ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Threats to I.T Internet security By Cameron Mundy.
1.1 Identify security issues that might threaten system performance. Charlie is aware that having a slow computer can be incredibly irritating, especially.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1.1 Identify security issues that might threaten system performance.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
1.1 Identify security issues that might threaten system performance.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Shreya Houji. VirusesViruses.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
Internet Safety Internet Safety LPM
All about viruses, hacking and backups By Harriet Thomas.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Year 10 ICT. What is it about?  This module sets out essential concepts and skills relating to the ability to understand main concepts underlying the.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Unit 4 IT Security.
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

ITQ Silver Unit 4 - IT Security for Users ICT DEPARTMENT Smith’s Wood Sports College NameChantelle Cogin Deadline

Silver Unit 4 - IT Security for Users (1 credit) Introduction This unit aims to provide learners with the ability to protect hardware, software and the data within an IT system against theft, malfunction and unauthorised access. This unit is about the skills and knowledge needed by the IT user to avoid common security risks and control access to software and data; and use a wider range of methods to protect software and data (e.g. from exchanging information by or when downloading software from the Internet). Learning Outcomes You will be able to: 1.1 I can identify security issues that might threaten system performance. 1.2 I can take appropriate security precautions to protect IT systems and data. 1.3 I can identify threats to information security associated with widespread use of technology. 1.4 I can take appropriate precautions to keep information secure. 1.5 I can follow relevant guidelines and procedures for the secure use of IT. 1.6 I can explain why it is important to backup data securely. 1.7 I can ensure that my personal data is backed up to appropriate media. Students should complete tasks 1.1 to 1.7 within this document

The Charlie Westwood Story Charlie Westwood is 16 years old; he lives in Solihull near Smith’s Wood. He has just completed his GCSE’s and is going to continue his studies at a local college. As a gift for doing well in his exams, his dad has bought him a PC. Charlie is very concerned about his new PC’s Security that he has asked you to help him avoid common security risks and to ensure his hardware, software and data are protected.

1.1 Identify security issues that might threaten system performance. Charlie is aware that having a slow computer can be incredibly irritating, especially when it takes a long time to complete even the simplest of tasks. Charlie will be using his computer a lot for his college work, so he is keen to ensure that its performance is not compromised. Identify common security issues that could affect the way Charlie’s computer performs. a) Explain to Charlie how the following risks may have an impact on a PCs performance: RiskExplain what the risk is to the machine how it may slow Charlie’s PC. Unsolicited (SPAM) junk mail Junk mail takes up to much space on your computer and it also causes the computer to run slow. Viruses causes harm Viruses causes harm and it can brake the computer and fill up all the memory on the computer. Adware advertising cookies Advertising cookies can use up your RAM memory which means you do not have much memory to use and it can also cause your computer to run slowly. Trojan Horses pretend to be safe Trojan horses can brake your computer and it can mess with the computer memory. Worms replicates replicates can fill up all the computer space so you have no more space on you computer. It can also brake your computer. Rogue Diallers calls, phone numbers there is more than none thing connected to the internet and it makes it run slower. Hackers take over Hackers could try doing something on your computer and the hacker could also access your account or delete all your files. Hackers can also change your password so they can hack it anytime without you knowing. Web browser advertising and Pop ups. opens a window such as your computer. If loads of different adverts keep popping up while your trying to do something then it will make your computer run slow.

1.2 Taking appropriate security precautions to protect IT systems and data.. It is important that Charlie shows practical capability and a responsible attitude in relation to basic security in his everyday life at home and college. a)Explain to Charlie the risks or dangers of the following: Swapping passwords with others…. People can go onto your account and delete your files. Failing to keep his passwords secure…. Someone will go on your account and put things on there that you don’t want Using ineffective passwords (e.g. the word "password" or a single key stroke)…. easy to guess so hackers can access it Downloading or attempting to download information that is either against local policies or is not known to be secure…. Slows down your computer and downloads things that are illegall

b)It is essential that Charlie has a suitable password. Complete the 2 nd column below say how strong (difficult to guess) you think each password is (very weak – weak – good – strong – very strong) Password How strong do you think it is and why? Actual strength using website password It isn’t that strong because it is easy to guess. Weak password1 It isn’t that strong because it is easy to guess. weak £pasSword1 Its harder for people to guessGood pa$word1 Its easy for people to guessStrong Pas$word1 Harder for people to guessVery strong Pa5$word1 Harder for people to guessVery strong c)Now go on the website and find out if you were right – complete the 3 rd column.

e) Explain to Charlie why it is important to take the following precaution to protect data? PrecautionWhy Updating anti-virus software and make regular checks it is important cause if a virus gets downloaded on your computer then the anti virus software will remove it. Back up data and ensure backups are in a physically separate If your computer gets wiped you have your back up files and you wont loose anything but if you haven’t backed up your files then you will loose all your work and wont be able to get it back. Install and Adjust firewall settings prevents hackers from accessing your computer and getting into your files. Download security software patches and updates; If you don’t update it then your not protecting your computer. Adjust internet security settings It can make your computer safer because it stops you from accessing things that you shouldn’t be on. Access levels People can access all your different things in your files

f) Explain to Charlie why it is essential to take the following precaution to protect IT systems? PrecautionWhy Locks on doors it prevents robbery if you leave your door open or unlocked someone can try open it and they will be able to rob personal things. Physical controls Someone can try break into your house but you can have an alarm, the alarm will go off when someone brakes into your house and then you could catch them. Report security threats or breaches if there is any harm done to you or your house after you have reported the threats the police will already be involved and will deffonailty do something about it Fire safety equipment in IT Rooms You need it because there could be a fire in an IT room so it is important that they have fire safety equipment in all rooms.

1.3 Identify threats to information security associated with widespread use of technology. Help Charlie identify some specific key threats relevant to his circumstances. a) Within college Charlie will use MS Outlook. Explain why Charlie should take care when using ? If people know his and password and he is using his for work then people from his work can log onto his account and delete all his work or they can mess about with his work. They can also change his password so he doesn’t know it and wont be able to log back onto his . b) Explain to Charlie what SPAM is and what he should do about it? Spam is Junk mail and if you have junk mail you need to delete it because you don’t need it. Also you can set up a filter in your settings to automatically delete spam s. c) Explain why Charlie should not leave his computer logged on in public places e.g. the open access areas in college? Charlie shouldn’t leave his computer logged on because other people can have access to all his things and delete it. They can also change his work or people could copy his work onto a memory stick and use it like its there own work. d) Why is it important that Charlie has a strong password for all his IT accounts? It is important that he has a strong password because people will be able to guess it and log onto his account. If he had a strong password that includes capital letters and numbers no one will be able to guess what it is and log on. e) Why shouldn’t Charlie store his user name and passwords in public web browsers? Charlie shouldn’t store his user name/password in a public browser because anyone he doesn't know will find out all his information. People will also be able to change his password and username and log onto his account without him knowing Charlie needs to be aware that there are people who pretend to be trusted entities in order to get personal information from users. (Phishing). f) Why shouldn’t Charlie provide personal information on a public network (e.g. the college network) that could enable criminals to access individuals' personal data? He shouldn’t put personal information on any public network because people he doesn’t know will be able to read his personal information so it is best that he keeps his personal information of all public networks.

1.5 Following relevant guidelines and procedures for the secure use of IT When in college Charlie must follow their security guidelines and procedures. These rules are made by the college and state how its IT systems should be used. The rules generally cover privacy, security and legal requirements. Each time Charlie logs on to the college network he is greeted by an Acceptable Use Policy (AUP) screen. a) Briefly explain to Charlie what the purpose of the Acceptable Use Policy (AUP) is and why he should obey the policy? He should obey the policy because if you are trying to hack someone's account you are having access to all there files without them knowing and when you are having access to someone's files you can delete all there work or you can mess about with it and you should not tamper with any other network area.

1.7 Demonstrate how personal data is backed up to appropriate media Show Charlie how to “back up “work effectively from your college computer onto a USB/Memory stick a) Show a printscreen of files on your college computer, paste the printscreen below. b) Show a printscreen of the files saved on your USB/Memory Stick, paste the printscreen below. c) Charlie isn’t aware that the college backs up all school data (full back up) regularly. Find about what happens and write a short paragraph why it is done. They back it up everyday and take it home at the end of the week incase a virus appears or it deletes any of your files. So if any of your work gets deleted or messed about with it will always be backed up so you will have all your work back.