1.1 System Performance Security Module 1 Version 5.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Section C Threats to Data.
POSSIBLE THREATS TO DATA
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Online Course START Click to begin… Module 2 General Information Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
IT Security Essentials Ian Lazerwitz, Information Security Officer.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
10 Essential Security Measures PA Turnpike Commission.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
New Data Regulation Law 201 CMR TJX Video.
1.1 Identify security issues that might threaten system performance. Charlie is aware that having a slow computer can be incredibly irritating, especially.
Internet safety By Lydia Snowden.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1.1 Identify security issues that might threaten system performance.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
ITQ LEVEL 1   IT Security for Users.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
ITQ LEVEL 1 IT Security for Users.  1. Which one of the following describes spam ? A.Gathering information about a person or organisation without their.
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Policies and Security for Internet Access
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
OCTOBER IS CYBER SECURITY AWARENESS MONTH. October is Cyber Security Awareness Month  Our Cyber Security Awareness Campaign focuses on topics such as.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Computer Security Keeping you and your computer safe in the digital world.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Slide Template for Module 4 Data Storage, Backup, and Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security of Data  
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

1.1 System Performance Security Module 1 Version 5

1.1 System Performance Security2 Unwanted Messages ‘ Spam ' is unwanted bulk Unwanted and other messages, or 'spam', can be received on the computer Use anti-spam software to protect the computer from the risk of unwanted messages

1.1 System Performance Security3 Malicious Programs 1. Malicious programs are: viruses, worms, trojans, spyware, adware, rogue diallers 2. Malicious programs can enter the computer by: USB’s attachments Downloads

1.1 System Performance Security4 How to Protect against Malicious Programs Use anti-virus and anti-spyware software to protect the computer from the risk of malicious programs Remember that anti-virus software needs to be updated regularly To Protect your computer from malicious programs: 1. Do not open attachments from unknown users, 2. Treat messages, files, software and attachments from unknown sources with caution

1.1 System Performance Security5 Infiltration A hacker is a skilled programmer, who secretly infiltrates computers without authorisation A firewall helps to protect the computer against the risk of infiltration

1.1 System Performance Security6 Hoaxes s can contain hoaxes: virus hoaxes, chain letters, scams, false alarms, misunderstandings, scares Check whether a message you have received is a hoax

1.2 Information Security Module 1 Version 5

1.2 Information Security8 Identity/Authentication Information can be at risk from unauthorised access An individual user name limits access to relevant levels of information when logging onto a computer Passwords and PIN numbers help to protect information from the risk of unauthorised access You should change your password/PIN number regularly Passwords should have a minimum of 6 characters and include a mixture of letters and numbers E.g. speaking753clock 321Butter258cup Tammy147Marie36

1.2 Information Security9 Confidentiality A password or PIN number protects information from unauthorised access You should not share your password/PIN number with anyone Do not write down your password/PIN number Password/PIN numbers should be memorised

1.2 Information Security10 Confidentiality of Information You should respect the confidentiality of information you have access to Only disclose confidential information to authorised personnel or systems Avoid leaving your computer unattended without logging off or locking it, to prevent the risk of unauthorised access to data

1.2 Information Security11 Identify Theft Phishing is an directing you to enter personal details on a fake website Inappropriate disclosure of information can lead to identify theft Avoid inappropriate disclosure of information by not giving personal details

1.3 Technology Security Module 1 Version 5

1.3 Technology Security13 Networks Sharing resources and data is the main advantage of using a public network. Unsecured networks can make information accessible to others Confidential information may be sent across an unsecured network in an encrypted format Wireless networks may be visible or accessible to other users There are security risks when using default passwords and settings on networks, computers and programs as they offer a low resistance to Hackers Internet security settings should be adjusted to prevent the risk of access to your network by other users

1.3 Technology Security14 Connectivity Bluetooth is short range wireless protocol for exchanging data Bluetooth settings should be adjusted to prevent the risk of unauthorised access to a Bluetooth device by others

1.3 Technology Security15 Portable Devices Portable devices are vulnerable to loss or theft: laptop, notebook, PDA, mobile phone, multimedia player USB’s and other removable storage devices can contain valuable and confidential information that is vulnerable to loss or theft

1.3 Technology Security16 Keeping Portable Devices Secure Ensure all portable and removable devices are stored safely and securely by: storing small devices out of sight on your person or in a locked drawer A laptop or other larger device, should be secured to a desk with cable (if you have to leave it unattended for a short period of time)

1.5 Data Security Module 1 Version 5

1.4 Guidelines and Procedures Module 1 Version 5

1.4 Guidelines and Procedures19 Guidelines and Procedures Relevant guidelines and procedures for the secure use of IT within your organisation are usually held by the IT Department Always follow the guidelines and procedures listed by your organisation, for the secure use of IT If you are unsure of the procedure to follow you should contact the Systems Administrator

1.4 Guidelines and Procedures20 Guidelines and Procedures (2) Understand the IT security checks you should carry out, which are listed in the organisation’s security policy Report IT security threats or breaches using the channel identified in the organisation’s security policy

1.4 Guidelines and Procedures21 Privacy Know the privacy policy within your organisation by reading the policy in the organisation’s policy manual Ensure you follow the privacy policy within your organisation

1.5 Data Security22 Security Prevention of Data Theft involves : Preventing access to data by: 1. using usernames and passwords/PIN numbers 2. Logging off the computer before leaving the room Preventing theft of computers or storage devices by: 1. locking computers and hardware using a security cable 2. storing small devices out of sight on your person or in a locked drawer or filing cabinet

1.5 Data Security23 Backups Backing up personal data and software is essential to prevent loss of data due to: 1. Accidental file deletion 2. Data corruption 3. Computer malfunction and subsequent file loss 4. Theft of your computer 5. Natural disasters like fire, flood or earthquakes Back up your personal data to appropriate media: like a labelled CD or USB or External Hard Drive It is important to have a secure off-site backup copy of files

1.5 Data Security24 Storage Store your personal data safely: Use a labelled storage device to backup personal data Make multiple copies of your data Store back up copies of personal data off-site Store software securely by making backups and storing off-site