Encryption and Hacking

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Unit 19 INTERNET SECURITY
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
By Demi Gardiner 8P Who’s been on your computer??
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Stay Safe on the computer!! This Is Emma and Jenny.They here to help you on the computer! By Rosie Pike.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Jan 11 Encryption and Hacking Encryption turns normal text into nonsense, and changes it back with a key. To someone who is not authorised to view it,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
What they are and how to protect against them
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Unit 4 IT Security.
How to build a good reputation online
Unit 4 IT Security.
Year 10 ICT ECDL/ICDL IT Security.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
BP5 – encryption - Fun gym
Malware, Phishing and Network Policies
BP5 – encryption - Fun gym
Computer Security.
Encryption and Hacking
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Part 3 Q11 to Q15 of National 5 Prelim
What devices use the internet?
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

Encryption and Hacking Jan 11

Your Answer Data encryption is used so that unauthorised people cannot view data, change it or steal it so it remains safe and secure. There are many different ways, such as passwords to stop unauthorised people from gaining access

Your Answer encrypted unreadable decryption passwords secret guess firewalls recognised

User IDs and passwords June 11 Q5

Your Answer To be specific to the user so only one person can be the real one To keep sensitive data safe so that it cannot be hacked or broken into

Your Answer

Malware

Your Answer Malware is bad programs that do harm to your computer. They gain access via any means of way e.g. download then corrupt or steal or delete data. One example is a virus which attaches itself to a file then tries to delete other files. 1) use passwords 2) encrypt sensitive data and have security measures e.g. antiviruses, firewalls etc.

Data Security

Your Answer 1) she doesn’t give out personal details e.g. passwords, email address, where she lives 2) makes sure she is talking to real person by confirming with another means e.g. text 3) doesn’t download anything e.g. fake files that contain a virus 4) have a firewall that alerts her to any unauthorised access