Presentation is loading. Please wait.

Presentation is loading. Please wait.

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.

Similar presentations


Presentation on theme: "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson."— Presentation transcript:

1 GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson

2 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. Viruses are security issues that may threaten system performance. A virus is a code that can copy itself and naturally has a harmful effect, such as corrupting the system or destroying data. An example of this is MyDoom. MyDoom began appearing in inboxes in 2004 and then became the fastest spreading worm to the web, beyond previous records set by the Sobig worm and ILOVEYOU. To get rid of a computer virus you enter safety mode on your computer, disconnect the computer from the internet, download a malware scanner and then finally run a scan with Malwarebytes. You shall always pay attention to the ‘warning’ signs that appear on the internet. Spyware is a security issue that may threaten data. Spyware is software that allows a user to get hidden information about someone else's computer activities by transmitting data secretly from their hard drive. To remove spyware you shall install an antispyware program and also check programs for items that do not belong to your computer. Spam is also a security issue that may threaten data. Spam is irrelevant messages sent over the internet which advertise websites and products. To remove spam you should create a Gmail account. Then Click the Spam link along the left side of any Gmail page, click the message you’d like to delete and then select delete all spam pages now.

3 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Phishing is collecting information on someone's online bank and credit card. Emails are then sent to claim to be from reputable companies. To prevent phishing you shall be alert for spam messages, only communicate personal information over the phone or to a website you know it is factually secure, avoid using emails on public computers, use security programs to protect your pc and finally you shall check your financial statements regularly. To have a strong password is important because it is less likely for people to hack into any of your accounts. This is because it is not easy to guess. An example of a strong password is to use numbers, lowercase letters and capital letters(Y0uRnaM3.) Also do not share your password with others. It is dangerous to leave your computer logged on because if someone was ever to get hold of the computer then they could possibly send false information claiming to be yourself to others. To prevent this, always log off or lock your account before leaving a device you are logged into.

4 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. It is important to have an individual password which gives only yourself access to your accounts. This is so that nobody else can gain access to your accounts. A backup file is keeping your files safe. We back up files just in case of any viruses or memory loss of a computer. When you back up your files, you pictures, financial and personal information, music, and all of your important data on your computer will never be lost. If you have a large network with many servers and workstations, you should consider a network area storage. You should backup at least once a week. Firewalls are used to protect systems. This minimises security risk by blocking unauthorised access. A firewall is something that the user of the computer is responsible for checking and installing. A firewall is also something that controls the internet traffic coming into and flowing out of your business.

5 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. Data needs to be backed up simply because something could accidently be deleted, hard disks could fail and there could also be a disastrous issue which leads to the device with the information on breaks. You should backup weekly. To back up your files in more than one space is important because there is a possibility that one of your other back up files could get damaged/lost. For an example, in a house fire.


Download ppt "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson."

Similar presentations


Ads by Google