Year 10 ICT ECDL/ICDL IT Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1.1 System Performance Security Module 1 Version 5.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Animation The rapid display of a sequence of images of 2-D or 3-D artwork/model positions, in order to create an illusion of movement.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Chapter 6 Introduction to Digital Security
Security Issues in Information Technology
Chapter 40 Internet Security.
Managing Windows Security
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Common Methods Used to Commit Computer Crimes
IT Security  .
Information Security.
Protecting Your Identity:
Lesson 3 Safe Computing.
Secure Software Confidentiality Integrity Data Security Authentication
Network security threats
Chapter 6 Introduction to Digital Security
Security Shmuel Wimer prepared and instructed by
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Phishing is a form of social engineering that attempts to steal sensitive information.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Topic 6: Issues Press F5 to view!
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
4 ways to stay safe online 1. Avoid viruses and phishing scams
Risk of the Internet At Home
Internet Safety Vocabulary
Prepared By : Binay Tiwari
Encryption and Hacking
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
Lesson 2- Protecting Yourself Online
Security in mobile technologies
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Year 10 ICT ECDL/ICDL IT Security

What is it about? This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the secure use of ICT in daily life. It also teaches us to use relevant technologies and applications to maintain a secure network connection, use the internet safely and securely, and manage data and information appropriately.

Goals of this Module Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft. Protect a computer, device or network from malware and unauthorised access. Understand the types of networks, connection types and network specific issues including firewalls. Browse the World Wide Web and communicate on the internet securely. Understand security issues related to communications including email and instant messaging. Back up and restore data appropriately and safely, and securely dispose of data and devices.

1 Security Concepts 1.1 Data Threats This section will introduce the main concepts underlying the secure use of ICT in daily life. It will explain threats to your data, and give you an understanding of measures you can take to protect it. 1.1 Data Threats When working with data, it is important to be aware of potential threats that may pose a security risk through the theft of or loss of the data. Once you are aware of potential these of outcome the against data your yourself to easier is it threats, and protect threats. Methods of protection will be covered later in this Module. Distinguish between data and information 1.1.1 Data are facts, numbers or images that are collected to be examined and considered, in order to help in decision-making. Information is the interpretation of this data in a structured way, in order to provide knowledge based on study, experience or instruction. For example, if you conduct a survey to ask 500 people of different ages and different professions how they use IT in their day- day lives, the answers these 500 people give to your - questions are ‘data’. When you analyse this data, you obtain ‘information’, which gives you knowledge about how the use of IT is affected by age and profession.

Data Threats When working with Data, it is important to be aware of potential threats that may pose a security risk through theft or loss of data. Once you are aware of potential threats, it is easier to protect yourself against them.

Distinguishing between Data and Info Data is facts, images and/or numbers that are collected to be examined and considered in order to help make decisions. Information is the interpretation of this data in a structured way. Example: You ask 200 people what type of phone they have. The answers you receive are classified as data. When you analyse this date, you get information.

Cybercrime Cybercrime is the use of any computer, or network, to commit a crime. Financial Scam Computer Hacking Downloading Pornographic Images from the Internet Virus Attacks Stalking by email Creating Websites that promote racial hatred Identity theft Social Engineering.

Hacking, Cracking and Ethical Hacking A hacker is an individual who attempts to bypass the security mechanisms of a network or information system. A cracker is someone who exploits the weaknesses and security holes with malicious intent such as blocking accounts, or stealing information.

Hacking, Cracking and Ethical Hacking Ethical hackers are computer security experts. They are employed by a company to attempt to bypass the security of said company’s information systems. The company can then act on this information, making their network safer.

Threats to Data Force majeure relates to unforeseen events beyond the control of the company. Items include war, natural disasters, system crashes and corruption. Employees can pose a risk to confidential information. They could pass information on to other people, or use it for their own advantage. They could even accidentally delete it.

Value of Information Personal Information is any info or combination of information that enables the identification of an individual. Personal information must be protected to prevent: Internet based fraud Identity Theft

Value of Information Commercially Sensitive Information includes: Statements of financial information Information of a company’s pricing structure Information in the nature of operating and financial information Current client lists, production costs, hourly rates etc.

Value of Information Commercially sensitive information must be protected to prevent: Theft Misuse of client details Misuse of financial information

Preventing Unauthorized Access to Data Using a username and have a good password How strong is your password? (school, social media, home) www.passwordmeter.com

Protecting Data Data Encryption The process of transforming information (plaintext) using an algorithm (cipher) to make it unreadable to anyone except those possessing special knowledge. The resulting product is encrypted information (ciphertext). Reversing the process is called decryption.