Cambridge Technicals Unit 12 P3 -Security risks.

Slides:



Advertisements
Similar presentations
QR Codes Real-world links or hardlinks Real-world links or hardlinks.
Advertisements

Web 2.0 Programming 1 © Tongji University, Computer Science and Technology. Web Web Programming Technology 2012.
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Pedagogic planning tools E-Learning Design Staff Development Day 28 June 2007.
Internet Safety At Home and School With thanks to.
What can you learn about the web site information from the URL?
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
E-safety and Internet Awareness Hanbury C of E First School.
Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
ILT and Functional Skills Staff Training & Development May 2012 Nathalie Stirland.
an Internet bookmark acts as a marker for a Web site.
A Report by Kaleb Noggle. Mac OS X Leopard Who and when it was developed How does it differ from other OS How it is used in the work place Recommended.
Staying Safe Online Stephan Freeman. Increasing numbers of people on social networking sites More and more people leading their lives online Varying degrees.
LO4 - Be able to create websites
TOPIC LEARNING BTEC Level 3 Unit 30 Graphics L01- All students will understand the role of a number of pieces of hardware in the creation of graphics (P)
1 Energy Conversion Project Create an energy conversion poster with at least 3 conversions(academic) or 4 conversions (honors) using any example. (For.
ICT iGCSE.  You should be able to describe the use of Internet developments such as:  Web 2.0  blogs  wikis  digital media uploading websites  social.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
0-1 Team # Status Report (1 of 4) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team #: Team Name.
0-1 Team # Status Report (1 of 4) Client Contact –Status Point 1 –Status Point 2 Team Meetings –Status Point 1 –Status Point 2 Team Organization –Description.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
 A cookie is a piece of text that a Web server can store on a user's hard disk.  Cookie data is simply name-value pairs stored on your hard disk by.
Market Research. Marketing Intern Project Goal: – By the end of this unit, you will develop an effective marketing research study for a mobile phone company.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
OCR Nationals Technological Innovation and E-Commerce Unit 8.
Unit 12 LO3 Be able to design websites
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
WEB SCIENCE. What is the difference between the Internet and the World Wide Web? Internet is the entire network of connected computers and routers used.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
UNIT 12 P3 – SECURITY PROTECTION MECHANISMS Cambridge Technicals.
The Microsoft Computing Safety Index 1. Background Microsoft’s objective: Quantify consumer perceptions of Internet safety, security and privacy Construct.
 Introduction to Computing  Computer Programming  Terrorisom.
OCR Nationals ICT – Unit 4 Task 1 Task Overview You will be evaluating 3 different interactive multimedia products and looking for aspects that you may.
Topic 5: Basic Security.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
CLOUDS. Online applications What is cloud computing Common, Location-independent, Online Utility on Demand Common implies multi-tenancy, not single or.
Web Design. What is the Internet? A worldwide collection of computer networks that links millions of computers by – Businesses (.com.net) – the government.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Unit 4 – Design and produce multimedia products AO1 – Review existing interactive multimedia products Mr S Farmer.
Describe the potential of IT to improve internal and external communications By Jim Green.
2 pt 3 pt 4 pt 5pt 1 pt 2 pt 3 pt 4 pt 5 pt 1 pt 2pt 3 pt 4pt 5 pt 1pt 2pt 3 pt 4 pt 5 pt 1 pt 2 pt 3 pt 4pt 5 pt 1pt Internet History Computer Networks.
MIS323 – Business Telecommunications Chapter 10 Security.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
The Internet Salihu Ibrahim Dasuki (PhD) CSC102 INTRODUCTION TO COMPUTER SCIENCE.
Computer Security Keeping you and your computer safe in the digital world.
Exam questions. LO1 Understand the purpose and content of pre-production.
Chapter-04 Building an Ecommerce Website. Building an E-commerce Site: A Systematic Approach The two most important management challenges in building.
Introduction to Internet Programming (Web Based Application)
Understanding the principles of website development
Technologies and Applications
Network security threats
ICT Communications Lesson 1: Using the Internet and the World Wide Web
E-Commerce Security Policy
Little work is accurate
Unit 13: Website Development
Reliable vs. Unreliable Web Sources
Starter What is identity theft?
Creative iMedia R081 Pre-Production
Credible Research Sources
LO1 - Know about aspects of cyber security
Presentation transcript:

Cambridge Technicals Unit 12 P3 -Security risks

P3 Hacking Hacking This document will provide you with information about what is meant by “hacking”. Write a brief explanation in your words aimed at someone who has little experience of the internet.

P3 Pagejacking, phishing, identity theft These are three ways that users can be exploited over the internet. For each one: Explain how it works Give advice to users about how to avoid being “caught” by this method

P3 Viruses Write a clear definition of a computer virus. These links may help: http://en.wikipedia.org/wiki/Computer_virus http://www.microsoft.com/en-gb/security/pc-security/virus-whatis.aspx http://www.ust.hk/ccst/antivirus/general/whatis.html Write THREE pieces of advice to users about how to avoid getting infected by a computer virus.

Cambridge Technicals Unit 12 M1 -Security risks

M1 Assessing security At Merit level, you need to find two examples of each of the following types of website: E-commerce (e.g. http://www.amazon.co.uk) Promotional (e.g. http://www.food.gov.uk/policy-advice/hygieneratings/toolkit/) Educational (e.g. http://www.bbc.co.uk/schools/) You are going to look at different aspects of these sites and compare them.

M1 Aspects to consider Client and user needs Multimedia features Interactive features Accessibility features Security features Set out your work in any way you wish, but make sure that you include all the aspects listed above.

M1 User side and server side Look at the purpose and features of each site. What demands will the content and features of the site make on: the server supplying the website? The computer or device used to view the website?

M1 Innovative content and improvements For each site, describe: Any of the content you feel is innovative Any improvements you could suggest.

Unit 12 D1 –impact of website security breaches on society Cambridge Technicals Unit 12 D1 –impact of website security breaches on society

D1 Website breaches You will need to research FIVE cases of website breaches taken from the three categories listed above: E-commerce Promotional Educational For each one, you need to write about: What the threat was; The impact on society; How the threat was resolved

D1 Possible examples As a starting point, search for these: The Heartland Breach (e-commerce) SalesGate.com breach (e-commerce) Ferris State’s online security breach (educational) University of York in student data breach (educational)