ICT Laptops Passwords Encryption Back-ups Data Protection Email and the Internet Viruses Social Networking / Professional Conduct.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Intermediate 2 Computing
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Baltic High School Classroom Connections Presentation.
Helping our customers keep their computers safe.  Using your pet’s, business, family, friend’s names  Using number or letter sequences (0123, abcd)
POSSIBLE THREATS TO DATA
QWERTY Keyboards.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
James Sees Senior Network Administrator Management Analyst Cyber Protection Strategies White Hall Business Association - Cyber Security & Awareness Conference.
Computer Hardware Software 1.Introduction 2.Internet research and security Basic online protection 3.Use PC safely and efficiently 4.Purchase decisions.
Network & Computer Security Training.  Prevents unauthorized access to our network and your computer  Helps keep unwanted viruses and malware from entering.
10 Essential Security Measures PA Turnpike Commission.
1.0 Computer Lab Regulations 1.1 Computer Lab Rules 1.2 User 1.3 Equipment 1.4 Data and User Security.
Creating STRONGCreating STRONGPasswords. CREATING STRONG PASSWORDSCREATING STRONG PASSWORDS A strong password is an important part of keeping your information.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Aaron Cauchi Nurse Informatics
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Information guide.
IT Security for Users By Matthew Moody.
etiquette Etiquette s always go to any of the following: Staff
1.1 System Performance Security Module 1 Version 5.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Computer System Game 6511 Keyboarding
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Task 1 Safe working practices in a business environment Understand how safe working practices are applied in a business environment B. Wallington Unit.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Data Protection Property Management Conference. What’s it got to do with me ? As a member of a management committee responsible for Guiding property you.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Network Security & Accounting
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Create Strong Passwords A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Lincoln School Home of the Lions!. 1.7 years in the EVSC 2.7 years at Harrison 3.1 st year as eLearning Coach Miss Stephens.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Lesson 1 – Microsoft Word. Contents 1. Introduction 2. Managing folders and saving documents 3. Changing fonts 4. Page layout 5. Paragraphs 6. Adding.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
What is Digital Citizenship? Using electronic, computerized technology responsibly and knowing how to stay safe.
Staff Induction Log On Credentials & Security Resources Web Applications / Software LanSchool Projectors / Cameras / Printing Laptops / WiFi.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Data Protection & Network Security Data Protection Protective Marking Secure Printing Passwords & the Internet Viruses Encryption.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Account & Google Message Center Guide August 2015 Prepared by: Angela Mars IT Education and Training.
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Technology Mrs. Huddleston
Handling Information Securely
G061 - Network Security.
Presentation transcript:

ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct

Care of Laptops No food or drink Do not hold heavy objects over the keys Use the carry case & zip it up! Close lid and support laptop by base Beware of trailing cables Take care to align pins when connecting to projector

Projectors CONNECT all cabling first Power up the PROJECTOR Switch the LAPTOP on

Passwords Passwords should be at least eight characters long and contain at least one of each of the following characters: –Upper case letter –Lower case letter –Number –Symbol etc.) Best password length > 13 characters Best to change at least every ninety days

Avoid Using Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters – , , abcdefg, or adjacent letters on your keyboard (qwerty) Personal information –Your name, birthday, driver's license, passport number, or similar information

Memorising Writing a password down is OK but: –Keep it safe and secure –Do not store it near or on the computer –No post it notes on monitors!

Permutations Available CharactersPermutationsFactor Alphabet2663 x Add case5230 x Add numbers62136 x ,164 Add special characters955 x , character95426 x ,768, characters9537 x ,000, characters952 x x Based on an 8 character password

Top Passwords From an analysis from real server breaches on the Internet –Passwords in the list are used by 99.8% of all users –40% of all passwords appear in the top 100 –71% of all passwords appear in the top 500

Encryption Means of scrambling data so that it can only be accessed with a password / key Protect the encryption password with extreme diligence Only effective when the machine is off or device is removed

Backup Suitability from best to worst: –CD (700MB) / DVD (4.7GB) –External hard disc (500GB) –Web based backup service (2-5GB) –USB memory stick (32GB) –Doing nothing There are potential security & data protection issues with web based services

Backup Procedure Always use COPY and not MOVE Verify that you can open backed up files Best to do regular full backups A least termly Backups will not be encrypted Make it easy and save all files in one location e.g. C:\Data

Data Protection Data protection applies to printed documents as well as electronic data Schedule 7 of the DPA: –Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

Security Breach Examples Imagine a potential security breach: –Leaving unencrypted data on a USB key –Leaving printed documents on public transport –Losing your phone –Losing your laptop –Disclosing your password

Document Handling Data or documents containing personal data must: –Be secured in a locked cabinet or area –Be protected by a strong password –Have access restricted to appropriate personnel only –Be encrypted before transfer –Not be left in plain view –Be destroyed securely

Never provide personal details in an or in response to an request Check the sender – does the address look right? Avoid links in s Does the 'ring true'? Look out for URLs ending in.tk.cc.info

'Reset' Example

UPS Example

Junk / Spam Folder

Have You Been Hacked?

Internet Beware of pop-ups Beware of obfuscated links Inappropriate web sites Virus scams

Pop-up Blocker Under Tools menu in IE9 Make sure it is turned on Close pop-ups with ALT+F4

Obfuscated Links Harmful addresses hidden behind innocuous looking links Google image search Link text can be anything Obfuscation

Anti Virus Programs Two programs are in general use: –Sophos –Microsoft Security Essentials

Detection Results

Social Networks Do not use on school provided computers Be mindful of your 'on-line reputation' No-one under 13 should be using Facebook Do not 'friend' students

Professional Conduct...uphold public trust in the profession and maintain high standards of ethics and behaviour, within and outside school... eOrderingDownload/teachers%20standards.pdf

Esafety

Advice and Support