Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses.
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Shreya Houji. VirusesViruses.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
Safety and Security issues of using ICT Alys brooks.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
An Introduction to Phishing and Viruses
IT Security  .
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Threats to data security

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Computer virusesTrojans WormsPhishing PharmingSpyware AdwareHacking Denial of Service attacksPhysical threats Businesses such as supermarkets must make sure that the data they hold is kept safe and secure. The security of data can be threatened by: Threats to data security

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A computer virus is a computer program that can replicate itself and spread itself from one computer to another. Computer viruses can: damage files; amend files; copy files; delete files. Using regularly updated anti-virus software can check a computer system for viruses and remove most viruses. Most anti-virus software will check any incoming files for viruses and stop the virus infecting the computer system. Computer viruses

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A trojan often appears to be software that is wanted or needed by the user of a computer system, but is really a standalone malicious program designed to take control of the PC. It can steal data from the PC and send it to another user. trojan Trojans An up-to-date security program or anti-virus software will block most trojans.

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A worm is a standalone malicious program designed to replicate itself and spread to other computers over the internet.worm Worms can cause harm to networks merely by consuming the bandwidth and slowing down the network for other users. Worms

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton PhishingPhishing is the attempt to obtain information such as personal details of passwords, account numbers or credit card details by pretending to be a trustworthy source and fooling the user into giving the details away. Users should always be on the lookout for suspicious s or messages which ask users to enter e.g. passwords or credit card details when replying to the message.suspicious s or messages Many companies such as Microsoft provide help on recognising phishing.Microsoft provide help on recognising phishing Phishing

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton PharmingPharming is an attempt to redirect the user to an alternative website so that the user will enter their details. The details are then stolen and used for fraud. Pharming attempts are common and new ones are being set every day. Up-to-date details can be found on Scamwatch. Scamwatch. Pharming

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton SpywareSpyware is malicious software that collects information about users without their knowledge. The information is logged and sent to other users so that personal details such as passwords can be stolen. Spyware such as key loggers can also be used to record keystrokes to send to other users, or to monitor the activity of the user. Spyware

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton AdwareAdware automatically shows adverts and promotions for goods or services on the screen of a computer. Most adware is harmless, but some may contain spyware or other viruses. Mostly, adware is considered to be just an annoying nuisance to the user. Adware

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Hacking is finding out the weaknesses in a computer system and exploiting those weaknesses. Hacking is not necessarily illegal, as a hacker might be attempting to gain access after losing a password or in an attempt to test the security of a system.hacker Hacking without authorisation or permission is illegal under the Computer Misuse Act. Hacking

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A denial of service attack A denial of service attack attempts to make a computer system unavailable to users and to prevent it from carrying out its proper activities. High-profile web sites or services are attacked by protesters or malicious attackers to draw attention to issues they may have with the provider. A denial of service attack can be attempted by bombarding the business server with more attempts at access than it can manage, so that legitimate users cannot gain access or the server stops working. Server Internet User Attacker No access Denial of Service attacks

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton The theft of computer components such as hard disks, USB memory sticks, CDs or DVDs where data is stored can lead to the loss of data. Physical threats to data Burglars and thieves stealing computers or laptops, laptops left on buses or trains, and dropped or misplaced USB memory sticks are all ways of losing data.