GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.

Slides:



Advertisements
Similar presentations
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Advertisements

What is identity theft, and how can you protect yourself from it?
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
MStreamIT Toolkit
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
evidence. Safety To stay safe on the internet there are many points you need to follow. The first point is to change your password regularly, you.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Information guide.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Santa’s s By Chloe Warman.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Etiquette – a list of rules that we observe Phishing - sending an to a user falsely claiming to be a legitimate company to scam the user into providing.
Santa’s s By Brandon. Sending an attachment to Santa I attached the by pressing the attachment button above the recipient box I used.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
This PowerPoint presentation will show you how to use your productively and successfully.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
. Here is me sending an with an attachment, you click onto the paper clip icon in order to send the attachment.
 To send a you need to first click new.  Then type in the name off the person you want to send it to.  Then write something.  And to finish.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
Computer Security... By Kate Robinson 8P Viruses Hackers Backups Stuxnet Gary Mckinnon.
Santa’s s By…….. Sending an attachment to Santa Explain how you attached the . Clicked The Paper Clip and attatched it. Explain why you.
STAYING SAFE: Here are some safety tips when using Change your password regularly and keep it in a safe place. Don’t share your password with anyone.
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
All you need to know to keep you and your computer safe!!!
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Internet safety.. Dangers of the internet: Paedophiles. Cyber bullying. Money theft. Sexual harassment. Identity theft. Hacking of your accounts. Viruses.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1. Setting up an account- technical
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Internet Safety.
Unit 4 IT Security.
Lesson 3 Safe Computing.
Unit 4 IT Security.
What is it? Why do I keep getting from Barracuda? SPAM.
Santa’s s By……..
Internet Safety – Social Media
What devices use the internet?
Presentation transcript:

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA Viruses are when your computers are controlled without the owners messing with it, you can receive a virus through s the sender sends the virus attached to the message. A virus can break your computer such as sending spams to your computer, all you need to do to get rid of viruses is buy Norton you can buy Norton either online or buy the CD which then downloads onto your computer. Spyware is when someone gathers a lot of information about a person and sends their information to another person. To get rid of a spyware you will use a remover tool or anti spyware scanner, but to completely be able to move the spyware then you might have to use spyware scanner a few times. It can be hard to get rid of a spyware Spam are loads of messages which get sent of the internet which go to loads of people at a time, Often sent into a junk mail in a message inbox classed as a unwanted . It can be really annoying but it isn’t at all a harmless virus but it is described as a fraud. To get rid of spams you can delete the message permanently so it doesn’t then bother you anymore. Do not reply to them and don’t buy nothing which they might be advertising.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA Phishing is when someone collets information on someone's online bank, credit card, or other information which is needed to login. Which they may then get into and use your identity or even buy things from your accounts out of your bank. You can tell when a has been phished due to the grammar and spelling on the . A way to prevent the problem is buy reporting the person or if it is in your s then click the phish scam button. Change all of your passwords on your accounts, report it to your bank, report to the bank if something has been brought which you have not purchased. You should have a strong password on your account so people will not be able to hack into it, also it would be harder for people to guess. Do not include your name in your passwords also use numbers in your passwords. This stops someone who is trying to get into your account by not getting in because you have used a strong password. You should not have your name of address in your password or have your password as ‘password’ because that is what they are going to be trying first. Always remember to log out of your computer once you have finished so people do not go through your things if you have left it logged in. If you do not do this then as soon as someone else goes onto the computer you was using they could easily delete files or click buy things from your accounts.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA Passwords are use useful on your documents because if someone tried to get on your documents then they wouldn’t have much success depending if you have a strong password they aren’t able to get on your documents. They also should be strong so then people will not be able to guess it as easily. Having a password stops people from going on your accounts and then you are keeping yourself private. Keep your back ups safe such as putting a lock on them so no one else is able to download your files. Make sure no one is able to access. You could put your work onto a memory stick just incase your work gets deleted on accident or by someone else on purpose. Always have a firewall on your documents and computer so then no one can access or view your work. This stops people from being able to wreck your work because firewall will stop them from doing certain things such as editing or deleting.

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA You should always back up data such as you work and other important files just incase you accidentally delete your work, backing up your data is a useful thing to do because if you delete something then all you have to do is upload everything from your back up backed onto your computer. Also you then have evidence if someone ever asks you for your work or if it needs putting onto a new computer. Another way is by getting a memory stick or something which plugs into the computer what would save all of your work and information, you could then carry the memory stick everywhere you go just incase you need your work somewhere else. Also if you purchase a new computer it would be useful to back up your information on a stick so then you can upload it onto your new computer.