Download presentation
Presentation is loading. Please wait.
Published byHarry Lloyd Modified over 8 years ago
1
ICT Laptops Passwords Encryption Back-ups Data Protection Email and the Internet Viruses Social Networking / Professional Conduct
2
Care of Laptops No food or drink Do not hold heavy objects over the keys Use the carry case & zip it up! Close lid and support laptop by base Beware of trailing cables Take care to align pins when connecting to projector
3
Projectors CONNECT all cabling first Power up the PROJECTOR Switch the LAPTOP on
4
Passwords Passwords should be at least eight characters long and contain at least one of each of the following characters: –Upper case letter –Lower case letter –Number –Symbol (!£$%^&*()_+@~#<>? etc.) Best password length > 13 characters Best to change at least every ninety days
5
Avoid Using Dictionary words in any language Words spelled backwards, common misspellings, and abbreviations Sequences or repeated characters –12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty) Personal information –Your name, birthday, driver's license, passport number, or similar information
6
Memorising Writing a password down is OK but: –Keep it safe and secure –Do not store it near or on the computer –No post it notes on monitors!
7
Permutations Available CharactersPermutationsFactor Alphabet2663 x 10 9 1 Add case5230 x 10 12 482 Add numbers62136 x 10 12 2,164 Add special characters955 x 10 15 77,804 +1 character95426 x 10 15 6,768,931 +2 characters9537 x 10 18 582,000,000 14 characters952 x 10 27 28 x 10 15 Based on an 8 character password
8
Top 10000 Passwords From an analysis from real server breaches on the Internet –Passwords in the list are used by 99.8% of all users –40% of all passwords appear in the top 100 –71% of all passwords appear in the top 500
9
Encryption Means of scrambling data so that it can only be accessed with a password / key Protect the encryption password with extreme diligence Only effective when the machine is off or device is removed
10
Backup Suitability from best to worst: –CD (700MB) / DVD (4.7GB) –External hard disc (500GB) –Web based backup service (2-5GB) –USB memory stick (32GB) –Doing nothing There are potential security & data protection issues with web based services
11
Backup Procedure Always use COPY and not MOVE Verify that you can open backed up files Best to do regular full backups A least termly Backups will not be encrypted Make it easy and save all files in one location e.g. C:\Data
12
Data Protection Data protection applies to printed documents as well as electronic data Schedule 7 of the DPA: –Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
13
Security Breach Examples Imagine a potential security breach: –Leaving unencrypted data on a USB key –Leaving printed documents on public transport –Losing your phone –Losing your laptop –Disclosing your password
14
Document Handling Data or documents containing personal data must: –Be secured in a locked cabinet or area –Be protected by a strong password –Have access restricted to appropriate personnel only –Be encrypted before transfer –Not be left in plain view –Be destroyed securely
15
Email Never provide personal details in an email or in response to an email request Check the sender – does the address look right? Avoid links in emails Does the email 'ring true'? Look out for URLs ending in.tk.cc.info
16
'Reset' Email Example
17
UPS Email Example
18
Junk / Spam Folder
19
Have You Been Hacked?
20
Internet Beware of pop-ups Beware of obfuscated links Inappropriate web sites Virus scams
21
Pop-up Blocker Under Tools menu in IE9 Make sure it is turned on Close pop-ups with ALT+F4
22
Obfuscated Links Harmful addresses hidden behind innocuous looking links Google image search Link text can be anything Obfuscation
23
Anti Virus Programs Two programs are in general use: –Sophos –Microsoft Security Essentials
24
Detection Results
25
Social Networks Do not use on school provided computers Be mindful of your 'on-line reputation' No-one under 13 should be using Facebook Do not 'friend' students
26
Professional Conduct...uphold public trust in the profession and maintain high standards of ethics and behaviour, within and outside school... https://www.education.gov.uk/publications/ eOrderingDownload/teachers%20standards.pdf
27
Esafety
28
Advice and Support www.saferinternet.org.uk www.getsafeonline.org www.ico.gov.uk
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.