Manga comic industry security information presentation By Dominic Roofe.

Slides:



Advertisements
Similar presentations
Networks By the end of this session, you will:
Advertisements

Computer security Viruses Hacking Backups
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Computer Networks,Internet,& SMTP Priyanka Daultani Department of Computer Science USF, San Francsico, CA.
Computer Networks IGCSE ICT Section 4.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Internet Publishing and Network Topology The Internet yahoo.com to the rest of the Internet 3dbang.htm “web.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Protecting ICT Systems
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
By Julia Nguyen B2. What is it?  Networking is two or more computers linked together  Two common types are Local Area Network (LAN) and Wide Area Network.
IT Security for Users By Matthew Moody.
By Kyle Slinger.  A network is where you can send information to and from different PCs.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
Section 6 Theory Software Copyright, Viruses and Hacking.
By Ksenia Primizenkina 8K
By Ramneek Hundal.. 5 types of Virus.. I LOVE YOUI LOVE YOU. WormsWorms.TROJEN HORES.MELISSA.HAPPY 99 What is a virus. A computer virus is a computer.
Utility Programs Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Chapter 3.  The characteristics and purpose of: ◦ Intranets ◦ Internet ◦ Extranets.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
STAY SAFE!! Don’t fall for the same old tricks !!.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer security By Shreya Houji. VirusesViruses.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Computer Security! By Tiffy O’Connell Viruses Backup Hackers.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Introduction to Student Name Student Class.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
NetTech Solutions Protecting the Computer Lesson 10.
A Network Security -Firewall Bruce Turin.
Communications & Networks National 4 & 5 Computing Science.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
ASSESSMENT TOOL The assessment tool comprises 3 sections: o Infrastructure o Policy o Practice Schools self-assess two-yearly, and for each assessment.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

Manga comic industry security information presentation By Dominic Roofe

Contents 1- Security issues that could threaten system performance 2- Precautions you should take to protect IT systems and data and why it is important to back up data securely 3- Guidelines and procedures for company staff

Security issues! As a major company you will have many different files and private information that you want to be kept safe and the company system as well so you will need to do certain things to keep your information safe from certain issues that could threaten your system like, Viruses All PCs and servers that are connected to the company system should have anti-virus software (Norton or MacAfee) to ensure the files are protected from viruses Unauthorised software introduced to the company LAN (Local Area Network) via USB sticks or disks can threaten the performance of the system (download/general computer speed can be affected as well)

Security and Data precautions Unregistered websites can affect your system and system performance as they can end up uploading viruses and bugs into your system slowing performance and losing data so you should use the proxy server responsibly and program it a set of rules that only allow company software to use certain websites and restrict any other websites All data should be kept in the LAN (Local Area Network) where it should be guarded by a firewall and the DMZ (Dematerialized zone/Proxy server) where if any body tries to hack the system they will get stopped either through the DMZ or the Firewall If any s are sent through the company system that may contain private information then in order to keep the information private your company should have a SMTP (Simple Messaging Transfer Protocol) which should also include antivirus software (Norton or MacAfee)

Guidelines and procedures for company staff As staff you should take these simple instructions in order to keep your company information safe: Install Anti-virus software onto all company PC’s and servers (and SMTP if your company uses it) Program the Proxy server to only allow the company to use certain sites If you follow these rules your information will be safe Thank you