1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Cyber-Safety Instructors: Connie Hutchison & Christopher McCoy.
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
SECURITY CHECK Protecting Your System and Yourself Source:
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Security Awareness Presenter: Royce Wilkerson.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
IT Security for Users By Matthew Moody.
Stay Safe & Secure Online. Outline Passwords Everyday Security Security Physical Security Protecting Personal Information.
1.1 System Performance Security Module 1 Version 5.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
Malicious Attack Corporate Awareness and Walk through Date 29 September 2011.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Manjit kaur Manjit Kaur1. Why do we need to protect our computer from a virus? A reason why we need to protect our computer from a virus is because it.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
A Quick and Easy Crash Course Internet Safety for Everyone.
STOP.THINK.CONNECT™ A NATIONAL CYBERSECURITY AWARENESS CAMPAIGN Protecting Yourself and Your Family Online.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Avoiding Frauds and Scams Barbara Martin-Worley Director, Consumer Fraud Protection 18 th Judicial District Attorney’s Office Serving Arapahoe, Douglas,
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Have a Safe Shopping Online Experience. Did You Shop Online Today?  Anything you need today is available online. Whether it’s groceries, jewellery, clothes,
Outline of this module By the end of this module, you will be able to: Understand what is meant by the term “advanced fee fraud”; Understand what is.
Internet Safety.
Unit 4 IT Security.
Home Computer Security
Cybersecurity Awareness
CYBERSAFETY & Personal information
Presentation transcript:

1

Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to computer security; Understand the consequences of not having a secure computer; Know what to do to secure your computer and its contents; and Know who to contact if you think the security of your computer has been breached. 2

Important information A copy of this presentation and the accompanying training booklet are available for download at: 3

Meet Beryl and Alan

Getting started… Why do you think it is important to protect the security of your computer? 5

An awareness of computer security There are several ways that the security of your computer can be broken: Malware Identity Crime Fraudulent s Unsecured Networks However, each of these can be overcome with a few simple steps. 6

Malware Short for “malicious software”, malware is designed to disrupt the normal running of your computer. Malware comes in many forms, each with a different purpose. Malware can be downloaded from an attachment or through visiting a compromised website. You might not know your computer is infected. 7

Identity crime Identity crime is the unauthorised use of your personal details, to commit fraud or other crimes. One of the most common types of identity crime is the use of stolen credit card details to purchase goods or services. People store a lot of personal information on their computers, therefore it is important to protect this. 8

Fraudulent s These types of s will appear in your inbox and can look genuine. They might come from your bank or another organisation that you do business with and ask you for personal information. They might also come as an with an attachment, which if opened, will infect your computer with malware. 9

Unsecured networks Many people have wireless networks at home which allows more than one person to access the internet at the same time. If this network is not secured, then anyone can use the internet connection, and use the internet download allowance as well as be able to access whatever information is stored on the computer. 10

Revision questions 11

Revision questions 12

Revision questions 13

How well did you do?

How to protect your computer There are several strategies which can help you protect your computer. By following these simple steps, you will greatly reduce the likelihood that your computer security is broken. 15

10 steps to protect your computer 1)Use antivirus protection and have an active firewall Install and regularly update antivirus protection and a firewall. Regularly scan your computer and back up data. 2)Regularly update your software Update software, as newer versions will fix weaknesses and problems in earlier versions. 16

10 steps to protect your computer 3)Never reply to an with personal details Fraudulent s will not always be obvious. Personal details should be guarded in the same way as money. Talk to someone if you are unsure of an . 4)Use a strong password Try to use different passwords, that contain at least 8 characters and a combination of letters, numbers and symbols. 17

10 steps to protect your computer 5)Use an filter An filter can automatically delete fraudulent s before they reach your inbox. However, just because an is in your inbox, doesn’t mean it isn’t fraud. 6)Avoid clicking on links in s Clicking on links in s from people you don’t know can take you to an infected website and allow malware to download on your computer. 18

10 steps to protect your computer 7)Avoid opening attachments attachments may seem harmless but they can have malware in them, which once opened will infect your computer. Always scan an attachment before opening it. 8)Secure your own network and use a firewall This will only allow authorised people to access your network and your internet connection. 19

10 steps to protect your computer 9)Avoid using public unsecured networks Wherever possible, use your own secured network, which you can control. If using a public network, avoid doing things like internet banking. 10) Surf safely The internet is a great resource, but try to stick to reputable websites, particularly when giving personal information (such as credit card details). 20

If your computer is not secure… There are steps you can take if you think your computer security has been broken. Don’t panic or ignore it! 1) Malware Scan your computer with antivirus protection. 2) Personal details compromised Contact relevant agencies to cancel accounts or change passwords. 21

Reporting Fraud You can report fraudulent s to the Australian Communications and Media Authority via at: You can report cybercrime to the Australian Cybercrime Online Reporting Network (ACORN): 22

Conclusion The internet has great benefits in terms of communicating, doing business and being entertained. By following the 10 steps outlined in this presentation, you should be able to enjoy the internet in a confident and safe manner! 23

Revision scenario 24

Revision scenario 25

Revision scenario 26

Questions?

Further information… For more information about other modules in this series: For more information about reporting cybercrime: For more information about online security issues: or For more information about computers and technology: 28