IT security By Tilly Gerlack.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Primary Threats to Computer Security
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Information Security Sharon Welna Information Security Officer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Internet Safety Internet Safety LPM
What is Spam? d min.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
IT Security  .
Unit 4 IT Security.
Personal spaces.
Lesson 3 Safe Computing.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

IT security By Tilly Gerlack

Threats

Data Theft Data theft is a problem where people are stealing information. Office workers have a better chance of committing a theft of data because they have access to the computers and usernames and passwords. Data theft is a term used to describe when information is illegally copied or taken from a business or an other individual.

Unintentional threats An example of unintentional threats is deleting data by accident. People do this all the time in offices and at work and make changes by accident.

Phishing Phishing is where you receive an email that looks like it is safe and from a company you know which asks you to click on a link and enter your username and password. This information is then collected by hackers who will then be able to get into your account.

Viruses Email viruses: Email viruses are able to spread more quickly than traditional viruses. They are send via email and get sent without the user even knowing. Worms: these are pieces of code that use computer networks and security holes to copy the original virus and make their way through networks. Trojan horse: A Trojan Horse pretends to be a regular downloadable program, such as a game. It will then damage your computer and can make it unusable. Malware: malicious software is what Malware means and this is a form of virus Spyware: spyware is a software that lets a user spy on someone else’s computer and can watch everything they do or type.

Hacking What is hacking? Someone who hacks is a clever programmer as it is not easy to hack. It is someone who logs into another hardrive illegally. They identify data from the computer and can copy, change or delete it.

Spam Spam is an email which is sent without the receivers permission. It can be linked with a virus. This is usually sent to a number of users. This could also be a phishing email.

Public WIFI Public Wi-Fi is a danger to your mobile or computer. It is unsafe because people can hack into your mobile or computer with the use of your Wi-Fi, they can track you and view your history and what you are viewing at the time. You have access to their usernames and passwords. To prevent fraud of your mobile or computer make sure you are using the hotspot of where you are. People make a WI-FI account in the same name so people connect to it thinking you are using the original one; not the copied.

An action to be aware of the danger of hacking, phishing and viruses. Precautions An action to be aware of the danger of hacking, phishing and viruses.

Hacking To prevent and be aware of hacking keep all your bank details and data private, never give out private information to anyone unless it is a safe website such as Lloyds bank. Always check on the web address and check if it is the original one; if you are not sure contact the web address by phone number or email.

Viruses To prevent getting viruses never click on a link or web page sent to you or a ‘pop up’. They are designed for specific operating systems for example: One that is designed for windows wont work on IOS. You should always install anti-virus software and keep it up-to-date.

Phishing To prevent phishing scams be cautious of received emails from unknown and unrecognised addresses. Look for a sign that the site is secure such as a lock icon on the browser’s status bar or a “https” or “URL”

Secure passwords Here are examples of weak passwords and strong passwords: PILCHER X Pilcher123 X P! 1cH3r876 You need a variety of characters (8 or more) More than one number Add symbols such as: (!-_) - Having a long password is more secure than having a short password.

Firewalls All networks have firewall, some are hard ware and some are software. The firewall is built into a Wi-Fi box for example.

Back- up data You need back- up data to prevent your computer from getting viruses, malwares and threats. Using back- up re-ensures your computer to keep files and documents safe. You can set up automatically or manually back up for your data. At school the IT staff back up everyday at 7am and 1pm.

Anti- virus software Anti-virus software protects you from: Viruses Hacking Spyware Phishing You have to renew your software and update it, this is because there are is an increase in viruses every year, by updating you have less of a chance of getting threats.

Public WIFI To prevent Wi-Fi network fraud make sure you are updated with an anti-virus software and firewall, this will block the identity of fraud. If you are on a public network be aware that it’s not someone who has used a ‘copycat’ network, when doing online banking and using your email make sure it is a safe network such as your home hotspot; not a public network.

Education It is important to educate people about security threats because it makes people aware of the problems and helps them watch out for any scams.