GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Computer security Viruses Hacking Backups
The Internet = A World of Opportunities
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Safe Surfing Tips Internet Safety Tips for Teens By: LaQuacious Garrett.
Internet safety By Lydia Snowden.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Information guide.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Staying Safe Online Keep your Information Secure.
s By Mollie.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Agenda Last class: Internet Literacy Lab Today: Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
By Thomas Fleury. Security Breaches There are many things that can affect a computer’s general performance such as taking out the plug while it is still.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Viruses... a big problem with small solutions.
Computer security By Shreya Houji. VirusesViruses.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
What is a Virus? A virus is something that you get in any shape or form. You could receive an that has an interesting title, but not know who is.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Internet Safety.
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
How to build a good reputation online
Unit 4 IT Security Kerris Davies.
Santa’s s By……..
Presentation transcript:

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS)

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. Security issues that can threaten system performance is viruses, spyware and spam s. Viruses can slow down your computer by putting a different software on your computer that slows it down, you can get these viruses from opening up s that have viruses attached to them, and an example of a virus is called ABC. To get rid of a viruses you need to download an antivirus’s software. Spyware is dangerous because it can find out everything you type on your computer, so this can find out passwords your typing or maybe be bank card details, then you can have you bank robbed, an example of spyware is try media. Spam is a problem because it can slow your computer down by send a load of s to your account that are useless. These s can have viruses attached. You can stop spam by blocking the senders name on your account.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Phishing is when you receive an telling you something like your bank account has been hacked it says click here to enter your details so they can actually steal your bank account details because the is fake or could say you have won a prize click here. You can get this by sighing up to websites then they you the fake s. Have a strong password that will you only know and none of your friends know about it so they can’t get on your account. To have a strong password add capital letters, number lower case letters and not have your name in the password. Don’t leave you’re self-logged on in public places so people can’t delete your files or you can lock your computer if you go off to do something quickly. You have to be careful when adding personal information when on a public network because people could go onto your account when your no there and go on you private files or information. When you see a padlock at the top of a url on a website it means it’s a secure website.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. Keeping a password on your files so no one can get on to them and edit them or delete them because they may be important files, if some hacks your computer and controls all your files they still won’t be able to access it because of the lock. If you have a strong password on the files no one will be able to guess it and you will have less of a risk of someone getting in to important files. For example I34tcarr0ts, never tell any of your friends this password word either and you should use different passwords for different file so if they find one password out they cant use the password to get to all of your files. If you download a firewall it will protect your computer from viruses off of s and adverts on the side of websites which might have a virus. so it won’t damage any of your data or no one can access your software or files. For example AVG firewall and they can clean up your computer and can get rid of all harmful files and this will speed your computer up.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. It is important to back up your computer because if your computer ever gets wiped maybe from factory resetting your computing, you will have all your files still or if a hacker got hold of your account you will still have a back up to put back on another computer or the same one after you get rid of the viruses if they have damaged your files on your computer. You can do it securely by saving it on the internet like an online storage or on a memory card. For example online storages like drop box or google drive. You should put your memory card in a cabinet with a lock on it so no one can get hold of it or when you throw away memory cards make sure you wipe it so no one can see files on that memory card or destroy the memory card like crushing it. You should have more than one back up just in case one of the backups get lost or wiped some how.