Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
How It Applies In A Virtual World
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Security of, privacy of and access to personal/confidential information/data.
Issues for Computer Users, Electronic Devices, Computer and Safety.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
IT Security  .
Secure Software Confidentiality Integrity Data Security Authentication
Year 10 ICT ECDL/ICDL IT Security.
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Lesson 2- Protecting Yourself Online
G061 - Network Security.
Presentation transcript:

Year 10 ICT

What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the secure use of ICT in daily life. It also teaches us to use relevant technologies and applications to maintain a secure network connection, use the internet safely and securely, and manage data and information appropriately.

Goals of this Module  Understand the key concepts relating to the importance of secure information and data, physical security, privacy and identity theft.  Protect a computer, device or network from malware and unauthorised access.  Understand the types of networks, connection types and network specific issues including firewalls.  Browse the World Wide Web and communicate on the internet securely.  Understand security issues related to communications including and instant messaging.  Back up and restore data appropriately and safely, and securely dispose of data and devices.

1 SecurityConcepts This section will introducethe main concepts underlying the secure use of ICT in daily life. It will explain threats to your data, and give you an understanding of measures you can take to protect it Data Threats When working with data, it is important to be aware of potential threats that may pose a security risk through the theft of or loss of the data. Once you are aware of potential theseof of outcometh e againstdatayouryourselfto to easieris is it it threats,an d protect threats. Methods of protection will be covered later in this Module. Distinguish between data and information Dat a are facts, numbers or images that are collected to be examined and considered, in order to help in decision-making.Information is the interpretation of this data in a structured way, in order to provide knowledge based on study, experience or instruction. For example, if you conduct a survey to ask 500 people of different ages and different professions how they use IT in their day-toto day lives, the answers these 500 people give to your- questions are ‘data’. When you analyse this data, you obtain ‘information’, which gives you knowledge about how the use of IT is affected by age and profession.

Data Threats  When working with Data, it is important to be aware of potential threats that may pose a security risk through theft or loss of data.  Once you are aware of potential threats, it is easier to protect yourself against them.

Distinguishing between Data and Info  Data is facts, images and/or numbers that are collected to be examined and considered in order to help make decisions.  Information is the interpretation of this data in a structured way.  Example: You ask 200 people what type of phone they have. The answers you receive are classified as data. When you analyse this date, you get information.

Cybercrime  Cybercrime is the use of any computer, or network, to commit a crime.  Financial Scam  Computer Hacking  Downloading Pornographic Images from the Internet  Virus Attacks  Stalking by  Creating Websites that promote racial hatred  Identity theft  Social Engineering.

Hacking, Cracking and Ethical Hacking  A hacker is an individual who attempts to bypass the security mechanisms of a network or information system.  A cracker is someone who exploits the weaknesses and security holes with malicious intent such as blocking accounts, or stealing information.

Hacking, Cracking and Ethical Hacking  Ethical hackers are computer security experts. They are employed by a company to attempt to bypass the security of said company’s information systems. The company can then act on this information, making their network safer.

Threats to Data  Force majeure relates to unforeseen events beyond the control of the company. Items include war, natural disasters, system crashes and corruption.  Employees can pose a risk to confidential information. They could pass information on to other people, or use it for their own advantage. They could even accidentally delete it.

Value of Information  Personal Information is any info or combination of information that enables the identification of an individual.  Personal information must be protected to prevent:  Internet based fraud  Identity Theft

Value of Information  Commercially Sensitive Information includes:  Statements of financial information  Information of a company’s pricing structure  Information in the nature of operating and financial information  Current client lists, production costs, hourly rates etc.

Value of Information  Commercially sensitive information must be protected to prevent:  Theft  Misuse of client details  Misuse of financial information

Preventing Unauthorized Access to Data  Using a username and have a good password  How strong is your password? (school, social media, home) 

Protecting Data  Data Encryption The process of transforming information (plaintext) using an algorithm (cipher) to make it unreadable to anyone except those possessing special knowledge. The resulting product is encrypted information (ciphertext). Reversing the process is called decryption.

Data and the Law  The way computers can process, store and transfer data has necessitated some form of legislation to protect the privacy of individuals.

Data and the Law  Anyone with personal data on their computer (Data Controllers) must ensure that:  Personal data is processed fairly and lawfully  Personal data is always processed in accordance with good practice  Personal Data is only collected for specific explicitly stated and legitimate purposes.  Personal data is not processed for any purpose that is incompatible with that for which the information is collected.  Personal Data that is processed is adequate and relevent in relation to the purposes of the processing.

Data and the Law  No more personal data is processed than is necessary having regard to the purposes of the processing.  Personal data that is processed is correct and, if necessary, up to date.  All reasonable measures are taken to complete, correct, block, or erase data to the extent that such data is incomplete or incorrect, having regard to the purposes for which they are processed.  Personal data is not kept for a period longer than is necessary.

Personal Security  Social engineering is a way to manipulate or influence people with the goal to illegally obtain sensitive data. Social engineers gather this information through phone calls, phishing and shoulder surfing.

Definitions  Phishing: A technique of fraudulently obtaining private information. Usually in the form of a fake , that appears to be from a legitimate business requesting verification of information.  Shoulder Surfing: Looking over someone's shoulder to see information they are entering into a computer.

Implications of Identity Theft  Personal  Can be devastating, causing emotional distress, anxiety, and even triggering depression.  Financial  Financial histories and credit records can suffer from identity theft leading to the loss or misuse of one of more existing accounts.  Business  Particularly in credit and financial fields, also suffer financial losses. A business can suffer from lost time and productivity when the victim is an employee.  Legal  Re-establishing a legal identity, including personal details, passport and tax records.

Methods of Identity Theft  Information Diving  The practice of recovering technical data  Skimming  An electronic method of capturing a victim’s personal information used by identity thieves. The skimmer is a small device that scans a credit card and stores the information found in the magnetic strip.  Pretexting  Creating and using an invented scenario to engage a targeted victim.

Setting Macro Settings

Setting a Password on a.docx

Advantages and Limitations of Encryption  Advantages:  Protect information stored on your computer from unauthorised access  Protect information while it is in transit from one computer system to another  Deter and detect accidental or intentional alterations  Verify whether or not the author of a document is really who you think it is.

Advantages and Limitations of Encryption  Limitations  If you forget your password then there is almost no chance of recovering your data  Some forms of encryption only offer nominal protection and can be broken easily.  Encrypted files attracts a suspicion as to what it is you are trying to protect.  Cannot prevent deletion of data.

Review  The process of intentionally accessing a computer without authorisation or exceeds access is known as:  A) Cracking  B) Phishing  C) Hacking  D) Pretexting

Review  The process of intentionally accessing a computer without authorisation or exceeds access is known as:  A) Cracking  B) Phishing  C) Hacking  D) Pretexting

Review  Which of the following is not a basic characteristic of information security?  A) Confidentiality  B) Locality  C) Integrity  D) Availability

Review  Which of the following is not a basic characteristic of information security?  A) Confidentiality  B) Locality  C) Integrity  D) Availability

Review  Encryption is the process of transforming plaintext using an algorithm to create ________ and make it unreadable by the use of a key  A) Pretext  B) Short Text  C) Gibberish Text  D) Ciphertext

Review  Encryption is the process of transforming plaintext using an algorithm to create ________ and make it unreadable by the use of a key  A) Pretext  B) Short Text  C) Gibberish Text  D) Ciphertext

Review  Which one of the following terms describes the process of someone monitoring you keying in your ATM pin with malicious intent?  A) Shoulder Surfing  B) Phishing  C) cyber Bullying  D) Cracking

Review  Which one of the following terms describes the process of someone monitoring you keying in your ATM pin with malicious intent?  A) Shoulder Surfing  B) Phishing  C) cyber Bullying  D) Cracking