L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords.

Slides:



Advertisements
Similar presentations
Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
Advertisements

E-Commerce: Security LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect.
Password Security An overview. We need your help The IT department uses the latest technology and techniques to maintain the highest level of security.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
Access 2007 ® Use Databases How can Microsoft Access 2007 help you manage a database?
Threats to I.T Internet security By Cameron Mundy.
Data Storage. Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are.
Hacking Phishing Passwords Sourendu Gupta (TIFR).
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
1 Safely Using Shared Computers Amanda Grady December 2013.
Textual Password How to use the Textual Authentication Model (AC)
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Passwords Internet Safety for grades Introduction to Passwords Become part of our everyday life –Bank cards, , chat programs, on- line banking,
How to be Safe Online. Online Access How many of you go online? What are your favorite things to do online? Who accesses the Internet from their smart.
How to Attach a File to an . Step One Log onto the Internet and then onto Click on Student Resources.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
This is a short presentation to explain how and why to login to the CIM website as a member. Benefits are: Access to myCIM (private member area, contains.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
How to Register for Apprenticeship Vacancies 1 Supporting young people’s services.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
By John Williams. Why Secure Passwords Matter Passwords protect everything about you online. Once those passwords are discovered and used by someone else.
Has your been hacked (or hijacked)? 1.What a Spam looks like 2.How to change your password to a stronger one.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Operating Systems Concepts 1/e Ruth Watson Chapter 9 Chapter 9 Accounts and Groups Ruth Watson.
Prepare to set up you new Gmail Account. What are you using? Software Program Name Owned bySoftware Location Outlook ExpressMicrosoftOn Your Computer.
Creating an Account on Our School Website
Edited By- Andrey Loburets 1V1.222/02/2016 ONLINE COURSE MOODLE.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Internet use 2. How internet used in business and learning? s Cloud computing Video conferencing.
Policies and Security for Internet Access
Staying Safe On Social Media. Website Security  How do you know if a website is secure?  Celebrities  http vs https  http: Hypertext Transfer Protocol.
Let’s activate your Key Account! Click the red button labeled Activate Account.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Managing Money Workshop The National Autistic Society AGM
Digital Citizenship Unit 2 Lesson 1: Strong Passwords
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
Communicating safely and appropriately online. Why do we need passwords?
Communicating safely and appropriately online
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Choosing A Username and Password
Key words: Secure | Password | Character
What this activity will show you
How to set up an Electronic Payment to MCP
Protecting What’s Yours: Your Identity
Safe Internet Mechatronika Budapest.
Passwords.
Call us on (Toll-free). How to Manage the Norton Identity Safe Logins Those Login information that you store in Identity Safe includes.
User access levels, Passwords, Encryption, Cipher, Key
Setting up an online account
Directions for accessing the New Intesa Sanpaolo Supplier Portal
Strong Passwords.
Start at our website at In the upper right hand corner is a link for “Office 365”
Keep It Safe! Secure Your Secrets
start to finish – November 20181
Creating Passphrases Include Examples NOT REQUIRED
Creating a MyMedicare Account
Creating a MyMedicare Account
Creating a MyMedicare Account
Warranty screenshots.
Presentation transcript:

L ESSON OBJECTIVES Students will: Describe what data security is and why it is important to keep information safe. Explain how encryption and passwords are used to keep information safe Describe the key features of a strong password.

EnglishKazakhRussian Data securityАқпарат қауіпсіздігіБезопасность данных CodeКод EncryptionШифрлеуШифрование AuthorisedАвторластырылғанАвторизованный UnauthorisedАвторыстырылмағанНеавторизованный PasswordҚұпия сөзПароль

D ATA S ECURITY Decides who can use the database and what information they can use. Use of login details (username and passwords. Protects data from damage such as fire.

E NCRYPTION Encryption is a way of coding messages or information in such a way that only authorised people can read it. Coding = writing Authorised = people with permission

C RACK THE CODE

P ASSWORDS A password is a secret word or string of characters that is used by a person when proving their identity. Logging onto school or work network accounts Online banking Can you think of other situations where you would use a password?

F EATURES OF A STRONG PASSWORD ? What are the features of a strong password? Take a moment to write/discuss what you think are the key features of a strong password.

H OW STRONG IS YOUR PASSWORD ? Visit the website To check how strong your password is? How can you make it stronger?

F EATURES OF A STRONG PASSWORD ? Password should have at least eight characters It should have a combination of letters, numbers and special characters. Letters should be a mixture of upper and lower case. It should not have any repeating characters It does not spell a name, band or birthday.