Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.

Similar presentations


Presentation on theme: "Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define."— Presentation transcript:

1

2 Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define key words and answer GCSE-type questions about computer security. Key words: Virus, hacker, encrypting, password, levels of access, firewall

3 What are the main threats that cause loss of data?  Viruses A ‘virus’ is a computer program designed to run undesirable instructions on a computer- e.g. delete files, send out Spam messages.  Hackers Try to gain unauthorised access to computer data, either via a network, internet or using the same computer.

4 Dealing with Viruses.  Install Anti-virus software and keep it up to date.  Attachments to Emails- only open if you know and trust the source.  Download programs- only if you trust the source. Mnemonic: Viruses Are Idiotic Disturbances

5 Dealing with Hackers.  Firewall software- make sure that it is running whilst using the Internet.  Password protect vital files (Word, Access, Excel etc. allow password encryption and protection)  Physically restrict access to computers which have vital information.  Logon account for computers Mnemonic: Fully Protect Password Logins

6 PASSWORD SECURITY Passwords should be...  Not easily guessable (Don’t use pet’s names, birthdays...etc.)  Changed Regularly  Used carefully (Make sure no one is looking over your shoulder)

7 Protecting Hardware  Keep track of Serial Numbers  Use burglar alarms when building is empty  Keep expensive equipment in a locked room  Put security locks on equipment

8 Other security issues- Spam  Spam – unsolicited Emails (usually sent en-mass and advertise products or services)  Deal with Spam by installing Spam filter software.

9 Backups  Backups are taken to make a copy of valuable data in case of loss.  Data can be lost because of … Breakdown of storage (e.g. hard disk) Viruses Accidental deletion Malicious intent!

10 Backup Media Magnetic tapeHard diskUSB disk CD ROMFloppy disk

11 Backup considerations …  What medium? (e.g. Memory stick, CD, Tape …?)  How often? (frequency) (e.g. Daily, weekly, monthly, every hour …?)  How many copies (e.g. over a year, over 1 week …?)  Where to keep it (e.g. off site, on site, safe …?)  Time of backup (e.g. after work is complete, network not busy …?)  Label archive items (e.g. day of week, week number …?)  Remember: Mock TL

12 Ancestral Backup Strategy First backupSecond backupThird backup Son FatherGrandfatherFather


Download ppt "Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define."

Similar presentations


Ads by Google