Cyber Security Lesson Quarter 1.

Slides:



Advertisements
Similar presentations
Section C Threats to Data.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Protecting Yourself Online (Information Assurance)
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
IT security By Tilly Gerlack.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Security Issues, Ethics, & Emerging Technologies in Education
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
 Introduction to Computing  Computer Programming  Terrorisom.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
HOW TO PREVENT IDENTITY THEFT ONLINE TIPS 1.WATCH OUT FOR PHISHING WEBSITES.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
INTRODUCTION & QUESTIONS.
Digital Citizenship Project Justin Lann. Netiquette Netiquette on Social Media Sites – A set of social conventions that facilitate interactions over networks.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Cyber Security and Computer Safety
Safety.
Securing Information Systems
(Title Slide) Your Photoshop collage will eventually go here.
Internet Safety Guidelines October 3, 2016
DIGITAL CITIZENSHIP What You Should Know!.
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Personal spaces.
Big Picture Consider this How many online threats might you be faced with a day?
Network security threats
Cyber Security By: Pratik Gandhi.
Securing Information Systems
Teaching Computing to GCSE
Cybersecurity Awareness
Risk of the Internet At Home
Staying safe on the internet
Cyber Security and Computer Safety
Internet Safety Vocabulary
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Prepared By : Binay Tiwari
Computer Security.
Bethesda Cybersecurity Club
Networking for Home and Small Businesses – Chapter 8
ICT Communications Lesson 3: Internet Life and Privacy
CYBERSAFETY & Personal information
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Privacy, Security, and Ethics
Presentation transcript:

Cyber Security Lesson Quarter 1

Why is Cyber Security Important? SAFETY: Themselves Physical/Mental Harm Personal information Identity theft Company information Projects

Examples of Risks Spam Virus Passwords Malware Rogue Security Software Trojan Horse Malicious spyware Phishing

What you should do: ALWAYS logout of all computers. NEVER assume something is safe. Keep passwords keep it unique with special characters & Secure. Do not post ANYTHING online that you wouldn’t want the WHOLE world to know. If it is online, it's’ fair game Keep personal information secure: Address, phone number, S.S., etc…

Cybersecurity Workforce Common Jobs Available: Security Analyst Security Engineer Security Architect Security Administrator Security Software Developer Cryptographer/Cryptologist Cryptanalyst Chief Information Security Officers Security Consultant/ Specialist Very Specialized Roles: Intrusion Detection Specialist Computer Security Incident Responder Source Code Auditor Virus Technician Ethical Hacker Vulnerability Assessor

Resources http://burning-glass.com/wp- content/uploads/Cybersecurity_Jobs_Report_2015.pdf https://www.dhs.gov/homeland-security-careers/dhs-cybersecurity https://www.nsa.gov/ http://www.cyberdegrees.org/jobs/