1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Network System Security - Task 2. Russell Johnston.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
What they are and how to protect against them
3.6 Fundamentals of cyber security
CYBER SECURITY...
Network security threats
Cyber Security By: Pratik Gandhi.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
Teaching Computing to GCSE
Computer Technology Notes 5
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
Viruses and Virus Protection
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Internet Safety and The Digital Divide
Unit 4 IT Security Kerris Davies.
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
WJEC GCSE Computer Science
Technology Mrs. Huddleston
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
INTERNET SECURITY.
Presentation transcript:

1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the risks • Show understanding of the Internet risks associated with malware, including viruses, spyware and hacking • Explain how anti-virus and other protection software helps to protect the user from security risks

Prep and lesson Find the best story about hacking

Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the risks We have looked at a number of cases that highlight what has been done. Fraud for financial gain Blackmail Identity theft Data theft eg: stealing others property/ privacy. One way to remember what could happen is think of the computer misuse act Unauthorised access to a computer Unauthorised access to a computer to edit, corrupt or delete files. Unauthorised access to a computer with illegal intentions.

What methods are available to help minimise the risks Firewall – creates a secure area behind it. A firewall is software that will block unexpected connections coming in to the network. Most operating systems include a firewall. Anti virus software – must be up-to-date Passwords and usernames (Access levels) – difficult and changed Https and HTTP (encryption). Public and Private key Acceptable Use Policy (AUP).

Show understanding of the Internet risks associated with malware, including viruses, spyware and hacking Malware - or malicious software, is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses and spyware Viruses. – Self replicating program that may corrupt or delete data. Spyware - software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Hacking – Unauthorised access to a computer (Computer misuse act) Interesting story about the computer misuse act.

Explain how anti-virus and other protection software helps to protect the user from security risks. Anti-virus: What does it do. Look at Norton website. Spam filters AUP.

Question David has installed anti-virus software on his computer. (a) State three tasks carried out by anti-virus software. Task 1 ....................................................................................................................................... ................................................................................................................................................... Task 2 ....................................................................................................................................... Task 3 ....................................................................................................................................... [3]

Answer Any three from: Scans files for viruses // detects/identifies a virus Can constantly run in background Can run a scheduled scan Can automatically updating virus definitions Can quarantine a virus Can delete a virus Completes heuristic checking Notifies user of a possible virus

Question David is still concerned that his computer might get infected by a computer virus. State three other ways in which David can reduce the risk of his computer getting a computer virus. 1 ................................................................................................................................................ ................................................................................................................................................... 2 ................................................................................................................................................ 3 ................................................................................................................................................

Answer Any three from: Use a firewall Use of a proxy server Do not use / download software / files from unknown sources Do not share external storage devices / USB pens Do not open / take care when opening attachments / link Do not connect computer to network / use as stand-alone computer Limiting access to the computer

Question

Answer

Question

Answer

Question 4 (a) State what is meant by the term SSL. .................................................................................................................. .............................[1]

Answer secure sockets layer − encrypts data being transmitted − use of https − use public and private keys

Question

Answer

Question (a) Viruses, pharming and phishing are all examples of potential Internet security issues. Explain what is meant by each of these three terms. Virus ........................................................................................................................ Pharming .......................................................................................................................... Phishing ......................................................................................................................... [6]

Answer (a) virus any two from: – program/software that replicates/copies itself – can delete or alter files/data stored on a computer – can make the computer “crash”/run slow pharming – malicious code/software installed on a user’s hard drive/actual web server – this code redirects user to a fake website (without their knowledge) – to obtain personal/financial information/data phishing – legitimate-looking emails sent to a user – as soon as recipient opens/clicks on link in the email/attachment … – … the user is directed to a fake website (without their knowledge) – To obtain personal/financial information/data