Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

POSSIBLE THREATS TO DATA
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
By : Injeong Lee 9CC. 1. Creator of this Presentation   2. What is Digital Security?   3. Why is Digital Security important?   4. How does Digital.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Securing Information Systems
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
AKick Software’s Many Years of Excellence us: | Website: Toll Free:
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Information Systems Design and Development Security Precautions Computing Science.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Technical Implementation: Security Risks
Security Issues in Information Technology
Cyber Security By: Pratik Gandhi.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
HOW DO I KEEP MY COMPUTER SAFE?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Digital Security Jesline James! 9cc

Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does it help? How does it help?  Some dangers and malicious softwares Some dangers and malicious softwares  Softwares/ Devices that provide protection Softwares/ Devices that provide protection  Some Digitally Secure Devices Some Digitally Secure Devices  Advantages and Disadvantages of some authentication tools. Advantages and Disadvantages of some authentication tools.  Continuation Continuation  VideoVideo

The CREATOR!!! =]  My name is Jesline James. I’m in year 9 and I’m 14. (I like SpongeBob, hence, the picture below).  I made a presentation on Digital security because I wanted people to know what it is and how it can help us. Nowadays more people, kids especially, are impacted badly by the internet.  Well, to make this presentation I had to collect all answers to all questions on Digital Security. Obviously, I had to research all the information relevant to the topic I have chosen and create a logo. Then, I picked out a video to make this presentation less boring. Back

What is Digital Security (self- protection)?  Digital Security gives people the liberty to bravely take part in daily communications through all devices without any worries(electronic precautions to guarantee safety. )  It is the protection of your digital identity. Back

How does it help?  Internet users are very familiar with companies like Symantec (Norton Anti-Virus) and McAfee that provide them with protection from viruses, as well as to provide secure firewalls and protection against spyware. It prevents digital dangers. Back

Some Dangers and malicious softwares.  High risk of intrusion  Fraud  Phishing – Stealing secret information by pretending to be a reputable and trustworthy company.  Viruses  Viruses can replicate their structures infecting other files or structures on a computer. Viruses are used to steal data.  Trojan horse  A Trojan horse is a general term for malicious software that pretends to be harmless so that a user willingly downloads it.  Spyware  Spyware refers to programs that secretly monitors activity on a computer system and reports that information to others without the user’s permission. Back

Softwares/ Devices that provide protection. Anti virus softwares like:  Symantec (Norton Anti-Virus)  McAfee  SecureDongle X  Web Services  ElecKey 2.0 provides software security that can protect your software applications against piracy, tampering etc.  USB  SIM Card Back

Some Digitally Secure Devices  Perhaps the most famous digitally secure device is the SIM (Subscriber Identity Module) card, a device that is put in mobile phones.  Another example is Microsoft.NET card framework. It has many coded solutions to avoid common programming problems etc. Back

Advantages and Disadvantages of some authentication tools. Pros of User ID and PasswordCons of User ID and Password Least expensive authentication method to use. Weak and prone to numerous attacks. No need to carry any extra hardware device. Security depends on the users' ability to maintain the user ID and password secret. No need to install extra software.Not fully reliable when used for making financial transactions. User IDs and passwords can be changed at the user's choice, and most users know how to use them. Cost of support increases with user ID and password complexity. Back

Continuation….. Pros on Digital Certificates on Smart cards and USB tokens Cons on Digitals Certificates on Smart cards and USB tokens Safer to use than the normal user ID or password. Have to carry an additional smart card reading device or USB so that they can log in. A third-party confirming authority issues the digital certificates, helping to increase user trust. Involves additional cost, such as the certifying authority's subscription cost for issuing the digital certificates. Difficult for non-authorized users to remove the private key when stored on a smart card. Requires user training for certificate generation and use. Back

Video  s9eO-w Back

The End!!!! Thank you for watching!