Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
Windows Tutorial 5 Protecting Your Computer
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Learn how to protect yourself against common attacks
IT Security  .
Protect Your Computer Against Harmful Attacks!
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
HOW DO I KEEP MY COMPUTER SAFE?
Internet Safety and The Digital Divide
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Add problems that can occur from Internet use, to the diagram

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Viruses are programs that can infect a computer without the permission or knowledge of the user. They can damage the systems settings and memory, generating error messages and causing the computer to malfunction. Viruses can get on to your computer through: visiting certain websites opening s downloading attachments or content from the Internet using infected portable storage devices such as memory sticks, CDs, DVDs connecting to an infected hard disk. Internet Safety

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Extension Can you explain the difference between a Worm and a Trojan Internet Safety Write a list of guidelines, with explanations, to help protect a computer from viruses

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Knowledge Spyware Spyware is a computer program which is installed without permission, sometimes through a virus or sometimes as part of the installation of a program. It works by collecting information and sending it back to another source. The information collected could include the websites you have been visiting or what you have been downloading. This information is often used for marketing purposes, but can also be used for illegal purposes such as fraud. Cookies A cookie is a small fi le which stores information related to your Internet activity and then reports this back to the website server. Cookies are used legitimately by website creators to enable websites to be customised for individual users. For example, if you go on to the BBC website, you can customise the homepage, and the next time you visit the site the layout will appear as you have set it. However, cookies can cause problems such as pop-ups being generated or details like passwords stored which could be used by hackers.

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Knowledge cont: Spam Spam is all unwanted such as unsolicited commercial , unsolicited bulk and chain letters. Phishing Phishing involves sending a link via an to a website which looks like a genuine website (e.g. a bank website) but is in fact bogus. The recipient may be tricked into following the link and entering details such as bank passwords or personal information on the website. Hackers It is important to keep the information that is stored on your computer secure. Hackers are people who try to get access to your computer without your permission in order to steal information which they could use for malicious or criminal purposes. Using peer-to-peer (P2P) software could increase the risk of hackers accessing data stored on your computer. Identity theft This takes place when someone collects personal information about you and uses that information for malicious or criminal purposes. In the past, criminals used to rummage though bins to get information, but now people can access Internet social networking sites where peoples profiles contain personal information, which could prove valuable to the criminals. Identity theft is a growing problem.

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Computer safety – complete the following to learn ways of protecting yourself against the dangers associated with computer and Internet use Complete the gap-fill texts by entering the correct words in the gaps. 1 To protect your computer from spyware: *You need to be aware that free _____________ on the Internet may contain _______________ and you should always consider this before installing such programs on your computer. * Install anti-spyware software; this is sometimes included with _____________ software. spyware software anti-virus

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 2 To protect your computer from cookies: *Regularly ______________ your ______________ Internet files. *Change your Internet settings so they do not accept ____________ from all sites. delete temporary cookies

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 3 To protect your computer from spam: *Set _____________ to block mail or siphon off known spam s into a _________ mail inbox. *Alert your service _____________ to mail which you think is spam. *Do not display your ____________ where people can copy it and add it to a mailing list. * When signing up to online companies, make sure you ____________ of your details being passed on to third parties. junkprovideropt outaddressfilters

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 4 To protect your computer from hackers: *Install a ____________ to block unauthorised users. This software or device checks information to make sure it is permitted to pass. * Make sure the software you use is up to date: install ____________ which make the software more secure and prevent access to hackers. *If the computer is in a place used by other people, do not leave it ____________ when you are away from it. *When a computer is used by more than one person, use a ____________ set up with ____________ rights to certain areas and not others. Guest accountfirewalllogged onfixesaccess

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety 5 To protect your computer from identify theft: *Have a firewall to block _________ access. *Protect your personal information using _________. *Use a _________ to destroy paper documents with personal details. *Use software that writes over _________ files many times so that the files cannot be recovered. encryptionunauthorisedshredderdelete

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety Homework task Describe the possible threats involved in connecting a computer to the Internet and outline ways of avoiding them. 6 marks