GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
INTERNET SAFETY FOR STUDENTS
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
INTERNET SAFETY FOR STUDENTS
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Simple Side of Computer Security for The Brownies That Like To Read!!
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
STAY SAFE!! Don’t fall for the same old tricks !!.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer security By Shreya Houji. VirusesViruses.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
Computer security By Isabelle Cooper.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet Safety.
Unit 4 IT Security.
Online Safety! By: Michelle Deng.
How to build a good reputation online
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Unit 4 IT Security Kerris Davies.
Presentation transcript:

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. To minimise security risks I know that I can use anti virus software this minimises the chances of a risk to my computer. A computer virus is something that hacks into your computer system altering or deleting files on your computer or ultimately breaking your computer. You can get one of these from opening a pop up that comes onto your computer or opening an that has an attachment of a virus within. An example of a virus is the; AIDS II. Viruses cause lots of situations that make the computer run slow and eventually break the computer. A virus is under the software category. You can have spyware spy’s on your computer so you need to be careful of what website’s you go on that can cause someone to be able to make a spyware attack on your computer. If a spyware attack happens on you they can access things such as personal messages and details. An example of a spyware is; keylogger. To prevent a spyware attack you have to use anti virus software which can be installed using the internet Don’t open links given in an as it can be a virus sent to attack the computer. This is known as spam. If you open a spam this will mean your computer will receive a virus.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Phishing is dangerous because people could get your personal details, phishing is identity theft. Phishing is an unknown which asks you about your personal details. Computer phishing is bad because people can access your personal details just from sending you an that you open. To prevent phishing you should never open a spam make sure you discuss personal information only via the phone or secure websites never clink on unknown links. You can be the victim of phishing by doing the opposite of all the things I have listed to prevent phishing. You have to have a strong password because then no one could get into your user or get onto your personal information. You also need to make sure you log out of anything you have logged into otherwise anyone could enter your personal profile. When on a public network you must never share private details, if it is necessary to share you personal information ensure your details are safe by looking for a padlock on the page. If you do not sign up to anything then this limits your chances of phishing. You must have a password of strong security.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. You can protect hardware and software by putting on the computer anti-virus software, by doing this you are protecting your computer from any harmful viruses that can attack your computer. You can use a software called firewall to protect your IT system this acts against the online community stopping people who have no authority accessing your network. A firewall acts like a barrier constantly protecting your computer from security risks. If an attack happened on your computer and you do not have a system like firewall to protect it then people who have made the attack on your computer can access your accounts seeing all personal information and all files stored on your computer. You should backup any files at least every week. If you do this then you will never lose your work.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. You should back up your files every week, you do this by moving all files onto either a USB or cloud storage meaning you can access these again if ever they were accidentally deleted. By doing this you can always access deleted work if anything ever went wrong. You should keep your backups in a secure file or somewhere safe and easily accessible to you and no one else, it would help if you put a password onto what you have stored your files in to access, this way it is secured for only you the user to access. In doing so your files are always protected.