Presentation is loading. Please wait.

Presentation is loading. Please wait.

Unit 1 Fundamentals of IT

Similar presentations


Presentation on theme: "Unit 1 Fundamentals of IT"— Presentation transcript:

1 Unit 1 Fundamentals of IT
LO5 – Understand ethical and operational issues and threats to computer systems 5.3 – Threats

2 Lesson Objectives Understand the different threats to computer systems. Including the following Phishing Hacking Viruses Trojans Interception Eavesdropping Data Theft Social Engineering

3 Hacking

4 Phishing

5 Phishing Cont. Malicious use refers to, for example, deletion, fraud, identity theft and selling on personal data. A good example if a phishing attack is when a user is sent an saying they have ordered an item from an online store. They will be asked to click on a link to see their order details. The link take the user to a page that shows a product code from a well known company. A message such as ‘if this order wasn’t made by you, please fill out the following form to cancel your order in the next 24hours’ is given. The form will ask for details such as credit card number, user’s address and so on. Some of the key clues are that links, such as how to ‘contact us’ don’t work.

6 Pharming

7 Spyware and Keylogging

8 Viruses

9 Trojans The act of introducing a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system This could include wiping data See this link for more: what-is-a-trojan.html

10 Interception When data packets on the internet are intercepted by a third part and copied, edited or transferred to a new location.

11 Eavesdropping Can refer to interception but is particularly listening to communication traffic not intended for the reader or listener such as , IM, faxing and video conferencing.

12 Data Theft Illegally removing copies of personal or company data from information systems. The act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information. Data theft is increasingly a problem for individual computer users, as well as big corporate firms. There is more than one way to steal data.

13 Social Engineering Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer. fraud/Types-of-social-engineering-fraud

14 Task Using the word document template to help you make sure you have detailed notes on the different threats to a computer system What are they? How can you prevent them? Answer the exam style questions at the bottom of the sheet.


Download ppt "Unit 1 Fundamentals of IT"

Similar presentations


Ads by Google