threats to i.t internet security by cameron mundy

14
Threats to I.T Internet security By Cameron Mundy

Upload: elfreda-summers

Post on 24-Dec-2015

214 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Threats to I.T Internet security By Cameron Mundy

Threats to I.TInternet security

By Cameron Mundy

Page 2: Threats to I.T Internet security By Cameron Mundy

Computer virus

Page 3: Threats to I.T Internet security By Cameron Mundy

Malware This is malicious software that can slow down the computer

and corrupt data files

Page 4: Threats to I.T Internet security By Cameron Mundy

Spyware Spyware is software that helps in getting information about a

person without their knowledge and it can send the information to another person or device without you knowing. They use spyware that can see the keys you are typing like passwords etc. Another type of spyware they use would be a software that can log on to your pc camera and record everything that you do.

Page 5: Threats to I.T Internet security By Cameron Mundy

Phishing

Phishing is a way of getting personal data such as usernames, passwords, and credit card details..

They gather this information by sending out emails that look like they are real and from your bank. They then asked you to click on link which sends you to a website that looks real and asks you to input your bank details or user name and passwords

Page 6: Threats to I.T Internet security By Cameron Mundy

Hacking A hacker is someone who seeks a weakness in a computer

system or sometimes computer networks. They then use this weakness to get access to the system and then they can plant viruses or steal and damage data.

Page 7: Threats to I.T Internet security By Cameron Mundy

Spam Spam is electronic junk mail which can contain malware, be

phishing or advertising and is usually sent to you with out your permissions.

Page 8: Threats to I.T Internet security By Cameron Mundy

Precautions Phishing: check sites are secure by looking for the padlock in

the link. Viruses: install anti-virus software and be careful what you

download. Hacking: get a firewall check the access. Unintentional: back up system. Everything: educate users

Page 9: Threats to I.T Internet security By Cameron Mundy

Secure passwords GIFT (weak password) GifT101 (medium strengths password) G1$T#1o1 (strong password)

Strong passwords should include: upper case letters lower case letters minimum 8 characters Numbers Symbols

Page 10: Threats to I.T Internet security By Cameron Mundy

Antivirus software You can download antivirus software easily and there are lots

of free ones available this software helps prevent viruses attacking your computer.

Page 11: Threats to I.T Internet security By Cameron Mundy

Firewalls A firewall could be described as a bouncer for the computer it

only lets in who is allowed. It is normally a piece of software that is installed on a computer. You can also change the settings so that different computers and users have different levels of access.

Page 12: Threats to I.T Internet security By Cameron Mundy

Physical security You can use physical security by locking doors and use cctv

and have security guards. This is important to make sure any computers aren’t stolen.

Page 13: Threats to I.T Internet security By Cameron Mundy

Unintentional threats If somebody accidentally deletes your work/files/accounts

you can have a back up system just encase that happens so you can go back and get it back again. The back ups should be done at regular intervals, like every day.

Page 14: Threats to I.T Internet security By Cameron Mundy

Public Wi-Fi The dangers of public Wi-Fi is that anybody can host a Wi-Fi

hotspot with the same name as another public hotspot which can mean they gain all your information about you and your search history.

If you are on a public network don’t put in any personal information like bank details or email account or something like Facebook or twitter.