health Risks
Ozone Irritation
Caused by laser printers in an office area, dry skin,
respiratory problems and so on

Ways of Eliminating or Minimising


Proper ventilation should exist to remove the
ozone gas as quickly as possible

Laser printers should be housed in a designated


printer room

Change to other types of printer if necessary


example – inkject printers
8.1.2 Safety Aspects

Safety is a different issue, health is


more general

More concerned with dangers that


could lead to serious injury or even
loss of life
Safety Risks

Electrocution
The injury or killing of someone by electric shock

Ways of Eliminating or Minimising

Use an RCB (Residual Current Breaker)

Check insulation on wires regularly

Don’t allow drinks near computers

Check equipment on a regular basis


Safety Risks

Trailing Wires (Trip Hazard)

Ways of Eliminating or Minimising

Use cable ducts to make the wires safe

Cover wires and or have them neatly tucked


away, under desks and so on

Use wireless connections wherever possible,


thus elimination cables altogether
Safety Risks

Heavy Equipment Falling and


Causing Injury

Ways of Eliminating or Minimising

Use strong desks and tables to support heavy


hardware

Use large desks and tables so that hardware


isn’t too close to the edge where it can fall off
Safety Risks
Fire Risk

Ways of Eliminating or Minimising


Have a fully tested CO2 or dry fire extinguisher
nearby, not water extinguishers
Don’t cover equipment vents, causing
equipment to overheat

Make sure that the electrics used in the


hardware is fully maintained, portable
appliance testing
Ensure good ventilation in the room, again to
stop overheating of hardware
Don’t overload sockets with too many items
Change to low-voltage hardware wherever
possible, replace CRT with LCD
Individual
Has an important role to play

Needs to have a good health and


safety strategy
Regular Checks
Check the state of the wires / cables and plugs, whether
01 damaged, lose wires in the plugs, isn’t broken or cracked

02 Make sure that drinks, tea or coffee, are well away

Fix wire along walls and behind desks wherever possible


03 to remove the risk of wire coming into contact with people

Do not cover with paper or fabric, towels or sheets, since


04 theses can block ventilation holes, causing overheat, or
materials could catch fire
Regular Checks
Do not plug too many devices into an electric outlet
05 socket, overloading a socket can cause a fire

Make sure to exercise every hour or so, to prevent the


06 health risks

Carry out an ‘ergonomic assessment’ on your work


07 station, numerous online questionnaires that will enable to
check whether work station is set up properly for own
health and safety
Individual
May require to buy new chairs or
computer hardware to minimize the
impact of sitting in front of screens or
typing for long periods at a time
8.2
E-safety
Refers to safety when using the internet

Keeping personal data safe

Mobile Phone

Computer or Tablet

Games Console

Wireless Technology
Personal Data
Personal data refers to any data concerning a
living person who can be identified either from
the data itself or from the data in conjunction
with other information

Example of PD

Name

Address

Date of Birth

Medical History

Banking Details
Sensitive Personal Data
Some personal data is often referred to as sensitive personal data

Example of SPD

Ethnic Origin

Political Views

Religion

Sexual Orientation

Criminal Activity
Exercise 8a
Do some research and find out why it is important that
personal data is kept confidential. Present your notes
as an article to discuss with the rest of the class
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Don’t give out any personal information to


unknown people,

isn't possible to physically meet people so


that their motives can be fully assessed

Anyone can say anything online and difficult


to determine whether they are genuine or
not
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Don’t send people photos of yourself –


either online or via a mobile phone

Very easy for somebody to pass photos


on or even pretend to be you for a
number of reasons

Particularly large risk on social networking


sites
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Always maintain your privacy settings on


whatever device is being used online or
during communications

Privacy settings allow the user to control


which cookies are stored on their
computer or they enable the user to
decide who can view certain information
about them on, for example, a social
networking site
Exercise 8b
Evaluate your own use of email and social media /
networking sites.

Which of these e-safety strategies do you use?


Issues

Also refers to the benefits, risks and responsibilities when using ICT

When accessing the internet make sure


the websites being visited can be trusted

Two common ways of checking:


Https
Padlock

When using search engines, always


make sure the device settings are set to
‘safe search’ and the highest possible
level of security is used
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Only use websites recommended by


teachers and only use a learner-friendly
search engine

Only open emails from known sources

Is always a good idea to make sure your


internet service provider (ISP) has an
effective email filtering feature to ensure
unknown emails are placed in the spam box
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Only email people you know

Think carefully before opening any


email and never include the school’s
name or photos of a student wearing a
school uniform in any email
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Extremely important to be vigilant when


using social networking sites, instant
messaging or chat rooms

Block or report anybody who acts suspiciously


or who uses inappropriate language

Be very careful with the language used in chat


rooms

Always use a nickname and never use real


name
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Extremely important to be vigilant when


using social networking sites, instant
messaging or chat rooms

Keep private and personal data secret

Do not enter private chat rooms – stay public


The danger signs in a private chat are:
somebody sounds too good to be true, they
ask you to go to instant messaging and then to
emails, they request your telephone number
and then finally suggest that you meet
Issues

Also refers to the benefits, risks and responsibilities when using ICT

Extremely important to be vigilant when using


social networking sites, instant messaging or
chat rooms

Never arrange to meet anyone for the first time


on your own

Always tell an adult first and meet the person in


a public place

Avoid the misuse of images

Always use appropriate language

Always respect people’s confidentiality


Online Gaming

Important to be careful when using online gaming since this


carries its own risks

Many users think that all players are like-minded, no real risks
Online Gaming

Reported known risks of online gaming

Violence in the game itself, which can lead to


violent behavior in reality
Online Gaming

Reported known risks of online gaming

Predators, people who prey on others who they


see as vulnerable
Online Gaming

Reported known risks of online gaming

Cyber bullying, sending messages of an


intimidating or threatening nature
Online Gaming

Reported known risks of online gaming

Use of webcams
Online Gaming

Reported known risks of online gaming

Voice-masking technology, disguise a voice to


hide real identify
Online Gaming

Reported known risks of online gaming

Online games are also a source of cyber-attacks


on computer or mobile phones,
virus, phishing or spyware
Online Gaming

Just some idea of the risks associated with using


computers or tablets online

Indicates that gaming and the use of mobile


phones carry equal risks

Basically, any communication device has a


number of associated risks

Take simple precautions, the risks are considerably


minimized and ICT can be used to its full
Exercise 8c
Find out what safety measures should be taken when
playing games on the internet.

Write an article on these safety measures and also


include ways to minimise or remove these risks
8.3
Security of
Data
Security of Data
Any electronic device that connects to a
network, internet or mobile phone networks have
a number of security risks
Security Risks

01 Hacking 06 Spyware

02 Phishing 07 Viruses

03 Smishing 08 Spam

04 Vishing 09
Moderated and
Unmoderated Forums

05 Pharming Cookies
10
8.3.1 Hacking
Description

Gaining unauthorized access to a computer system

Can lead to identity theft or the misuse of personal


Effects

information
Data can be deleted, changed or corrupted on a user’s
computer

Use of firewalls

Use of strong , frequently changed, passwords and user IDs


Methods

Use of intrusion detection software

Use of user IDs and passwords


8.3.1 Hacking

Cracking is where someone edits the source code of


a program, allowing it to be exploited or changed for a
specific purpose

Usually done for a malicious purpose, send a user to a


fake website

Cracking is always illegal and

very damaging
8.3.1 Hacking

Use of encryption won’t stop hacking

Encryption makes the data unreadable


to the hacker but the data can still be
deleted, altered or corrupted
8.3.2 Phishing
Description

The creator sends out legitimate-looking emails to


target users
As soon as the recipient clicks on a link in the
email or attachment, they are sent to a fake
website
They are fooled into giving personal data in
replying to the email
The email often appears to come from a trusted
source, such as a bank or well-known service
provider
8.3.2 Phishing

Effects The creator of the email can gain personal


data, such as bank account data or credit
card number, from the user

This can lead to fraud or identity theft


8.3.2 Phishing

Methods

Many ISPs or web browsers filter out


phishing emails

Users should always be cautious when


opening emails or attachments

Do not click on executable attachments


that end in .exe, .bat, .com or .php
8.3.2 Phishing

Methods

Phishing emails often look legitimate by


copying large companies, such as online
store, to try to convince users that the
emails is totally authentic
8.3.2 Phishing
Malicious use refers to:

Deletion Fraud Identity Theft Selling


8.3.2 Phishing
Example of a phishing attack

A user is sent an email saying they have


ordered an item from an online store

Will be asked to click on a link to see the


order details

The link takes the user to a page that shows a


product code from a well-known company

A message such as: “if this order wasn’t made


by you, please fill out the following form to
cancel, your order in the next 24 hours’ is given
8.3.2 Phishing
Example of a phishing attack

The form will ask for details such as: Some of the key clues are that links, such as:
how to “contact us”, don’t work
Credit card number
User’s address and so on
8.3.2 Phishing
Smishing

Short for “SMS” phishing

Uses the SMS system of mobile phones to


send out fake text messages

Similar to phishing, scams often contain a URL


or telephone number embedded

Recipient will be asked to log on to the website


or make a telephone call
8.3.2 Phishing
Smishing

Will be asked to supply personal details such as:


Credit / debit card numbers
Passwords

As with phishing attacks, the text message will


appear to come from a legitimate source and
will make a claim,

Have won a prize or need to contact their


bank urgently
8.3.2 Phishing

Smishing

Most people believe that


only computers are liable
to security threats, mobile
phones are not at risk

This make smishing a


particularly dangerous
security threat to many
people
8.3.2 Phishing

Vishing

Voice mail phishing, another variation

Use a voice mail message to trick the user into


calling the telephone number contained in the
message
8.3.2 Phishing

Vishing

As all phishing attacks, user will be asked to supply personal data


thinking they are talking to a legitimate company
8.3.3 Pharming
Description

Malicious code installed on a user’s


computer or on a web server, the code
will redirect the user to a fake website
without their knowledge

The user doesn’t have to take any


action, unlike phishing
8.3.3 Pharming
Effects

The creator of the malicious code can gain personal data such as credit / debit details from users when
they visit the fake website; usually the website appears to be that of a well-known and trusted company

Can lead to fraud or


identity theft
8.3.3 Pharming

Methods

Some anti-spyware can identify and


remove pharming code from a user’s
computer

User should always be alert and look


out for clues that they are being
redirected to another website
8.3.3 Pharming

Methods

Users should always look out for clues that they


are being connected to a secure website

Should look out for https:// in the URL or use of


the padlock symbol
ACTIVITY
ACTIVITY
ACTIVITY
8.3.4 Spyware and Keylogging Software
Description

Software that gathers data by monitoring key


presses on the user’s keyboard

Gathered data is then sent back to the person


who sent the software

More info

https://www.youtube.com/watch?v=L8169DHNeQ0
8.3.4 Spyware and Keylogging Software
Effects

Spyware gives the originator access to all data


entered using a keyboard on the user’s computer

Software is able to install other spyware, read


cookie data and also change a user's default
browser
8.3.4 Spyware and Keylogging Software
Methods

Use anti-spyware to reduce the risk

User should always be alert and check for clues


that their keyboard activity is being monitored

When entering a password, for example, using


a pointing device or touch screen, to select
characters from a drop-down menu can reduce
the risk

More info

https://www.youtube.com/watch?v=_lCDg2XzEsA
8.3.4 Spyware and Keylogging Software
Methods

Banks often use drop-down menus where the user enters certain
characters from their password using a mouse or touch screen

The required characters are also changed every time the user logs
into their account to stop hackers getting the full password
Discussion

Name one of the key


logging application
and discuss about it
briefly.

Name one of the key


anti-logging application
and discuss about it
briefly.
8.3.5 Viruses
Description

Program code or software that can replicate / copy


itself with the intention of deleting or corrupting files
on a computer

Often cause the computer to malfunction, for


example, by filling up the hard drive with data

More info

https://www.youtube.com/watch?v=Ip-u5NZJiwY
8.3.5 Viruses
Effects

Can cause the computer to ‘crash’, stop function


normally or become unresponsive
For example, the user gets the ‘not responding’
message

The software can delete files or data on a computer

The software can corrupt operating system files,


making the computer run slowly or even ‘crash’

More info

https://www.youtube.com/watch?v=HvMQKffEAbk
8.3.5 Viruses
Methods

Install anti-virus software and update it


regularly

Don’t use software from unknown


sources

Be careful when opening emails or


attachments from unknown senders
8.3.5 Viruses
Methods

Backing up files won’t guard against the


effect of viruses, the virus may have
already attached itself to the files that are
being copied to the backup system

When these files are then copied back to the


computer, the virus is simply reinstalled
Discussion

Name one of the virus


and discuss about its
effect briefly.

Name one of the antivirus


application and discuss
about its characteristic
briefly.
ACTIVITY
ACTIVITY
ACTIVITY
ACTIVITY
ACTIVITY
8.3.6 Spam
Referred to as “Junk” email

Usually sent out to a recipient who is on a


mailing list or mailing group

Spammers obtain these email addresses


from chat rooms, websites, news groups and
even certain viruses that have been set up to
a user’s contacts list
8.3.6 Spam

Rarely a security risk, but can lead to “Denial of


Services”
eg. Clogging up the bandwidth on the internet

Can be link to phishing attacks or even the spread of


computer viruses

Many ISPs filter out spam or junk mail, some overactive


ISPs can filter out wanted emails that come from new
sources
8.3.6 Spam
Denial of Services

Basically an attack
on a network that is
design to slow the
network down by
flooding it with
useless traffic

More info

https://www.youtube.com/watch?v=ilhGh9CEIwM
8.3.6 Spam
Prevention Techniques

To obtain the maximum protection possible


when using the ‘junk email filter’ set the
protection level to high or to safe list only

Make sure the junk mail filter is kept up to


date
8.3.6 Spam
Prevention Techniques

Block images in HTML messages that spammers use as web beacons


8.3.6 Spam
Prevention Techniques

Web Beacon

Can be a graphic image,


linked to an external web
server, that is placed in an
HTML-formatted message
and can be used to verify that
your email address is valid
when the message is opened
and images downloaded
8.3.6 Spam
Prevention Techniques

Look out for check boxes that are


already selected when items are
bought online

Check box indicate that agreed to


sell or give your email address to
third party users
8.3.6 Spam
Prevention Techniques

Do not sign up to commercial


mailing lists

Do not reply to an email or


unsubscribe from a mailing list that
you did not explicitly sign up to in
the first place
ACTIVITY
8.3.7 Forums
Moderated and Unmoderated

An online discussion forum in which all the posts are


checked by an administrator before they are allowed
to be posted
Moderated Forum

Many users prefer this type of forum


Moderator can not only prevent spam, but can
also filter out any posts that are inappropriate,
rude or offensive, or even those that wander
off the mail topic
8.3.7 Forums
Moderated and Unmoderated

The internet is essentially an unmoderated forum

No one ‘owns’ the internet, and essentially not


policed

Only real safeguards are a voluntary cooperation


between the users and the network operators

however

Most social forums or networking groups


have a set of rules or protocols that
members are requested to follow or they
will be deleted
ACTIVITY
8.3.8 Cookies

Small files or code that are stored on a


user’s computer

Sent by a web server to a user’s computer

Each cookie is effectively a small look-up table


containing pairs of (key, data) values
eg. Surname, Jones
Music, Rock
8.3.8 Cookies

Once the cookie has been read by the code on


the web server or user’s computer, the data can
be retrieved and used to customize the web page
for each individual

Often referred to as user preferences


eg. When a user buys a book online, the
cookies remember the type of book the user chose
and the web page will then show a message such as:

Customers who bought “Cambridge IGCSE ICT” also bought “Cambridge IGCSE Computer
Science”
8.3.8 Cookies

The data gathered by cookies forms an


anonymous user profile and doesn’t contain
personal data such as passwords or credit / debit
card number

A very efficient way of carrying data from one


website session to another, or even between
sessions on related websites

Remove the need to store massive amounts of data on the web server itself, storing the data on
the web server without using cookies would also make it very difficult to retriever a user’s data
without requiring the user to login every time they visit the website
8.3.8 Cookies

Use of secure servers is always advised

A secure web server is one that supports any of


the major security protocols, such as
SSL / TLS

Encrypt and Decrypt messages to protect them


against third party eavesdropping

SSL TSL
Secure Sockets Layer Transport Sockets Layer
8.3.8 Cookies

Making purchases from a secure web server ensures that a user’s payment or personal
information can be translated into a secret code that’s difficult to break
8.4
Additional Security
of Data Online
8.1 Physical Security

8.2 E-Safety

8.3 Security of Data

Additional Security of
Data Online
Additional ways of keeping data secure when
accessing external systems, such as internet
8.4 Additional Security of Data Online

Firewalls Security Encryption Authentication


Protocols
8.4.1 Firewalls

Can be either software or hardware,

Sits between the user’s computer and an external network, for example, the internet

Filters information coming in and out of the user’s computer

Firewall
User’s
Software or Internet
Computer
Hardware
Tasks of Firewall

To examine the ‘traffic’


between a user’s
computer, or internet
network, and a public
network, for example, the
internet

https://www.youtube.com/watch?v=kDEX1HXybrU
Tasks of Firewall

Checks whether
incoming or outgoing
data meets a given
set of criteria
Tasks of Firewall

If the data fails the criteria,


the firewall will block the
traffic and give the user, or
network manager, a
warning that there may be
a security issue
Tasks of Firewall

Can be used to log all


incoming and outgoing
traffic to allow later
interrogation by the user,
or network manager
Tasks of Firewall

Criteria can be set so that


the firewall prevents
access to certain
undesirable sites, the
firewall can keep a list of all
undesirable IP addresses
Tasks of Firewall

Possible for firewalls to


help prevents viruses or
hackers entering the user’s
computer network
Tasks of Firewall

Also possible for firewalls to help prevent


hackers gaining access to the user’s
computer or network

Can be done by blocking IP addresses,


but it should be pointed out that hackers
can still have access to a computer or
network if they are using an allowed
computer
Tasks of Firewall

The user is warned if some software on their system is trying to access an external data
source, for example, an automatic software upgrade, the user is given the option of
allowing it to go ahead or request that such access is denied

Update is
available
Firewalls

Can be a hardware
interface that is located
somewhere between the
computer and the
internet connection, in
which case it is often
referred to as a gateway
Firewalls

Alternatively, the firewall


can be software installed
on a computer, in some
cases this is part of the
operating system
Firewalls

There are certain circumstances where the firewall can’t prevent potential harmful
traffic

Cannot prevent individuals,


on internal networks, using
their own modems to
bypass the firewall
Firewalls

There are certain circumstances where the firewall can’t prevent potential harmful
traffic

Employee misconduct or
carelessness cannot be
controlled by firewalls, for
example, control of
passwords or user accounts
Firewalls

There are certain circumstances where the firewall can’t prevent potential harmful
traffic

User on stand-alone
computers can choose to
disable the firewall, leaving
their computer open to
harmful traffic from the
interent
Firewalls

All issues require management


control, or personal control on a
single computer, to ensure that
the firewall is allowed to do its job
effectively
8.4.2 Security Protocols

Sets of rules used by


computers to
communicate with
each other across a
network, when using
the internet
8.4.2 Security Protocols
https://www.youtube.com/watch?v=hExRDVZHhig

2 forms of security protocols


SSL Secure Sockets Layer

A type of protocol that allows


data to be sent and received
securely over the internet

When a user logs on to a website, encryption


SSL encrypts the data – only user
computer and web server are able
to make sense of what is being
Server
transmitted
SSL Secure Sockets Layer

User will know: if SSL is being applied

Https: Padlock
SSL Secure Sockets Layer
Communicating across a network using SSL

The user’s web The web browser The web server If the web Once this
browser sends a requests that the responds by browser can image is
message so web server sending a copy authenticate received, the
shat it can identifies itself of its SSL this certificate, web server
connect with the certificate to the it sends a acknowledges
required users web message back the web
website, which is browser to the web browser and
secured by SSL server to allow the SSL-
communication encrypted two-
to being way data
transfer begins
SSL Secure Sockets Layer

Certificate

SSL certificates are small data files that


digitally bind an encryption key to an
organization's details.

When installed on a web server, it shows


as the green padlock and the https
protocol and ensures secure
connections from a web server to a web
browser
TLS Transport Layer Security

Similar to SSL but is a more


recent security system

A form of protocol that ensures


the security and privacy of data encryption

between devices and users


when communicating over the
Server
internet
TLS Transport Layer Security

Essentially designed to
provide encryption,
authentication and data
integrity in a more
effective way than its
predecessor, SSL

Data Integrity – maintaining the


accuracy and the consistency of
data
TLS Transport Layer Security

When a website and a


user communicate over
the internet, TLS is
designed to prevent a
third party hacking into
this communication and
causing problems with
data security
TLS Transport Layer Security

Is formed of two layers:

Record Protocol: Part of the communication can be used with or without


encryption, contains the data being transferred over the internet

Handshake Protocol: Permits the website and the user to authenticate each
other and to make use of encryption algorithms, a secure session between
user and website is established
TLS Transport Layer Security

Is formed of two layers:

Record Protocol:
Part of the
communication
can be used with
or without
encryption,
contains the data
being transferred
over the internet
TLS Transport Layer Security

Is formed of two layers:

Handshake Protocol:
Permits the website and the user to authenticate
each other and to make use of encryption
algorithms

A secure session between user and website is


established
TLS Transport Layer Security

Only the most recent web browsers


support both SSL and TLS, which is
why the older SSL is still used in many
cases

They both effectively do the same thing


TLS Transport Layer Security
Differences between SSL and TLS

Possible to extend TLS by adding new


authentication methods

TLS can make use of session caching, which


improves the overall performance compared

TLS to SSL

TLS separates the handshaking process from


the record protocol layer, which holds all the
data
TLS Transport Layer Security
Session Caching

When opening a TLS session, it requires a lot of


computer time, due mainly to the complex
encryption keys being used

The use of session caching can avoid the need to


utilize so much computer time for each connection

TLS can either establish a new session or attempt


to resume an existing session, using the latter can
boost system performance considerably
TLS Transport Layer Security
Session Caching

A collection of
processed data that
is kept on hand and
reused in order to
avoid costly repeated
database queries
8.4.3 Encryption
Is used primarily to protect data in case it has been
hacked or accessed illegally

While encryption won’t prevent hacking, it makes the


data meaningless unless the recipient has the
necessary decryption tools
8.4.3 Encryption

Uses a secret key that has the


capability of altering the characters
in a message

If the key is applied to a message,


its content is changed, which then
makes it unreadable unless the
recipient also has the same secret
key

When this secret key is applied to the


encrypted message, it can be read
8.4.3 Encryption
The key used to encrypt( or encode) the
message is known as the encryption key

The key used to decrypt (or decipher) the


message is known as the decryption key

When a message undergoes encryption it


becomes cypher script

The original message is Known as plain


text
8.4.3 Encryption
8.4.3 Encryption
8.4.3 Encryption
8.4.4 Authentication

Used to verify that data comes


from a secure and trusted source

Works with encryption to strengthen


internet security
8.4.4 Authentication

Password

Biometrics

Digital Certificates
Digital Certificates

A pair of files stored on a user’s computer – used in


the security of data sent over the internet

Each pair of files is divided into:

A public key : Which is known by anyone

A private key : Known to the computer user


only
Digital Certificates

example

When sending an email, the message is made more


secure by attaching a digital certificate

When the message is received, the recipient can


verify that it comes from a known or trusted source by
viewing the public key information

for more info

https://www.youtube.com/watch?v=UbMlPIgzTxc
Digital Certificates

Made up of six parts:


The sender’s email address

The name of the digital certificate owner

A serial number

Expiry date, the date range during which the


certificate is valid

Public key, used for encrypting messages


and for digital signatures

Digital signature of certificate authority (CA) - VeriSign


Digital Certificates

Operating systems and web browsers maintain


lists of trusted certificate authorities
Passwords

When logging on to a system, a bank website,


user will be asked to type in “Password”

Should be a combination of letters and


numbers that would be difficult for somebody
else to guess
Passwords

Strong passwords should contain upper case


and lower case characters as well as other
keyboard symbols, for example:
Rn5K;2mL/8
Passwords

When the password is typed in,


shows on the screen as ********,
so nobody overlooking can see
what the user has typed in

If the user’s password doesn’t


match up with the user ID then
access will be denied
Passwords

Many systems ask for the password


to be typed in twice as a verification
check
Passwords

To help protect the system, users are only


allowed to type in their password a certain
number of times –

Usually three times is the maximum


number of tries allowed, before the
system locks the user out

User will be unable to log on until the system


administrator has reset the password
Passwords

If a user forgets password when using the


internet, they can request that the password is
sent their email address

Password is never shown on the computer


screen for reasons of security
Passwords

Passwords should be changed on a


regular basis in case they become
known to another user or even a hacker

Important to prevent other people


gaining access to your password by way
of spyware or viruses

Security Risks
Passwords

Often necessary to use a user ID or log


in ID as well as password

Gives an additional security level since


the user ID and password must match
up to allow a user to gain access to

https://www.mybank.com
Biometrics

Relies on certain unique characteristics


of human beings

Fingerprint scans
Signature recognition
Retina scans
Iris recognition
Face recognition
Voice recognition
Biometrics

Used in a number of applications as a


security device.

Example

Smartphones use fingerprint matching


before they can be operated

Pharmaceutical companies use face


recognition or retina scans to allow entry
to secure areas
Biometrics

Fingerprint Scans

Compared against previously scanned


fingerprints in a database, if they match
then access is allowed

System compares patterns of “ridges”


and “valleys”, which are fairly unique
Accuracy = about 1 in 500

Use As a security method for entering a building


Biometrics

Fingerprint Scans

Fingerprints are unique, improve security since it


would be difficult to replicate

Other security devices, magnetic cards, can be lost


or even stolen, which makes them less effective

Impossible to “sign in” for else since would match up


to one person only on the database
Advantages
Can’t be misplaced, a person always has them
Biometrics

Fingerprint Scans

Relatively expensive to install and


set up

If a person’s fingers are damaged


through an injury, this can have an
effect on the scanning accuracy

Some people may regard it as in


infringement of civil liberties
Disadvantages
Biometrics

Retina Scans
Use infrared light to scan the unique pattern of blood vessels in
the retina, at the back of the eye

Rather unpleasant
technique,
requiring a person
to sit totally still for
10 to 15 seconds
while the scan
takes places

Very secure as no way to


duplicate blood vessels
patterns, accuracy is about
one in ten million
Comparison of Six Common
Biometric Techniques

Biometric Comparative Comparative Devices Social What can interfere


Technique Accuracy Cost Needed Acceptability with the procedure

Damaged Fingers,
Fingerprint scans High accuracy Medium Scanner Medium
e.g - cuts

Signature Signatures can change


Low accuracy Medium An optical pen High
recognition with time

Retina scans High accuracy High Digital camera Low Irritation of the eye

Iris recognition High accuracy High Digital camera Low Wearing of glasses

Medium-Low
Face recognition Medium Digital camera High Facial hair or glasses
accuracy

Background noise or
Voice recognition Medium accuracy Medium Microphone High
person had a cold
Comparison of Six Common
Biometric Techniques

Biometric Technique: Fingerprint scans

Comparative Accuracy: High accuracy

Comparative Cost: Medium

Devices Needed: Scanner

Social Acceptability: Medium

What can interfere with Damaged fingers


the procedure: e.g, cuts
Comparison of Six Common
Biometric Techniques

Biometric Technique: Signature recognition

Comparative Accuracy: Low accuracy

Comparative Cost: Medium

Devices Needed: An optical pen

Social Acceptability: High

What can interfere with Signatures can change


the procedure: with time
Comparison of Six Common
Biometric Techniques

Biometric Technique: Retina scans

Comparative Accuracy: High accuracy

Comparative Cost: High

Devices Needed: Digital camera

Social Acceptability: Low

What can interfere with


Irritation of the eye
the procedure:
Comparison of Six Common
Biometric Techniques

Biometric Technique: Iris recognition

Comparative Accuracy: High accuracy

Comparative Cost: High

Devices Needed: Digital camera

Social Acceptability: Low

What can interfere with


Wearing of glasses
the procedure:
Comparison of Six Common
Biometric Techniques

Biometric Technique: Face recognition

Comparative Accuracy: Medium-low accuracy

Comparative Cost: Medium

Devices Needed: Digital camera

Social Acceptability: High

What can interfere with


Facial hair or glasses
the procedure:
Comparison of Six Common
Biometric Techniques

Biometric Technique: Voice recognition

Comparative Accuracy: Medium accuracy

Comparative Cost: Medium

Devices Needed: Microphone

Social Acceptability: High

What can interfere with Background noise or


the procedure: person has a cold
Comparison of Six Common
Biometric Techniques

Fingerprint Scans

One of the most developed biometric


techniques

Very high accuracy

Very easy to use

Relatively small storage requirements for


the biometric data created

Advantages
Comparison of Six Common
Biometric Techniques

Fingerprint Scans

For some people it is very intrusive, since it is still


related to criminal identification

It can make mistakes if the skin is damaged.

E.g, cuts

Disadvantages
Comparison of Six Common
Biometric Techniques

Signature Recognition

Non-intrusive

Requires very little time to verify (above five


seconds)

Relatively low-cost technology

Advantages
Comparison of Six Common
Biometric Techniques

Signature Recognition

If individuals do not sign their


names in a consistent manner
there may be problems with
signature verification

High error rate (one in 50)

Disadvantages
Comparison of Six Common
Biometric Techniques

Retina Scans

Very high accuracy

There is no known
way to replicate a
person’s retina

Advantages
Comparison of Six Common
Biometric Techniques

Retina Scans

It is very intrusive

It can be relatively slow to verify retina


scan with stored scans

Very expensive to install and set up

Disadvantages
Comparison of Six Common
Biometric Techniques

Iris Recognition

Very high accuracy

Verification time is generally less than five


seconds

Advantages
Comparison of Six Common
Biometric Techniques

Iris Recognition

It is very intrusive

Uses a lot of memory for the data to


be stored

Very expensive to install and set up

Disadvantages
Comparison of Six Common
Biometric Techniques

Face Recognition

Non-intrusive method

Relatively inexpensive technology

Advantages
Comparison of Six Common
Biometric Techniques

Face Recognition

It is affected by changes in lighting, the


person’s hair, their age, and if the
person is wearing glasses

Disadvantages
Comparison of Six Common
Biometric Techniques

Voice Recognition

Non-intrusive method

Verification takes less than five seconds

Relatively inexpensive technology

Advantages
Comparison of Six Common
Biometric Techniques

Voice Recognition

A person’s voice can be recorded easily and used for


unauthorized access

Low accuracy

An illness, such as a cold, can change a person’s voice,


making absolute identification difficult or impossible

Disadvantages
ACTIVITY: Past Paper
ACTIVITY: Past Paper
ACTIVITY: Past Paper

Encryption
ACTIVITY: Past Paper

Encryption
ACTIVITY: Past Paper

Spam
ACTIVITY: Past Paper

Phishing Pharming
Exercise 8d
Find out which applications use each of the biometric
techniques described in this section.

Consider all the advantages and disadvantages of


each method and make conclusions about its suitability
for the applications you found
Online Credit Fraud

Online credit card fraud is still too common


Online Credit Fraud

Hackers gaining access to a user’s computer


through the use of spyware, phishing or pharming

Trick a user who is not particularly IT literate

Tricked giving personal and financial details that


enable to gain full access to a user’s account

Lead to unauthorized purchases or even removal of


money from account if it remains undetected
Online Credit Fraud

The breaking of passwords through a


number of techniques is all-too-familiar risk

If password are weak or no encryption is


used then it is a relatively easy task to break
these passwords and illegal access to bank
and credit card accounts
Online Credit Fraud

Always a good idea to type in a web address or URL rather


than ‘copy and paste it’ from an email or other website
Online Credit Fraud

Sometimes the web address / URL is altered very slightly in


the email and the user ends up visiting a fake website
Online Credit Fraud

Once visit the fake website, it is possible that they will give personal and financial details to a
fraudster without the user’s knowledge – by physically typing in the web address the user will
ensure they get it right and avoid such risks
Online Credit Fraud

If the user is using wireless technology, it is very


important for internet access to be password
controlled since it is relatively easy to tap in to
wireless networks without password protection
Online Credit Fraud

If a user logs in to an account or website in a


public place, such as airport using the
available Wi-Fi hotspots, it is necessary to be
vary vigilant,

There is always a risk that somebody is


monitoring internet usage in the area and will
try to tap in to the data that is going to and
from any computer using this wireless link
Online Credit Fraud

Even large organizations can be subject to


cybercrime, in recent years, the cloud and
some large retail companies have been the
targets for hackers, which leaves customers
very vulnerable
Online Credit Fraud
PRECAUTIONS

Always use varied and complex


passwords for all accounts
Online Credit Fraud
PRECAUTIONS

Check the accuracy of bank


accounts continually and resolve
any discrepancies immediately
Online Credit Fraud
PRECAUTIONS

Only provide personal information


on sites that have ‘https’ in the web
address or have the padlock icon in
the web browser
Online Credit Fraud
PRECAUTIONS

Don’t provide personal information


to any unsolicited requests for
information, this is often a sign of
phishing
Online Credit Fraud
PRECAUTIONS

Don’t open emails or attachments


from unknown senders
Online Credit Fraud
PRECAUTIONS

Delete any messages from your


spam folder on a regular basis
Online Credit Fraud
PRECAUTIONS

Report any suspicious phishing


activity to the company that is used
by the perpetrator
Online Credit Fraud
PRECAUTIONS

Only download software from sites


that can be trusted
Cloud Security

Several computer, especially tablets and laptops and mobile phone, manufacturers encourage
customers to store or back their files on a medium known as the cloud
Cloud Security

Users purchase cloud storage and can then access all their files, for examples, photos, videos,
music or e-books, from any device anywhere in the world
Cloud Security

Don’t need to carry memory sticks around to access the files away from home

ADVANTAGES
Cloud Security

Don’t have to pay for large storage capacity on the computer / tablet or mobile phone

ADVANTAGES
Cloud Security

Cloud is controlled by external companies, they will ensure that files are backed up and therefore
reduce the possibility of losing irreplaceable data

ADVANTAGES
Cloud Security

Ability to synchronize files ensure they are automatically updated across all devices, means that
the latest version of a file saved on a desktop PC, for example, is also available on the other
devices, such as a smartphone

ADVANTAGES
Cloud Security

Cloud storage is also ideal for collaboration purposes, it


allows several users to edit and collaborate on a single file
or document – there is no need to worry about tracking the
latest version or which user made the changes

ADVANTAGES
Cloud Security

Obvious advantages, there are still security


worries about using cloud storage

DISADVANTAGES
Cloud Security
DATA SECURITY

Companies that transfer


vast amounts of
confidential data from
their own systems to a
cloud service provider
are effectively
relinquishing control of
their own data security

DISADVANTAGES
Cloud Security
DATA SECURITY

What physical
security exists
regarding the
building where
the data is
housed?

DISADVANTAGES
Cloud Security
DATA SECURITY

How good is the


cloud service
provider’s resistance
to natural disasters
or power cuts?

DISADVANTAGES
Cloud Security
DATA SECURITY

What safeguards exist regarding personnel


who work for the cloud service company?

Can they use their authorization codes to access


confidential data for monetary purposes?

DISADVANTAGES
Cloud Security
DATA LOSS

Important and irreplaceable data could be


lost from cloud storage facilities RISK

Actions from hackers, gaining


access to accounts or
pharming attacks, could lead
to loss or corruption of data

DISADVANTAGES
Cloud Security
DATA LOSS

Users need to be certain sufficient safeguards


exist to overcome these potentially very
harmful risks

Three breaches of security involving two of the


largest cloud service providers showed why
many of the above fears make people a little
nervous of using this facility to store their
important files

DISADVANTAGES
Cloud Security
DATA LOSS

The XEN security threat, which forced several cloud


operation to reboot all their cloud servers, this was
caused by a problem in the XEN Hypervisor

HYPERVISOR

A piece of computer software,


firmware or hardware that creates
and runs virtual machines

DISADVANTAGES
Cloud Security
DATA LOSS

A recent case
where a large
cloud service
provider
permanently lost
data during a
routine backup
procedure

DISADVANTAGES
Cloud Security
DATA LOSS

The celebrity photos cloud hacking scandal,


where over 100 ‘interesting’ photos of
celebrities were leaked

Hackers had gained access to a number of


cloud accounts, which enabled them to
publish the photos on social networks and
to sell them to publishing companies

DISADVANTAGES
Cloud Security
DATA LOSS

Reasons have made


individuals and companies
nervous about using cloud
service providers

A game between hackers and


owners of online service
companies continues to simmer

DISADVANTAGES
Cloud Security
DATA LOSS

Considerable amounts of advice have


been given

Provided users are vigilant in use of


any device connected to the internet
then the possibility of being a victim of
cybercrime is considerable reduced

DISADVANTAGES
Section Break
Think Big, Start Small
THANK YOU
Insert the Subtitle of Your Presentation
We Create Quality Professional PPT Presentation
Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation. Easy to change colors, photos. Get a modern
PowerPoint Presentation that is beautifully designed.

Your Text Here Your Text Here


01 Get a modern PowerPoint Presentation 02 Get a modern PowerPoint Presentation
that is beautifully designed. that is beautifully designed.

Your Text Here Your Text Here


03 Get a modern PowerPoint Presentation 04 Get a modern PowerPoint Presentation
that is beautifully designed. that is beautifully designed.

Agenda
Style
Timeline Style
Your Text Here Your Text Here
Easy to change colors, Easy to change colors,
photos and Text. photos and Text.

2020 2022

2019 2021 2023


Your Text Here Your Text Here Your Text Here
Easy to change colors, Easy to change colors, Easy to change colors,
photos and Text. photos and Text. photos and Text.
Our Team Style
MICHAEL DOE
Example Text : Get a modern PowerPoint Presentation that is beautifully
designed. I hope and I believe that this Template will your Time, Money and
Place Your Picture Here Reputation. Easy to change colors, photos and Text. Get a modern PowerPoint
Presentation that is beautifully designed. You can simply impress your audience
and add a unique zing.

ALLPPT Work Experience


Layout 2013 ~ 2014 Text here
Example Text : Get a modern PowerPoint Presentation
Clean Text that is beautifully designed.
Slide for your 2014 ~ 2016Text here
Presentation Example Text : Get a modern PowerPoint Presentation
that is beautifully designed
/FACEBOOK www.hompageurl.com
2016 ~ 2022 Text here
Example Text Example Text Example Example Text : Get a modern PowerPoint Presentation
@TWITTER Text Example Text Example Text that is beautifully designed.
Infographic Style

Content Here Content Here


Get a modern PowerPoint Get a modern PowerPoint
Presentation that is Presentation that is
beautifully designed. beautifully designed.

Content Here Content Here


Get a modern PowerPoint Get a modern PowerPoint
Presentation that is Presentation that is
beautifully designed. beautifully designed.

ALLPPT Layout Clean Text Slide for


your Presentation. ALLPPT Layout
Clean Text Slide for your Presentation.

Content You can simply impress your audience and add


Here a unique zing and appeal to your
Presentations.
Infographic Style

Your Text Here Your Text Here


Get a modern PowerPoint Presentation that Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change Contents is beautifully designed. Easy to change
colors, photos and Text.
Contents colors, photos and Text.

Your Text Here Your Text Here


Get a modern PowerPoint Presentation that Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change
Contents is beautifully designed. Easy to change
colors, photos and Text.
Contents colors, photos and Text.

Your Text Here


Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change
colors, photos and Text. Contents
 Simple Portfolio Presentation  Simple Portfolio Presentation
 Presentation  Presentation
 Portfolio  Portfolio
 Simple Portfolio  Simple Portfolio
 Portfolio Presentation  Portfolio Presentation
 Presentation  Presentation
 Portfolio Presentation  Portfolio Presentation
 Simple Portfolio Place Your Picture Here Send To Back  Simple Portfolio

We Create
AWESOME Quality Professional

PRESENTATION Modern PowerPoint Presentation

NO.1 Presentation
Infographic Style
You can simply You can simply
impress your audience impress your audience
and add a unique zing and add a unique zing
and appeal to your and appeal to your
Presentations. Easy to Presentations. Easy to
change colors, photos. change colors, photos.

ALLPPT Layout Clean Text Slide for your


Presentation. ALLPPT Layout Clean Text
Slide for your Presentation.

You can simply You can simply


impress your audience impress your audience
and add a unique zing and add a unique zing
and appeal to your and appeal to your
Presentations. Easy to Presentations. Easy to
change colors, photos. change colors, photos.
Infographic Style

Get a modern PowerPoint


Get a modern Power
Text
Text
Point Presentation.
Presentation that is
beautifully designed.

Get a modern PowerPoint


Presentation that is
beautifully designed.
Text
Get a modern Power
Text Get a modern PowerPoint
Text
Point Presentation.
Presentation that is
beautifully designed.
EASY TO CHANGE COLORS

AWESOME We Create
Quality Professional
PRESENTATION PPT Presentation
Simple
Presentation !
Contents Here
15%
This PowerPoint Template has clean and
neutral design that can be adapted to any
20%
60% content and meets various market
segments. Get a modern PowerPoint
Presentation that is beautifully designed.

This PowerPoint Template has clean and


20% neutral design that can be adapted to any
content and meets various market
Text Here segments.

This PowerPoint Template has clean and


60% neutral design that can be adapted to any
content and meets various market
Text Here segments.

This PowerPoint Template has clean and


15% neutral design that can be adapted to any
content and meets various market
Text Here segments.
Infographic Style
100
90
80
70
60
50
40
30
20
10
0
Category 1 Category 2 Category 3 Category 4

You can simply impress your audience and add a unique


zing and appeal to your Presentations.

You can simply impress your audience and add a unique


zing and appeal to your Presentations.

You can simply impress your audience and add a unique


You can simply impress your zing and appeal to your Presentations.
Modern Presentation
32% Simple PowerPoint
audience and add a unique zing
and appeal to your Presentations. You can simply impress your audience and add a unique
zing and appeal to your Presentations.
ALLPPT Layout Clean Text Slide
for your Presentation. ALLPPT
Layout Clean Text Slide for your
Presentation.
Your Picture Here

Your Picture Here And Send To Back

You can simply impress your audience and add a


unique zing and appeal to your Presentations. Get
a modern PowerPoint Presentation that is
beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation.
Infographic Style

1 2 3

4 5 6

7 8 9

Your Text Here Your Text Here Your Text Here Your Text Here
Get a modern Get a modern Get a modern Get a modern
PowerPoint PowerPoint PowerPoint PowerPoint
Presentation that is Presentation that is Presentation that is Presentation that is
beautifully designed. beautifully designed. beautifully designed. beautifully designed.
Infographic Style

Add Text
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Add Text Presentation.
Get a modern PowerPoint
Presentation. $66,800
Add Text Here
$54,000
Add Text Here
$44,600
Add Text Here
$39,200
Add Text Here
$34,400
Add Text Here
AWESOME
SLIDE
LOREM IPSUM
DOLOR SIT AMET,
LOREM IPSUM DOLOR SIT AMET,
CU USU AGAM INTEGRE IMPEDIT.

Get a modern PowerPoint Presentation that is


beautifully designed. Easy to change colors,
photos and Text. You can simply impress your
audience and add a unique zing and appeal to
your Presentations. You can simply impress
your audience and add a unique zing and
appeal to your Presentations. Easy to change
colors, photos and Text. I hope and I believe
that this Template will your Time, Money and
Reputation. I hope and I believe that this
Template will your Time, Money and Reputation.
Infographic Style
Content Here
Get a modern PowerPoint
Presentation that is beautifully
designed. I hope and I believe that this
Template will your Time.

Content Here
Get a modern PowerPoint
Presentation that is beautifully
designed. I hope and I believe that this Content Here
Template will your Time. Get a modern PowerPoint
Presentation that is beautifully
designed. I hope and I believe that this
Template will your Time.
Infographic Style

Your Text Here


01 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.

Your Text Here


02 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.

Your Text Here


03 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.

Your Text Here


04 You can simply impress your audience and add a unique zing and appeal to your
Presentations. Easy to change colors, photos and Text.
Infographic Style
Example Text : Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Tem -
plate will your Time, Money and Reputation. Easy to change colors, photos and Text.

CONTENTS HERE
You can simply impress your audience and add a unique zing and
appeal to your Reports and Presentations with our Templates. Get a
modern PowerPoint Presentation that is beautifully designed. I hope
and I believe that this Template will your Time, Money and Reputation.

Place Your Picture Here


CONTENTS HERE
You can simply impress your audience and add a unique zing and
appeal to your Reports and Presentations with our Templates. Get a
modern PowerPoint Presentation that is beautifully designed. I hope
and I believe that this Template will your Time, Money and Reputation.

CONTENTS HERE
You can simply impress your audience and add a unique zing and
appeal to your Reports and Presentations with our Templates. Get a
modern PowerPoint Presentation that is beautifully designed. I hope
and I believe that this Template will your Time, Money and Reputation.
Infographic Style
Get a modern

80%
PowerPoint
60% Presentation that is
beautifully designed.
Your Text Here
You can simply impress your audience and
You can simply impress your audience add a unique zing and appeal to your
and add a unique zing and appeal to Presentations. Get a modern PowerPoint
your Presentations. Presentation that is beautifully designed.
Easy to change colors, photos and Text. I
hope and I believe that this Template will your

45% Time, Money and Reputation. Easy to


change colors, photos and Text. Get a
Your Text Here modern PowerPoint Presentation that is
beautifully designed. You can simply impress
You can simply impress your audience your audience and add a unique zing and
and add a unique zing and appeal to appeal to your Presentations.
your Presentations.
Get a modern PowerPoint Presentation that
is beautifully designed. Easy to change
75% colors, photos and Text. I hope and I believe
that this Template will your Time, Money and
Your Text Here Reputation. Get a modern PowerPoint
Presentation that is beautifully designed.
You can simply impress your audience
and add a unique zing and appeal to I hope and I believe that this Template will
your Presentations. your Time, Money and Reputation.
Infographic Style
Content Here
You can simply impress your audience and add a unique zing
and appeal to your Presentations. Easy to change colors,
photos and Text. Get a modern PowerPoint Presentation that
is beautifully designed.
01
Option Content Here

You can simply impress


Content Here your audience and add a
You can simply impress your audience and unique zing and appeal to
add a unique zing and appeal to your 02 04 your Presentations. Easy
Presentations. Easy to change colors, photos to change colors, photos
and Text. Get a modern PowerPoint Option Option
and Text. Get a modern
Presentation that is beautifully designed. PowerPoint Presentation
that is beautifully
designed.
03
Content Here Option
You can simply impress your audience and add a unique zing
and appeal to your Presentations. Easy to change colors,
photos and Text. Get a modern PowerPoint Presentation that
is beautifully designed.
Simple Portfolio Pre-
sentation Designed
ALLPPT Layout Clean Text Slide Get Modern
for your Presentation. Portfolio Presentation
Get a modern PowerPoint Presentation
that is beautifully designed. You can simply
impress your audience and add a unique
zing and appeal to your Presentations.

Get a modern PowerPoint Presentation


that is beautifully designed. You can simply
impress your audience and add a unique
zing and appeal to your Presentations.

Portfolio Presentation
Get Modern
Infographic Style

Your Text Here Your Text Here Your Text Here Your Text Here

Your Text Here Text Here Text Here Text Here Text Here

Your Text Here Content Content Content Content

Your Text Here Text Here Text Here Text Here Text Here

Your Text Here Content Content Content Content

Your Text Here Text Here Text Here Text Here Text Here

Your Text Here Content Content Content Content

Your Text Here Text Here Text Here Text Here Text Here
Infographic Style

Your Text Here Option A Option B Your Text Here


I hope and I believe I hope and I believe
that this Template that this Template
will your Time, will your Time,
Money and Money and
Reputation. Get a Reputation. Get a
modern PowerPoint modern PowerPoint
Presentation that is Presentation that is
beautifully Option A Option B beautifully
designed. designed.
We Create
Quality Professional Text Here
Easy to change
PPT Presentation colors.

Your Text Here


You can simply impress
your audience and add a
unique zing and appeal to
your Presentations.
Your Text Here
01 I hope and I believe that this Template will your Time, Place Your Picture Here And Send To Back
Money and Reputation .

Your Text Here


02 I hope and I believe that this Template will your Time,
Money and Reputation .

Your Text Here


03 I hope and I believe that this Template will your Time,
Money and Reputation .

Your Text Here


04 I hope and I believe that this Template will your Time,
Money and Reputation .
Infographic Style
85%
30% A I hope and I believe
that this Template will
1 your Time, Money and
I hope and I believe Reputation.
that this Template will
your Time, Money and
Reputation. B 50%
2
I hope and I believe
that this Template will
your Time, Money and
C Reputation.

3
Infographic Style
Content here
WEAKNESS Get a modern PowerPoint Presentation that is beautifully designed. hope and
I believe that this Template will your Time, Money and Reputation.
STRENGTHS You can simply
impress your
You can audience and add a
simply unique zing
impress your Content here
audience and Get a modern PowerPoint Presentation that is beautifully designed. hope and
add a unique
zing S W I believe that this Template will your Time, Money and Reputation.

O T
THREATS Content here
You can Get a modern PowerPoint Presentation that is beautifully designed. hope and
simply I believe that this Template will your Time, Money and Reputation.
OPPORTUNITIES impress your
audience and
You can simply
add a unique
impress your
zing Content here
audience and add a
unique zing Get a modern PowerPoint Presentation that is beautifully designed. hope and
I believe that this Template will your Time, Money and Reputation.
PORTFOLIO
PRESENTATION

PRESENTATION INFOGRAPHIC

 Get a modern PowerPoint Presentation that is


beautifully designed. Easy to change colors, photos
and Text.

 Get a modern PowerPoint Presentation that is


beautifully designed. Easy to change colors, photos
LOREM IPSUM DOLOR and Text.
SIT AMET,  Get a modern PowerPoint Presentation that is
CU USU AGAM beautifully designed. Easy to change colors, photos
INTEGRE IMPEDIT. and Text.
Infographic Style
Your Text Here Your Text Here Your Text Here Your Text Here

Text Here Text Here Text Here Text Here

Text Here Text Here Text Here Text Here

Text Here Text Here Text Here Text Here

Text Here Text Here Text Here Text Here

Text Here Text Here Text Here Text Here

Text Here Text Here Text Here Text Here

$ 1200 $1000 $600 $500


Infographic Style
Content Here
You can simply impress your audience and add a
1
unique zing and appeal to your Presentations. Easy
Content Here
You can simply impress your audience and add a
4
unique zing and appeal to your Presentations. Easy
to change colors, photos and Text. to change colors, photos and Text.

Content Here
You can simply impress your audience and add a
2
unique zing and appeal to your Presentations. Easy
Content Here
You can simply impress your audience and add a
5
unique zing and appeal to your Presentations. Easy
to change colors, photos and Text. to change colors, photos and Text.

Content Here
You can simply impress your audience and add a
3
unique zing and appeal to your Presentations. Easy
Content Here
You can simply impress your audience and add a
6
unique zing and appeal to your Presentations. Easy
to change colors, photos and Text. to change colors, photos and Text.
Place Your Picture Here And Send To Back

AWESOME SLIDE
Contents_Here
Example Text : Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that
this Template will your Time, Money and Reputation. You can simply impress your audience and add a unique
zing and appeal to your Presentations.

LOREM IPSUM
 Get a PowerPoint Presentation  Get a PowerPoint Presentation  Get a PowerPoint Presentation
DOLOR SIT AMET,  Get a PowerPoint Presentation  Get a PowerPoint Presentation  Get a PowerPoint Presentation
CU USU AGAM  Get a PowerPoint Presentation  Get a PowerPoint Presentation  Get a PowerPoint Presentation
INTEGRE IMPEDIT.  Get a PowerPoint Presentation  Get a PowerPoint Presentation  Get a PowerPoint Presentation
Infographic Style
Content Here

Content Here You can simply


impress your
audience and add a
Content Here You can simply unique zing and
impress your appeal to your
audience and add a Presentations. Get a
Content Here You can simply unique zing and modern PowerPoint
impress your appeal to your Presentation that is
audience and add a Presentations. Get a beautifully designed.
You can simply
unique zing and modern PowerPoint Easy to change
impress your
appeal to your Presentation that is colors, photos and
audience and add a
Presentations. beautifully designed. Text.
unique zing.

Simple PowerPoint Simple PowerPoint Simple PowerPoint Simple PowerPoint


Simple PowerPoint Simple PowerPoint Simple PowerPoint Simple PowerPoint
Infographic Style
You can simply impress your audience and add a unique zing and appeal to your Presentations. I hope and I believe that this
Template will your Time, Money and Reputation. Easy to change colors, photos and Text. Get a modern PowerPoint Presentation
that is beautifully designed. You can simply impress your audience and add a unique zing and appeal to your Presentations. I
hope and I believe that this Template will your Time, Money and Reputation.

Text Here 20% 35% 45%

Your Text Here 50% 30% 20%

Your Content Here 65% 20% 15%

Text 60% 15% 25%

Content Here 30% 40% 30%

Content 40% 20% 40%

You can simply impress your audience and add a unique zing and appeal to your Presentations. I hope and I believe that this Template will your Time,
Money and Reputation. Easy to change colors, photos and Text. Get a modern PowerPoint Presentation that is beautifully designed. You can simply
impress your audience and add a unique zing and appeal to your Presentations.
AWESOME
SLIDE
LOREM IPSUM
DOLOR SIT AMET,
LOREM IPSUM DOLOR SIT AMET,
CU USU AGAM INTEGRE IMPEDIT.

 Simple Portfolio Presentation


 Presentation
 Portfolio
 Simple Portfolio
 Portfolio Presentation
 Presentation
 Portfolio Presentation
 Simple Portfolio
Infographic Style
Content Here
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy
to change colors, photos.

Content Here Content Here


You can simply impress your audience and add a You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy unique zing and appeal to your Presentations. Easy
to change colors, photos. to change colors, photos.

Content Here Content Here


You can simply impress your audience and add a You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy unique zing and appeal to your Presentations. Easy
to change colors, photos. to change colors, photos.

Content Here
You can simply impress your audience and add a
unique zing and appeal to your Presentations. Easy
to change colors, photos.
Infographic Style

Content Here Content Here Content Here Content Here Content Here
You can simply You can simply You can simply You can simply You can simply
impress your impress your impress your impress your impress your
audience and add a audience and add a audience and add a audience and add a audience and add a
unique zing. unique zing. unique zing. unique zing. unique zing.

40% 60%
Text Here Text Here
Easy to change colors, Easy to change colors,
photos and Text. photos and Text.

Content Here Content Here


You can simply impress your audience and add a unique zing You can simply impress your audience and add a unique zing
and appeal to your Presentations. Get a modern PowerPoint and appeal to your Presentations. Get a modern PowerPoint
Presentation that is beautifully designed Presentation that is beautifully designed
Place Your Picture Here

Awesome Presentation
Simple PowerPoint
You can simply impress your audience and add a unique zing and appeal to your Presentations. Easy to change colors, photos and Text. Get a
modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation. You
can simply impress your audience and add a unique zing and appeal to your Presentations.

PowerPoint
Infographic Style
Your Text Here
Add Text
You can simply impress your audience and add a unique zing and appeal to your
Simple Presentations. Get a modern PowerPoint Presentation that is beautifully
PowerPoint designed. Easy to change colors, photos and Text.
Presentation
Your Text Here
You can simply impress your audience and add a unique zing and appeal to your
Presentations. Get a modern PowerPoint Presentation that is beautifully
designed. Easy to change colors, photos and Text.

Your Text Here


You can simply impress your audience and add a unique zing and appeal to your
Presentations. Get a modern PowerPoint Presentation that is beautifully
designed. Easy to change colors, photos and Text.
Add Text
Your Text Here
Simple
PowerPoint You can simply impress your audience and add a unique zing and appeal to your
Presentation Presentations. Get a modern PowerPoint Presentation that is beautifully
designed. Easy to change colors, photos and Text.
Infographic Style
Your Text Here
01
You can simply impress your audience and add a unique zing and appeal to
your Presentations. n D
ti o
Your Text Here
Op
02
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
i onC
t
Your Text Here Op
03
You can simply impress your audience and
add a unique zing and appeal to your
Presentations.
i onB
t
Op
Your Text Here
04
You can simply impress your
audience and add a unique n A
ti o
Op
zing and appeal to your
Presentations.
Column Get a modern PowerPoint Presentation that is beautifully designed. You
can simply impress your audience and add a unique zing and appeal to
your Presentations.

Style You can simply impress your audience and add a unique zing and appeal to your
Presentations. I hope and I believe that this Template will your Time, Money and Reputation.
Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors,
photos and Text. You can simply impress your audience and add a unique zing and appeal to
your Presentations. You can simply impress your audience and add a unique zing and
appeal to your Presentations. I hope and I believe that this Template will your Time, Money
and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. Easy to
change colors, photos and Text.

You can simply impress your audience and add a unique zing and appeal to your
Presentations. I hope and I believe that this Template will your Time, Money and Reputation.
Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors,
photos and Text. You can simply impress your audience and add a unique zing and appeal to
your Presentations.

You can simply impress your audience and add a unique zing and appeal to your
Presentations. I hope and I believe that this Template will your Time, Money and Reputation.

LOREM IPSUM DOLOR SIT AMET, CU


USU AGAM INTEGRE IMPEDIT.
Columns Style
We Create Example Text :
Get a modern PowerPoint Presentation
Example Text :
Get a modern PowerPoint Presentation
Quality Professional that is beautifully designed. You can simply
impress your audience and add a unique
that is beautifully designed. You can simply
impress your audience and add a unique
PPT Presentation zing and appeal to your Presentations.
Easy to change colors, photos and Text. I
zing and appeal to your Presentations.
Easy to change colors, photos and Text. I
hope and I believe that this Template will hope and I believe that this Template will
your Time, Money and Reputation. I hope your Time, Money and Reputation. I hope
Get a modern PowerPoint Presentation and I believe that this Template will your and I believe that this Template will your
that is beautifully designed. I hope and I Time, Money and Reputation. Easy to Time, Money and Reputation. Easy to
believe that this Template will your Time, change colors, photos and Text. I hope and change colors, photos and Text. I hope and
Money and Reputation. You can simply I believe that this Template will your Time, I believe that this Template will your Time,
impress your audience and add a unique Money and Reputation. Money and Reputation.
zing and appeal to your Presentations. Get
a modern PowerPoint Presentation that is
Example Text :
beautifully designed. You can simply
Get a modern PowerPoint Presentation
impress your audience and add a unique
that is beautifully designed. You can simply
zing and appeal to your Presentations.
impress your audience and add a unique
Easy to change colors, photos and Text. I
zing and appeal to your Presentations.
hope and I believe that this Template will
Easy to change colors, photos and Text. I
your Time, Money and Reputation. I hope
hope and I believe that this Template will
and I believe that this Template will your
your Time, Money and Reputation. I hope
Time, Money and Reputation. Easy to
and I believe that this Template will your
change colors, photos and Text.
Time, Money and Reputation. Easy to
change colors, photos and Text. I hope and
I hope and I believe that this Template will
I believe that this Template will your Time,
your Time, Money and Reputation.
Money and Reputation.
THANK YOU
Insert the Subtitle of Your Presentation
Fully Editable Shapes
Fully Editable Shapes

!
Fully Editable Icon Sets: A
You can Resize without
losing quality
You can Change Fill
Color &
Line Color

FREE
PPT
TEMPLATES
www.allppt.com
Fully Editable Icon Sets: B
You can Resize without
losing quality
You can Change Fill
Color &
Line Color

FREE
PPT
TEMPLATES
www.allppt.com
Fully Editable Icon Sets: C
You can Resize without
losing quality
You can Change Fill
Color &
Line Color

FREE
PPT
TEMPLATES
www.allppt.com

You might also like