Presentation is loading. Please wait.

Presentation is loading. Please wait.

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.

Similar presentations


Presentation on theme: "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan."— Presentation transcript:

1 GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan

2 PROMPTS Have you answered these questions? 1.What is X? (e.g A computer virus is …) 2.Why is X dangerous? (e.g. A computer virus can make your computer do ….) 3.Given an example? (e.g. A common computer virus is ….) 4.How do you get X? (e.g. You can get a computer virus by …) 5.How do you get rid of X? (e.g. To get rid of a computer virus you need to use a …)

3 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. If you get a computer virus it is going to effect your computer and its effectiveness. Spam can also be a security issue that can slow down your computer. I can describe security issues that will effect issues. Such as adware and pop ups. Which can slow down your computer. If your computer gets hacked the hacker could see all your personal thing like pictures, videos, and all your personal details.

4 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity. Identity theft: Identity theft: Do not put any personal information on a public network as someone could use the information and pretend to be him. This pretender could contact his friends and send abusive messages, all while pretending to be Charlie. So, do not send any personal information over emails. Phising: phising scam involves fraudsters spoofing real websites to obtain money from people by stealing their account details. They also use email to find peoples details. Hacking: hacking is someone that tries or does get in control of your computer or laptop for a reason like seeing your personal details it is really bad for someone to hack your computer because you are not in control of it they can do what they what and see what they want the best way to stop this is buying a good software that stops hackers this software is called fire wall.

5 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk. Locks on doors so your computer doesn’t get stolen or damaged. Physical controls like security guards and CCTV because if there is security guards and CCTV it is less likely for someone to try and steal anything because they are scared of getting caught Fire safety equipment / we have fire safety equipment because in a computer room there is a high risk of fire because the computer generate heat and it causes a high risk within the room. Another way of decreasing equipment getting stolen is putting electronic tags on them so if they get taken of the property the alarms would set off and it would alert the security Gard to protect your data you should make back up copy's of your work

6 SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.7 I can describe why it is important to backup data and how to do so securely. It is important to back up your work in case your computer breaks or turns off because if you have not backed it up all your work be lost and there is no way of getting back. There are loads of resources that you can use to back your computer like a memory stick can be use it is easily transportable because of small size and can be used in the majority of computers but it can be lost easily because of the size of the memory stick average space is 8gb which cannot hold much data. Also you can use cloud storage it is model of data storage where the digital data is stored in other locations unlimited storage and can be accessed anywhere but may increase risk of unauthorised access to your files. External hard drive a data storage


Download ppt "GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan."

Similar presentations


Ads by Google