IT Security for Users By Matthew Moody.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
1.1 Identify security issues that might threaten system performance. Charlie is aware that having a slow computer can be incredibly irritating, especially.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
1.1 Identify security issues that might threaten system performance.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
We are here to tell you how to keep you’re computer clear of all bad things. Without a doubt it will help a true Brownie will take all this on board!
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 4 IT Security.
Risk of the Internet At Home
Computer Security.
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

IT Security for Users By Matthew Moody

1.1 Security issues that may threaten system performance A weak password is easy access for hackers because they can just guess your password instead of hacking into it. If your in a work space and hackers get into your computer they can get access to your personal documents. A strong password consists of numbers/caps and if you have extremely important information in a document you should set a password for it. Viruses can get hold of passwords, documents and personal information. Trojans and worms are the most common viruses these viruses delete documents and get your personal information. It also makes your computer run slowly. You need to get a anti virus software on your computer e.g. Norton and MacAfee Spam could threaten your computer. Spam normally has adware, spyware and malware. Phishing and pharming are also associated with spam. Phishing is where a ad has a virus on a website and it gets your information from your computer. Pharming is where you get redirected to a legit looking website and it will take all of your personal information. To protect yourself from this don’t click on links from people you don’t trust. Adware slows down your computer because it sees what you search and it gives you ads that keep popping up.

1.2 Security precautions to protect IT systems and data Firewalls protect your data from unauthorised access (hackers trying to get into your computer) and it doesn't let the hackers into your computers. Firewalls prevent hackers from getting your personal information and documents. Anti virus software's are extremely useful because when a virus is downloaded onto your computer the anti virus software puts the virus in a place where it can not harm your computer. Anti virus software's do weekly security checks and antivirus software's need updating often

1.3 the threats to system and information and integrity Hacker – A hacker is a person who creates viruses and try's to steal your information. Hackers use things like Trojan, worms and spam. To protect yourself from hackers install a antivirus software and enable firewall in your settings. Virus - A virus is a software which is designed by a hacker to get your personal details from your computer also a virus poses as a reliable software which you can trust until you download it. Viruses normally corrupt/delete files and get your information e.g. contacts and bank details Zombie – In computer science, a zombie is a computer connected to the internet that has been compromised by a hacker, computer virus or Trojan horse and can be used to perform malicious taks of one sort or another under remote direction.

1.4 keeping information secure and manage personal access to information sources securely Locking your pc is important because if you do not lock your pc someone could go onto your computer and look at your personal information and work/school work and they could change your documents or delete them. In a company this could get you fired or you could fail your course work. Setting a password on a folder The first screenshot shows me setting my document to read only this makes it so the user can not edit my work. The second document shows me setting a password on a document this makes it so I can only use this document.

1.4 keeping information secure and manage personal access to information sources securely Backing up my work to a USB or DVD – this is important because if you only have 1 copy of your work and it corrupts you have lost that document forever so its important to make 2 or 3 copies of your work because if 1 file corrupts you still have the other copies.

1.5 ways to protect hardware, software and data and minimise security risk Make sure that there is a firewall in operation between their computer and the internet. Make sure you have a good password that no one knows and that has good strength (Caps, numbers, symbols etc…) Make sure your data is backed up regularly onto a DVD or USB. Make sure your computer is in a secure place where no one can take it.

1.6 apply guidelines and procedures for the secure use of IT In school our parents sign the acceptable users policy which is a contract to make sure that we use the internet and email appropriately (no games/emailing people your not supposed to). We have to keep our passwords safe so no one else can log into my computer. In a company employees would do a similar thing and also follow company rules/guidelines on using the computer in a appropriate way for example strong passwords, correct use of email (email etiquette), not using computers inappropriately (playing on games or personal use like shopping online)

1.7 why is it important to backup data and how to do it securely If your computer breaks or is stolen and you haven’t backed up your data you have lost that work which in a company an get you fired so its important to back up your data to DVD, USB or external hard drives. For a business backing up data is vital as the data my contain customer details. If this is lost it could cause your company to fire you or go bankrupt. I backup my data onto a USB and most companys use external hard drives. School backs up my data on a daily basis but students should backup there data onto cloud (onedrive), USB, DVD or external hard drives because if they loose GCSE work they could fail there course.

1.8 select and use effective backup procedures for systems and data The school backups our data everyday then the files are put in a fire proof safe. At school we use one drive (cloud) to back up our data. The cloud is useful because we can access one drive anywhere and you can backup lots of data onto one drive. Students can bring in USB’s, DVD’s and external hard drives so we can have a copy as well. I use one drive and a USB to backup my data so I don’t loose my GCSE work.