gold unit 4 - it security for users (2 credits) thomas jenkins

5
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins

Upload: lucas-chandler

Post on 29-Dec-2015

216 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins

GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS)

Thomas Jenkins

Page 2: GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe the security issues that may threaten system performance. One of the issues that could threaten the security of your pc is a virus. A computer virus is a piece of software that gets into your computer and buries into files. A computer virus will slow down your performance. An example of a computer virus is the “ILOVEYOU” virus. This is a worm that attacked millions of windows pcs. Computer viruses are bad because they slow your computer and can be very hard to remove once on your pc. You can get computer viruses many ways like downloading things off the internet or opening links that have been sent to you through email. You can get rid of viruses by using anti virus software like Norton Antivirus.

Another issue that could threaten the security of your pc is spyware. Spyware is software that allows someone to access your files from a separate computer and get your passwords from websites. An example of spyware is “Trymedia” this causes pop ups and pop unders appear. Spyware is bad because people can get into your files and see things that are personal to you like photos of you or family or can get into important files like work. You can get spyware by downloading things from the internet or opening links sent to you. To get rid of spyware you would use antispyware software to find and get rid of the software.

Spam is a problem because they can build up in your inbox and make your computer slow. It may also contain viruses. Spam is emails that are sent to you that you didn’t ask for that contain advertisements. An example of spam would be being repeatedly sent emails containing advertisements. You can get spam by signing up for things on the internet. You can stop spam by not signing up for things on the internet or not using you’re main email to sign up for things.

Page 3: GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.3 I can describe the threats to system and information security and integrity.

Phishing is when people try to get your credit card details passwords and usernames by posing as a friendly entity on the internet. They do this by sending emails to you containing links or pretending to be a website like Facebook and saying that you need to change your password for a reason. To protect yourself from phishing don’t click on links that have been sent to you through emails and don’t trust something telling you to put you’re details in because a website would never ask for you’re details up front.

Having a strong password is important because if you have a password that is easy to guess people will gain access to your accounts or emails. You should have different passwords for different things like you’re bank account and something mediocre like facebook or twitter. You should also have a password that is difficult for example “Purple-123” this is makes it extremely difficult for someone to guess you’re password because there is a capital letter a symbol and numbers.

It’s dangerous to leave your computer logged on because people could go on it and access your private emails or access your accounts if you leave your computer unattended. People could also delete things from your computer that are important or could even upload a virus that can steal you’re information or delete things on your computer. You need to be careful when you are in a public place like a cyber café and your typing in your information onto a website as somebody could walk past and look at your information.

Page 4: GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.5 I can describe ways to protect hardware, software and data and minimise security risk.

You should lock you’re computer if you walk away to stop people from tampering with it or looking at you’re files. Its stops people from hacking your computer or attempting to add viruses to your computers. Locking your computer also helps keep you files the same while you go and do something else.

Lock your files so nobody can access or delete them. Also lock your files so they are protected from hackers. You should also put a lock on your files because if they are important then it’s a good idea to protect them. Locking you’re files can stop people stealing information or important documents.

Have a firewall on your computer to stop hackers, viruses, bugs etc. Also have a firewall as protection against spyware. It also monitors your computer network so it can detect if a virus is trying to be downloaded when you are downloading things. A firewall can block Trojan horses as it detects them before they can attempt to get onto your computer.

Page 5: GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins

SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA

1.7 I can describe why it is important to backup data and how to do so securely.

It’s important to back up data because your files could be deleted or lost if your computer breaks. It is also important to back You can securely back up your data by doing more then one backup keeping the backups in a safe place. You should back up your files just encase you have to factory reset your computer so you don’t lose any files that could have been very important.

You can perform a backup by backing up all of your files onto a CD. You can also save your files onto a location online were they will be kept safe and secure. You should keep your CDs in a cabinet that can be locked to ensure they are safe. For example of an online storage system the website google drive can be used to store your files and keep them secure. You should have two backups because there could be a chance that one of your backups will break and also one online so that it will always be stored and safe if the other copies are lost.

Its important to backup your backup if necessary so your files will be safe just in case something happens to your first backup.