SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Viruses & Security Threats
           Unit 1 – Understanding Computer Systems




JMW 2012
By the end of this session:
• All of you would be able to explain how viruses
  affect computers.
• Most of you should understand how your
  identity can be stolen through phishing and
  spyware applications.
• A few of you could explore other threats to
  data security, e.g. hacking, and actions that can
  be taken to minimise risks.
Viruses
• Some viruses (or malware) try to gain entry to your computer in a
  similar way by pretending to be something else.

• For example, that screensaver you downloaded or game you played
  may have a virus contained with it.

• These viruses are sometimes called Trojan Horses.

• Worms are viruses which attach themselves to files on your
  computer. Infected files then spread the virus as the worm attaches
  itself to other files on the system.

• File sharing websites can often be a source of
  viruses. Avoid sharing illegal file-sharing sites
  and scan any programs downloaded from the
  Internet.
How can I protect myself?
• Use a virus scanner to scan any files you
  download from the Internet or other
  computers.

• Regularly scan your computer’s hard drive for
  viruses.

• Keep your virus definitions
  up-to-date.
Identity Theft

• Phishing emails pretend to be another company in
  order to extract personal information, such as
  passwords, from users.

• The email asks you to click a link which takes you to a
  fake website and then enter your password (which is
  then stored by the phishers.)

• Spyware hides on your computer and records
  everything you do and passes it on to criminals.

• They can then steal your identity and pretend to be
  you – this is called “Identity Theft”
How can I protect myself?
• Check the link shown in the email matches the website
  you go to when clicked.

• Legitimate emails often use personal data, e.g. first
  name, which Phishers don’t have access to.

• Never give out your password details on any website
  unless you are 100% sure it is the official website. If in
  doubt check the email received with the company before
  divulging any information.

• Scan your computer regularly for spyware. Use firewalls
  to prevent unauthorised communication from your
  computer.
Your Task
• Create a poster to raise aware of data security
  threats.
• Your poster should:
  – Explain the risk
  – Give advice on how to minimise the risk

         Extra Challenge:

         • Explain why every computer should have a firewall installed.
         • When you buy something online, how is the debit/credit card data
           kept secure?
Peer Review of Posters
• Look at the poster of the person sitting next to
  you.
• Is it fit for purpose?
  – Does it explain at least one of the data security
    threats?
  – Does it provide advice to minimise the risks?
  – Does it stand out? Clear writing?

  Identify 2 good things about the poster (2 stars *)
       and one area for improvement (1 wish)

Weitere ähnliche Inhalte

Was ist angesagt?

Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentationPhương Anh Pađi
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirusVishwarajYadav
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus Tasif Tanzim
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPTEva Harshita
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System ThreatsDrishti Bhalla
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basicsSrinu Potnuru
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyOPSWAT
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 

Was ist angesagt? (20)

Hacking and virus presentation
Hacking and virus presentationHacking and virus presentation
Hacking and virus presentation
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Malicious Software and Virus
Malicious Software and Virus Malicious Software and Virus
Malicious Software and Virus
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Computer virus
Computer virusComputer virus
Computer virus
 
Anti Virus Software
Anti Virus SoftwareAnti Virus Software
Anti Virus Software
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer security basics
Computer security  basicsComputer security  basics
Computer security basics
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Anti virus
Anti virusAnti virus
Anti virus
 
Malware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny CzarnyMalware and Anti-Malware Seminar by Benny Czarny
Malware and Anti-Malware Seminar by Benny Czarny
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 
Viruses notes
Viruses notesViruses notes
Viruses notes
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 

Andere mochten auch

Andere mochten auch (7)

Ip security
Ip security Ip security
Ip security
 
IP Security
IP SecurityIP Security
IP Security
 
ip security
ip securityip security
ip security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
IP Security
IP SecurityIP Security
IP Security
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 

Ähnlich wie Viruses & security threats

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamJoelGautham
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To MalwareMichael Carthy
 

Ähnlich wie Viruses & security threats (20)

How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Online reputation
Online reputationOnline reputation
Online reputation
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Online access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.GauthamOnline access and computer security.pptx_S.Gautham
Online access and computer security.pptx_S.Gautham
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Computer Virus and Spyware
Computer Virus and SpywareComputer Virus and Spyware
Computer Virus and Spyware
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
IS100 Week 11
IS100 Week 11IS100 Week 11
IS100 Week 11
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Malware
MalwareMalware
Malware
 
Introduction To Malware
Introduction To MalwareIntroduction To Malware
Introduction To Malware
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Computer security
Computer securityComputer security
Computer security
 

Mehr von wardjo

Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right softwarewardjo
 
Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and componentswardjo
 
Storage
StorageStorage
Storagewardjo
 
Software
SoftwareSoftware
Softwarewardjo
 
Secondary storage
Secondary storageSecondary storage
Secondary storagewardjo
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologieswardjo
 
Representing text
Representing textRepresenting text
Representing textwardjo
 
Representing sound
Representing soundRepresenting sound
Representing soundwardjo
 
Hexadecimal
HexadecimalHexadecimal
Hexadecimalwardjo
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and additionwardjo
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)wardjo
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)wardjo
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)wardjo
 
Binary logic
Binary logicBinary logic
Binary logicwardjo
 

Mehr von wardjo (15)

Choosing the right software
Choosing the right softwareChoosing the right software
Choosing the right software
 
Lesson 3 source and components
Lesson 3   source and componentsLesson 3   source and components
Lesson 3 source and components
 
Storage
StorageStorage
Storage
 
Software
SoftwareSoftware
Software
 
Secondary storage
Secondary storageSecondary storage
Secondary storage
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Introduction to Networks & Topologies
Introduction to Networks & TopologiesIntroduction to Networks & Topologies
Introduction to Networks & Topologies
 
Representing text
Representing textRepresenting text
Representing text
 
Representing sound
Representing soundRepresenting sound
Representing sound
 
Hexadecimal
HexadecimalHexadecimal
Hexadecimal
 
Binary conversion and addition
Binary conversion and additionBinary conversion and addition
Binary conversion and addition
 
A451 memory (2-12)
A451   memory (2-12)A451   memory (2-12)
A451 memory (2-12)
 
A451 introduction to cpu (2-12)
A451   introduction to cpu (2-12)A451   introduction to cpu (2-12)
A451 introduction to cpu (2-12)
 
A451 cpu fetch execute cycle (2-12 & 2-14)
A451  cpu fetch execute cycle (2-12 & 2-14)A451  cpu fetch execute cycle (2-12 & 2-14)
A451 cpu fetch execute cycle (2-12 & 2-14)
 
Binary logic
Binary logicBinary logic
Binary logic
 

Kürzlich hochgeladen

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Kürzlich hochgeladen (20)

Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

Viruses & security threats

  • 1. Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012
  • 2. By the end of this session: • All of you would be able to explain how viruses affect computers. • Most of you should understand how your identity can be stolen through phishing and spyware applications. • A few of you could explore other threats to data security, e.g. hacking, and actions that can be taken to minimise risks.
  • 3. Viruses • Some viruses (or malware) try to gain entry to your computer in a similar way by pretending to be something else. • For example, that screensaver you downloaded or game you played may have a virus contained with it. • These viruses are sometimes called Trojan Horses. • Worms are viruses which attach themselves to files on your computer. Infected files then spread the virus as the worm attaches itself to other files on the system. • File sharing websites can often be a source of viruses. Avoid sharing illegal file-sharing sites and scan any programs downloaded from the Internet.
  • 4. How can I protect myself? • Use a virus scanner to scan any files you download from the Internet or other computers. • Regularly scan your computer’s hard drive for viruses. • Keep your virus definitions up-to-date.
  • 5. Identity Theft • Phishing emails pretend to be another company in order to extract personal information, such as passwords, from users. • The email asks you to click a link which takes you to a fake website and then enter your password (which is then stored by the phishers.) • Spyware hides on your computer and records everything you do and passes it on to criminals. • They can then steal your identity and pretend to be you – this is called “Identity Theft”
  • 6. How can I protect myself? • Check the link shown in the email matches the website you go to when clicked. • Legitimate emails often use personal data, e.g. first name, which Phishers don’t have access to. • Never give out your password details on any website unless you are 100% sure it is the official website. If in doubt check the email received with the company before divulging any information. • Scan your computer regularly for spyware. Use firewalls to prevent unauthorised communication from your computer.
  • 7. Your Task • Create a poster to raise aware of data security threats. • Your poster should: – Explain the risk – Give advice on how to minimise the risk Extra Challenge: • Explain why every computer should have a firewall installed. • When you buy something online, how is the debit/credit card data kept secure?
  • 8. Peer Review of Posters • Look at the poster of the person sitting next to you. • Is it fit for purpose? – Does it explain at least one of the data security threats? – Does it provide advice to minimise the risks? – Does it stand out? Clear writing? Identify 2 good things about the poster (2 stars *) and one area for improvement (1 wish)