Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Risks Todays Lesson Security Risks Security Precautions

Similar presentations


Presentation on theme: "Security Risks Todays Lesson Security Risks Security Precautions"— Presentation transcript:

1 Security Risks Todays Lesson Security Risks Security Precautions
Spyware, Phishing & Keylogging Online fraud, Identity Theft DOS (Denial of Service) attacks Hacking Viruses, Worms & Trojans Security Precautions Anti-virus software Passwords/Encryption Biometrics Security Protocols and Firewalls Use of Security Suites

2 Security Risks A computer system is secure if it is not able to be accessed by an unauthorised person and not affected by malware Malicious software – software deliberately created to disrupt a computer system or gain illegal access to it in order to gather information Malware includes viruses, worms, Trojans, spyware, adware and keylogging software. Security precautions can be taken to protect against malware

3 Security Risks Spyware
Spyware programs gather information about you from your computer, for example which websites you visit This data can be used to target you with specific marketing Spyware can also interfere with normal operation of a computer by changing setting such as disabling anti-virus software or firewalls

4 Security Risks Phishing
An attempt to trick someone into giving away personal information using the internet Pretending to be a well-known company or bank for example Techniques: , text message, telephone calls, social engineering

5

6

7 Delete all suspicious emails (without reading them) and texts
Delete all suspicious s (without reading them) and texts. Don’t call any numbers. Don’t give out personal information to an unsolicited caller.

8 Security Risks Keylogging software
Keystroke logging or keylogging software is a program that records user’s key presses and is often used to steal passwords, credit card numbers etc There are many legal uses, for example during testing of software or monitoring employees productivity or for police investigations Can be used by criminals to gather usernames, passwords, PINS or other sensitive information

9

10 Security Risks Online Fraud
Online fraud or internet fraud – using the services of the internet to defraud people of money or carry out identity theft Many different types: Paying for goods that are never received Supplying bank or personal detail to help someone move money between accounts Q – online fraudsters traded 12 million pieces of personal information

11 Security Risks Denial of Service (DOS) attacks
A DOS attack is designed to cause problems on a network so that legitimate users cannot access resources, for example their online bank account The attack involves sending so many requests to a host computer (e.g. a companies web server) that it cannot respond to legitimate requests

12 Security Risks Denial of Service (DOS) attacks
In some cases, a DOS attack can crash the affected computer particularly if the attack includes malware DDOS (Distributed DOS) attack takes place when many different computers carry out a DOS attack against a single host computer. More difficult to defend against.

13

14 VIDEO

15 Hacking Hacking is gaining unauthorised access to a computer system and is usually illegal It is a crime under the Computer Misuse Act Black hats – skilled hacker who hacks illegally White hats – skilled hacker who hacks for legal purposes such as testing the security of a companies own computer systems

16 Security Risks Viruses
A piece of code that attaches itself to programs, makes copies of itself and destroys your system Ways of spreading Downloaded from a website Opened up from an attachment Infected backing storage device Across local network Symptoms of a virus Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason Data loss Computer restarting randomly Unwanted s generated

17 Security Risks Worms Trojans
A program that finds gaps in your security, creates copies of itself and floods your system with unwanted data Trojans A program that appears as if it is carrying out a helpful task, for example, defragmenting your hard disk You download it thinking it is carrying out a harmless task and it causes harm, for example, deleting files or adding unwanted toolbars

18 Security Risks Virus activation
Some viruses will start doing damage as soon as the program they area attached to is run Some viruses wait for a specific action to take place on the computer – a logic bomb Some viruses wait until a specific date and time before doing their damage – a time bomb

19 Security Risks ‘I Love You’ virus
An example of all three (virus, worm and Trojan) Trojan: it comes disguised as a ‘Love Letter’ when it is carrying a harmful program Virus: it infects files, turning them into new Trojans Worm: copies itself by sending itself to everyone in your address book

20 VIDEO

21 Security Precautions Anti-virus software
A program that protects a computer against attack or infection by malware Has a database of known viruses The anti virus software compares sections of code to this database to identify and destroy viruses Most anti-virus software downloads virus database updates automatically

22 Security Precautions Passwords
A list of characters that stops people accessing your data Disadvantages You can forget them Programs have been created that can test billions of different passwords each second, eventually guessing yours!!

23 Security Precautions Encryption Biometrics
Putting data into a code before transfer The hacker cant understand the data without having the key to decipher the code Biometrics Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition E.g. new Passports

24 Security Precautions Security Protocols
A rule or agreement set up between the sender and receiver of data Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are 2 examples SSL and TLS both use encryption

25 Security Precautions Firewalls
A program designed to prevent unauthorised access to or from a private network Checks all data coming in and out of a network The firewall decides which packets of data are allowed through to the destination address

26 Security Precautions Security suites
Groups of programs used to block threat to your computer Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters Parental control

27 Assessment task: games review
You need to produce: Inputs/Processes/Outputs Annotated design of user interface (a sketch of the form with labels) Design of the program in suitable design notation (pseudocode) Program code with comments Test Data A screenshot of a test run Evaluation – does the program do what it is supposed to do? How could it be improved

28 Test Data

29 Pseudocode


Download ppt "Security Risks Todays Lesson Security Risks Security Precautions"

Similar presentations


Ads by Google