Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Any criminal action perpetrated primarily through the use of a computer.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
An Introduction to Phishing and Viruses
Unit 4 IT Security.
Lesson 3 Safe Computing.
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012

By the end of this session: All of you would be able to explain how viruses affect computers. Most of you should understand how your identity can be stolen through phishing and spyware applications. A few of you could explore other threats to data security, e.g. hacking, and actions that can be taken to minimise risks.

Viruses Some viruses (or malware) try to gain entry to your computer in a similar way by pretending to be something else. For example, that screensaver you downloaded or game you played may have a virus contained with it. These viruses are sometimes called Trojan Horses. Worms are viruses which attach themselves to files on your computer. Infected files then spread the virus as the worm attaches itself to other files on the system. File sharing websites can often be a source of viruses. Avoid sharing illegal file-sharing sites and scan any programs downloaded from the Internet.

How can I protect myself? Use a virus scanner to scan any files you download from the Internet or other computers. Regularly scan your computer’s hard drive for viruses. Keep your virus definitions up-to-date.

Identity Theft Phishing s pretend to be another company in order to extract personal information, such as passwords, from users. The asks you to click a link which takes you to a fake website and then enter your password (which is then stored by the phishers.) Spyware hides on your computer and records everything you do and passes it on to criminals. They can then steal your identity and pretend to be you – this is called “Identity Theft”

How can I protect myself? Check the link shown in the matches the website you go to when clicked. Legitimate s often use personal data, e.g. first name, which Phishers don’t have access to. Never give out your password details on any website unless you are 100% sure it is the official website. If in doubt check the received with the company before divulging any information. Scan your computer regularly for spyware. Use firewalls to prevent unauthorised communication from your computer.

Your Task Create a poster to raise aware of data security threats. Your poster should: – Explain the risk – Give advice on how to minimise the risk Extra Challenge: Explain why every computer should have a firewall installed. When you buy something online, how is the debit/credit card data kept secure?

Peer Review of Posters Look at the poster of the person sitting next to you. Is it fit for purpose? – Does it explain at least one of the data security threats? – Does it provide advice to minimise the risks? – Does it stand out? Clear writing? Identify 2 good things about the poster (2 stars *) and one area for improvement (1 wish) Identify 2 good things about the poster (2 stars *) and one area for improvement (1 wish)