Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.

Slides:



Advertisements
Similar presentations
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Advertisements

Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
OV Copyright © 2011 Element K Content LLC. All rights reserved. System Security  Computer Security Basics  System Security Tools  Authentication.
Data Security GCSE ICT.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
BUSINESS B1 Information Security.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Shreya Houji. VirusesViruses.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Ethics. Ethics are the principles and standards we use to decide how to act.
How to protect your computer By: Emily, Jackie and Kathleen.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
IT in Business Issues in Information Technology Lecture – 13.
Hackers And Hacking.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Computer security By Isabelle Cooper.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Chap1: Is there a Security Problem in Computing?.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Brownie Girl Guides Guide to Computer Security Part1 Confused with viruses? Look no further and listen then ;)
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Computer threats, Attacks and Assets upasana pandit T.E comp.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Security Issues & Ethics in Education By Maud Mushayamunda.
Information Systems Design and Development Security Precautions Computing Science.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access to computer systems.

Ways hackers use to invade the computer system n 1. Tapping Information theft can tap into communication line and steal the data without interrupting the sending and receiving of data. SENDER RECEIVER Communication media (e.g. network/ telephone line) HACKER ADD The message “ADD” is duplicated by the hacker.

To overcome this problem, we can use data encryption method to help us because it is hard or even impossible to impose a physical protection or password during this process. Data Encryption n Data are usually encrypted before sending and decrypted upon receiving. A method of converting a meaningful message into an encrypted form which does not carry any meaning.

Example: Given the encrypted form is HKK. Knowing this key. Change every letter in the message to another one. SENDER RECEIVER Communication media (e.g. network/ telephone line) HKK ADD HKK

2. Denial of Service Definition: A prevention of the use of information resources either intentionally or unintentionally, which affects the availability of the information resources. n Hackers send large amount of meaningless messages or to target. n Make the server not able to react with large amount of information at the same time. n Computer may react very slowly and cause the service to stop.

3. Change/ Delete information in a web site. 4. Transmit computer virus or infected programs through . (e.g. I Love You) 5. Unauthorized use of others password and access user’s information without permission.

Data Protection Methods n 1. Use password that is hard to guess. n 2. Install anti-virus software. n 3. Install firewall software. n 4. Use encryption whenever possible