GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
What is it? Why do I keep getting from Barracuda? SPAM.
Computer Security.
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. Viruses are security issues that may threaten system performance. A virus is a code that can copy itself and naturally has a harmful effect, such as corrupting the system or destroying data. An example of this is MyDoom. MyDoom began appearing in inboxes in 2004 and then became the fastest spreading worm to the web, beyond previous records set by the Sobig worm and ILOVEYOU. To get rid of a computer virus you enter safety mode on your computer, disconnect the computer from the internet, download a malware scanner and then finally run a scan with Malwarebytes. You shall always pay attention to the ‘warning’ signs that appear on the internet. Spyware is a security issue that may threaten data. Spyware is software that allows a user to get hidden information about someone else's computer activities by transmitting data secretly from their hard drive. To remove spyware you shall install an antispyware program and also check programs for items that do not belong to your computer. Spam is also a security issue that may threaten data. Spam is irrelevant messages sent over the internet which advertise websites and products. To remove spam you should create a Gmail account. Then Click the Spam link along the left side of any Gmail page, click the message you’d like to delete and then select delete all spam pages now.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Phishing is collecting information on someone's online bank and credit card. s are then sent to claim to be from reputable companies. To prevent phishing you shall be alert for spam messages, only communicate personal information over the phone or to a website you know it is factually secure, avoid using s on public computers, use security programs to protect your pc and finally you shall check your financial statements regularly. To have a strong password is important because it is less likely for people to hack into any of your accounts. This is because it is not easy to guess. An example of a strong password is to use numbers, lowercase letters and capital letters(Y0uRnaM3.) Also do not share your password with others. It is dangerous to leave your computer logged on because if someone was ever to get hold of the computer then they could possibly send false information claiming to be yourself to others. To prevent this, always log off or lock your account before leaving a device you are logged into.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. It is important to have an individual password which gives only yourself access to your accounts. This is so that nobody else can gain access to your accounts. A backup file is keeping your files safe. We back up files just in case of any viruses or memory loss of a computer. When you back up your files, you pictures, financial and personal information, music, and all of your important data on your computer will never be lost. If you have a large network with many servers and workstations, you should consider a network area storage. You should backup at least once a week. Firewalls are used to protect systems. This minimises security risk by blocking unauthorised access. A firewall is something that the user of the computer is responsible for checking and installing. A firewall is also something that controls the internet traffic coming into and flowing out of your business.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. Data needs to be backed up simply because something could accidently be deleted, hard disks could fail and there could also be a disastrous issue which leads to the device with the information on breaks. You should backup weekly. To back up your files in more than one space is important because there is a possibility that one of your other back up files could get damaged/lost. For an example, in a house fire.