Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 11 Task #1 www.computechedu.co.uk/awitl Read the unit specification and create a glossary which defines each of the words / terms you don’t know.

Similar presentations


Presentation on theme: "Unit 11 Task #1 www.computechedu.co.uk/awitl Read the unit specification and create a glossary which defines each of the words / terms you don’t know."— Presentation transcript:

1 Unit 11 Task #1 www.computechedu.co.uk/awitl
Read the unit specification and create a glossary which defines each of the words / terms you don’t know the meaning of Word Explanation Root Kit A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook don't just copy off the internet write in your own words Software which allows malicious software to hide within an operating system and disguise the fact it has been compromised

2 Unit 11 Task #1 Produce a PowerPoint which explains current security threats that can affect the IT systems of organisations. Include internal, external, physical and social engineering / software based threats What is the difference between the categories of threat?

3 BTEC Threat List Current security threats and techniques (which are continually evolving), include: Internal threats, e.g. employee actions, data theft, accidental loss, unintentional disclosure or damage to data, unsafe practices (use of external flash storage, visiting untrusted websites, downloading/uploading files to/from the internet, users overriding security controls, file-sharing apps and bring your own device (BYOD)) External threats, e.g. data theft, destruction, withholding and/or disruption of systems (by competitors, cyber criminals, governments, terrorists) for political purposes or for financial gain Physical threats, e.g. theft of equipment or data, malicious damage to equipment or data, damage or destruction by fire, flood, terrorist action or other disaster Social engineering and software-driven threats used to obtain secure information (software that has a malicious intent), e.g. malware, viruses, worms, Trojan horses, ransomware, spyware, adware, rootkits, backdoors.


Download ppt "Unit 11 Task #1 www.computechedu.co.uk/awitl Read the unit specification and create a glossary which defines each of the words / terms you don’t know."

Similar presentations


Ads by Google