Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

GCSE ICT Networks & Security..
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Thank you to IT Training at Indiana University Computer Malware.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
We are here to help you… Fight something like this Brownies !
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Manga comic industry security information presentation By Dominic Roofe.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
Computer security By Isabelle Cooper.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
8 – Protecting Data and Security
Unit 4 IT Security.
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define key words and answer GCSE-type questions about computer security. Key words: Virus, hacker, encrypting, password, levels of access, firewall

What are the main threats that cause loss of data?  Viruses A ‘virus’ is a computer program designed to run undesirable instructions on a computer- e.g. delete files, send out Spam messages.  Hackers Try to gain unauthorised access to computer data, either via a network, internet or using the same computer.

Dealing with Viruses.  Install Anti-virus software and keep it up to date.  Attachments to s- only open if you know and trust the source.  Download programs- only if you trust the source. Mnemonic: Viruses Are Idiotic Disturbances

Dealing with Hackers.  Firewall software- make sure that it is running whilst using the Internet.  Password protect vital files (Word, Access, Excel etc. allow password encryption and protection)  Physically restrict access to computers which have vital information.  Logon account for computers Mnemonic: Fully Protect Password Logins

PASSWORD SECURITY Passwords should be...  Not easily guessable (Don’t use pet’s names, birthdays...etc.)  Changed Regularly  Used carefully (Make sure no one is looking over your shoulder)

Protecting Hardware  Keep track of Serial Numbers  Use burglar alarms when building is empty  Keep expensive equipment in a locked room  Put security locks on equipment

Other security issues- Spam  Spam – unsolicited s (usually sent en-mass and advertise products or services)  Deal with Spam by installing Spam filter software.

Backups  Backups are taken to make a copy of valuable data in case of loss.  Data can be lost because of … Breakdown of storage (e.g. hard disk) Viruses Accidental deletion Malicious intent!

Backup Media Magnetic tapeHard diskUSB disk CD ROMFloppy disk

Backup considerations …  What medium? (e.g. Memory stick, CD, Tape …?)  How often? (frequency) (e.g. Daily, weekly, monthly, every hour …?)  How many copies (e.g. over a year, over 1 week …?)  Where to keep it (e.g. off site, on site, safe …?)  Time of backup (e.g. after work is complete, network not busy …?)  Label archive items (e.g. day of week, week number …?)  Remember: Mock TL

Ancestral Backup Strategy First backupSecond backupThird backup Son FatherGrandfatherFather