240 likes | 250 Views
Privacy and Security Issues. Privacy and Security Issues related to I nformation and Communication Technology. Describe privacy and security issues Explain importance of keeping information secure and confidential Analyse the form and potential impact of computer viruses
E N D
Privacy and Security Issues Privacy and Security Issues related to Information and Communication Technology
Describe privacy and security issues • Explain importance of keeping information secure and confidential • Analyse the form and potential impact of computer viruses • Explain how anti-virus software applications enhance system security Subtopics
Identity Theft stealing info from a person that allows you to access anything in their name
Protection of Credit Card Information protect the six-digit issuer identifier, account number, cardholder name, card verification value code (CVV) and your pin number
Your personal cookies may get leaked out onto a website and leave your personal information out there if you don’t delete them often Cookies
Relation to ICT • computer skills needed to access any info through a computer
Importance of Privacy and Security Introduction
Why is privacy and security important? About 90% of victims did not know they were being hacked. Cyber-bullying
What are some ways to be protected? Firewall Complicated passwords And more! Antivirus-softwares
Pop-up blockers • Back-up files What are some ways to be protected? (continuation)
Risk of losing important files • Used for selfish or inappropriate reasons, such as identity theft, etc. Consequences
A software on computers that can replicate itself, travel around and is designed to interfere with the operation of your computer. • A virus can ruin, copy and even delete data off your computer. What is a computer virus?
Trojan Horse • Worms • Bootsector Virus • Marco Virus • Memory Resident Virus • Rootkit Virus • Polymorphic Virus • Logic Bombs/Time Bombs Virus names
Some of the uses or purposes of a Trojan can be: • Electronic money theft • Viewing users screen • Crashing computer • Control computer remotely REMEMBER - a Trojan horse is software that pretends to be a legitimate program in order to gain your trust. Trojan Horse
Functions include; • Replace files with copies of itself • Rename files • Modify them so they become unusable • Install additional malware • Terminate any active anti-malware REMEMBER - Worms are the worst of all because they don't require you to click on anything and can start all by themselves. Worms
A Computer virus ... • can slow down your computer. • might corrupt your system files. • might make some programs faulty or corrupt. • might damage your boot sector creating problems when you boot into the windows. • might steal important information from your computer and send to some other person. • might change the power ratings of your computer and could blast the system DON’T FORGET!
A software designed to be used on your computer to find, treat, remove and keep malwares away. It will keep all your computer data safe! What Is An Anti-Virus Software?
For Businesses There are many anti-virus soft wares out there tailored to businesses. Such as: -AVG (Business Edition) -Bitdefender -McaAfee -Avira (Professional Security) (Endpoint Security) (Small Business Security Suite) (Business Security Suite) -And many more... What Anti-Virus Softwares Are Available
Files and data are protected so no hackers can them. While your working you won’t get any threats or web viruses. When you have to send an email to one your of employees, you won’t have trouble sending them. How antivirus helps
They install it because they have less distractions and less weight on their shoulders. With having less threats and hackers they have more time to get their work done. They are stress free and are protected 24/7. Why people install antivirus
Ana – Privacy issues [Co-Coordinator a.k.a Coco #1] Catalina-Form on Computer viruses Claudia- Antivirus Joanne- Importance of Security Karla-Antivirus Lianne- Intro to Security Marsha-Intro and Impact Computer viruses [Co-Coordinator a.k.a. Coco #2] Maxine-Security and Privacy issues Summary