LO1 - Know about aspects of cyber security

Slides:



Advertisements
Similar presentations
Computer Security CIS326 Dr Rachel Shipsey.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advanced Networks and Computer Security Curt Carver & Jeff Humphries © 1999 Texas A&M University.
Year 10 – Chapter 4 – Computer Networks Lesson 5: Network Security Starter Task – Data Encryption ABCDEFGHIJKLMNOPQRSTUVWXYZ
Cambridge Technicals Unit 12 P3 -Security risks.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Attack Graphs for Proactive Digital Forensics Tara L. McQueen Delaware State University Louis P. Wilder Computational Sciences and Engineering Division.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Ensuring Computer & Data Security. Information Where there is an interactive task within the programme it cannot be completed on- screen. It is suggested.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Information Security Awareness Levels of TAFE South Australia Employees Hong Chan Bachelor of IT ( Honours ) Supervisor: Dr Sameera Mubarak.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
UNIT 1 DOMAIN NAMES Cambridge Technicals. Domain names You are going to prepare a presentation for a group of small business owners. They are interested.
Section 6 Theory Software Copyright, Viruses and Hacking.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
A General Overview of Information Security Senior advisor Mona Naomi Lintvedt
Page 1 Credits to Page 2 what happened What you don’t know CAN hurt you s o p l e a s e t a k e a moment to get to know around the world recently E-Rule:
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Social Networking Year 7. Starter List as many social networking sites you can think of or that you use or have used. GO!
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Unit 1 Living in the Digital WorldChapter 3 – Entertain Me This presentation will cover the following topics: What precautions should I take? Name:
 Introduction to Computing  Computer Programming  Terrorisom.
Internet Safety Internet Safety LPM
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
8.4 – Band Manager Spreadsheets Mr Farmer. Lesson 3 - Starter Wiki > Year 8 > Band Manager > Lesson 3 Click the link Read > Scatter > Test 10 mins.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Watch this… 7KQhI4 7KQhI4 Questions to think about: Is this bullying? And if.
Mr C Johnston ICT Teacher
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
McLean HIGHER COMPUTER NETWORKING Lesson 12 Network Security Requirements Description of computer and network security requirements (confidentiality,
UNIT 1 ROUTERS Cambridge Technicals. Routers You need to explain the function of a ROUTER in how computers connect to the internet and to networks in.
CAN YOU GUESS THE PASSWORD You and your teacher are going to work through a program with 5 different passwords. And you need to try and guess them. You.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
SLC – You tell me Web design – Using software design a website.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
NOT PROTECTIVELY MARKED The Cybercrime Problem What is cybercrime? What is the problem and how big is it? How you can protect yourself. T/DCI Tim Bower.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
CACHE Level 3 Early Years Educator CACHE LEVEL 3 CHILDCARE & EDUCATION Unit 7 Observation, assessment and planning Lesson 3 © Hodder & Stoughton Limited.
3.6 Fundamentals of cyber security
4th SG13 Regional Workshop for Africa on “Future Networks for a better Africa: IMT-2020, Trust, Cloud Computing and Big Data” (Accra, Ghana, March.
Internet developments
Year 8 ICT Internet Security
Liberty International Underwriters
Level 3 Revision & Portfolio
Current ‘Hot Topics’ in Information Security Governance Auditing
Chapter 5 Electronic Commerce | Security
Introduction Of Information Security
Anonymised information
Understanding the issues related to the use of information
Self concept- Self esteem –
Chapter 5 Electronic Commerce | Security
Unit 2: Global Information
D3 Confidentiality.
The science of learning
Understand Risks to IT Security
Social Networking: Esafety
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Computer Security CIS326 Dr Rachel Shipsey.
Data Protection.
LO1 - Know about aspects of cyber security
LO1 - Know about aspects of cyber security
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Computer Security CIS326 Dr Rachel Shipsey.
Presentation transcript:

LO1 - Know about aspects of cyber security Level 2 Technical IT Unit 2: Essentials of Cyber Security

What is Cyber Security? Lesson 1

Starter Using you current knowledge of IT and the how the internet is used, can you define what is meant by Cyber Security? Write your own definition 5mins

Objectives Understand what is meant by cyber security Understand the purpose and importance of cyber security

Cyber Security This is the processes, practices and technologies that are designed to protect networks, computers, programs and data/information from attack, damage or unauthorised access. What is a network? What is data/information?

Purpose and Importance The purpose of cyber security is: To protect information and data Keep information and Data confidential Maintain the integrity of information and data Protect information/data from unauthorised modification Maintain the availability of information and data Protect information/data from unauthorised destruction Task – Write notes in your book about Cyber security. You must have a correct definition Explain the purpose of protection personal data and the importance of this. Explain the purpose of protecting data in organisations and the importance of it. Explain what is meant by maintaining the integrity of data and unauthorised modification. Explain what is mean by maintaining the availability of data and unauthorised destruction.

Research Task Research different examples of cyber security incidents. Create a report on your findings. The report must include: The incidents where confidentiality has been breached The incidents where data/information has been accessed and modified The incidents where data/information has been destroyed Any incidents where there has been a combination of the above. Explain in as much detail what happened in these incidents. Don’t just copy and paste. Whatever websites you used, source them in a bibliography at the end of the report with links to the site.