Unit 4 IT Security Kerris Davies.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Computer security Viruses Hacking Backups
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
The Simple Side of Computer Security for The Brownies That Like To Read!!
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
STAY SAFE!! Don’t fall for the same old tricks !!.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Shreya Houji. VirusesViruses.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
What is Spam? d min.
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Managing Windows Security
What they are and how to protect against them
Unit 4 IT Security.
Lesson 3 Safe Computing.
Contact Norton Support Canada for Firewall Issues.
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Stay Safe While Using The Internet
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Unit 4 IT Security Kerris Davies

Security issues that threaten systems Viruses A virus is designed to spread from one document to another document and also has the ability to copy itself onto other documents. A virus does not have the capability to copy itself without a host cell. Spyware Spyware contains sensitive data. An example of this is card numbers, passwords ect. Spam Spam is receiving a large amount of irrelevant emails. An example of this is a company promoting a product.

Security precautions to protect systems By doing software updates this will prevent new viruses being made. Scanning files will check for any unauthorised changes in files which could become a threat to any unprotected files on your computer system. By having a anti virus spyware monitor on your computer for threats that could corrupt your computer system

How to protect yourself Firewalls A fire wall is a program or hardware that helps you to identify viruses, worms and hackers that will try and take over your computer system/ software by doing this over the Internet. A fire wall will protect your laptop from any viruses from taking over your laptop, causing your laptop/computer to become corrupted. Sometimes, firewalls are installed already onto your computer system Password You need to ensure that you have a strong password in order to make sure that your account is protected in order to make sure that it limits the chances of your account to get hacked. It is a good idea to make sure that you have different passwords for different websites because if one of your accounts does get hacked, then the hacker will not be able to access any of your other accounts because the password is different. Securing hardware These are some ways on how to securing hardware, install a firewall onto your computer system. You can also install an antivirus software and install and anti – spyware software in order to protect your computer. By using different passwords this will protect your accounts from hackers. You can also check your security settings on your web browser in order to keep your accounts protected.

Backing up data You should back up your data as this will make sure if you lose any data, you will be able to access the information again. You should have duplicates of your work, just in case you lose a copy. Data backups is a good storage device for security by making regular backup files it should be stored in fireproof safes. To prevent spam you should make your accounts private and personal to prevent from websites sending a lot of spam. You can prevent spam by not giving your email out to unknown websites that could be a potential threat. Or you can create an email address that is not for your personal use, when using unknown or untrustworthy websites that could cause viruses on your computer system.

Being Safe online We can be safe online by making sure that your passwords are very strong and different for each website in order to prevent hackers from accessing your accounts. Also by installing a anti virus software on your laptop, this will prevent any viruses from corrupting your laptop.