Unit 4 IT Security.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Unit 11 Communication & Collaboration.  Identify different communication methods  Identify advantages of electronic communication  Identify common.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
All about viruses, hacking and backups By Harriet Thomas.
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Any criminal action perpetrated primarily through the use of a computer.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Internet Safety.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
What they are and how to protect against them
Hacking Computer crime and cyber security.
Malware and Computer Maintenance
Learn how to protect yourself against common attacks
links and attachments: Help stop malware from spreading
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
How to use the internet safely and How to protect my personal data?
Unit 4 IT Security.
How to build a good reputation online
Unit 11 Communication & Collaboration
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
What is it? Why do I keep getting from Barracuda? SPAM.
Stay Safe While Using The Internet
Computer Security.
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Unit 4 IT Security

Security issues that threaten systems Viruses-A virus is a simple program designed to cause harm to someone else's computer. A virus spreads by duplicating and attaching itself to other files. The extent of the damage depends on the virus Spyware-Spyware is software that is installed on a computing device without the end user's knowledge. Such software is controversial because even though it is sometimes installed for relatively innocuous reasons, it can violate the end user's privacy and has the potential to be abused. Spam-Spam means sending massive amounts of electronic junk mail that people haven't asked for. In legal terms it means to send 'unsolicited commercial email' This term is used because the vast majority of spam is sent in order to try and persuade you to buy something.

Security precautions to protect systems Viruses- install anti virus software, keep the anti virus software up to date so u don’t get any viruses, run regularly scheduled scans with anti virus software, keep your operating system current, secure your network so you don’t get viruses, think before you click, keep your personal information to yourself or keep it safe, don’t use open wi-fi and use multiple strong passwords Spyware-The key in all cases is whether or not you (or someone who uses your computer) understand what the software will do and have agreed to install the software on your computer. There are a number of ways spyware or other unwanted software can get on your computer Spam-Try to avoid opening spam emails and clicking on links in spam messages. ◾Don’t buy anything from a spammer. Not only do you risk comprising your security and infecting your computer with malware - viruses and so on - you also reward and encourage the spammers. ◾Don’t be tempted to reply. The mailbox is probably unread. ◾Don’t threaten the spammer. Some mails will be seen and spammers have rights too. Threatening messages could expose you to legal action. ◾Avoid ‘unsubscribe’ options. Cynically, spammers often include an ‘unsubscribe’ link. Far from removing the menace, clicking it will confirm that your address is active and probably attract even more spam. ◾Use a disposable email address. You could use this account especially for buying online or writing to newsgroups. If you find that you are getting a lot of spam at this address, you can simply delete it and set up another

How to protect yourself Firewalls-firewalls these can be either hardware , software or both. A firewall can be told to block certain traffic (such as all emails and suspect IP address) or only to allow certain traffic(such as from a single, trusted device), blocking everything else Passwords-to protect yourself the password must be impossible to guess. When it comes to passwords, it’s obvious that the human brain functions entirely different than a computer. A password like a3Jfi9nC looks complicated and therefore you might think it were secure. Infact, this password could be cracked within a mere 2 hours on average laptop hardware. Securing hardware-you can get a Norton app on your computer to stop it from getting viruses and spams

Backing up data Why back up data? You would backup data by using a hard drive or installing a system and then you would select all of your apps you have downloaded and store them in your hard drive so if anything gets deleted on your computer you will have back up in your hard drive How to securely back up data someone can keep all the data safe using a fire safe so you don’t lose the information all at once. You can also back up your data to the cloud, this is a strategy for backing up data that involves removing data offsite to a managed service provider for protection.

Being Safe online How can we be safe online? We can be safe online by making sure what you are doing, we can also be safe on apps we use like social media such as making sure there are no spams and viruses however passwords and usernames are important because you have to use strong passwords but not your names and birthdates. To be safe you will need to install a anti virus app to make sure you keep all your apps safe from getting a virus. If you lose information in school you can get it back by asking the technicians because they save the information onto their computer so if you lose it they can get it back for you