Cyber security and Computer Misuse

Slides:



Advertisements
Similar presentations
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Advertisements

NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Cyber X-Force-SMS alert system for threats.
Norman SecureSurf Protect your users when surfing the Internet.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
DIGITAL SECURITY PART 2 TOOLS. phising  Internet criminals can steal your personal and banking information without you ever noticing – they can do it.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Internet safety By Suman Nazir
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
AP CSP: Cybercrime.
Escalation Of Ad Wars Boosts Malware Delivery
Chapter 40 Internet Security.
Network security Vlasov Illia
Digital Security Identity theft Copyright Laws Plagiarism, and More.
how to prevent them from being successful
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Lesson 3 Safe Computing.
Secure Software Confidentiality Integrity Data Security Authentication
National Cyber Security Month
Answer the questions to reveal the blocks and guess the picture.
Phishing is a form of social engineering that attempts to steal sensitive information.
COMPUTER CRIME.
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
Unit 27: Network Operating Systems
– Communication Technology in a Changing World
Network Security: IP Spoofing and Firewall
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Introduction to Systems Security
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Firewalls Jiang Long Spring 2002.
Web Servers / Deployment
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
What is Phishing? Pronounced “Fishing”
WJEC GCSE Computer Science
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Communicating in the IT Industry
Unit 1.6 Systems security Lesson 1
INTERNET SECURITY.
Presentation transcript:

Cyber security and Computer Misuse Unit: Social & Economic Impact of Information and Communications Technology Cyber security and Computer Misuse

Introduction We live in a digital era where so much of what we do is done within a finger tip. Whether it’s ordering from a restaurant, shopping online or even making hotel reservations. We are constantly using the internet and as such are also regenerating data stored online through cloud storage. Today we will be focusing on cloud storage and elaborating more on cyber security.

Cloud Storage

Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network typically the Internet. Source:-www.techtarget.com

How does Cloud Storage work? . It works by sharing resources, software, and information via the Internet. The information is stored on physical servers maintained and controlled by a cloud computing provider, such as Apple in regards to iCloud or Google Drive for Google users.

Objectives At the end of the lesson, students should be able to: define cyber security differentiate between vulnerability, threats and attacks Name five threats associated with cyber security explain the five threats associated describe countermeasures to mitigate against these threats

Cyber security

What is Cyber Security? Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks.

Elements of Cyber security the possibility of being attacked or harmed Vulnerability Threats Attacks intention to inflict pain, injury, danger or damage an aggressive and violent act

Cyber threats and attacks

DDos A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

How to prevent DDos Call your ISP or hosting provider tell them you are under attack and ask for help. Buy more bandwidth to handle spikes in traffic that may be caused by malicious activity. configuring your firewall or router to blocking attacks.

Password Attacks

How to prevent password cracking

Malvertising Malvertising ( "malicious advertising“) typically involves injecting malicious or malware- advertisements into legitimate online advertising networks and web pages.

How to prevent malvertising Uninstall browser plug-ins you don't use and set the rest to click-to-play. Browser plug-ins, especially Java and Adobe's Flash, are usually the most vulnerable elements in your system. Install an ad blocker but before you do it, be aware that ad blockers are controversial Install an antivirus program that will identify and neutralize exploit kits.

Phising Phishing is a cybercrime whereby someone poses as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

How to prevent phising Use Firewalls – high-quality firewalls act as buffers between you, your computer and outside intruders. Be Wary of Pop-Ups – pop-up windows often masquerade as legitimate components of a website. All too often, though, they are phishing attempts. Never Give Out Personal Information – as a general rule, you should never share personal or financially sensitive information over the Internet. Make it a habit to check the address of the website. A secure website always starts with “https”.

Cyber attack

Your digital footprints follow you… #watchwehyuhpost

What have you learnt?