24
Privacy and Security Issues Privacy and Security Issues related to Information and Communication Technology

Privacy and Security Issues Privacy and Security Issues related to Information and Communication Technology

Embed Size (px)

Citation preview

Privacy and Security IssuesPrivacy and Security Issues related to Information and Communication

Technology

Subto

pic

s

Describe privacy and

security issuesExplain importance of

keeping information secure and confidential

Analyse the form and

potential impact of computer viruses

Explain how anti-virus

software applications

enhance system security

Identity Theft stealing info from a person that allows you

to access anything in their name

Protection of Credit Card Information

protect the six-digit issuer identifier, account number, cardholder name, card verification value code (CVV)

and your pin number

Cookie

sYour personal cookies

may get leaked out onto a website and leave your personal information out there if you don’t delete them often

Relation to ICT computer skills needed to access any

info through a computer

Importance of

Privacy and Security

Introduction

Why is privacy and security important?

About 90% of victims did not know they were being hacked.

Victims who were Hacked

Victims who knewVictims who didn't know

Cyber-bullying

What are some ways to be protected?

FirewallComplicated passwords

Antivirus-softwares

And more!

What are some ways to be protected? (continuation)

Pop-up blockers

Back-up files

Conse

quence

s Risk of losing important files

Used for selfish or inappropriate reasons, such as identity theft, etc.

Introduction to Computer Viruses

What

is a

com

pute

r vi

rus?

A software on computers that can replicate itself, travel

around and is designed to interfere

with the operation of

your computer. A virus can ruin, copy

and even delete data

off your computer.  

Yearly Comparison of Computer Viruses

Vir

us

nam

es

Trojan Horse Worms Bootsector Virus Marco Virus Memory Resident Virus

Rootkit Virus Polymorphic Virus Logic Bombs/Time Bombs

Trojan Horse

Some of the uses or purposes of a Trojan can be:

• Electronic money theft

• Viewing users screen

• Crashing computer

• Control computer remotely

REMEMBER - a Trojan horse is software that pretends to be a legitimate program in order to gain your trust.

Worm

s

Functions include;• Replace files with copies of

itself• Rename files• Modify them so they become

unusable• Install additional malware

• Terminate any active anti-

malwareREMEMBER - Worms are the

worst of all because they don't

require you to click on anything

and can start all by themselves.

DO

N’T

FO

RG

ET!

A Computer virus ...• can slow down your computer.

• might corrupt your system files.

• might make some programs

faulty or corrupt.• might damage your boot sector

creating problems when you

boot into the windows.

• might steal important

information from your computer

and send to some other person.

• might change the power

ratings of your computer and

could blast the system

What Anti-Virus Softwares Are Available

There are many anti-virus soft wares out there tailored to businesses.

Such as:

-AVG (Business Edition)

-Bitdefender

-McaAfee

-Avira (Professional Security)

(Endpoint Security)

(Small Business Security Suite)

(Business Security Suite)

-And many more... 

For Businesses

Sum

mary

Ana – Privacy issues [Co-

Coordinator a.k.a Coco #1]

Catalina-Form on Computer

virusesClaudia- Antivirus

Joanne- Importance of Security

Karla-AntivirusLianne- Intro to Security

Marsha-Intro and Impact

Computer viruses [Co-

Coordinator a.k.a. Coco #2]

Maxine-Security and Privacy

issues