Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

POSSIBLE THREATS TO DATA
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Data Security GCSE ICT.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
Unit 19 INTERNET SECURITY
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Internet Safety. Phishing, Trojans, Spyware, Trolls, and Flame Wars—oh my! If the idea of these threats lurking around online makes you nervous, then.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
Internet Safety Internet Safety LPM
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Chapter 40 Internet Security.
Hotspot Shield Protect Your Online Identity
Unit 4 IT Security.
Cyber Security By: Pratik Gandhi.
Encryption and Hacking
Encryption and Hacking
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Network and Data Security
Cybersecurity By Sri Kankanahalli.
G061 - Network Security.
Presentation transcript:

Protection of Data 31 Protection of Data 31

Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers Access Levels Passwords Anti-virus software Firewall Encryption Backup & Recovery Privacy Settings

Protection of Data 31 Simply means protection such as locks on doors, or CCTV & even turning computers off at night Physical Barriers

Protection of Data 31 A strong password is at least 8 characters and includes uppercase & lowercase letters plus numbers and symbols Strong passwords create a random mix of character that’s hard to guess or ‘crack’ Cyber criminals use special programs to ‘crack’ passwords by trying masses of possible combinations Such programs can try on average over 8 billion password combinations each second Passwords

Protection of Data 31 Passwords Strong or Weak? apple toffeeapple ToffeeApple123 7 Tofple 5 7_tofPle5: At least 8 characters: upper/lower letters & numbers PLUS punctuation and symbols.

Protection of Data 31 Means people only have access to the parts of the system they need In a business, that will depend on their job role Staff would also need training before gaining greater access Access Levels

Protection of Data 31 Software that works by scanning your files & then deleting a virus or put it safely in quarantine There are lots of different brands of anti- virus software But whatever you use, it must be kept up-to-date because new viruses are released all the time Anti-Virus Software

Protection of Data 31 Anti-Virus Software

Protection of Data 31 Means software that monitors data packets coming in and out of a network to protect it from viruses, malware and hackers. It puts a ‘wall’ around a network and stops any data traffic that’s trying to use unauthorised channels Firewall

Protection of Data 31 Firewall Communication Channels ‘Ports’ HTTP Port 80 SMTP Port 25 Malicious Communication

Protection of Data 31 Firewall HTTP 80 SMTP 25

Protection of Data 31 Firewall LAN

Protection of Data 31 Means scrambling data to turn it into a secret code before sending it over a network, or the Internet so hackers can’t decode & understand it This is especially important for sensitive personal details being sent across the Internet, such as from bank websites That’s why https is now so important Encryption

Protection of Data 31 Encryption Intercept packets Called ‘packet sniffing’ Can collect passwords etc

Protection of Data 31 Encryption

Protection of Data 31 A backup is a copy of data kept in a different location. Don’t forget the different location! Recovery is replacing the data, such as copying the backup files Backup & Recovery

Protection of Data 31 Security settings can be used on social networking sites to protect users’ privacy. Privacy Settings

Protection of Data 31 Protection of Data 31

Protection of Data 31 Protection of Data 31