One of the main problems with computer systems is the threat of viruses, spyware and other things that may harm the system. If not careful, malicious websites.

Slides:



Advertisements
Similar presentations
A Guide to INCTR s Portal Enhancing international communication in the service of global cancer control.
Advertisements

Downloading and Installing WinID3 Dental Training Module I Richard M. Scanlon, D.M.D.
Windermere Photo Gallery A Walkthrough of What’s New.
Grade 6 Hopewell Elementary You will read each slide, then try to think of the answer. When you think you know the answer, click ONCE on the mouse.
Thank you to IT Training at Indiana University Computer Malware.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Cloud Computing Part #3 Zigmunds Buliņš, Mg. sc. ing 1.
OAAIS Enterprise Information Security Security Awareness, Training & Education (SATE) Program or UCSF Campus VPN.
Computer Referbishment The Demonstration. To Do… Virus Protection Schedule A Full System Scan Install Service Pack 3 Clean Up Tools Drive Formatting Install.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Format Scandisk Defragmentation Antivirus Compression Software
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Adobe Forms THE FORM ELEMENT PANEL. Creating a form using the Adobe FormsCentral is a quick and easy way to distribute a variety of forms including surveys.
Validation and Verification
Chapter 15 Designing Effective Output
Unit 1 – Improving Productivity Instructions ~ 100 words per box.
Computer Basics.  Be sure to check with your school’s Network Administrator and/or Handbook before you make changes to your school computer.
HINARI/Basic Internet Concepts (module 1.1). Instructions - This part of the:  course is a PowerPoint demonstration intended to introduce you to Basic.
SLIR Computer Lab: Orientation and Training December 16, 1998.
COMP 4923 Green IT audit for Registrar’s Office John, Michael, Sarah.
Level 2 IT Users Qualification – Unit 1 Improving Productivity
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
Staying Safe Online Keep your Information Secure.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
By Ksenia Primizenkina 8K
PC Maintenance How to keep your computer healthy.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Katie.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer security By Shreya Houji. VirusesViruses.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Unit 12 Additional Evidence catelyn. 1.1 I can describe what types of information are needed. For the business card, I included the name of the company.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
240-Current Research Easily Extensible Systems, Octave, Input Formats, SOA.
By Hyrum Wines  2. Anti-spyware: A spyware is a program which collects private information and sends it to its programmer. Spywares are considered.
Software. A web site is a collection of web pages on a particular topic. A web page is a document written in HTML code. Web pages are linked together.
INTERNET SAFETY FOR KIDS
Legal Issues Legal issues include copyright / intellectual property infringements, libel / defamation, disability discrimination and data protection. Any.
Budgeting Tool Brandon Ganch Chris George Paul Perello Mike Schmidt.
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
VIRUS.
Computer Skills and Applications Computer Security.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
This poster has been designed to act as a customisable template. You do not have to use this template but it might be a useful starting point. The poster.
Ⅰ. PS Driver ML-4050N Series PostScript, Driver ML-4050N Series PostScript, Driver.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
W elcome to our Presentation. Presentation Topic Virus.
for all Hyperion video tutorial/Training/Certification/Material Essbase Optimization Techniques by Amit.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Erica Larnerd COSC Spyware...  What is it?  What does it do?  How does it get on my computer?  How can I tell if it’s on my computer?  What.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Desktop Publishing Lesson 1 — Working with Documents.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
By: Brett Belin. Used to be only tackled by highly trained professionals As the internet grew, more and more people became familiar with securing a network.
Unit 4 IT Security.
How to Get Rid of Online Threats Impacting your Computer Device?
Topic 5: Communication and the Internet
Presentation transcript:

One of the main problems with computer systems is the threat of viruses, spyware and other things that may harm the system. If not careful, malicious websites can steal personal information and use these against anyone. This will be a major problem with our system if not well protected, since this data has to be extremely confidential and sensitive. These kinds of attacks are generally referred to as “Cross- site Scripting” or “XXS”. It can be very difficult to be sure that the system is not vulnerable to these sorts of attacks.

Different anti-virus software available for some protection against these are as follows: Anti-Virus SoftwareWindowsMacLinuxUnix AVG Anti-Virus Clam Anti-Virus F-Prot Kaspersky Anti-Virus Linux Shield Norton Anti-Virus PC Tools Anti-Virus The anti-virus software that we choose to use will of course depend on the operating system that we decide to run this system with. This is because certain anti-virus software is designed only for the use of certain operating systems and not so good for the protection of others. This is just a small sample of the list of all the available anti-virus software available.

Spyware is also a major issue of malicious use of the system, the anti-spyware available are: Ad-Aware Spybot Search and Destroy PC Tools Spyware Doctor This again is just a small sample of the spyware software that is available to protect our system. It is very important to have anti-spyware because all of the information that will be stored in our system must remain confidential and no-one without granted access should be able to access this system.

Malicious use could also mean physical damage to our main server containing the information from our system. There are such measures needed to be taken into consideration to protect against this too. Measures such as: ONLY authorised access to the room containing the server should be allowed. Possibly in an always locked room. Possibly extra security measures around the actual server including bars or a glass wall around it to stop people getting to it. These aren’t as important as the anti-virus and anti-spyware software, but is another malicious way the system can be affected and these are ways to stop this.

The obvious way of preventing this system to be used incorrectly is to make sure that only authorised personnel can access this system, and they must be trained in order to use. Each authorised person should be provided with a password that only they are entitled to know, which would stop any other people accessing this data externally.

PDFs are very ideal for forms and such data, which our system could make good use of, with all the information held. Specialised fonts are better used on PDFs which means more scientific symbols available for some sets of healthcare data could make using a PDF to present the data a useful option. The images presented are of high resolution images on a small file format. Large PDFs can take a long time to load, which can be frustrating for clients if they need the data quick. The user must have Adobe Reader plug-in installed on the computer in order to access the information. Not all machines will be able to use this which means that there could be a problem with some clients trying to access the data but can’t. PDF documents are usually formatted to print vertically, the monitor of most machines are wider and print horizontally. This would make inconvenience because of the extra scrolling.

More fit for purpose for graphics. Meaning this would be the best choice for displaying graphs to represent the data. Can add note pages. More attractive than a PDF. This is not essential but this is the best option if we decide to make our system colourful, etc. Takes up quite a lot of disk space. This is not good because disk space can be expensive; meaning the cost of the project would cost more if using this way to present the information to the client. Takes longer to load than a PDF. Lots of software conflicts because of different types of PowerPoint applications. Microsoft PowerPoint presentations may not work on other versions.

These are a small selection of graphs that we could use to present the results to the client. It’s just a brief description of what they show and why we’d use them. This is the basic chart used to compare results based on some sort of count. It can be used to clearly see the largest of the results and also the smallest. This is another way of comparing different results of a particular subject. This can be used to see quickly, how much of the total, one of the “topics” contains. It is also better looking, graphically than a bar chart and is more commonly used to represent data that is similar to the data we will hold.

This is a different type of graph used for a different purpose as to the other two. The main purpose it so find a correlation between two sets of data to see if one has an affect on the other. This could be used in our case for example with people with a certain condition, and compare it with potential causes, and thus if there is a positive correlation, we can then deduce the cause of a particular condition. Positive Correlation – As both the x and y axis are increasing, this would mean that one has a direct impact on the other. For example, something related slightly to our case would be number of people with cold, and number of people walking in wet weather that week would have a positive correlation because wet weather could cause a cold. Negative Correlation – As one axis increases, the other decreases, meaning that the line produced would have a negative gradient. No correlation – One topic would have absolutely no affect on the other, and there would be no “line of best fit” produced.

The general layout of the radar chart is a shape (with as many sides as the number of questions) with different layers, the further out from the centre usually means the higher amounts or the larger numbers and it usually starts at zero from the centre. Each “question” will have the same scale for answer for these charts. For example I the diagram (below) the scale is in $, which I can only assume is $10m per segment, and it gets bigger as the layers come out from the centre. Once all the questions have been filled in, the lines are joined from each point, making a polygon. The bigger the area, the bigger the average answer and usually the better, but not necessarily. It’s basically a quick way to analyse how successful something or how bad something is in comparison to something similar. It would be a good idea for us to use this graph when comparing results from a questionnaire, so we know what to focus on and improve on based on current systems.

This is a questionnaire designed for doctors who use a computer system to process data about their patients, and have some sort of results presented to them. Please circle the relevant answer. Cheers. 1 – Very Poor2 – Poor3 – Average4 – Good5 – Very Good 1)What do you think of the current layout of the computer system you use at the moment? )How secure is the current system you use? )What do you think of the speed of the current system you use? )Do you think you are being given the right amount of statistical analysis modules, ways to present the data, available for you to use? )How easy is the current system available to you, to use? )How well does the system cope with very large amounts of data entered into it? )How well do you think the legal, social and ethical issues are being considered with your data? )Please state the current operating system you are using and then give it a rating. My Current Operating System is )Would you be willing to install some updates to run a new and better system? Yes / No 10)Could you please list some possible improvements (if any) that can be made on you current system to make it better. Thank you for your time, this will be a great help to us!