 Introduction to Computing  Computer Programming  Terrorisom.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
Unit 28- Website Development Assignment 1- THEORY P3
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Discovering Computers 2010
Security Advice Georgie Pepper Campsmount Acadamy.
Threats to I.T Internet security By Cameron Mundy.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Computer Technology Timpview High School.  is inexpensive and easy to use and track  Spam – s sent in bulk to many people’s .
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Security Issues, Ethics, & Emerging Technologies in Education
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Malicious Attacks By Katya, Grace, Lachlan, Sairus and Eric!
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Awicaksi E-Commerce Security & Payment System E-Commerce.
What is Spam? d min.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Edexcel GCSE Cyber security threats Computer Science 1CP1
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Unit 4 IT Security.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
What The Right Steps To Check RR Mail If It Is Hacked?
Teaching Computing to GCSE
Cyber Security Lesson Quarter 1.
Norton technical support Norton.com/Setup | Norton Setup and Install with Product Key Norton Antvirus Activation For protection against.
Risk of the Internet At Home
Dear Students,   The school holidays are just around the corner. When spending time online during the school holidays, you should be aware of good practices.
Prepared By : Binay Tiwari
Philip Nichilo Vincent Carestia
How to Stay Safe Online Rollie Edwards.
Security in mobile technologies
Wireless Spoofing Attacks on Mobile Devices
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.

Presentation transcript:

 Introduction to Computing  Computer Programming  Terrorisom

No Background in Cyber Security

 Student Awareness  Maintaining Integrity  Smart User

 Cover Relevant Topics  Malware  Phishing  Points of Vulnerability  Protection Options  Resource Availability  Consequences

 Avoiding Dangerous Sites  Domain Name Clues  Intended Use  Ethical Use

 Personal Data Protection  Passwords, SSN, Address, DOB  Compromising Pictures/Videos  Attachments & Links from unknown senders  Social Engineering  Protect Your Computing Devices

 Produce an MLA Formatted Research Paper on a Cyber Security Related Topic  Produce a Class Presentation on a Cyber Security Related Topic

 Describe what is meant by cybercrime and who perpetrates it?  Name and describe the types of viruses from which I need to protect my computer?  Explain how you can protect a computer from viruses?  Explain how hackers attack computing devices and describe the harm they can cause?  Explain the purpose of a firewall and describe how it keeps a computer safe from hackers?  Identify 2 methods for password management?

 Illustrate how a person can surf the Internet anonymously and use biometric authentication devices to protect their data?  Describe the management of online annoyances such as spyware and spam?  Identify the data that should be backed up and describe the best methods for doing so?  Explain what is meant by social engineering and describe how someone can avoid falling prey to phishing?  Provide hands-on check for understanding