POSSIBLE THREATS TO DATA

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Section C Threats to Data.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
UT Wing Civil Air Patrol. Objective Identify network and cyber vulnerabilities and mitigations Social Media/Metadata/Exfil data MITM Attacks Malware Social.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Data Security GCSE ICT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Digital Citizen Project By: Frances Murphey Technology and Education.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Network System Security - Task 2. Russell Johnston.
Security Risks Todays Lesson Security Risks Security Precautions
Cyber Security and Computer Safety
Chapter 40 Internet Security.
Viruses & Destructive Programs
IT Security  .
Network security threats
Topic 6: Issues Press F5 to view!
20332 security Legal and ethical issues when a business is providing internet access for individuals © EIT, Author Gay Robertson, 2016.
Malware, Phishing and Network Policies
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Cyber Security and Computer Safety
G061 - Network Security.
Presentation transcript:

POSSIBLE THREATS TO DATA

TYPES OF THREATS Opportunist threats People who find an unattended computer that has been left logged in to a system may view, steal or damage information, programs or hardware. Computer viruses These are small programs that can replicate themselves and spread from computer to computer. They are never beneficial; they make changes to the system they infect. They arrive by attaching themselves to files or email messages. Malware These include computer worms, Trojan horses, spyware and adware. Phishing Attempts to gain access to passwords, financial details and other privileged information. Done via email messages pretending to come from a trusted website, instant messaging or social networks. They try to divert you to a website that looks authentic and that asks for information about you. Accidental damage This may be caused by a natural disaster (flooding), mischief or accidental mishap, and can result in losing all of a computer’s data. Hackers People who purposefully try to gain unauthorised access.

PREVENTATIVE AND REMEDIAL ACTIONS Physical barriers These include turning off computers and locking offices when the systems are unattended to prevent damage by people, theft or the environment. Password control of access Passwords are sequences of characters, known only to the computer user, which allow access to a computer, network or application. Access levels These can be set up to allow individuals to have access to only specific levels of an application and to prevent unauthorised users from accessing particular data. Anti-virus software This is set up to intercept computer viruses before they can become resident on the computer. Firewall This is a piece of software that monitors all data arriving at your computer from the internet and all data leaving your computer. It stops anything that it thinks is harmful or unwanted. Encryption This is used to codify data so that it cannot be read by anyone who does not have the key to the code. Backup and recovery Making a backup of data is the only way of recovering from a total data disaster. Backups can be; a full system backup, incremental backups or backups to removable media such as USB sticks. Recovery Replacing the data if something happens, such as deletion or corruption. Personal Safety Security settings can be used on social networking sites to protect users’ privacy and reputation.

LEGISLATION Data Protection Act 1998 Computer Misuse Act 1990 Businesses must conform to the eight principles to protect the data that they hold about customers. Computer Misuse Act 1990 The law was created to punish hackers and creators of viruses. Copyright, Designs and Patents Act 1988 Copyright protects people’s original data such as artworks, music, code, books, etc. Freedom of Information Act 2000 This gives people the right to see data held about them by organisations, and also to request access to data about organisations such as local councils or national government. TECHNOLOGY USED FOR MONITORING Technology can be used to monitor people’s movements and communications. Movement: CCTV cameras, GPS devices like those found in smartphones, Data from airports, such as passenger lists Communications: Monitoring email, monitoring website visits, logging keywords typed into search engines.