Presentation is loading. Please wait.

Presentation is loading. Please wait.

ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline.

Similar presentations


Presentation on theme: "ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline."— Presentation transcript:

1 ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline

2 Silver Unit 4 - IT Security for Users (1 credit) Introduction This unit aims to provide learners with the ability to protect hardware, software and the data within an IT system against theft, malfunction and unauthorised access. This unit is about the skills and knowledge needed by the IT user to avoid common security risks and control access to software and data; and use a wider range of methods to protect software and data (e.g. from exchanging information by e-mail or when downloading software from the Internet). Learning Outcomes You will be able to: 1.1 I can identify security issues that might threaten system performance. 1.2 I can take appropriate security precautions to protect IT systems and data. 1.3 I can identify threats to information security associated with widespread use of technology. 1.4 I can take appropriate precautions to keep information secure. 1.5 I can follow relevant guidelines and procedures for the secure use of IT. 1.6 I can explain why it is important to backup data securely. 1.7 I can ensure that my personal data is backed up to appropriate media. Students should complete tasks 1.1 to 1.7 within this document

3 The Charlie Westwood Story Charlie Westwood is 16 years old; he lives in Solihull near Smith’s Wood. He has just completed his GCSE’s and is going to continue his studies at a local college. As a gift for doing well in his exams, his dad has bought him a PC. Charlie is very concerned about his new PC’s Security that he has asked you to help him avoid common security risks and to ensure his hardware, software and data are protected.

4 1.1 Identify security issues that might threaten system performance. Charlie is aware that having a slow computer can be incredibly irritating, especially when it takes a long time to complete even the simplest of tasks. Charlie will be using his computer a lot for his college work, so he is keen to ensure that its performance is not compromised. Identify common security issues that could affect the way Charlie’s computer performs. a) Explain to Charlie how the following risks may have an impact on a PCs performance: RiskExplain what the risk is to the machine how it may slow Charlie’s PC. Unsolicited Email (SPAM) junk mail Junk mail takes up to much space on your computer and it also causes the computer to run slow. Viruses causes harm Viruses causes harm and it can brake the computer and fill up all the memory on the computer. Adware advertising cookies Advertising cookies can use up your RAM memory which means you do not have much memory to use and it can also cause your computer to run slowly. Trojan Horses pretend to be safe Trojan horses can brake your computer and it can mess with the computer memory. Worms replicates replicates can fill up all the computer space so you have no more space on you computer. It can also brake your computer. Rogue Diallers calls, phone numbers there is more than none thing connected to the internet and it makes it run slower. Hackers take over Hackers could try doing something on your computer and the hacker could also access your account or delete all your files. Hackers can also change your password so they can hack it anytime without you knowing. Web browser advertising and Pop ups. opens a window such as your computer. If loads of different adverts keep popping up while your trying to do something then it will make your computer run slow.

5 1.2 Taking appropriate security precautions to protect IT systems and data.. It is important that Charlie shows practical capability and a responsible attitude in relation to basic security in his everyday life at home and college. a)Explain to Charlie the risks or dangers of the following: Swapping passwords with others…. People can go onto your account and delete your files. Failing to keep his passwords secure…. Someone will go on your account and put things on there that you don’t want Using ineffective passwords (e.g. the word "password" or a single key stroke)…. easy to guess so hackers can access it Downloading or attempting to download information that is either against local policies or is not known to be secure…. Slows down your computer and downloads things that are illegall

6 b)It is essential that Charlie has a suitable password. Complete the 2 nd column below say how strong (difficult to guess) you think each password is (very weak – weak – good – strong – very strong) Password How strong do you think it is and why? Actual strength using website password It isn’t that strong because it is easy to guess. Weak password1 It isn’t that strong because it is easy to guess. weak £pasSword1 Its harder for people to guessGood pa$word1 Its easy for people to guessStrong Pas$word1 Harder for people to guessVery strong Pa5$word1 Harder for people to guessVery strong c)Now go on the website http://www.yetanotherpasswordmeter.com/ and find out if you were right – complete the 3 rd column.http://www.yetanotherpasswordmeter.com/

7 e) Explain to Charlie why it is important to take the following precaution to protect data? PrecautionWhy Updating anti-virus software and make regular checks it is important cause if a virus gets downloaded on your computer then the anti virus software will remove it. Back up data and ensure backups are in a physically separate If your computer gets wiped you have your back up files and you wont loose anything but if you haven’t backed up your files then you will loose all your work and wont be able to get it back. Install and Adjust firewall settings prevents hackers from accessing your computer and getting into your files. Download security software patches and updates; If you don’t update it then your not protecting your computer. Adjust internet security settings It can make your computer safer because it stops you from accessing things that you shouldn’t be on. Access levels People can access all your different things in your files

8 f) Explain to Charlie why it is essential to take the following precaution to protect IT systems? PrecautionWhy Locks on doors it prevents robbery if you leave your door open or unlocked someone can try open it and they will be able to rob personal things. Physical controls Someone can try break into your house but you can have an alarm, the alarm will go off when someone brakes into your house and then you could catch them. Report security threats or breaches if there is any harm done to you or your house after you have reported the threats the police will already be involved and will deffonailty do something about it Fire safety equipment in IT Rooms You need it because there could be a fire in an IT room so it is important that they have fire safety equipment in all rooms.

9 1.3 Identify threats to information security associated with widespread use of technology. Help Charlie identify some specific key threats relevant to his circumstances. a) Within college Charlie will use MS Outlook. Explain why Charlie should take care when using Email? If people know his email and password and he is using his email for work then people from his work can log onto his account and delete all his work or they can mess about with his work. They can also change his password so he doesn’t know it and wont be able to log back onto his email. b) Explain to Charlie what SPAM is and what he should do about it? Spam is Junk mail and if you have junk mail you need to delete it because you don’t need it. Also you can set up a filter in your email settings to automatically delete spam emails. c) Explain why Charlie should not leave his computer logged on in public places e.g. the open access areas in college? Charlie shouldn’t leave his computer logged on because other people can have access to all his things and delete it. They can also change his work or people could copy his work onto a memory stick and use it like its there own work. d) Why is it important that Charlie has a strong password for all his IT accounts? It is important that he has a strong password because people will be able to guess it and log onto his account. If he had a strong password that includes capital letters and numbers no one will be able to guess what it is and log on. e) Why shouldn’t Charlie store his user name and passwords in public web browsers? Charlie shouldn’t store his user name/password in a public browser because anyone he doesn't know will find out all his information. People will also be able to change his password and username and log onto his account without him knowing Charlie needs to be aware that there are people who pretend to be trusted entities in order to get personal information from users. (Phishing). f) Why shouldn’t Charlie provide personal information on a public network (e.g. the college network) that could enable criminals to access individuals' personal data? He shouldn’t put personal information on any public network because people he doesn’t know will be able to read his personal information so it is best that he keeps his personal information of all public networks.

10 1.5 Following relevant guidelines and procedures for the secure use of IT When in college Charlie must follow their security guidelines and procedures. These rules are made by the college and state how its IT systems should be used. The rules generally cover privacy, security and legal requirements. Each time Charlie logs on to the college network he is greeted by an Acceptable Use Policy (AUP) screen. a) Briefly explain to Charlie what the purpose of the Acceptable Use Policy (AUP) is and why he should obey the policy? He should obey the policy because if you are trying to hack someone's account you are having access to all there files without them knowing and when you are having access to someone's files you can delete all there work or you can mess about with it and you should not tamper with any other network area.

11 1.7 Demonstrate how personal data is backed up to appropriate media Show Charlie how to “back up “work effectively from your college computer onto a USB/Memory stick a) Show a printscreen of files on your college computer, paste the printscreen below. b) Show a printscreen of the files saved on your USB/Memory Stick, paste the printscreen below. c) Charlie isn’t aware that the college backs up all school data (full back up) regularly. Find about what happens and write a short paragraph why it is done. They back it up everyday and take it home at the end of the week incase a virus appears or it deletes any of your files. So if any of your work gets deleted or messed about with it will always be backed up so you will have all your work back.


Download ppt "ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline."

Similar presentations


Ads by Google