Download presentation
Presentation is loading. Please wait.
Published byChester Hall Modified over 6 years ago
1
ECDL Module 7 IT SECURITY Facilitator: John Morris Time: 30 seconds
Transition in SAY: ‘Welcome to the class’ DO: Introduce yourself and explain a bit about who you are SAY: ‘The class will take [amount of time]…’ Transition out Say: We’re now going to look at how the class works
2
1 2 3 4 5 6 Learning Outcomes SECURITY CONCEPTS
MALWARE 2 NETWORK SECURITY 3 Follow along to learn more about each of these topics SECURE WEB USE 4 5 COMMUNICATIONS SECURE DATA MANAGEMENT 6 SUMMARY Time: seconds Transition in SAY: ‘Let’s take a quick look at the Learning Outcomes for this session…’ OPTIONAL: ‘Do you think you are able to do any of these already?’ OPTIONAL: ‘Do you have any questions about these outcomes?’ Transition out Say: We’re going to start with the first outcome shown here…
3
SECURITY CONCEPTS 1.1 Data Threats 1.2 Value of Information
1.3 Personal Security 1.4 File Security
4
Data Threats Data Vs Information Select each button on the left to see
CLICK TO REVEAL Data Vs Information Select each button on the left to see the description. Select NEXT TOPIC when ready Understand the term cybercrime Common terms NEXT TOPIC Threats to data from force majeure Recognise other threats to data
5
Data Threats Data Vs Information
CLICK TO REVEAL Data Vs Information What is the difference between data and information Data is unprocessed information. Data may be numbers, text, or images. Information is the processed output of data making it meaningful to the person who receives it. DATA GOES IN – INFORMATION COMES OUT Understand the term cybercrime Common terms NEXT TOPIC Threats to data from force majeure Recognise other threats to data
6
Data Threats Data Vs Information What is cybercrime?
CLICK TO REVEAL Data Vs Information What is cybercrime? Cybercrime is an illegal activity that uses the Internet or a computer. Examples include identity theft and social engineering. Understand the term cybercrime Common terms NEXT TOPIC Threats to data from force majeure Ask: What is Social Engineering? Next
7
Data Threats Data Vs Information Understand the term cybercrime
CLICK TO REVEAL Data Vs Information Hacking involves using computer expertise to gain access to a computer system without authorisation. Password cracking involves stealing passwords to computer systems or sites. This can be done by guessing the password, by using software or hacking into a sites database. Software cracking involves disabling or removing security features in software so that applications can be used without licence. Ethical hacking involves attacking a computer security system with permission from its owners to find vulnerabilities that a malicious hacker might exploit. Understand the term cybercrime Common terms NEXT TOPIC Threats to data from force majeure Recognise other threats to data
8
Data Threats Data Vs Information
CLICK TO REVEAL Data Vs Information Recognise threats to data from force majeure. Force majeure is a ‘superior force’ or an unforeseen event that can threaten data like: Fire Flood War Earthquake Understand the term cybercrime Common terms NEXT TOPIC Threats to data from force majeure Recognise other threats to data
9
Data Threats Data Vs Information Recognise threats to data from:
CLICK TO REVEAL Data Vs Information Recognise threats to data from: Employees – Could steal company data such as new product information Service providers – Could lose, destroy, or steal valuable company data External individuals – Could gain access to a computer system and steal/delete data Understand the term cybercrime Common terms NEXT TOPIC Threats to data from force majeure Recognise other threats to data
10
The Value of Information
CLICK TO REVEAL 1 Avoid identity theft and fraud by protecting personal information 2 Prevent the theft or misuse of client details and financial information 3 Use encryption and passwords to prevent unauthorised access 4 Keep information secure: Confidentiality – Integrity - Availability 5 Know your Data Protection rights 6 Policies are designed to show how ICT should be used to protect the organisation’s data
11
The Value of Information
CLICK TO REVEAL Social engineering involves Manipulating people into doing something or giving out confidential information, rather than by hacking to obtain the information. Phone calls - Misleading phone calls to gain valuable information Phishing – Misleading s, usually designed to look like they have come from your bank, asking that account details be updated Shoulder surfing – Cover that keypad to hide PIN Often used to gain access to a computer system. Confidential or valuable information is gathered and used to commit an act of fraud. There are several methods of identity theft such as: Information diving - The practice of recovering information from discarded material Skimming – Using a scanner device to skim Information from payment cards Pretexting - Gaining personal information through deception Identity theft is often used to gain access to a computer system. Confidential or valuable information is gathered and used to commit an act of fraud.
12
File Security Macros What is a macro? Should I trust macros?
A macro is small program within Word or Excel that is designed to automate multiple steps that are repeated regularly Should I trust macros? Only trust macros if they are from a trusted source. Remember, macros have the potential to contain malicious or damaging code
13
File Security Setting a password on an Excel or Word file: Click File.
Click Info. Click Protect Document (or Workbook). Click Encrypt with Password Choose a password and click OK. Re-enter the password and click OK.
14
File Security Encryption Encryption has advantages and limitations
Encrypted data cannot be read without a key Only an authorised receiver (the one with the key) can read the message Limitations: If the encryption key is lost it leaves the data unusable
15
WRAP UP Any questions?
16
2.1 Definition and Function 2.2 Types 2.3 Protection
MALWARE 2.1 Definition and Function 2.2 Types 2.3 Protection
17
WHAT IS MALWARE?
18
MALWARE Definition and Function Some common types include:
Trojan – A destructive program that masquerades as an application Rootkit – Used to enable continued access to a computer while actively hiding its presence Back door – Used to bypass system security
19
MALWARE CLICK TO REVEAL Worms - Self-replicating malware that uses a computer network to send copies of itself to other computers Viruses - Computer programs that can replicate themselves and cause damage to a computer like: Adware - Software package that automatically plays, displays, or downloads advertisements to a Computer Spyware - Malware that collects information on user browser habits without their consent Botnets - Can infect and control computers without consent Keystroke logging - Involves the capturing of information that is typed on a keyboard
20
ANTI-VIRUS Protection What is Anti-Virus Software?
CLICK TO REVEAL Protection What is Anti-Virus Software? Anti-virus software scans a computer to detect and block viruses before they infect the system. Anti-virus software needs to be kept up to date with definition files. It cannot always stop attacks to system vulnerabilities or security flaws. ASK: What is Anti-Virus Software? SAY: Anti-virus software scans a computer to detect and block viruses before they infect the system. Anti-virus software needs to be kept up to date with definition files. It cannot always stop attacks to system vulnerabilities or security flaws. Click each of the 5 icons to learn more
21
ANTI-VIRUS Protection
CLICK TO REVEAL Protection How do you scan specific drives, folders, files using anti-virus software: Launch the Anti-Virus Application. Select the Drives, Folders, Files to scan. Click Scan. ASK: How do you scan specific drives, folders, files using anti-virus software SAY: Launch the Anti-Virus Application - Select the Drives, Folders, Files to scan - Click Scan. Click each of the 5 icons to learn more
22
ANTI-VIRUS Protection
CLICK TO REVEAL Protection How do we schedule scans using anti-virus software? Launch the Anti-Virus Application. Select the Schedule Scan options and select the Scan Frequency, Date/Time. Click on the Scan button. ASK: How do we schedule scans using anti-virus software? SAY: Launch the Anti-Virus Application - Select the Schedule Scan options and select the Scan Frequency, Date/Time - Click on the Scan button. Click each of the 5 icons to learn more
23
ANTI-VIRUS Protection
CLICK TO REVEAL Protection What is Quarantine and what is the effect of quarantining infected/suspicious files? Quarantining a file moves the file to a safe location on a drive that is managed by the anti-virus software. The file can still be restored from quarantine if required. ASK: What is Quarantine and what is the effect of quarantining infected/suspicious files? SAY: Quarantining a file moves the file to a safe location on a drive that is managed by the anti-virus software. The file can still be restored from quarantine if required. Click each of the 5 icons to learn more
24
ANTI-VIRUS Protection
CLICK TO REVEAL Protection Why should we download and install software updates, anti-virus definition files? Installing software updates and anti-virus definition files can fix a flaw or security risk in an application. More importantly, the updates can protect you against newer security risks ASK: Why should we download and install software updates, anti-virus definition files? SAY: Installing software updates and anti-virus definition files can fix a flaw or security risk in an application. More importantly, the updates can protect you against newer security risks Click each of the 5 icons to learn more
25
WRAP UP Any questions?
26
NETWORK SECURITY 3.1 Understanding networks 3.2 Network Connections
3.3 Wireless Security 3.4 Access Control
27
Understanding networks
CLICK TO REVEAL A network is a group of two or more computer systems linked together by communications channels to allow for sharing of resources and information Some common types of networks are: Local Area Network (LAN) same building Wide Area Network (WAN) over a long distance Virtual Private Network (VPN) securely over the internet between remote locations SAY: A network is a group of two or more computer systems linked together by communications channels to allow for sharing of resources and information Some common types of networks are: CLICK: Local Area Network (LAN) - A network that connects computers in close proximity, usually in the same building CLICK: Wide Area Network (WAN) – A network that connects computers over a long distance, using telephone lines and satellite communications CLICK: Virtual Private Network (VPN) - A network that allows users to privately share information between remote locations, or between a remote location and a business' home network
28
Understanding networks
CLICK TO REVEAL What is the role of a Network Administrator? What is the function of a firewall? What are the limitations of a firewall? ASK: What is the role of a Network Administrator? SAY: Network administrators are involved in managing the authentication, authorisation and accounting within a network. Tasks include maintaining staff access to required data on the network and ensuring network usage is in line with ICT policy. CLICK ASK: What is the function of a firewall? SAY: Firewalls are used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the network pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. It is the BOUNCER! You can't enter our network without your name on the list. ASK: What are the limitations of a firewall? SAY: - Does not always provide automatic notification if your network is hacked - Cannot protect against an attack generated from within the network - May restrict some legitimate traffic
29
Network Connections How can we connect to a network?
CLICK TO REVEAL How can we connect to a network? What are the security implications of connecting to a network? SAY: How can we connect to a network? SAY: Cable - Involves connecting to a network using physical cables Wireless - Connections that allow you to wirelessly connect to a network without the need for a cable CLICK ASK: What are the security implications of connecting to a network? SAY: - Computers connected to the network may be infected with malware. - Connecting to a network may open your system up to potential for unauthorised data access. - Connecting to a network may increase the challenge of maintaining privacy.
30
Wireless Security Points to remember about wireless networks:
Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Most commonly used Always use a password to protect wireless networks Unprotected wireless networks present risks SAY: Points to remember about wireless networks SAY: The two most common forms of wireless security are: Wired Equivalent Privacy (WEP) Wi-Fi Protected Access (WPA) Most commonly used SAY: Requiring a password ensures that only authorised users can access the network and data SAY: On an unprotected wireless network other people may be able to access your data
31
WRAP UP Any questions?
32
4.1 Web Browsing 4.2 Social Networking
SECURE WEB USE 4.1 Web Browsing 4.2 Social Networking
33
SECURE BROWSING CLICK TO REVEAL
SAY: Certain online activity such as online shopping or online banking should only be undertaken on secure web pages SAY: Know how to identify a secure website! Check the web page URL for “https” and the Lock Symbol CLICK SAY: Be aware of pharming - An attack that redirects a website's traffic to a fake website SAY: A digital certificate is used to provide 3rd party verification that the sender of a message is who they claim to be. The file contains a public key and other authentication information to allow it to be validated.
34
SECURE BROWSING Autocomplete & Autosave
You can control how Autocomplete & Autosave are managed by following these steps: Open Internet Explorer by clicking the Internet Explorer icon on the taskbar. Click the Tools button, and then click Internet options. On the Content tab, under AutoComplete, click Settings. SAY: When you visit a website that requires you to sign in to your account—like an , banking, or shopping site—Internet Explorer will ask if you want your user name and password remembered. The next time you visit the site and start entering your user name, Internet Explorer will finish filling in your account info. SAY: If you do tasks online that require entering personal info—like shipping and billing addresses—on websites, AutoComplete can save time by filling out forms automatically. The next time you visit a site with forms and start entering your info, Internet Explorer will finish filling out the form based on what you've previously entered. CLICK SAY: You can control how Autocomplete & Autosave are managed by following these steps: 1. Open Internet Explorer by clicking the Internet Explorer icon on the taskbar. 2. Click the Tools button , and then click Internet options. 3. On the Content tab, under AutoComplete, click Settings.
35
COOKIES Cookies An internet cookie is a small piece of data sent from a website and stored in the user's web browser. Every time the user loads the website, the browser sends the cookie back to the server to notify the user's previous activity. Cookies typically store data such as your name or even items added to the shopping cart in an online store. Controls for cookies are to be found in internet explorer: Open Internet Explorer by clicking the Internet Explorer icon on the taskbar. Click the Tools button, and then click Internet options. On the Privacy tab, find the cookie settings. ASK: What are cookies? SAY: An internet cookie is a small piece of data sent from a website and stored in the user's web browser. Every time the user loads the website, the browser sends the cookie back to the server to notify the user's previous activity. Cookies typically store data such as your name or even items added to the shopping cart in an online store.
36
DELETE HISTORY Delete Browsing History
Open Internet Explorer by clicking the Internet Explorer icon on the taskbar. Click the Tools button, and then click Internet options. On the Content tab, under AutoComplete, click Settings. SAY: Users often find that they need to delete private data from a browser like: browsing history, cached internet files, passwords, cookies, auto-complete data.
37
SOCIAL NETWORKS Be careful on social networks
CLICK TO REVEAL Be careful on social networks Don’t disclose personal or company confidential information such as passwords, PIN numbers, client details on social network sites. Be sure to apply appropriate account privacy settings. Ensure that personal details are hidden. Watch out for misleading information being posted by users. False identities may be used! Watch out for cyber bullying, grooming and fraudulent links. SAY: Don’t disclose personal or company confidential information such as passwords, PIN numbers, client details on social network sites. ASK: Why not? SAY: Be sure to apply appropriate account privacy settings. Ensure that personal details are hidden. ASK: Why? SAY: Watch out for misleading information being posted by users. False identities may be used! SAY: Watch out for cyber bullying, grooming and fraudulent links.
38
WRAP UP Any questions?
39
5.1 E-Mail 5.2 Instant Messaging
COMMUNICATIONS 5.1 5.2 Instant Messaging
40
CLICK TO REVEAL Encryption and decryption help to ensure only the intended recipient can read an . A digital signature is an encrypted code that demonstrates the authenticity of a message.
41
eMail Fraudulent email and Phishing
A simple rule – delete unsolicited . s may contain a virus or malware Phishing involves inviting you to change your (bank) account details with the intent of stealing that information.
42
Instant Messaging Instant Messaging
CLICK TO REVEAL Instant Messaging Instant messaging is real-time texting between two or more computers/devices. IM can be used to share links or files. As files can be transferred (images etc.) so can malware! As with social networks, don’t disclose important information
43
WRAP UP Any questions?
44
SECURE DATA MANAGEMENT
6.1 Securing and Backing Up Data 6.2 Secure Destruction
45
SECURING & BACKING UP DATA
Its important to have a back-up procedure in case of loss of your company data Back-up procedures will ensure that data can be recovered in the event it is lost. Backups should be kept off-site in case of a fire or flood or other force majeure SAY: Recognise the importance of having a back-up procedure in case of loss of data such as documents, spreadsheets or financial records. Back-up procedures will ensure that data can be recovered in the event it is lost.
46
BACKUP FEATURES Features of a backup
Frequency – How often you want a back-up to occur Schedule – The time of day / night the backup occurs Storage location – Where the backup is stored (external hard drive)
47
BACKUP A PC Back up data. In the control panel, click Backup and Restore. Set up Backup. Choose a back-up location (drive/network) and click Next. Choose what data to back up or accept the recommended default settings. Choose the back-up schedule. Save Settings and Backup
48
RESTORING A BACKUP To restore backed up data.
In the control panel, click Backup and Restore - Restore My Files. Choose what you want to restore by using Search, Browse for Files or Browse for folders to add files/folders to restore Follow the steps to select the location and click restore files
49
SUMMARY & WRAP UP Topics covered in this module: 1. SECURITY CONCEPTS
2. MALWARE 3. NETWORK SECURITY 4. SECURE WEB USE 5. COMMUNICATIONS 6. SECURE DATA MANAGEMENT Any questions? Summary Give a formal summary of what you have done. You can use the Learning Outcomes shown at the start or maybe consider recapping the activities.
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.