Download presentation
Published bySamuel Rogers Modified over 7 years ago
1
Security Risks Todays Lesson Security Risks Security Precautions
Spyware, Phishing & Keylogging Online fraud, Identity Theft DOS (Denial of Service) attacks Hacking Viruses, Worms & Trojans Security Precautions Anti-virus software Passwords/Encryption Biometrics Security Protocols and Firewalls Use of Security Suites
2
Security Risks A computer system is secure if it is not able to be accessed by an unauthorised person and not affected by malware Malicious software – software deliberately created to disrupt a computer system or gain illegal access to it in order to gather information Malware includes viruses, worms, Trojans, spyware, adware and keylogging software. Security precautions can be taken to protect against malware
3
Security Risks Spyware
Spyware programs gather information about you from your computer, for example which websites you visit This data can be used to target you with specific marketing Spyware can also interfere with normal operation of a computer by changing setting such as disabling anti-virus software or firewalls
4
Security Risks Phishing
An attempt to trick someone into giving away personal information using the internet Pretending to be a well-known company or bank for example Techniques: , text message, telephone calls, social engineering
7
Delete all suspicious emails (without reading them) and texts
Delete all suspicious s (without reading them) and texts. Don’t call any numbers. Don’t give out personal information to an unsolicited caller.
8
Security Risks Keylogging software
Keystroke logging or keylogging software is a program that records user’s key presses and is often used to steal passwords, credit card numbers etc There are many legal uses, for example during testing of software or monitoring employees productivity or for police investigations Can be used by criminals to gather usernames, passwords, PINS or other sensitive information
10
Security Risks Online Fraud
Online fraud or internet fraud – using the services of the internet to defraud people of money or carry out identity theft Many different types: Paying for goods that are never received Supplying bank or personal detail to help someone move money between accounts Q – online fraudsters traded 12 million pieces of personal information
11
Security Risks Denial of Service (DOS) attacks
A DOS attack is designed to cause problems on a network so that legitimate users cannot access resources, for example their online bank account The attack involves sending so many requests to a host computer (e.g. a companies web server) that it cannot respond to legitimate requests
12
Security Risks Denial of Service (DOS) attacks
In some cases, a DOS attack can crash the affected computer particularly if the attack includes malware DDOS (Distributed DOS) attack takes place when many different computers carry out a DOS attack against a single host computer. More difficult to defend against.
14
VIDEO
15
Hacking Hacking is gaining unauthorised access to a computer system and is usually illegal It is a crime under the Computer Misuse Act Black hats – skilled hacker who hacks illegally White hats – skilled hacker who hacks for legal purposes such as testing the security of a companies own computer systems
16
Security Risks Viruses
A piece of code that attaches itself to programs, makes copies of itself and destroys your system Ways of spreading Downloaded from a website Opened up from an attachment Infected backing storage device Across local network Symptoms of a virus Keyboard malfunctioning Strange display on monitor Hard drive spinning for no reason Data loss Computer restarting randomly Unwanted s generated
17
Security Risks Worms Trojans
A program that finds gaps in your security, creates copies of itself and floods your system with unwanted data Trojans A program that appears as if it is carrying out a helpful task, for example, defragmenting your hard disk You download it thinking it is carrying out a harmless task and it causes harm, for example, deleting files or adding unwanted toolbars
18
Security Risks Virus activation
Some viruses will start doing damage as soon as the program they area attached to is run Some viruses wait for a specific action to take place on the computer – a logic bomb Some viruses wait until a specific date and time before doing their damage – a time bomb
19
Security Risks ‘I Love You’ virus
An example of all three (virus, worm and Trojan) Trojan: it comes disguised as a ‘Love Letter’ when it is carrying a harmful program Virus: it infects files, turning them into new Trojans Worm: copies itself by sending itself to everyone in your address book
20
VIDEO
21
Security Precautions Anti-virus software
A program that protects a computer against attack or infection by malware Has a database of known viruses The anti virus software compares sections of code to this database to identify and destroy viruses Most anti-virus software downloads virus database updates automatically
22
Security Precautions Passwords
A list of characters that stops people accessing your data Disadvantages You can forget them Programs have been created that can test billions of different passwords each second, eventually guessing yours!!
23
Security Precautions Encryption Biometrics
Putting data into a code before transfer The hacker cant understand the data without having the key to decipher the code Biometrics Using physical characteristics to allow access to a system, for example, finger print, retina, voice, face recognition E.g. new Passports
24
Security Precautions Security Protocols
A rule or agreement set up between the sender and receiver of data Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are 2 examples SSL and TLS both use encryption
25
Security Precautions Firewalls
A program designed to prevent unauthorised access to or from a private network Checks all data coming in and out of a network The firewall decides which packets of data are allowed through to the destination address
26
Security Precautions Security suites
Groups of programs used to block threat to your computer Anti-virus Anti-spyware A firewall Identify theft protection Spam Filters Parental control
27
Assessment task: games review
You need to produce: Inputs/Processes/Outputs Annotated design of user interface (a sketch of the form with labels) Design of the program in suitable design notation (pseudocode) Program code with comments Test Data A screenshot of a test run Evaluation – does the program do what it is supposed to do? How could it be improved
28
Test Data
29
Pseudocode
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.