Presentation is loading. Please wait.

Presentation is loading. Please wait.

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.

Similar presentations


Presentation on theme: "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe."— Presentation transcript:

1 GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS)

2 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. Security issues that can threaten system performance is viruses, spyware and spam emails. Viruses can slow down your computer by putting a different software on your computer that slows it down, you can get these viruses from opening up emails that have viruses attached to them, and an example of a virus is called ABC. To get rid of a viruses you need to download an antivirus’s software. Spyware is dangerous because it can find out everything you type on your computer, so this can find out passwords your typing or maybe be bank card details, then you can have you bank robbed, an example of spyware is try media. Spam is a problem because it can slow your computer down by send a load of emails to your email account that are useless. These emails can have viruses attached. You can stop spam by blocking the senders name on your email account.

3 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Phishing is when you receive an email telling you something like your bank account has been hacked it says click here to enter your details so they can actually steal your bank account details because the email is fake or could say you have won a prize click here. You can get this by sighing up to websites then they email you the fake emails. Have a strong password that will you only know and none of your friends know about it so they can’t get on your account. To have a strong password add capital letters, number lower case letters and not have your name in the password. Don’t leave you’re self-logged on in public places so people can’t delete your files or you can lock your computer if you go off to do something quickly. You have to be careful when adding personal information when on a public network because people could go onto your account when your no there and go on you private files or information. When you see a padlock at the top of a url on a website it means it’s a secure website.

4 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. Keeping a password on your files so no one can get on to them and edit them or delete them because they may be important files, if some hacks your computer and controls all your files they still won’t be able to access it because of the lock. If you have a strong password on the files no one will be able to guess it and you will have less of a risk of someone getting in to important files. For example I34tcarr0ts, never tell any of your friends this password word either and you should use different passwords for different file so if they find one password out they cant use the password to get to all of your files. If you download a firewall it will protect your computer from viruses off of emails and adverts on the side of websites which might have a virus. so it won’t damage any of your data or no one can access your software or files. For example AVG firewall and they can clean up your computer and can get rid of all harmful files and this will speed your computer up.

5 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. It is important to back up your computer because if your computer ever gets wiped maybe from factory resetting your computing, you will have all your files still or if a hacker got hold of your account you will still have a back up to put back on another computer or the same one after you get rid of the viruses if they have damaged your files on your computer. You can do it securely by saving it on the internet like an online storage or on a memory card. For example online storages like drop box or google drive. You should put your memory card in a cabinet with a lock on it so no one can get hold of it or when you throw away memory cards make sure you wipe it so no one can see files on that memory card or destroy the memory card like crushing it. You should have more than one back up just in case one of the backups get lost or wiped some how.


Download ppt "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe."

Similar presentations


Ads by Google