GCSE ICT SECURITY THREATS.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Internet Safety/Cyber Ethics
Security, Privacy, and Ethics Online Computer Crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
The Legal Framework Can you work out which slide each bullet point should go on?!
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Digital Citizen Project Katie Goodall Educational Technology 505.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Technical Implementation: Security Risks
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
To Know what Cyber crime is
Misuses of ICT Malpractice and crime © Folens 2008.
DIGITAL CITIZENSHIP What You Should Know!.
Learn how to protect yourself against common attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Internet Safety Vocabulary
Societal Issues in Computing (COMP466)
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Follow safety rules so that YOU: Avoid getting HURT.
Unit 4 IT Security Kerris Davies.
What is Information Security?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

GCSE ICT SECURITY THREATS

So what is a Hacker? Computer Hacking involves a person known as a Computer Hacker. This person will access a computer system without the permission of the owner.  Their aim from this action is to break security systems of a computer with the intention to obtain confidential documents or most commonly credit card numbers. 

Why do they do it? More serious types of hacking could involve the computer systems within the defence centres or even police departments to delete or modify criminal records. Many hackers are motivated by a sense of achievement; the act of breaking into a computer system  using their own mental effort is reward enough for them. 

For Example…. The lives of space shuttle astronauts were put at risk by a computer hacker who overloaded Nasa's communication system in 1997 . As the Nasa shuttle orbiting the Earth docked with the Russian Mir space station, a hacker interfered with the computer systems that monitor the heartbeat, pulse and medical conditions of the crew.

The Computer Misuse Act (1990) This was passed by Parliament and made three new offences: 1. Accessing computer material without permission e.g. looking at someone else's files. 2. Accessing computer material without permission with intent to commit further criminal offences e.g. hacking into the bank's computer and wanting to increase the amount in your account. 3. Altering computer data without permission e.g. writing a virus to destroy someone else's data, or actually changing the money in an account.

As reported by the Anti-Phishing Working Group 176 unique new phishing attacks—spam attempts to fool users into divulging financial information on phoney websites—were reported in January 2004. By June 2004, that number skyrocketed to a 1,422.

So what is it? Phishing attacks use 'spoofed‘ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as: Credit card numbers Account usernames and passwords Social security numbers, etc.

Police warn of tsunami online scams The scams include the sending of unsolicited e-mails asking for money to be deposited in overseas bank accounts to support relief efforts as well as false Web sites using the disaster to spread computer viruses.

To "troll" means to allure, to fish, to entice or to bait. Beware the Troll To "troll" means to allure, to fish, to entice or to bait.  An internet troll is someone who fishes for people's confidence and, once found, exploits it. 

Cyber-Stalking One of every ten people on the Internet today will become the victim of a cyber stalker. Cyberstalking is where the electronic mediums such as the Internet are used to pursue, harass or contact another in an unsolicited fashion

Spyware When a PC is infected with spyware that every keystroke, every website and every conversation could be recorded or monitored by the people or companies that may have secretly installed software on your PC.

The Consequences….. Banking and identity theft Unusual computer problems Slow Internet access Changed browser homepage, search pages or favourites Excessive numbers of adware generated adverts such as pop-ups.

So, what can we do?....

Regular backups and security. Just making something illegal or setting up regulations does not stop it happening. So responsible computer users need to take reasonable steps to keep their data safe. This includes regular backup and sufficient security with passwords.

Copyright law This covers the copying of written, musical, or film works using computers and provides the legal protection needed. There have been cases where laws such as Copyright have been used to crack down on files sharing Internet sites or individuals who store and distribute music illegally. There is a massive problem with many people around the world obtaining copyrighted material illegally.

Close down chat rooms Some chatrooms have been closed down due to abuses, especially where children are vulnerable. Some have "moderators" who help to prevent abuses. Advice about sensible use is important; especially to never give personal contact details or arranges meetings without extreme caution.

Reduce email spamming This may be reduced by: never replying to anonymous emails setting filters on email accounts reporting spammers to ISPs, who are beginning to get together to blacklist email abusers governments passing laws to punish persistent spammers with heavy fines