Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
SECURITY CHECK Protecting Your System and Yourself Source:
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
INTERNET SAFETY FOR STUDENTS
Spyware & Internet Security
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Security Issues: Phishing, Pharming, and Spam
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Protecting Yourself Online (Information Assurance)
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Protecting Your Computer & Your Information
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Reliability & Desirability of Data
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1. Self Awareness You should only access your accounts and private informations from a safe location (only at home as necessary if at all possible) where.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Protecting Your Identity: Information Security Basics Presented by:Barbara D. Kissner SVP & CIO International Fidelity Insurance Company March 18, 2014.
Internet Safety Internet Safety LPM
What is Spam? d min.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Activity 4 Catching Phish. Fishing If I went fishing what would I be doing? On the Internet fishing (phishing) is similar!
Internet safety By Suman Nazir
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
An Introduction to Phishing and Viruses
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
I S P S loss Prevention.
Cyber Security By: Pratik Gandhi.
Spyware & Internet Security
Cybersecurity Awareness
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
9 ways to avoid viruses and spyware
What devices use the internet?
Presentation transcript:

Keeping Information Safe Task 4

Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself Try to use a mix of letters and numbers or upper and lower case if the password is case sensitive Do not tell other people your password

Pets name Where you live Someone’s name Random mix of letters and numbers

Types of Spyware Malware – Collects information from your computer and passes it back to a 3 rd party Adware – Software which displays unsolicited adverts; often linked to spyware Trojan Horse – a type of malware which hides behind a desired software program Dialers – can be used to link your computer to a premium line telephone number

Internet Security Do not put all your personal details on internet sites eg facebook When using websites look for the internet security padlock Be aware that pop ups are a common way of getting you to link to a virus or malware

Internet Security Use sites that you know about and can check their security Check the ULR matches the site you are viewing ml

Phishing Most commonly an stating your account Information needs updating Watch for URL’s that are numeric or different from the link you clicked on Best thing to do is to type in the URL (Uniform Resource Locator) and check your account directly without following any links in the Many legitimate s no longer contain a link (Paypal)

Example of a Phishing

security Do not respond to unsolicited s asking for personal details. If you receive an unknown with an attachment delete without opening the attachment If an offers you a deal that seems too good to be true it invariably will be so delete it

Your computer Ensure that you have up to date virus software, ideally with links to get regular updates Make sure that your firewall setting are correct and providing the levels of protection you need If you have a wireless network make sure it is password protected