Unit 11 Task #1 www.computechedu.co.uk/awitl Read the unit specification and create a glossary which defines each of the words / terms you don’t know.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

POSSIBLE THREATS TO DATA
Information Security EDU IT Security Terms EDU
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Mr C Johnston ICT Teacher
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Ch.5 It Security, Crime, Compliance, and Continuity
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Unit 2 - Hardware Computer Security.
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
HACKING Unlike most computer crime / misuse areas which are clear cut in terms of actions and legalities (e.g. softwarepiracy), computer hacking is more.
1.1 System Performance Security Module 1 Version 5.
Viruses & Destructive Programs
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Managing Technology and Information Chapter 15. Distinguish between data and information and explain the role of management information systems in business.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Using Technology to Manage Information
Topic 5: Basic Security.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Computer Skills and Applications Computer Security.
CONTROLLING INFORMATION SYSTEMS
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
What they are and how to protect against them
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
CYBER SECURITY...
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Business Risks of Insecure Networks
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Risk of the Internet At Home
Malware, Phishing and Network Policies
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
LO1 - Know about aspects of cyber security
Computer System Security
Presentation transcript:

Unit 11 Task #1 www.computechedu.co.uk/awitl Read the unit specification and create a glossary which defines each of the words / terms you don’t know the meaning of Word Explanation Root Kit A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executables. Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook don't just copy off the internet write in your own words Software which allows malicious software to hide within an operating system and disguise the fact it has been compromised

Unit 11 Task #1 Produce a PowerPoint which explains current security threats that can affect the IT systems of organisations. Include internal, external, physical and social engineering / software based threats What is the difference between the categories of threat?

BTEC Threat List Current security threats and techniques (which are continually evolving), include: Internal threats, e.g. employee actions, data theft, accidental loss, unintentional disclosure or damage to data, unsafe practices (use of external flash storage, visiting untrusted websites, downloading/uploading files to/from the internet, users overriding security controls, file-sharing apps and bring your own device (BYOD)) External threats, e.g. data theft, destruction, withholding and/or disruption of systems (by competitors, cyber criminals, governments, terrorists) for political purposes or for financial gain Physical threats, e.g. theft of equipment or data, malicious damage to equipment or data, damage or destruction by fire, flood, terrorist action or other disaster Social engineering and software-driven threats used to obtain secure information (software that has a malicious intent), e.g. malware, viruses, worms, Trojan horses, ransomware, spyware, adware, rootkits, backdoors.