Presentation is loading. Please wait.

Presentation is loading. Please wait.

IT Security for Users By Matthew Moody.

Similar presentations

Presentation on theme: "IT Security for Users By Matthew Moody."— Presentation transcript:

1 IT Security for Users By Matthew Moody

2 1.1 Security issues that may threaten system performance
A weak password is easy access for hackers because they can just guess your password instead of hacking into it. If your in a work space and hackers get into your computer they can get access to your personal documents. A strong password consists of numbers/caps and if you have extremely important information in a document you should set a password for it. Viruses can get hold of passwords, documents and personal information. Trojans and worms are the most common viruses these viruses delete documents and get your personal information. It also makes your computer run slowly. You need to get a anti virus software on your computer e.g. Norton and MacAfee Spam could threaten your computer. Spam normally has adware, spyware and malware. Phishing and pharming are also associated with spam. Phishing is where a ad has a virus on a website and it gets your information from your computer. Pharming is where you get redirected to a legit looking website and it will take all of your personal information. To protect yourself from this don’t click on links from people you don’t trust. Adware slows down your computer because it sees what you search and it gives you ads that keep popping up.

3 1.2 Security precautions to protect IT systems and data
Firewalls protect your data from unauthorised access (hackers trying to get into your computer) and it doesn't let the hackers into your computers. Firewalls prevent hackers from getting your personal information and documents. Anti virus software's are extremely useful because when a virus is downloaded onto your computer the anti virus software puts the virus in a place where it can not harm your computer. Anti virus software's do weekly security checks and antivirus software's need updating often

4 1.3 the threats to system and information and integrity
Hacker – A hacker is a person who creates viruses and try's to steal your information. Hackers use things like Trojan, worms and spam. To protect yourself from hackers install a antivirus software and enable firewall in your settings. Virus - A virus is a software which is designed by a hacker to get your personal details from your computer also a virus poses as a reliable software which you can trust until you download it. Viruses normally corrupt/delete files and get your information e.g. contacts and bank details Zombie – In computer science, a zombie is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious taks of one sort or another under remote direction.

5 1.4 keeping information secure and manage personal access to information sources securely
Locking your pc is important because if you do not lock your pc someone could go onto your computer and look at your personal information and work/school work and they could change your documents or delete them. In a company this could get you fired or you could fail your course work. Setting a password on a folder The first screenshot shows me setting my document to read only this makes it so the user can not edit my work. The second document shows me setting a password on a document this makes it so I can only use this document.

6 1.4 keeping information secure and manage personal access to information sources securely
Backing up my work to a USB or DVD – this is important because if you only have 1 copy of your work and it corrupts you have lost that document forever so its important to make 2 or 3 copies of your work because if 1 file corrupts you still have the other copies.

7 1.5 ways to protect hardware, software and data and minimise security risk
Make sure that there is a firewall in operation between their computer and the internet. Make sure you have a good password that no one knows and that has good strength (Caps, numbers, symbols etc…) Make sure your data is backed up regularly onto a DVD or USB. Make sure your computer is in a secure place where no one can take it.

8 1.6 apply guidelines and procedures for the secure use of IT
In school our parents sign the acceptable users policy which is a contract to make sure that we use the internet and appropriately (no games/ ing people your not supposed to). We have to keep our passwords safe so no one else can log into my computer. In a company employees would do a similar thing and also follow company rules/guidelines on using the computer in a appropriate way for example strong passwords, correct use of ( etiquette), not using computers inappropriately (playing on games or personal use like shopping online)

9 1.7 why is it important to backup data and how to do it securely
If your computer breaks or is stolen and you haven’t backed up your data you have lost that work which in a company an get you fired so its important to back up your data to DVD, USB or external hard drives. For a business backing up data is vital as the data my contain customer details. If this is lost it could cause your company to fire you or go bankrupt. I backup my data onto a USB and most companys use external hard drives. School backs up my data on a daily basis but students should backup there data onto cloud (onedrive), USB, DVD or external hard drives because if they loose GCSE work they could fail there course.

10 1.8 select and use effective backup procedures for systems and data
The school backups our data everyday then the files are put in a fire proof safe. At school we use one drive (cloud) to back up our data. The cloud is useful because we can access one drive anywhere and you can backup lots of data onto one drive. Students can bring in USB’s, DVD’s and external hard drives so we can have a copy as well. I use one drive and a USB to backup my data so I don’t loose my GCSE work.

Download ppt "IT Security for Users By Matthew Moody."

Similar presentations

Ads by Google