1 AQA ICT AS Level © Nelson Thornes 2008 1 Firewalls and Virus Checkers.

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Example policy elements and their role in bandwidth management and optimisation.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
1.1 System Performance Security Module 1 Version 5.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
Types of Electronic Infection
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Manga comic industry security information presentation By Dominic Roofe.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Network Security & Accounting
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Information Systems Design and Development Security Precautions Computing Science.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Managing Windows Security
Year 8 ICT Internet Security
Homeland Security: Computer Protection
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
HOW DO I KEEP MY COMPUTER SAFE?
Unit 4 IT Security Kerris Davies.
Operational procedures for preventing misuse
Presentation transcript:

1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers

2 AQA ICT AS Level © Nelson Thornes Firewalls What does a firewall do? It checks the data coming into a computer system via the Internet against a set of rules or criteria, and only lets permitted material through. It also helps to prevent unauthorised access to computer networks.

3 AQA ICT AS Level © Nelson Thornes They work by: Allowing all traffic unless it does not meet certain criteria. Allowing no traffic unless it meets certain criteria. Basic criteria could be: nature of the data source of the data Firewalls

4 AQA ICT AS Level © Nelson Thornes Firewalls can be hardware or software Firewalls Hardware Software

5 AQA ICT AS Level © Nelson Thornes Firewalls Firewall software is usually included as part of the operating system. Specialist firewall software can also be purchased, for example:

6 AQA ICT AS Level © Nelson Thornes How can organisations prevent unauthorised access? A firewall can log all attempts to enter a private network. Multiple attempts may suggest unauthorised attempts. This warning would allow extra security to be put in place. An audit trail is a record that shows who has accessed an ICT system and what they have done. Avoid using the term hacking in an exam, as this is rather vague. Unauthorised access

7 AQA ICT AS Level © Nelson Thornes Firewalls How does the firewall in your own institution work? How does your institution prevent access to unsuitable websites? How does your institution prevent unauthorised access?

8 AQA ICT AS Level © Nelson Thornes Anti-virus software continually scans for viruses, including Trojans and Worms. It must be kept up-to-date, though, as new viruses appear all the time. Companies usually charge a subscription for updates. Virus Checkers

9 AQA ICT AS Level © Nelson Thornes Anti-virus software maintains a database of known viruses. Incoming data files, through , downloads or removable media, are checked against the database. Suspicious files are deleted or put into a safe quarantined area for further investigation. Scheduled scans of all data files on the system can be done automatically. Virus definitions need to be kept up-to-date and software subscriptions include regular downloads of updates. Anti-virus software