Technical Implementation: Security Risks

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
Security, Privacy, and Ethics Online Computer Crimes.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Any criminal action perpetrated primarily through the use of a computer.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
Internet Safety.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
What they are and how to protect against them
An Introduction to Phishing and Viruses
Misuses of ICT Malpractice and crime © Folens 2008.
Security Risks Malware (Malicious software)
Unit 4 IT Security.
Lesson 3 Safe Computing.
Cyber Security By: Pratik Gandhi.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Technology Mrs. Huddleston
Lesson 2- Protecting Yourself Online
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Technical Implementation: Security Risks National 4 viruses, worms, trojans hacking National 5 phishing, keylogging (hardware and software), virus, online fraud, identity theft anti-virus software good password settings Biometrics firewalls Security Precautions

What is a secure computer system? A computer system is secure if it: cannot be accessed by unauthorised person not infected by malicious software malware is software that disrupts the operation of a computer system allows illegal access to a computer system

Why are these security risks a problem? We use computers for everything: private email messages online shopping – card details on your computer organisations store your personal and private details on computers

Virus copies (replicates) itself to infect other programs or computers needs human activity to spread – file must be run or opened in order to infect a computer system viruses attach themselves to other programs to ensure this happens

Worm does not need to attach itself to another program transmits copies of itself to other computers using networks some worms only spread and do nothing else – they disrupt by consuming network bandwidth and storage space

Trojan a program that appears safe but has a virus or worm hidden inside disguises itself as another type of file, even as an anti-virus program! e.g. download a game, program or picture and when you run the file the virus or worm infects your computer

When does a virus strike? malware may not affect your computer system straight away may wait for a specific date before activating – time bomb a specific action to take place – logic bomb why wait? more systems can be affected before discovery

How viruses spread sharing infected optical discs (CD or DVD) or flash memory between computers creating optical discs or using flash memory on an infected computer email attachments across networks downloads

Virus effects (what a virus can do) corrupted or lost files and data displaying unwanted messages unusual images or sounds played rebooting/restarting unexpectedly generation of spam emails denial of service attacks

Hacking hacking is gaining unauthorised access to a computer system – usually illegal a crime under the Computer Misuse Act Black Hat Hacker who uses their skills illegally – often for money, respect or for a political cause White Hat Hacker who uses their skills to break into computer systems for legal purposes such as testing security of computer systems

Keylogging recording every key that is pressed without the user knowing may be software or hardware used illegally by criminals to get sensitive data like account numbers and PINs used legally to help test programs, monitor employee’s productivity

Phishing an attempt to get you to give away personal information criminals pretend to be a well known company or bank how: email, text message, telephone calls, social engineering

What was wrong with that email? no username ‘account will terminated’ – an attempt to get you to do it asap bad grammar and missing full stops click here – cannot see hyperlink address Go to the official website by typing it into the address bar or doing a search for it. Avoid clicking on links through e-Mail.

Online fraud online fraud (internet fraud) is the use of internet services to defraud people of money or to carry out identity theft lots of different types including: paying for goods which never arrive supplying bank or personal details to a stranger e.g. ‘I am a prince from <country>, please send your bank account details so I can send you £50 million …’

Anti-virus Software a software application which protects against infection by viruses and other malware detects and removes viruses before they spread further or do damage needs a connection to the internet to download updates to help protect against new viruses

Anti-virus Software always running so has an impact on system performance checking: files from the internet programs and data you are using optical discs and flash memory email attachments

Passwords a user identity and password allow controlled access to computer systems passwords should be strong

Passwords strong password: at least 8 characters long contain at least: 1 upper-case (A-Z) AND 1 lower-case character (a-z) 1 number (0-9) 1 special character (‘!@*&%$£ etc) no more than three repeating characters (111) or ordered characters (567)

Passwords to prevent a keylogger stealing passwords, some websites now ask you to select random characters from your password you don’t type so the keylogger cannot record it

Biometrics biometrics use your physical characteristics or behaviour to identify you to a computer physical characteristics: finger prints palm prints face recognition eye scans – retina or iris

Biometrics behavioural characteristics: how you walk voice recognition signature

Biometrics Advantages more secure than a password or card which can be lost or stolen difficult to forge some biometrics (e.g. fingerprints)

Biometrics Disadvantages physical danger e.g. cut hand/finger off you cannot get new data if stolen or tampered with

Firewalls a system to prevent unauthorised access to or from a private network rules and conditions specify what information is blocked and what is allowed to pass through

Firewalls hardware firewall software firewall can be built into a router has no effect on computer performance protects the whole network software firewall always running so may impact computer performance if on your PC protects only that PC