1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Class Discussion. Suppose your parents told you that they were going to give you an allowance and open a bank account for you. And, if you managed your.
[your name, organization] Protecting Your Identity: What to Know, What to Do.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
What to Know, What to Do Presentation Powered By: The Federal Trade Commission Consumer Protection Toolkit.
Protecting Your Identity: What to Know, What to Do.
BALANCING LIFE’S ISSUES, INC. Identity Theft Protection, Prevention and Self Help.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Issues Raised by ICT.
Administrative Practices Outcome 1
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
General Awareness Training
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
Internet Safety Internet Safety LPM
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Identity Theft One of America's fastest growing crimes.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
 Collect your past paper  Collect a starter sheet – do it as your computer is logging on.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Phishing & Pharming Methods and Safeguards Baber Aslam and Lei Wu.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
Antisocial use of ICT and Computer Fraud
COMPUTER CRIMES Presented by THABO.
Done by… Hanoof Al-Khaldi Information Assurance
Unit 4 IT Security.
Handling Personal Data
Administrative Practices Outcome 1
Protecting Your Identity:
Network security threats
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Lesson 2- Protecting Yourself Online
Scams, Identity Theft, and Viruses Kelly & Caitlin
Protecting Your Identity:
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Identity & Access Management
Understand mechanisms to control organisational IT security
HOW DO I KEEP MY COMPUTER SAFE?
Encryption and Hacking
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Lesson 2- Protecting Yourself Online
G061 - Network Security.
Presentation transcript:

1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data Security/data security task 3. Read the Objectives at the top of the sheet 4. Complete the two starter questions

 Stolen data can be used to commit identity theft or steal money from bank accounts and credit cards  Some data could reduce a companies competitiveness if leaked to competitors  Data that is corrupted or altered by unauthorised users is useless to a business

 Physical security (locks and alarm systems)  Access security (user names and passwords, firewalls, screen-savers, encryption software)  Defensive security (anti-virus software, anti- spam software, anti-adware software, anti- spyware software)

 The Data Protection Act (1998). It states that: ◦ any business or organisation that holds personal data about individuals (data subjects) must comply with the 8 data protection principles ◦ data subjects have various rights to see, correct and prevent their personal data being processed or used for marketing without their permission

 Copy the web address from the document and paste it in to Firefox.  Use the mini-website to answer the questions

 Answer the 9 mark question