Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.

Similar presentations


Presentation on theme: "Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT."— Presentation transcript:

1 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20131 Threats to data security

2 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20132 Computer virusesTrojans WormsPhishing PharmingSpyware AdwareHacking Denial of Service attacksPhysical threats Businesses such as supermarkets must make sure that the data they hold is kept safe and secure. The security of data can be threatened by: Threats to data security

3 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20133 A computer virus is a computer program that can replicate itself and spread itself from one computer to another. Computer viruses can: damage files; amend files; copy files; delete files. Using regularly updated anti-virus software can check a computer system for viruses and remove most viruses. Most anti-virus software will check any incoming files for viruses and stop the virus infecting the computer system. Computer viruses

4 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20134 A trojan often appears to be software that is wanted or needed by the user of a computer system, but is really a standalone malicious program designed to take control of the PC. It can steal data from the PC and send it to another user. trojan Trojans An up-to-date security program or anti-virus software will block most trojans.

5 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20135 A worm is a standalone malicious program designed to replicate itself and spread to other computers over the internet.worm Worms can cause harm to networks merely by consuming the bandwidth and slowing down the network for other users. Worms

6 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20136 PhishingPhishing is the attempt to obtain information such as personal details of passwords, account numbers or credit card details by pretending to be a trustworthy source and fooling the user into giving the details away. Users should always be on the lookout for suspicious emails or messages which ask users to enter e.g. passwords or credit card details when replying to the message.suspicious emails or messages Many companies such as Microsoft provide help on recognising phishing.Microsoft provide help on recognising phishing Phishing

7 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20137 PharmingPharming is an attempt to redirect the user to an alternative website so that the user will enter their details. The details are then stolen and used for fraud. Pharming attempts are common and new ones are being set every day. Up-to-date details can be found on Scamwatch. Scamwatch. Pharming

8 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20138 SpywareSpyware is malicious software that collects information about users without their knowledge. The information is logged and sent to other users so that personal details such as passwords can be stolen. Spyware such as key loggers can also be used to record keystrokes to send to other users, or to monitor the activity of the user. Spyware

9 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 20139 AdwareAdware automatically shows adverts and promotions for goods or services on the screen of a computer. Most adware is harmless, but some may contain spyware or other viruses. Mostly, adware is considered to be just an annoying nuisance to the user. Adware

10 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 201310 Hacking is finding out the weaknesses in a computer system and exploiting those weaknesses. Hacking is not necessarily illegal, as a hacker might be attempting to gain access after losing a password or in an attempt to test the security of a system.hacker Hacking without authorisation or permission is illegal under the Computer Misuse Act. Hacking

11 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 201311 A denial of service attack A denial of service attack attempts to make a computer system unavailable to users and to prevent it from carrying out its proper activities. High-profile web sites or services are attacked by protesters or malicious attackers to draw attention to issues they may have with the provider. A denial of service attack can be attempted by bombarding the business server with more attempts at access than it can manage, so that legitimate users cannot gain access or the server stops working. Server Internet User Attacker No access Denial of Service attacks

12 Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 201312 The theft of computer components such as hard disks, USB memory sticks, CDs or DVDs where data is stored can lead to the loss of data. Physical threats to data Burglars and thieves stealing computers or laptops, laptops left on buses or trains, and dropped or misplaced USB memory sticks are all ways of losing data.


Download ppt "Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT."

Similar presentations


Ads by Google