11 2 3 4 5 6 7 8 9 10 11 12 13 14 15234567891011 12131415 £1 Million 14 £500, 000 13 £250,000 12 125,000 11 £64,000 10 £32,000 9 £16,000 8 £8,000 7 £4,000.

Slides:



Advertisements
Similar presentations
15 £1 Million 14 £500, £250, , £64, £32,000 9 £16,000 8 £8,000 7 £4,000 6 £2,000 5 £1,000 4 £500 3 £300 2 £200 1 £100.
Advertisements

Computer security Viruses Hacking Backups

1 3. Data Protection and Privacy Reference: Discovering Computers 2003/2004 Course Technology, Thomson Learning Chapter 12 Note: The privacy laws in HK.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Johnson Logistics Solutions Office of Systems and Information Technology.

IB WAVES SPECIAL.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
The Internet = A World of Opportunities
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Click on the question number you require.

Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
Protecting ICT Systems

IT Security for Users By Matthew Moody.



By Ksenia Primizenkina 8K
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
£1 Million 14 £500, £250, , £64, £32,000 9 £16,000 8 £8,000 7 £4,000.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Fitness & health.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
$1 Million 14 $500, $250, $125, $64, $32,000 9 $16,000 8 $8,000 7 $4,000.
{ Active Directory Security Why bother?.   Law #1: Nobody believes anything bad can happen to them, until it does   Law #2: Security only works if.


Yr 8 Respiration.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.



2/11/ Dela Cruz.  Trojan Horses  Worms  Viruses  Piggyback software  Attachments with viruses 2/11/2016 Dela Cruz 2.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
2/18/2016Fatimah AlAkeel - Network 11 Introduction to Networks.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
£1 Million 14 £500, £250, , £64, £32,000 9 £16,000 8 £8,000 7 £4,000.

$1 Million 14 $500, $250, $125, $64, $32,000 9 $16,000 8 $8,000 7 $4,000.

Recommended Computing Practices Dean Steichen SIR Branch 8 February 16, 2006.
Topic P2 Special!
£1 Million 14 £500, £250, , £64, £32,000 9 £16,000 8 £8,000 7 £4,000.
CLICK below on the desired question number.
Centre of Expertise - Security Securing your business against cybercrime Or surely we do not have anything to worry about...do we?
£1 Million 14 £500, £250, £125, £64, £32,000 9 £16,000 8 £8,000 7 £4,000.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.


Network System Security - Task 2. Russell Johnston.
Technical Implementation: Security Risks
Working at a Small-to-Medium Business or ISP – Chapter 8
Cyber Security By: Pratik Gandhi.
Answer the questions to reveal the blocks and guess the picture.
Introduction to Networks
Introduction to Networks
Introduction to Networks
Introduction to Networks
Introduction to Networks
Presentation transcript:

£1 Million 14 £500, £250, , £64, £32,000 9 £16,000 8 £8,000 7 £4,000 6 £2,000 5 £1,000 4 £500 3 £300 2 £200 1 £100

A:B: Killer catsThermochromic & Teflon Coating £100 What are commonly used to secure buildings? C:D: Plastic fences CCTV 50:50

Excellent!Excellent!

Unlucky!Unlucky! That’s incorrect

A:B: £200 The Data Protection Act became law when? C:D: :50

Excellent!Excellent!

SorrySorry That’s incorrect …

A:B: £300 The Computer Misuse Act was introduced in? C:D: :50

FantasticFantastic

Oh dear! That’s incorrect …

A:B: EncryptionDon’t use them £500 What’s the best way of protecting s? C:D: Send from homeSend from a public computer 50:50 Ask Me Ask us

BrilliantBrilliant

SorrySorry That’s incorrect …

A:B: Load Trojans onto the PC Test it with a virus £1,000 What should you do with Antivirus protection? C:D: Don’t use it Update it regularly 50:50

Well done!

Unlucky!Unlucky! You should have thought of your experime nts!

A:B: Good features Current Licences £2,000 What should all software used by organisations have? C:D: Be available free Easy to install 50:50

Super!Super!

Oh no! That’s incorrect !…

A:B: Copper based ethernet Wireless £4,000 Which transmission media are most secure? C:D: CoaxialFibre Optic 50:50

Very good!

IncorrectIncorrect So near and yet so far!

A:B: Antivirus softwareSoftware Firewall £8,000 An organsiation has been subject to attack what should it install? C:D: Intrusion Detection System Hardware Firewall 50:50

Very good!

Sorry!Sorry! That’s incorrect …

A:B: System crashesInternet access closes £16,000 What happens when unused ports & protocols are closed down? C:D: Softens the systemHardens the system 50:50

Very good!

UnluckyUnlucky That’s incorrect …

Digestion A:B: Upper& Lower case letters Numbers & Characters £32,000 What should be used in passwords? C:D: At least 8 letters Digestion NumbersCharacters 50:50

Brilliant!Brilliant!

Unfortunately…Unfortunately… That’s incorrect !

A:B: Server Engineer Telephone Engineer £64,000 A stranger walks into the IT room claiming to be from IT support who is he? C: D: Social Engineer Blackmailer 50:50

Well done!

I’m sorry That’s incorrect …

A:B: BiometricsToken access £125,000 A server door has iris or finger print scanners what is this called? C:D: Lock and keyNothing 50:50

Very good!

IncorrectIncorrect You should have got that one!

A:B: Weekly Backups Daily Backups £250,000 Which backups should be conducted? C:D: Differential Backups Incremental Backups 50:50

Excellent!Excellent!

Wrong Choice! That’s incorrect …

A:B: The computer The Router £500,000 A hardware firewall is normally built into? C:D: The InternetThe Modem 50:50

Very Good!

Sorry!Sorry! That’s incorrect …

A:B: £ 1,000,000 Are you enjoying this course? C:D: Yes love it to bits No Not at all Yes 50:50

Take a break! Fantastic!Fantastic!

UnluckyUnlucky You were nearly a millionaire and got a break!

Thank you for playing! Thank you for playing! Thank you for playing!