Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

8
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012

Transcript of Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Page 1: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Viruses & Security ThreatsUnit 1 – Understanding Computer Systems

JMW 2012

Page 2: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

By the end of this session:

• All of you would be able to explain how viruses affect computers.

• Most of you should understand how your identity can be stolen through phishing and spyware applications.

• A few of you could explore other threats to data security, e.g. hacking, and actions that can be taken to minimise risks.

Page 3: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Viruses• Some viruses (or malware) try to gain entry to your computer in a

similar way by pretending to be something else.

• For example, that screensaver you downloaded or game you played may have a virus contained with it.

• These viruses are sometimes called Trojan Horses.

• Worms are viruses which attach themselves to files on your computer. Infected files then spread the virus as the worm attaches itself to other files on the system.

• File sharing websites can often be a source ofviruses. Avoid sharing illegal file-sharing sitesand scan any programs downloaded from theInternet.

Page 4: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

How can I protect myself?

• Use a virus scanner to scan any files you download from the Internet or other computers.

• Regularly scan your computer’s hard drive for viruses.

• Keep your virus definitionsup-to-date.

Page 5: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Identity Theft

• Phishing emails pretend to be another company in order to extract personal information, such as passwords, from users.

• The email asks you to click a link which takes you to a fake website and then enter your password (which is then stored by the phishers.)

• Spyware hides on your computer and records everything you do and passes it on to criminals.

• They can then steal your identity and pretend to be you – this is called “Identity Theft”

Page 6: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

How can I protect myself?• Check the link shown in the email matches the website

you go to when clicked.

• Legitimate emails often use personal data, e.g. first name, which Phishers don’t have access to.

• Never give out your password details on any website unless you are 100% sure it is the official website. If in doubt check the email received with the company before divulging any information.

• Scan your computer regularly for spyware. Use firewalls to prevent unauthorised communication from your computer.

Page 7: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Your Task

• Create a poster to raise aware of data security threats.

• Your poster should:– Explain the risk– Give advice on how to minimise the risk

Extra Challenge:

• Explain why every computer should have a firewall installed.• When you buy something online, how is the debit/credit card data

kept secure?

Page 8: Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.

Peer Review of Posters• Look at the poster of the person sitting next to

you.• Is it fit for purpose?– Does it explain at least one of the data security

threats?– Does it provide advice to minimise the risks?– Does it stand out? Clear writing?

Identify 2 good things about the poster (2 stars *)and one area for improvement (1 wish) wish