Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.

Slides:



Advertisements
Similar presentations
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
Advertisements

Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Computer Crime and Identity Theft Abe Orabi Tom Ballaro Tim Williams.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Module 2.2 Security, legal and ethical issues Theme: Finding solutions.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Unit 28- Website Development Assignment 1- THEORY P3
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Protecting Our Personal Space Security in a Virtual World.
Threats to I.T Internet security By Cameron Mundy.
Protecting Our Personal Space Security in a Virtual World by David Hines - Information Security Officer
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Mobile and Cyber Threat Issues The Fifth Annual African Dialogue Consumer Protection Conference Livingstone, Zambia September 2013.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
McLean HIGHER COMPUTER NETWORKING Lesson 8 E-Commerce Explanation of ISP Description of E-commerce Description of E-sales.
Data Security.
safety Bailey mullan. dangers ing has become on of the main sources for communicating. When using it is more likely for someone.
Network Security & Accounting
Operational Circular No 5 Use of CERN Computing Facilities.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet safety By Suman Nazir
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Introduction to Computers Lesson 8B. home Ways to Connect to the Internet Direct connection Remote terminal connection Gateway connection LAN Modem High-speed.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Mobile Security By Jenish Jariwala. What is Mobile Security?  Mobile Security is the protection of smartphones, tablets, laptops and other portable computing.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
5 different ways to get tricked on the internet. 1. Viruses A virus is a computer malware program that copies it’s files to the computer. This may allow.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
Computer Security Sample security policy Dr Alexei Vernitski.
Mobile device security Practical advice on how to keep your mobile device and the data on it safe.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
Chapter 40 Internet Security.
Lecture 5. Security Threats
Introduction to Computers
Year 10 ICT ECDL/ICDL IT Security.
Malware, Phishing and Network Policies
Encryption and Hacking
Encryption and Hacking
Firewall.
Unit 4 IT Security Kerris Davies.
Communicating in the IT Industry
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Security risks in a network

Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect to the internet your computer is visible to billions of computers around the world. To prevent remote access is to use firewall. Firewall  Is a software that permits or blocks connections between your computer and other computers on the network according to the rules you have set. A firewall is not enough on its own because some malware such as virus works by shutting down firewall.

Intercepting data: using sensitive data across the internet  Credit card information  Personal details  Sensitive company information  Bank account information Thus information can be intercepted and read by other networks users who may use it to commit fraud. Encryption is one way to keep data safe.

Illegal access  Data can be stolen or corrupted by unauthorised users on a network Authentication  The process of identifying an individual to prevent illegal access

Captcha test: to ensure the user is a human and not a computer program

Q1- why firewalls are used by people when accessing the Internet Q2- Data can be encrypted when it is sent to other people over the internet. Explain how encryption helps keep data secure.