SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Primary Threats to Computer Security
POSSIBLE THREATS TO DATA
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
310KM Mobile Commerce Applications Lab/Tutorial 8 Part 3 Team members: Li Chun Yin Pun Hoi Lam Pun Hoi Lam Shek Hin Shing Shek Hin Shing.
FIT3105 Security and Identity Management Lecture 1.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Work through these.... Acronym – match ‘em up Voip SMS PIN SSID URL LED VLE GPS ISP CCV HTTP USB HDMI Voice over the internet protocol High Definition.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
1.1 System Performance Security Module 1 Version 5.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Internet  Major:Safety science and engineering  Author:jiangqian( 蒋乾 )
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Input devices Output devices Wired Methods Ethernet ADSL Fibre Optic.
Security, Social and Legal Issues Regarding Software and Internet.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Hackers And Hacking.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Internet Dangers Technology Communication Tools E-Literate.
Computer crimes.
Privacy, Security and Ethics
Society & Computers PowerPoint
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
E-SAFETY PARENT’S WORKSHOP THURSDAY 5 TH MAY. PASSIVE NO EXCUSES! We can’t be PASSIVE - being unaware or ill-informed is not an excuse!
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Computer Security Keeping you and your computer safe in the digital world.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Safety.
Edexcel GCSE Cyber security threats Computer Science 1CP1
Security, Social and Legal Issues Regarding Software and Internet
IT Security  .
Personal spaces.
Topic 6: Issues Press F5 to view!
Teaching Computing to GCSE
THE PYRAMID OF KNOWLEDGE
Information Technology Services Education and Awareness Team
The Internet of Unsecure Things
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
ICT Communications Lesson 3: Internet Life and Privacy
Information Technology Services Education and Awareness Team
Presentation transcript:

SECURITY ISSUES

TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES BECAUSE STORING IMPORTANT INFORMATION PHYSICAL THREATS THEFT, FLOOD, FIRE AND DAMAGE HACKERS PHISHING CONS PEOPLE INTO BELIEVING THAT OR TEXT IS FROM A VALID ORGANISATION UNSECURED WIRELESS NETWORKS

WHAT TO DO? LATEST UPDATE ENCRYPTION BACKUPS

PRIVACY ISSUES SEARCH ENGINES – RECORD INFORMATION ABOUT YOUR SEARCHES, IP ADDRESS AND HOW LONG YOU SPENT. THIS TO PERSONALISE ADVERTS SOCIAL NETWORKING – KEEP TRACK OF YOUR INTERACTIONS COOKIES- SMALL TEXT FILES STORED ON YOUR COMPUTER AND CAN STORE YOUR BROWSING HABITS IDENTIFY THEFT HACKERS

MONITORING MOVEMENTS AND COMMUNICATIONS PASSPORTS ARE SCANNED ONLINE GAMES MONITORED WHO YOU PLAYING WITH SOCIAL NETWORKING MONITORING MOVEMENTS S COMPANIES ABLE TO MONITOR WHO YOU SEND S TO IP ADDRESS PROVIDE CLUES TO SEARCH ENGINES AND SOCIAL NETWORKING ABOUT YOUR GEOGRAPHICAL LOCATION CREDIT CARDS ALLOW THE BANKS TO KNOW WHERE, WHEN AND HOW MUCH MONEY YOU SPENT