GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
The laws Organizations are covered by lots of different laws
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
1.1 System Performance Security Module 1 Version 5.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
The Simple Side of Computer Security for The Brownies That Like To Read!!
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Computer project – computer virus 1D Christy Chan (9) Patricia Cheung (14)
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
GCSE ICT 3 rd Edition Computer networks 19 A computer network is a collection of computers linked together so that they can communicate with each other.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
We are here to help you… Fight something like this Brownies !
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Data Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Safety and Security issues of using ICT Alys brooks.
All you need to know to keep you and your computer safe!!!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
UNIT 19 Data Security 2.
Unit 4 IT Security Kerris Davies.
There are two different types of computer network:
G061 - Network Security.
Presentation transcript:

GCSE ICT Viruses, Security & Hacking

Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How do they work - Designed to install, propagate & cause damage - Work on the memory of a system - 2 points of invasion – Disk drives / Network adapter cards GCSE ICT - Viruses

How a virus spreads: GCSE ICT - Viruses Virus

Preventative measures Anti-Virus software to scan files - must be regularly updated Firewall software - stops malicious programs being sent through networks - prevents unauthorised access (hacking) over the internet Backups (regular). Damage Caused Home computers Major organisations At worst, a total loss of data! GCSE ICT - Viruses

What is a computer virus? Malicious code of computer programming At what 2 points can a virus enter a computer system? Disk drives (i.e. floppy disk, CD) Network adapter card (over the internet, via , etc) Name two ways that will help prevent viruses Up-to-date Anti-virus software Firewalls GCSE ICT – Viruses (Recap)

Introduction to Security Methods of protecting data Up-to-date anti-virus software Passwords/Log-ons Backups - Stored away from the computer (tape, CD, removable hard-drives, off-site Web-based server) Web-based servers - Advantages Back-up data less likely to be “Lost” Can upload information at any time Backup data can be easily be downloaded GCSE ICT - Security

Web-based servers - Disadvantages May not be as secure Connection must be fast and reliable Fire/theft may cause upload/security information to be lost Keep information secure Prevent viruses - up-to-date anti-virus software - scan files at regular intervals - scan all new files GCSE ICT - Security

Keep information secure (continued…) Prevent unauthorised access - keep passwords CONFIDENTIAL! - choose random passwords - physical security (lock doors, etc) - secure & protect sensitive information GCSE ICT - Security

What kind of information should be kept confidential? Name 3 ways of protecting electronic data –Anti-virus software –Passwords/Log-ons –Keeping regular back-ups Discuss the advantages and disadvantages of Web-based servers… What ways can you prevent unauthorised access? –Keep passwords CONFIDENTIAL! –Choose random passwords –Physical security (lock doors, etc) –Secure & protect sensitive information GCSE ICT – Security (Recap)

Hacking Gaining unauthorised access to a computer, electronic information or network by breaking codes and passwords to gain unauthorised entry to computer systems. Hackers can do an enormous amount of damage Stand-alone computers are usually safe Computers which form part of networks are in danger from hackers. GCSE ICT – Hacking

Hacking (continued) Many hackers may or may not have no fraudulent intent Often carried out by corrupt employees or employees with a grudge The extent of hacking is difficult to assess, much of it is only discovered by accident. GCSE ICT – Hacking

Tasks: Complete ‘hackers and viruses’ handout Continue your own investigations into viruses, security & hacking on the Internet – – – – ict.com/gcse/theory/crime/hacking/ ckers/primer/index.html ict.com/gcse/theory/crime/hacking/ ckers/primer/index.html – resources.co.uk/hackers_for_schoolresourcescouk.htm resources.co.uk/hackers_for_schoolresourcescouk.htm – ict.com/gcse/theory/crime/hacking/hacking/index.htm ict.com/gcse/theory/crime/hacking/hacking/index.htm Make any additional notes. GCSE ICT