Threats to I.T Internet security By Cameron Mundy.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer security By Shreya Houji. VirusesViruses.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Stay Safe Online. Use strong passwords Using the same password for all your accounts makes it easy to remember. However, it also means a hacker needs.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Threats to IT security Jordan pilcher. phishing Phishing is when companies or people from other people who think they can get away with scamming you for.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Internet Safety.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
Lesson 3 Safe Computing.
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
Internet Safety Vocabulary
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Lesson 2- Protecting Yourself Online
Security in mobile technologies
What devices use the internet?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Threats to I.T Internet security By Cameron Mundy

Computer virus

Malware  This is malicious software that can slow down the computer and corrupt data files

Spyware  Spyware is software that helps in getting information about a person without their knowledge and it can send the information to another person or device without you knowing. They use spyware that can see the keys you are typing like passwords etc. Another type of spyware they use would be a software that can log on to your pc camera and record everything that you do.

Phishing  Phishing is a way of getting personal data such as usernames, passwords, and credit card details..  They gather this information by sending out s that look like they are real and from your bank. They then asked you to click on link which sends you to a website that looks real and asks you to input your bank details or user name and passwords

Hacking  A hacker is someone who seeks a weakness in a computer system or sometimes computer networks. They then use this weakness to get access to the system and then they can plant viruses or steal and damage data.

Spam  Spam is electronic junk mail which can contain malware, be phishing or advertising and is usually sent to you with out your permissions.

Precautions  Phishing: check sites are secure by looking for the padlock in the link.  Viruses: install anti-virus software and be careful what you download.  Hacking: get a firewall check the access.  Unintentional: back up system.  Everything: educate users

Secure passwords  GIFT (weak password)  GifT101 (medium strengths password)  G1$T#1o1 (strong password) Strong passwords should include:  upper case letters  lower case letters  minimum 8 characters  Numbers  Symbols

Antivirus software  You can download antivirus software easily and there are lots of free ones available this software helps prevent viruses attacking your computer.

Firewalls  A firewall could be described as a bouncer for the computer it only lets in who is allowed. It is normally a piece of software that is installed on a computer. You can also change the settings so that different computers and users have different levels of access.

Physical security  You can use physical security by locking doors and use cctv and have security guards. This is important to make sure any computers aren’t stolen.

Unintentional threats  If somebody accidentally deletes your work/files/accounts you can have a back up system just encase that happens so you can go back and get it back again. The back ups should be done at regular intervals, like every day.

Public Wi-Fi  The dangers of public Wi-Fi is that anybody can host a Wi-Fi hotspot with the same name as another public hotspot which can mean they gain all your information about you and your search history.  If you are on a public network don’t put in any personal information like bank details or account or something like Facebook or twitter.