Big Picture Consider this How many online threats might you be faced with a day?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Unit 2 - Hardware Computer Security.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber security. Malicious Code Social Engineering Detect and prevent.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Security Risks Todays Lesson Security Risks Security Precautions
Topic 4: E-safety, Health and Safety
Chapter 40 Internet Security.
Managing Windows Security
Hacking Computer crime and cyber security.
COMPUTER CRIMES Presented by THABO.
Three Things About Malware
Cybersecurity.
MALWARE Autumn Mattis.
Network Security Fundamentals
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
Network security threats
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Teaching Computing to GCSE
Computer Applications Unit B
Risk of the Internet At Home
Cybersecurity.
Malware, Phishing and Network Policies
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Ch9 E-commerce Security
Computer Security By: Muhammed Anwar.
Unit 1 Fundamentals of IT
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Big Picture Consider this How many online threats might you be faced with a day?

System Security Part 1

Learning Objectives To understand what malicious code is To understand how social engineering techniques are used against computer system users To know what measures can be used for detection and prevention

Malicious Code Social Engineering Detect and prevent

Malicious Code or Malware is designed to ………. Virus Trojan Spyware Adware Complete sentence in your exercise book Malicious Code or Malware is designed to ……….

Complete sentence in your exercise book Computer Virus A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. They commonly spread through emails – remember don’t open an email if it looks suspicious. Question: How might a computer virus spread via email? Complete sentence in your exercise book

Trojan A Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent. Named after the original Trojan horse from Greek myth How?

Spyware What advice would you give to prevent spyware infecting a computer system? Spyware is software that aims to gather information about a person or organisation without their knowledge and that may send such information to another entity without their consent.

See Google Classroom for examples of infographics Adware a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "un-closable window” Unlike most malware, Adware is not illegal and so is used by some well known companies TASK! Create an infographic highlighting the risks and/or providing advice about Malware See Google Classroom for examples of infographics Malware

Social Engineering Blagging Social engineering is a set of methods criminals use to trick us into handing over information like passwords and credit card details. Click a topic on the left for more information Phishing Pharming Shouldering