Security Advice Georgie Pepper Campsmount Acadamy.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Implications and Security Issues of the Internet By Neelesh Patel.
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
The Internet = A World of Opportunities
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Quiz Review.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Viruses By amrisa hussain Internet safety. viruses Viruses- a virus is a file or a piece of code which is capable of copying itself and typically has.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer security By Shreya Houji. VirusesViruses.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and Spyware Protection Group 9 Shana Reese, Jamarr Dumas, Casey Watkins.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security By Isabelle Cooper.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
This Guide is going to be about how to  attach files  create a signature  send to multiple recipients with using ‘Cc’ and ‘Bcc’  change the priority.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
Technology Mrs. Huddleston
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security Advice Georgie Pepper Campsmount Acadamy

Introduction The most common security issues that threaten your It systems and data are:  Viruses  Trojans  Spyware  Spam In this guide you shall learn what these common security threats do and how to prevent them from taking over your computer software's. Georgie Pepper Campsmount Acadamy

Viruses  A computer software is a small programme designed to spread from one computer to another. They will then interfere with your computers operation and make your pc slow.  A virus could potentially delete your files or corrupt your computer. Viruses are normally found on s and links.  A computer virus makes several copies of itself.  Computer viruses don’t normally damage your computer but they do damage you files and data  Viruses can slow your computer down and make it very annoying.  To prevent a virus getting onto your computer, you can install an anti-virus software. Examples of this are:  AVG  Norton security  Mcafe Georgie Pepper Campsmount Acadamy

Trojans  A Trojan virus does not have the ability to make copies of itself as a common virus could but it can:  Copy data  Block data  Modify data  Delete data  However, it could lead to viruses be installed on your devices.  A Trojan viruses works by claiming to be one thing (like a game) but actually when it runs it causes damage to your computer.  Disrupt your computers by making it slow.  You stop Trojan virus the same way you stop a virus…. By installing an anti-virus software. You do this because a Trojan virus is still a virus so you stop it in the same way. Georgie Pepper Campsmount Acadamy

Spyware  Spyware is a programme that works by secretly recording what you are doing on your computer.  You can use spyware for good and for bad.  Its aim is usually to discover passwords, banking credentials and credit card details.  Spyware can transmit, monitor and record your online activities.  If you constantly have pop-ups you could have spyware living on your computer.  Spyware doesn’t affect the performance of your computer but it does spy on you.  To prevent spyware from getting onto your computer, you could:  Create a firewall= protect (a network or system) from unauthorized access with a firewall.  Update your software  Adjust internet explorer security settings  Download or install an anti-spyware software  Surf and download more safely Georgie Pepper Campsmount Acadamy

Spam  Spam is often considered to be electronic rubbish that is sent to many computer users.  Real spam is generally advertising for a product.  There is little to be done to prevent yourself from receiving spam.  As long as you do not open advertisements or spam you should be ok.  Spam can often make your computers slow if you open them. Sometimes spam can install viruses on your computer.  Check who it’s from. Spam will almost always come from an unrecognized sender, often with odd addresses. Don’t open an if your totally unsure who the sender is.  If you accidently open a spam then report the spam as quick as possible. Georgie Pepper Campsmount Acadamy