Unit 4 IT Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Viruses.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Any criminal action perpetrated primarily through the use of a computer.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Learn how to protect yourself against common attacks
Common Methods Used to Commit Computer Crimes
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
Unit 11 Communication & Collaboration
Information Security 101 Richard Davis, Rob Laltrello.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Call AVG Antivirus Support | Fix Your PC
Scams, Identity Theft, and Viruses Kelly & Caitlin
Information Security Session October 24, 2005
What is it? Why do I keep getting from Barracuda? SPAM.
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Unit 4 IT Security

Security issues that threaten systems Viruses-A computer virus is a type of malicious software program ("malware") that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them. Infecting computer programs can include as well, data files, or the "boot" sector of the hard drive. Spyware-Software designed to collect information about what you are doing on the computer. For example a 'key logger' is a type of spyware that monitors and stores a record of every keystroke made on the computer. This data may then be sent to a remote server without your knowledge. Used to harvest passwords. Spam-Spam means sending massive amounts of electronic junk mail that people haven't asked for. In legal terms it means to send 'unsolicited commercial email' This term is used because the vast majority of spam is sent in order to try and persuade you to buy something.

Security precautions to protect systems Viruses-Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software. Spyware - Programs such as Web root Spy Sweeper and entrust Pest Patrol are offered for a small yearly subscription fee. These programs can help you prevent future attacks, scan for suspicious programs, and remove spyware and malware from your computer. Spam - Try to avoid opening spam emails and clicking on links in spam messages. Don’t buy anything from a spammer. Not only do you risk comprising your security and infecting your computer with malware - viruses and so on - you also reward and encourage the spammers. Don’t be tempted to reply. The mailbox is probably unread. Don’t threaten the spammer. Some mails will be seen and spammers have rights too. Threatening messages could expose you to legal action. Avoid ‘unsubscribe’ options. Cynically, spammers often include an ‘unsubscribe’ link. Far from removing the menace, clicking it will confirm that your address is active and probably attract even more spam.

How to protect yourself Firewall-A firewall is a program or device that acts as a barrier to keep destructive elements out of a network or specific computer. Firewalls are configured (in hardware, software, or both) with specific criteria to block or prevent unauthorized access to a network. They work as filters for your network traffic by blocking incoming packets of information that are seen as unsafe. In large corporations, if a firewall is not in place, thousands of computers could be vulnerable to malicious attacks. Firewalls should be placed at every connection to the internet and are also used to control outgoing web traffic as well in large organizations. Passwords-Passwords help protect your privacy and identity. The strength of your password is an important factor to consider. If passwords are guessed or stolen, someone logging in under your identity could cause problems with your credit, reputation, or with MIT's resources. If you have a hard time remembering all of your passwords, Last Pass Enterprise is a password management system that removes the inconvenience of remembering all of your passwords and increases security. Securing hardware -Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as key logging), passwords, and other valuable data.

Backing up data Most businesses use computers to store very important data (customer records, financial information, designs for products, etc.) If this data is lost, the business could possibly have to close. Backing-up business data is essential. information technology, a backup, or the process of backing up, refers to the copying and archiving of computer data so it may be used to restore the original after a data loss event. The verb form is to back up in two words, whereas the noun is backup. Backups have two distinct purposes. How to securely back up data Organize your data. If your files are in more places than you can remember, spend a weekend or two organizing your file structure. Think of it as Spring cleaning, except digital. Get some hard drives for on-site backups. While we all know backing up is important, most of us don't do it for some reason or another. Well, actually, we can probably name those reasons: time, money, and TIME. With terabytes dropping down in prices every single day, the money factor should be no longer an issue. Now there's just the time part.

Being Safe online How can we be safe online? Know the scams. Read articles and blogs, follow the news, and share this so you can learn about different kinds of scams and what you can do to avoid them and also help your friends. Think before you click. Never click on links in messages from people you don’t know or vaguely know. These phishing emails have links that lead to websites that can lure you into giving personal information or download malware to your computer. You should even be wary with emails from people you do know if it looks or sounds suspicious. Hackers can create a malicious email that looks like it came from your best friend’s email account. Safely peruse. Beware of phony websites. These sites may have an address that’s very similar to a legitimate site, but the page can have misspellings, bad grammar or low resolution images. However, scammers are getting better at replicating sites so make sure. If a site asks for personal information, that you double check the URL and make sure it’s not asking for information it shouldn’t. McAfee Site Advisor is a free download and protects you from going to risky sites Shop safely. Don’t shop on a site unless it has the “https” and a padlock icon to the left or right of the URL. Also, protect yourself and use a credit card instead of a debit card while shopping online a credit card company is more likely to reimburse you for fraudulent charges. If you lose information in school you can get it back by asking the school technicians they keep safe of the information on their computer.