privacy and security issues
DESCRIPTION
Privacy and Security Issues. Privacy and Security Issues related to I nformation and Communication Technology. Describe privacy and security issues Explain importance of keeping information secure and confidential Analyse the form and potential impact of computer viruses - PowerPoint PPT PresentationTRANSCRIPT
Privacy and Security IssuesPrivacy and Security Issues related to Information and Communication
Technology
Subt
opics
Describe privacy and security issuesExplain importance of
keeping information secure and confidential
Analyse the form and potential impact of computer virusesExplain how anti-virus
software applications enhance system security
Identity Theft stealing info from a person that allows you
to access anything in their name
Protection of Credit Card Informationprotect the six-digit issuer identifier,
account number, cardholder name, card verification value code (CVV)
and your pin number
Cook
ies
Your personal cookies may get leaked out onto a website and leave your personal information out there if you don’t delete them often
Relation to ICT computer skills needed to access any
info through a computer
Importance of
Privacy and SecurityIntroduction
Why is privacy and security important?
About 90% of victims did not know they were being hacked.
Victims who were Hacked
Victims who knewVictims who didn't know
Cyber-bullying
What are some ways to be protected?
FirewallComplicated passwords
Antivirus-softwares
And more!
What are some ways to be protected? (continuation)
Pop-up blockersBack-up files
Cons
eque
nces
Risk of losing important files Used for selfish or inappropriate
reasons, such as identity theft, etc.
Introduction to Computer Viruses
Wha
t is a
com
pute
r viru
s? A software on computers that can
replicate itself, travel around and is designed to interfere
with the operation of your computer. A virus can ruin, copy
and even delete data off your computer.
Yearly Comparison of Computer Viruses
Viru
s nam
es
Trojan Horse Worms Bootsector Virus Marco Virus Memory Resident Virus
Rootkit Virus Polymorphic Virus Logic Bombs/Time Bombs
Trojan Horse
Some of the uses or purposes of a Trojan can be: • Electronic money theft• Viewing users screen• Crashing computer• Control computer remotely
REMEMBER - a Trojan horse is software that pretends to be a legitimate program in order to gain your trust.
Wor
ms
Functions include;• Replace files with copies of itself
• Rename files• Modify them so they become
unusable• Install additional malware• Terminate any active anti-
malwareREMEMBER - Worms are the worst
of all because they don't require
you to click on anything and can
start all by themselves.
DON’
T FO
RGET
!
A Computer virus ...• can slow down your computer.
• might corrupt your system files.
• might make some programs
faulty or corrupt.• might damage your boot sector
creating problems when you
boot into the windows.• might steal important
information from your computer
and send to some other person.
• might change the power ratings
of your computer and could
blast the system
Antivirus
What Is An Anti-Virus Software?
A software designed to be used on your computer to find, treat, remove and keep malwares away. It will keep all
your computer data safe!
What Anti-Virus Softwares Are Available
There are many anti-virus soft wares out there tailored to businesses.Such as:
-AVG (Business Edition)-Bitdefender-McaAfee-Avira (Professional Security)
(Endpoint Security) (Small Business Security Suite) (Business Security Suite)
-And many more...
For Businesses
How
antiv
irus
help
s
Files and data are protected so no hackers can them. While your working you won’t get any threats or web viruses. When you have to send an email to one your of employees, you won’t have trouble sending them.
Why
peo
ple
in
stal
l ant
iviru
s
They install it because they have less distractions and less weight on their shoulders. With having less threats and hackers they have more time to get their work done. They are stress free and are protected 24/7.
Sum
mar
y
Ana – Privacy issues [Co-Coordinator a.k.a Coco #1]
Catalina-Form on Computer
virusesClaudia- AntivirusJoanne- Importance of Security
Karla-AntivirusLianne- Intro to Security Marsha-Intro and Impact Computer viruses [Co-Coordinator a.k.a. Coco #2]
Maxine-Security and Privacy
issues