Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Security Risks As computer’s have a greater role in our everyday life opportunities for technology crime have been created. All networks need to have security.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Threats To A Computer Network
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Isabelle Cooper.
Data Security.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Security Risks Malware (Malicious software)
ISNE101 Dr. Ken Cosh Week 13.
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks

Virus A computer virus is a program that will damage your computer Once into your computer system it will attach itself to another program and reproduce itself Examples of the destructive effects of a virus: – data corrupted or deleted, the screen display malfunction, hard drive spinning, computer freezes, unexpected messages or sounds

Worm A computer worm is a malicious program that multiplies once it is in your computer. It can multiply so many times that it can fill up your computer’s memory and backing storage and slow the system,or even a whole network, right down!

Trojan Trojans are programs that pretend to be something like a game, a small application, a tool for maintaining your computer. Once you run the Trojan program it will damage your computer system. They are often found in attachments and are.exe files.

Hacking A hacker is someone who gains unauthorised access to a computer system. Hackers usually use networks to get into computer systems. They ‘break’ or steal passwords to gain access then copy, steal, delete, corrupt data.

Anti-virus software Anti-virus software can detect and destroy lots of viruses worms and trojans. Anti-virus software has a database of all viruses. worms and trojans which they must keep up to date or a regular basis. They will then scan your computer, locate and destroy the viruses worms and trojans

Anti-Virus

Spyware Spyware is a program that steals information from your computer e.g. -mail messages, usernames, passwords, bank details. It then sends this information across the internet to the person who sent the spyware. How does it get into your computer? – attachments, – Hidden inside another program that you install. If you don’t stop the spyware all your personal details and passwords can be stolen!

Phishing Phishing is a technique used by criminals tour personal information such as ID & password, bank details, phone number, address etc.. Phishers use s pretending to be from e.g. your bank, from Ebay from Pay-Pal to get you to give them your details. They can even pretend to be someone who wants to give you money, but first you have to give them your bank details.. Then they steal from you!

Keylogging A keylogger is a program designed to track and monitor user keystrokes, often used to steal passwords, credit card numbers. Keyloggers work unseen by the user, often by acting as software driving thekeyboard The information gathered is often then uploaded to a website, a server or an address.

Keylogger Using a keylogger you can:

online fraud Criminals use websites, online messages, or “spam” s can reach large numbers of people easily. Their fake messages and websites look real and credible and can convince people to part with their money. Examples: bogus investment schemes, spreading false information to boost share prices, fake prize giving schemes, news that you have inherited money, bargain selling websites

Online fraud All on line fraud schemes want to get money from you They will try – to get your bank details – to get enough personal information to open accounts in your name – get you to send cash directly

Identity theft Stealing your personal details such as bank account details, national insurance number, date of birth, address etc This enables the thief to pretend to be you and e.g. open bank accounts, get a credit card, buy on-line, withdraw cash

Denial of Service Attacks There are two main types of DOS Attacks which consume so many network resources such as processors, disk space, memory, network connections, routers, that there is none left for users Attacks on a specific network resource e.g. disabling a file server.

Methods used in Denial of Service Attacks Resource starvation. This means using up a network resource so that legitimate users can’t access it. A good example is when the DOS attack sends corrupt packets of data to a network filling up the storage area so it can’t handle any more network traffic Bandwidth consumption. This means flooding the network with senseless data. : e.g. An example of this is flooding an server with messages until it crashes.

Methods used in Denial of Service Attacks Using weaknesses in networking software, making a server crash by targeting a design flaw in the operating system Attacking the routers. Sending streams of corrupted packets aimed at routers to divert them from routing data through a network.

Security precaution: Passwords A Password need to be secure! Tips: Make it at least 8 letters long Use a combination of UPPER and lower case letters, numbers and punctuation e.g Baw% Heid34& Don’t write it down and leave it lying about Change it frequently

Security precaution: Encryption

Ecryption: protecting sensitive data by using codes. In order to read an encrypted data you need the Key to the code You can encrypt data held on a storage device such as a hard drive: this would mean that any data that a hacker stole would be meaningless to them

Security precaution: Encryption Data being sent across networks is vulnerable to hacking so: – Encrypting data being sent across networks is a sensible precaution e.g. when paying for something bought on-line you have to send your card details. – Websites that collect your card details should have https in their address: that means they are using encryption to send your information.

Security precaution: Biometrics Biometrics: security using technology to recognise physical characteristics such as: – Fingerprints, the eye retina, a face, a voice.

Firstly the data on a person is input and stored into the computer e.g: – A copy of their fingerprints, images of their face, an image of the retina in their eye, a recording of their voice

Security precaution: Biometrics Before it allows a person access, the computer system – Scans their fingerprints – Takes a picture of their face – Takes a picture of their eye retina – Takes a recording of their voice The compares it to the data held in its memory If there is a match then access is granted

Security protocols A security protocol is a method of protecting data being sent across networks Commonly used protocols are – Secure File Transfer Protocol (SFTP) – Secure Hypertext Transfer Protocol (HTTPS) – Secure Socket Layer (SSL). These protocols carry out functions such as: – Authenticating the sender and receiver of the data – Managing the encryption of the data ( including the keys) – Making sure that the data arrives intact and has not been tampered with.

Security precaution: Firewall A firewall is a system designed to check the data coming into or going out of a network. It : – only allows access to authorised users and applications – prevents unauthorised access to a network. On a small network e.g. a home network it will be implemented using software. On a larger network it may involve using a dedicated computer as well as software. The firewall software will often be provided by a security suite or, it might be provided by the operating system

Firewall

Security Suite A Security Suite is a set of programs are designed to protect your computer from a wide range of threats such as: viruses, trojans, spyware, identity theft, fake websites They can even provide firewalls and software to ‘tune up’ your system performance.

Security Suite

Checking websites

Security Suite Not all security suites provide the same features and when you are choosing between them you should ask the following questions – Does the suite protect from every type of threat? – How effective is the suite at protecting your computer? – How easy is it to use? – Does it offer additional support and helpful resources? – How often is it updated?

Security Suite Check out these websites to compare security suites