Unit 2 Information gathering techniques Short Term Goal: To employ appropriate information gathering techniques to accurately assess pupils current online.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Let’s Talk About Cyber Security
ITQ qualification briefing 17 June 2010 Museum of London.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
The Use of WebCT to aid Fieldwork Learning and Teaching: Digital Student Portfolios T.Y. Lee, Fieldwork Coordinator BSW Department of Applied Social Studies.
Using internet and cell phones safely
Metamorphic Viruses Pat Walpole. Introduction What are metamorphic viruses Why they are dangerous Defenses against them.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
1 Kids on the Web. Child’s play? September, 2008.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Digital Citizenship Project Elle Wagner ED 505. Netiquette on Social Media Sites DoDon’t Be professionalPost illegal activity Share accurate informationBully.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Unit 3 Predicting and analysing data from online behaviour questionnaire Short Term Goal: To accurately assess pupils current online behaviour and raise.
Module 6 Planning and Deploying Messaging Security.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Course ILT Printer and virus management Unit objectives Perform various printing tasks, including installing printer drivers, printing documents, monitoring.
Chapter 6 – Computer Viruses/Hacking and Prevention Starter Task – How can a virus effect your computer? Last Lesson: - Software Copyright & illegal Downloads.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Homework #2 John Bach IST 110 Section 031 JMB6824 9/15/2012.
Ben Obrien 10N ICT homework 6 6th November. The ‘Yaha.K’ Virus The spread of the Windows worm, called Yaha.K, has led anti-virus firms to.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Computer security By Shreya Houji. VirusesViruses.
Mr Conti 28th March 2014 Lesson Aim To learn about different types of software that are produced for computer systems. Lesson Outcomes Good – will be able.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
1 Pertemuan 10 Software Protection Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Phillip Dinh, Fofanova, 1301, UH Internet Security By Phillip Dinh 1301 Spring 2007 University of Houston.
Chapter 9Basic Troubleshooting Techniques  9.1General Troubleshooting Techniques 9.1General Troubleshooting Techniques 9.1General Troubleshooting Techniques.
Merylin Sosa- Mejia COPYRIGHT POWERPOINT. PENALTIES AND FAIR USE.
Teacher Rooming Equipment Rules / Expectations Login / Passwords Technical Issues Homework Printing.
How to protect your computer By: Emily, Jackie and Kathleen.
Planning an Installation and d Upgrade. Learning Objectives  To learn how to plan an upgrade and installation.
The Following Announcement Is A Public Service If YOU Are Experiencing Any Of The Following Symptoms With YOUR Application / Software Please STOP.
Internet Safety Internet Safety LPM
Virus Scan Software.  Every computer should have virus scan software to protect it from the increasing number of bad files that are installed on computer’s.
By: Zach Beilstein. What is a computer virus? A computer virus is a software program that is designed to destroy files and/or mess up the operations of.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Cyber Safety Jamie Salazar.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus (W). A virus is a piece of software or programming that can be extremely harmful to computer. It damages your computer by taking over your.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Writing an message Finish off your slide on recommendations of how to write an .
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Computer Ethics, Viruses, and Copyrights
Classroom Management CLPL November
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Computer Ethics, Viruses, and Copyrights
Presentation transcript:

Unit 2 Information gathering techniques Short Term Goal: To employ appropriate information gathering techniques to accurately assess pupils current online behaviour.

How many of you use ? Check your school for an

Starter on risky communication class s exercise “infected” word document attachment download.exe file

How can you reduce risk from computer viruses? Stepping Stones put these protection steps into the correct sequence. remember to discard steps you wouldn’t use. Get antivirus software Open from unknown sender Keep antivirus software updated Scan files before opening Delete from unknown sender Do not open from unknown sender DragandDrop Macro (c) Copyright 2005 by and

What ways can we use to get information on how people behave online? Brainstorm exercise

What method best suits our purpose? What are the most important factors in gathering information on online behaviour?

Diamond9Diamond9 exercise What method best suits our purpose?

What questions to ask! Question generator exercise /quiz_ks3.asp /#teachers

Outcome from these lessons Developing a questionnaire to assess riskiness of current online behaviour