Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Account Assurance Services This is what we protect you from the consequences of Cyber Crime.
1 Creating a Data Backup Oakland University University Relations Updated - June 2006.
POSSIBLE THREATS TO DATA
Computer security Viruses Hacking Backups
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
INTERNET SAFETY FOR STUDENTS
UNIT 1 OCR EVIDENCE You are required to build Powerpoint presentations as Awareness Guides for new staff and pupils arriving in school. They are intended.
A01 - Safe Working Practices - Safety Patrol UK Safety Patrol UK are an organisation that travels to businesses to give presentations and advice on using.
The Internet = A World of Opportunities
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
INTERNET SAFETY FOR STUDENTS
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Autumn assessment Welcome. This power point will tell you about how to protect your computer against viruses and computer break downs. From anti virus.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
STAY SAFE!! Don’t fall for the same old tricks !!.
Anti-virus software THERE ARE MANY ANTI VIRUS SOFTWARES TO KEEP YOU SAFE FROM VIRUS’S. THESE SOFTWARES ARE :  BULL GUARD  MCAFEE.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Viruses... a big problem with small solutions.
Computer security By Shreya Houji. VirusesViruses.
By Demi Gardiner 8P Who’s been on your computer??
Virus hacking Stuxnet Backups. Computer SecurityComputer Security Catch it, kill it, bin it.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Ethics. Ethics are the principles and standards we use to decide how to act.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Computer security By Isabelle Cooper.
Data Security.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
Virus Scan Software.  Every computer should have virus scan software to protect it from the increasing number of bad files that are installed on computer’s.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Onguardonline.gov By Austin Kellogg. Main ideas  Protect your personal information  Know who your dealing with  Use security software that updates.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
Writing an message Finish off your slide on recommendations of how to write an .
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
OCR Nationals – ICT Safe Working Practices
HOW TO MAKE YOUR GMAIL ACCOUNT SECURE…. At Google, we take account security very seriously. To protect your account, we strongly recommend following the.
Encryption and Hacking
Unit 4 IT Security Kerris Davies.
Computer Misuse Act 1990 GCSE ICT.
What is Information Security?
COMPUTER SAFTEY IS IMPORTANT….
Presentation transcript:

Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use anti virus software Use a sensible file name Make sure you always log out Protect important files with an extra password Protecting files from loss

Files are at risk of unauthorised access; hackers may break into your computer and steal files. People may also try to steal files from business to gain a competitive advantage Solutions Make sure rooms are secure Never tell anyone your password Protect important files with extra passwords Beware of computer hackers Anti-virus software Protecting files from unauthorised access

Protection files from modification Show screen shots of how to password protect a document Make files read only

Passwords You need to give recommendations on choosing a strong password