Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
BlueRedGreenPurpleOrange.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Threats To A Computer Network
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Quiz Review.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
IT Security  .
Unit 4 IT Security.
Personal spaces.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Title: The Internet LO: Security risks

Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus

Phishing Associated to s. It involves sending an that looks as thought it comes from a legitimate organisation (such as banks). They usually have a link that would lead to a fake website where the user will be asked to provide information (both personal and financial). It can lead to Identity theft

Pharming It involves re-directing users from a genuine website to websites that allow a pharmer or hacker to access data from the user’s computer or network. Infecting a user’s computer with a virus Direct users to fake websites Hacker can record the details entered by a user

Spamming Spam is also known as junk mail. It is send to fill your inbox and it tends to be more of a nuisance than a security threat unless you open a spam and follow the links they have in them. Your ISP probably has anti-spam filters and it may happen that legitimate s are sent to your spam but by recognising the account they will become legitimate.

Spyware It’s dangerous software that monitors and saves, in a file, all information typed on a user’s computer. The spyware then transmits the file to the person who installed the spyware. This could lead to passwords and important information being stolen.

Cookies Cookies are small amounts of text sent and received through the web browser as we search and visit websites. Cookies remember who you are and may welcome you to a website with a personalised greeting. They also store information about your habits. They can be useful when frequently visiting the same website and saving your login.

Cookies They can also be a nuisance because the allow other website to know what websites you frequently use and you can get unwanted suggestions of things you might be interested to buy or visit.

Viruses These are small programs that can invade your computer system and damage it. It is a piece of programming code that replicates itself and may corrupt or delete files and data. Some can erase or overwrite the hard disk with useless data

What to do? There are different ways of protecting your computer. Antivirus software Firewalls Be smart

Anti-virus An anti-virus is a software that can scan your computer’s memory, files that you accessed from the internet and attachments. If it finds a virus it’s put into quarantine so it can no longer access and harm the rest of the computer.

firewalls A firewall is also a software that work in real time and forbids programs from accessing the user’s computer. It can also denied unauthorised sites and computers from gaining access to the users computer.

Be smart - Do not open s of unknown users. - Do not access or download information from unknown websites. - If you downlaod any file from the internet run it through your anti-virus before you open it.