3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INFORMATION TECHNOLOGY
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Factors to be taken into account when designing ICT Security Policies
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
1.1 System Performance Security Module 1 Version 5.
LANs and WANs Coatbridge High School Computing Department.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Chapter X When can I consider my personal data secure?
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computer security By Shreya Houji. VirusesViruses.
We are here to help you… Fight something like this Brownies !
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Computer security By Isabelle Cooper.
Data Security.
Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Chapter 40 Internet Security.
UNIT 19 Data Security 2.
Part 3.
Encryption and Hacking
Encryption and Hacking
Unit 4 IT Security Kerris Davies.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
How it affects policies and procedures
When can I consider my personal data secure?
G061 - Network Security.
Presentation transcript:

3.3 Digital Communication Security

Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels, encryption. Identify the measures which can be taken to protect information systems from misuse: virus protection, firewalls, backing up data on an LAN and a stand-alone computer. Identify the characteristics of a secure password.

Network security measures Passwords and user names Access levels and access rights Encryption

Passwords and user names A password is unique to a person. A user name is a name used to gain access to a computer system.

Access levels The level to which someone can gain access to different parts/areas of a computer system.

Encryption This is the process of transforming information using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

Prevention methods Virus protection Firewalls Backing up data on an LAN and a stand- alone computer

Virus protection Use anti-virus software Regularly update the anti-virus software Do not use software from unknown sources

Firewall Security software that protects the Intranet from unauthorised users.

Backing up data Taking a second copy of the data so that if the original copy gets corrupted then the backup is still available. Normally backup onto either hard disk or removable storage.

Characteristics of a secure password Make it long Make it something not easily guessed Make it a mix of letter and numbers Make it a mix of capitals and non capitals Make sure it is not written down anywhere

Discussion What systems are in place in your school and with you to ensure your data is kept safe?