When can I consider my personal data secure?

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computer Networks. Types of Wireless Network Attacks - 1 Insertion attacks: When a wireless device connects to an access point without authorization Interception.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Chapter 5: System Software: Operating Systems and Utility Programs.
New Data Regulation Law 201 CMR TJX Video.
Data Security GCSE ICT.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Computer Lab Teachers are welcome to change or add slides within this presentation to suit the needs of their students or better accommodate the structure.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Essential CCHS Computing Information Computer Applications September 2009.
Security and backups GCSE ICT.
By Ksenia Primizenkina 8K
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Best Practices for Protecting Data. Section Overview Mobile Computing Devices Technical Procedures Data Access and Permissions Verbal Communication Paper.
Chapter X When can I consider my personal data secure?
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Computer Security By Richa Patel. Viruses A Virus is something that you can get on you on your computer which can damage documents on your computer. What.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Computer security By Isabelle Cooper.
Keeping Your Computer Safe and Running Efficiently.
Chapter 4. Drive – The largest storage area. The C: Drive is usually the hard drive, but you can have other drives on your network or on a separate device.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
 Atwood-Hammond High School.  You are given access to the school’s computer network as a privilege, not a right.  Any work done using your school account.
Any criminal action perpetrated primarily through the use of a computer.
Physical Security Concerns for LAN Management By: Derek McQuillen.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Network Management Chapter 8 Semester 3 By Roger Lewis.
How To Make The Backup Of AVG Antivirus 2017 Definitions.
Chapter 6 Protecting Your Files
Security Architecture of Windows
Security Issues in Information Technology
Basic Guide to Computer Backups
What they are and how to protect against them
Malware and Computer Maintenance
Chapter 6 Application Hardening
Unit 4 IT Security.
Year 8 ICT Internet Security
Chapter 1 Getting Started
Password Management Limit login attempts Encrypt your passwords
Controlling Computer-Based Information Systems, Part II
How to build a good reputation online
Why Computer Security Need???
How to Install and Setup Quick Heal Antivirus Call
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Lecture-16(B) Taking Protective Measures
Teaching Computing to GCSE
Computer Security for Businesses
Computers Vocabulary.
Martus Account Set Up Benetech is a non-profit organization that develops and supports Martus, a secure information management software for human rights.
Technology Mrs. Huddleston
Lesson 3 Data Storage.
Have you seen this screen?
Data Recovery: Why Secure Deletion is so Important.
Introduction to the PACS Security
G061 - Network Security.
Presentation transcript:

When can I consider my personal data secure? Chapter X When can I consider my personal data secure?

How Important is this chapter to undestanding how computers work? 7

How Important is this chapter to understanding how to use a computer?

How can I be sure that my files will be available when I need them? Data in memory is volatile. Data in storage is non-volatile so it is always available As long as it isn’t trashed accidentally or deliberately. So, when using software (Word, etc.) save often.

How can I be sure that my files will be available when I need them. BACK UP IMPORTANT DATA Often Specifically what should YOU do with your data. At least once per semester, back up your entire computer if it is at all convenient. I use a removable hard disk They are currently cheap

Securing YOUR data (continued) I back up my “My Documents” folder on a monthly basis, usually burning it to a CD. My Really important stuff such as this semester’s notes, tests, grades, etc I back up on a weekly basis to two places – another drive on my home network AND a USB flash memory drive My really, really, really important stuff such as my financial data, I back up every time I use it to a USB flash drive and monthly to a CD.

How can I make my data secure? Secure data is data that is difficult for OTHERS to access. There are two basic methods of securing data: Password systems Encryption

Password Systems Username and Password – Good systems will not tell you which one is wrong if one of them is. Usernames are often given to you so you have no choice as to what to use. Most people choose their own passwords.

Password Systems (Cont) Bad things users do: Easy to guess passwords. Tell their passwords to friends. Write their passwords on a paper and leave it near their computer. Short passwords can be guessed by brute force.

Password Systems (Cont) If the system is not secured, then the password file may be compromised and all passwords will be unsecured. Some systems (older versions of Windows) had their password files unencrypted. The system manager has special powers over users, so if a system manager’s account can be cracked all security is lost.

How can you make good passwords? Make it long. Use both letters and digits, maybe even special symbols Use upper and lower case. Example: dsitBtitw5 (dr sidbury is the best teacher in the world 5) Example: P=2*(L+w)

Encryption Ebub jt fodpefe tp uibu ju epfto’u mppl opsnbm. Data is encoded so that it doesn’t look normal.

What else can go wrong internally? Programs may make duplicate copies of data which aren’t secure and may even be sent to developers. Erased data is not really erased, unless you take special precautions.

What can go wrong externally? That is, what problems does the use of a network cause? Keyboard Sniffers Wire tapping Trojan Horses Viruses Worms

Firewalls – What do they do? A firewall monitors traffic from one system to another one. The systems may be individual computers or networks. Most computers which you buy have a built in firewall. You should configure them or you will not be able to use software correctly.

Firewalls Unfortunately there are lots of different firewalls, so I can’t help you with details about them. But we can look at some of the settings on Zone Alarm Pro, which is what I use.

Summary Data should be safe (not likely to be lost) and secure (hard for someone else to get) Safety is primarily implemented with backups Security is implemented with: Username/Password systems Encryption Antivirus Firewalls

Terminology Audit Trail Caesar Cipher Firewall Incremental Backup Persistent Storage Personal Identification Number (PIN) Public Key Encryption Transactions Trojan horses Virus Worm