Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Let’s Talk About Cyber Security
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Unit 28- Website Development Assignment 1- THEORY P3
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Issues Raised by ICT.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Staying Safe Online Keep your Information Secure.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Security Training USAID Information Security.
Protecting Students on the School Computer Network Enfield High School.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Manga comic industry security information presentation By Dominic Roofe.
INTERNET SAFETY FOR KIDS
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Safety Internet Safety LPM
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Policies and Security for Internet Access
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Information Systems Design and Development Security Precautions Computing Science.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security Risks Todays Lesson Security Risks Security Precautions
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
How to build a good reputation online
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Minimising risks to data

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Online protection Use of anti-virus software The risk to the security of data can be minimised by: Minimising risks to data

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Most anti-virus software will check any incoming files for viruses and stop the virus infecting a computer system. Regularly using anti- virus software can check a computer system for viruses and remove most viruses. Anti-virus software should be kept updated. Using anti-virus software

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Data can be protected while online by: using firewalls;firewalls using passwords correctly;passwords correctly checking the security of a website;security of a website being careful of unsolicited s or messages.unsolicited s or messages Online protection

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A firewall can be hardware-based or software-based. Both are designed to create a barrier between a private e.g. company or home network and a public network, e.g. the internet. Firewalls check the incoming and outgoing network traffic against a set of rules to decide whether or not the traffic is allowed to pass. If it is, it will be allowed through the firewall. If it is not allowed, the traffic will be discarded.incoming outgoing Firewall

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Traffic arrives at firewall from internet Traffic enters the network if it is allowed by the firewall rules Internet Private network Firewall uses set of rules to check whether or not the traffic can pass Traffic is discarded if it is not allowed by rules set in firewall A record is made in a log stored on the company servers Incoming traffic and firewalls

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Traffic arrives at firewall from company network Traffic allowed to pass by firewall out of network to the internet if it is allowed by rules InternetPrivate network Firewall uses set of rules to check whether or not the traffic can pass Traffic is discarded if it is not allowed by rules set in firewall A record is made in a log stored on the company servers Outgoing traffic and firewalls

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton While it can be difficult to manage and remember different passwords, it is important that different passwords are used for different accounts. If the same password is used, once an unauthorised user finds one password, he can access all the other accounts as well. Passwords should be carefully chosen so that they are not easy to guess but are not too difficult to remember. Help with creating passwords can be found here. Passwords can be checked herePasswords can be checked here. Passwords

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton A secure website will have a padlock shown in the browser and use HTTPS in the URL to show that the data being transferred is encrypted. padlock https Website security

Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton s should be checked before they are opened and read. s from unknown senders and s that have not been requested (unsolicited s) may contain viruses. Attachments should be checked with anti-virus software or not opened at all. Sometimes the message itself may contain malicious code that could be a virus. Hyperlinks in s should always be checked carefully before being followed, as the website to which the user is directed may also contain viruses or not be a genuine site. security