Presentation is loading. Please wait.

Presentation is loading. Please wait.

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.

Similar presentations


Presentation on theme: "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford."— Presentation transcript:

1 GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford

2 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. A computer virus is a software that could potentially damage your computer. An example of a computer virus is Ontario it is the virus of death to your computer. Computer viruses are bad because it damages your computer, deletes your files and slows down your computer. You can get viruses by downloading off a torrent websites, downloading inappropriate videos and harmful files. To get rid of a virus you need to get a free antivirus software or buy one from your local computer and electronics store. Spyware is a dangerous piece of software where people can find out your passwords bank details etc. Spyware is a software that gathers people’s information without them knowing. The spyware can send the information to another entity without the persons consent. Spyware is classified in four types in data. These four types are called system monitors, Trojans, adware and tracking cookies. Spyware is used to track people’s movements whilst using the internet. Some spywares such as key loggers are installed on public computers so that it can monitor what the users of the computer have been on. Spam is where somebody send you a massive amount of junk mail to your email address that you haven’t asked for. In the legal term spam mean to send unsolicited commercial email. The term is used because the majority of spam is trying to get you to by something or trying to persuade you about something. Many email packages offer spam filters that try to prevent people sending you spam to your email inbox. It is up to you to check through your spam filter to see is any emails that you wanted have gone into your spam box. Out of all the emails that are sent in the world in 1 day there are about 80-90% it’s a spam message so that means there is a 10-20% chance that it’s the email that you asked for.

3 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Phishing is where somebody try to attempt to acquire sensitive information such as your usernames, passwords and potentially credit card details. You should only enter your personal details if the website that you are going to enter them in is secure. It is also a crime to commit phishing because it can come across as fraud. For a safe and secure password you should use a range of numbers, letters and symbols for an example Th3-H41rY_d0G. You should lock your computer to protect your files and your details if you need to go and do something that you have to leave your device. If you go to a cybercafé you have to be careful with the website that you are going to use because people could walk past look at your computer screen. What you shouldn’t do is put your personal details into a public computer because you never know who could be watching you and if you’re on a secure computer you should only put your personal details into your own personal computer and not a public one.

4 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. You should always protect your personal information or personal files with a password because people could hack into your computer get into your personal information or personal files and take that information to use for themselves. You should also back your files up to keep them safe and so that you don’t lose them. You should have a good protecting firewall so that hackers and viruses can’t get into your computer and destroy your files or take your personal information.

5 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. You should always back up your files and save them onto a memory stick or a disc drive so that you don’t lose them because they could be important files that you may need for the future. Time – you should always back up your files at the end of the day but not every day. How often – you should back your files you every 2 weeks Number of copies – you should always make more than 1 copy just in case you lose a copy. Where to keep – you should keep you’re backed up files in a folder with a sensible name that you can easily access. Take your back up with you because somebody could come up and steal it. If you leave your backed up files on top of your computer and it caught fire you would lose everything that you have backed up and you would also lose every file that you have used on that pc.


Download ppt "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford."

Similar presentations


Ads by Google