Presentation is loading. Please wait.

Presentation is loading. Please wait.

1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.

Similar presentations


Presentation on theme: "1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the."— Presentation transcript:

1 1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the risks • Show understanding of the Internet risks associated with malware, including viruses, spyware and hacking • Explain how anti-virus and other protection software helps to protect the user from security risks

2 Prep and lesson Find the best story about hacking

3 Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the risks We have looked at a number of cases that highlight what has been done. Fraud for financial gain Blackmail Identity theft Data theft eg: stealing others property/ privacy. One way to remember what could happen is think of the computer misuse act Unauthorised access to a computer Unauthorised access to a computer to edit, corrupt or delete files. Unauthorised access to a computer with illegal intentions.

4 What methods are available to help minimise the risks
Firewall – creates a secure area behind it. A firewall is software that will block unexpected connections coming in to the network. Most operating systems include a firewall. Anti virus software – must be up-to-date Passwords and usernames (Access levels) – difficult and changed Https and HTTP (encryption). Public and Private key Acceptable Use Policy (AUP).

5 Show understanding of the Internet risks associated with malware, including viruses, spyware and hacking Malware - or malicious software, is any program or file that is harmful to a computer user. Malware includes computer viruses, worms, Trojan horses and spyware Viruses. – Self replicating program that may corrupt or delete data. Spyware - software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

6 Hacking – Unauthorised access to a computer (Computer misuse act)
Interesting story about the computer misuse act.

7 Explain how anti-virus and other protection software helps to protect the user from security risks.
Anti-virus: What does it do. Look at Norton website. Spam filters AUP.

8 Question David has installed anti-virus software on his computer. (a) State three tasks carried out by anti-virus software. Task Task Task [3]

9 Answer Any three from: Scans files for viruses // detects/identifies a virus Can constantly run in background Can run a scheduled scan Can automatically updating virus definitions Can quarantine a virus Can delete a virus Completes heuristic checking Notifies user of a possible virus

10 Question David is still concerned that his computer might get infected by a computer virus. State three other ways in which David can reduce the risk of his computer getting a computer virus

11 Answer Any three from: Use a firewall Use of a proxy server
Do not use / download software / files from unknown sources Do not share external storage devices / USB pens Do not open / take care when opening attachments / link Do not connect computer to network / use as stand-alone computer Limiting access to the computer

12 Question

13 Answer

14 Question

15 Answer

16 Question 4 (a) State what is meant by the term SSL [1]

17 Answer secure sockets layer − encrypts data being transmitted − use of https − use public and private keys

18 Question

19 Answer

20 Question (a) Viruses, pharming and phishing are all examples of potential Internet security issues. Explain what is meant by each of these three terms. Virus Pharming Phishing [6]

21 Answer (a) virus any two from: – program/software that replicates/copies itself – can delete or alter files/data stored on a computer – can make the computer “crash”/run slow pharming – malicious code/software installed on a user’s hard drive/actual web server – this code redirects user to a fake website (without their knowledge) – to obtain personal/financial information/data phishing – legitimate-looking s sent to a user – as soon as recipient opens/clicks on link in the /attachment … – … the user is directed to a fake website (without their knowledge) – To obtain personal/financial information/data


Download ppt "1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the."

Similar presentations


Ads by Google