Security Risks Todays Lesson Security Risks Security Precautions

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
Threats To A Computer Network
Viruses & Destructive Programs
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Edexcel GCSE Cyber security threats Computer Science 1CP1
3.6 Fundamentals of cyber security
IT Security  .
Security Risks Malware (Malicious software)
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
COMPUTER VIRUSES Computer Technology.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Internet Safety and The Digital Divide
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
WJEC GCSE Computer Science
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Security Risks Todays Lesson Security Risks Security Precautions Spyware, Phishing & Keylogging Online fraud, Identity Theft DOS (Denial of Service) attacks Hacking Viruses, Worms & Trojans Security Precautions Anti-virus software Passwords/Encryption Biometrics Security Protocols and Firewalls Use of Security Suites

Security Risks A computer system is secure if it is not able to be accessed by an unauthorised person and not affected by malware Malicious software – software deliberately created to disrupt a computer system or gain illegal access to it in order to gather information Malware includes viruses, worms, Trojans, spyware, adware and keylogging software. Security precautions can be taken to protect against malware

Security Risks Spyware Spyware programs gather information about you from your computer, for example which websites you visit This data can be used to target you with specific marketing Spyware can also interfere with normal operation of a computer by changing setting such as disabling anti-virus software or firewalls

Security Risks Phishing An attempt to trick someone into giving away personal information using the internet Pretending to be a well-known company or bank for example Techniques: email, text message, telephone calls, social engineering

Delete all suspicious emails (without reading them) and texts Delete all suspicious emails (without reading them) and texts. Don’t call any numbers. Don’t give out personal information to an unsolicited caller.

Security Risks Keylogging software Keystroke logging or keylogging software is a program that records user’s key presses and is often used to steal passwords, credit card numbers etc There are many legal uses, for example during testing of software or monitoring employees productivity or for police investigations Can be used by criminals to gather usernames, passwords, PINS or other sensitive information

Security Risks Online Fraud Online fraud or internet fraud – using the services of the internet to defraud people of money or carry out identity theft Many different types: Paying for goods that are never received Supplying bank or personal detail to help someone move money between accounts Q1 2012 – online fraudsters traded 12 million pieces of personal information

Security Risks Denial of Service (DOS) attacks A DOS attack is designed to cause problems on a network so that legitimate users cannot access resources, for example their online bank account The attack involves sending so many requests to a host computer (e.g. a companies web server) that it cannot respond to legitimate requests

Security Risks Denial of Service (DOS) attacks In some cases, a DOS attack can crash the affected computer particularly if the attack includes malware DDOS (Distributed DOS) attack takes place when many different computers carry out a DOS attack against a single host computer. More difficult to defend against.

VIDEO

Hacking Hacking is gaining unauthorised access to a computer system and is usually illegal It is a crime under the Computer Misuse Act Black hats – skilled hacker who hacks illegally White hats – skilled hacker who hacks for legal purposes such as testing the security of a companies own computer systems

Security Risks Viruses A piece of code that attaches itself to programs, makes copies of itself and destroys your system Ways of spreading Downloaded from a website Opened up from an email attachment Infected backing storage device Across local network Symptoms of a virus Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason Data loss Computer restarting randomly Unwanted emails generated

Security Risks Worms Trojans A program that finds gaps in your security, creates copies of itself and floods your system with unwanted data Trojans A program that appears as if it is carrying out a helpful task, for example, defragmenting your hard disk You download it thinking it is carrying out a harmless task and it causes harm, for example, deleting files or adding unwanted toolbars

Security Risks Virus activation Some viruses will start doing damage as soon as the program they area attached to is run Some viruses wait for a specific action to take place on the computer – a logic bomb Some viruses wait until a specific date and time before doing their damage – a time bomb

Security Risks ‘I Love You’ virus An example of all three (virus, worm and Trojan) Trojan: it comes disguised as a ‘Love Letter’ when it is carrying a harmful program Virus: it infects files, turning them into new Trojans Worm: copies itself by sending itself to everyone in your email address book

VIDEO

Security Precautions Anti-virus software A program that protects a computer against attack or infection by malware Has a database of known viruses The anti virus software compares sections of code to this database to identify and destroy viruses Most anti-virus software downloads virus database updates automatically

Security Precautions Passwords A list of characters that stops people accessing your data Disadvantages You can forget them Programs have been created that can test billions of different passwords each second, eventually guessing yours!! https://howsecureismypassword.net/

Security Precautions Encryption Biometrics Putting data into a code before transfer The hacker cant understand the data without having the key to decipher the code Biometrics Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition E.g. new Passports

Security Precautions Security Protocols A rule or agreement set up between the sender and receiver of data Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are 2 examples SSL and TLS both use encryption

Security Precautions Firewalls A program designed to prevent unauthorised access to or from a private network Checks all data coming in and out of a network The firewall decides which packets of data are allowed through to the destination address

Security Precautions Security suites Groups of programs used to block threat to your computer Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters Parental control

Assessment task: games review You need to produce: Inputs/Processes/Outputs Annotated design of user interface (a sketch of the form with labels) Design of the program in suitable design notation (pseudocode) Program code with comments Test Data A screenshot of a test run Evaluation – does the program do what it is supposed to do? How could it be improved

Test Data

Pseudocode