Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Section C Threats to Data.
POSSIBLE THREATS TO DATA
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Data Security GCSE ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
8 – Disaster and Malicious Attack Planning and Recovery
3.6 Fundamentals of cyber security
IT Security  .
Big Picture Consider this How many online threats might you be faced with a day?
Teaching Computing to GCSE
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Prepared By : Binay Tiwari
HOW DO I KEEP MY COMPUTER SAFE?
Encryption and Hacking
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Threats To Data 30 Threats To Data 30

Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats Other Malware Computer Viruses Phishing Accidental Damage Hackers

Threats To Data 30 A company’s network security can be breached by people who take a random opportunity, such as an unattended PC Just lock the machine – CTRL/Alt/Del Opportunity Threats

Threats To Data 30 Viruses are malicious programs designed to replicate and spread across a computer or a network to damage or corrupt files & data So be clear: a virus is a program Viruses

Threats To Data 30 Other Malware GoodBad BenignMalign Malicious

Threats To Data 30 Malware is the general name for several other types of malicious software Examples are Trojans, worms, adware and spyware These are all nasty kinds of software that aims to cause damage to files or to steal data Other Malware

Threats To Data 30 Means when criminals use fake s or fake websites They trick people into clicking links and then entering their personal data, such as bank passwords The cyber-criminals then obtain money by fraud and identify theft. Phishing

Threats To Data 30 Phishing Criminal now has personal details eg bank password Some fooled so they open fake s & click links 2 Fake site also looks real so people enter personal details & click Submit 3 4 Send masses of fake s 1

Threats To Data 30 Accidental Damage

Threats To Data 30 Accidental Damage So accidental damage can be cause by natural disasters, such as freak weather causing a flood or an earthquake But accidents can also happen that affect the data For example, an untrained user could delete important files

Threats To Data 30 People who try to gain unauthorised access to a computer or a network. A high proportion of hackers are people who actually work for an organisation But there are many different types Some hackers just do it for the challenge of breaking through security But there are also cyber-criminals… Hackers

Threats To Data 30 Hackers Intercept packets Called ‘packet sniffing’ Can collect passwords etc

Threats To Data 30 Hackers That’s why it’s called ‘drive by’ hacking! So home networks need password that’s strong

Threats To Data 30 Hackers Malicious Software Program Malware Get Personal Details eg Passwords Harm Computer eg Delete files Cyber Criminals

Threats To Data 30 Threats To Data 30

Threats To Data 30 Threats To Data 30