Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
GCSE ICT Networks & Security..
Section C Threats to Data.
POSSIBLE THREATS TO DATA
Computer security Viruses Hacking Backups
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
What are the risks to the data when we store all our work on computer? By Jessica Mann.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
STAY SAFE!! Don’t fall for the same old tricks !!.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
How to use ? By Martyna Haliniak. How to log on? In order to log on, you have to type in your username & password in the text boxes, and then click.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
By Demi Gardiner 8P Who’s been on your computer??
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Ethics. Ethics are the principles and standards we use to decide how to act.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
INTERNET SAFETY FOR KIDS
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All you need to know to keep you and your computer safe!!!
By Liam Wright Manga comic group Japan SAFETY on your computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Don’t let them catch your computer!!!!!
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Microsoft SQL is known as RDMS (Relational Database Management System) which is developed by Microsoft and is highly used at corporate and enterprise.
Information Systems Design and Development Security Precautions Computing Science.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Unit 4 IT Security.
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect it you can use a firewall. Depending how good your firewall is you can prevent any type of threat but if your firewall is old and bad threats can get in but not all threats.

Anti-Virus Software 1.What is anti-virus software? Anti virus software is a program that you install that is used to scan your computer for any viruses/malware that can be detected during the scan. It can also remove it for you as well sometimes to keep the computer safe. 2. Why should you update this software? You should update this software regularly because there are always new viruses that are being made. By updating to new software, it should insure that these new viruses cannot harm your computer of anti-virus system.

Access levels Read only Read and write Full control An Access level is a maintenance option in computer basic input/output system settings that shows the current user's access level.

Passwords are sequences of characters which is hard for anyone else to work out also known as a strong password and can change it regularly which it a good idea for the maximum protection for your account, For example Facebook or eBay so it’s a good idea to change your password to prevent people getting access to your account and to stop anyone to get your credit card details. Some people think that it is a bad thing to change their password because they might forget the password next time they try to log in.

Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it. It is so important because if a hacker gets access to the file he wont be able to read it because the file will be in plain text. The text is translated in a design called encryption algorithm. This mean the writing will appear as ciphertext. What is encryption?

Encryption is the process of encoding messages (or information) in such a way that third parties cannot read it. It is so important because if a hacker gets access to the file he wont be able to read it because the file will be in plain text. The text is translated in a design called encryption algorithm. This mean the writing will appear as ciphertext. What is encryption?

This is something that makes sure that people cannot access your computer such as, doors, passwords on your computer and windows which stop any opportunist threats. If there are not any physical barriers present then it makes it easier for someone to gain personal information from this computer. Opening a ICT company next to a river may not be a smart idea, especially if it is prone to flooding. If your equipment is on the ground floor you are going to loose it, however it can be overcome by building it higher above the ground. What is a physical barrier?

A back up is a copy of a file or other item of data made in case the original is lost or damaged.