SlideShare a Scribd company logo
1 of 17
THREATS ABOUT ICT
Darryl Arnett, Robert Dean & Steven
Pennie
MALPRACTICE
 Not backing up work
 Going behind employers back
 Looking at porn
 Using download sites for music and
films
 Staying logged on
 Looking at irrelevant websites
 Sharing usernames and passwords with
other people
PROTECTING AGAINST INTERNAL
THREATS
 Passwords
 Attach computers to desks
 Staff Training
 Anti-virus software
 Code of conduct
PROTECTING AGAINST
EXTERNAL THREATS
 Firewalls to prevent hacking
 ICT facilities not in flood risk area
 Laptop data encrypted to help prevent loss
when stolen
 Uninterruptible power supply
 Use security codes on doors etc to prevent
access from unauthorised people
CRIME
 Copying software
 Hacking
 Stealing peoples information
 Fraud
 Stealing disks and programs, even data
 Having illegal/pirate software
 Spreading viruses
NATURAL DISASTERS
 Fire
 Floods and Other Water Damage can result in a
loss of equipment and data
TO PREVENT IT
 Use Firewalls
 You don’t have ICT facilities in potential
areas prone to flooding
 Use keypads/biometric measures to prevent
unauthorised access ICT rooms/equipment
 Encrypt data on laptops so if they are stolen
the security of the data is not compromised
 Install an interruptible power supply to
prevent loss of power
INTERNAL THREATS
INTERNAL THREATS
 Examples of Internal threats are:
 Employees introducing viruses
 Staff deliberately damaging software, hardware and data
 Staff accidentally loosing or damaging data.
 Staff leaving computers logged on.
 Staff letting other people know their passwords.
 Staff hacking in to ICT systems.
PROTECTING AGAINST
INTERNAL THREATS
 Train staff to prevent mistakes.
 Use passwords to prevent unauthorised access.
 Attach computers to desks to prevent theft
 Install virus checking software.
 Change passwords regularly.
 Have an acceptable use policy.
Definition ofDefinition of
MalpracticeMalpractice
•Malpractice is the word used to describe the act of
careless and improper use of ICT.
•At the workplace, the rules are stated in an ICT
policy. Malpractice involves breaking these rules
without malicious intent.
•Malpractice is not against the law
Examples ofExamples of
MalpracticeMalpractice
•Downloading material which is not appropriate to
your job
•Surfing the internet in work hours.
•Not backing up your work.
•Compromising company security by not logging off
from your workstation.
By Joe C & Joe H
EXAMPLES OF CRIME INCLUDE:
HACKING
A hacker is a term for a computer criminal
which steals your identity or information without
permission
IDENTITY THEFT
Identity theft is a term used to refer to fraud that
involves pretending to be someone else in order
to steal money
FRAUD
A fraud is a deception made for personal gain or
damage to another individual

More Related Content

What's hot

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security roughNathaniel (Nate) Tuenge
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Vulnerabilities Of IoT
Vulnerabilities Of IoT Vulnerabilities Of IoT
Vulnerabilities Of IoT Centextech
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 

What's hot (20)

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Vulnerabilities Of IoT
Vulnerabilities Of IoT Vulnerabilities Of IoT
Vulnerabilities Of IoT
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Internet
InternetInternet
Internet
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 

Viewers also liked

Camila alejandra proyecto terminado como el profe jhon lo pidio
Camila alejandra proyecto terminado como el profe jhon lo     pidioCamila alejandra proyecto terminado como el profe jhon lo     pidio
Camila alejandra proyecto terminado como el profe jhon lo pidiomaldonado1020hfvyfkhihii
 
Historia de la contabilidad
Historia de la contabilidadHistoria de la contabilidad
Historia de la contabilidad3106877009k
 
Inspírate viajando
Inspírate viajandoInspírate viajando
Inspírate viajandoandre1989z
 
σεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσεις
σεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσειςσεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσεις
σεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσειςPetros Manzieris
 
DPS screenshot - Emily Climer
DPS screenshot - Emily ClimerDPS screenshot - Emily Climer
DPS screenshot - Emily ClimerAS Media Column D
 
Calidad de vida en el trabajo recursos humanos 2(1)
Calidad de vida en el trabajo recursos humanos 2(1)Calidad de vida en el trabajo recursos humanos 2(1)
Calidad de vida en el trabajo recursos humanos 2(1)Alexis Garcia Camacho
 
A doçura do teu falar
A doçura do teu falar  A doçura do teu falar
A doçura do teu falar iecpcerq
 
A mensagem da cruz
A mensagem da cruz   A mensagem da cruz
A mensagem da cruz iecpcerq
 
A ele a glória
A ele a glória   A ele a glória
A ele a glória iecpcerq
 
A alegria do senhor
A alegria do senhor   A alegria do senhor
A alegria do senhor iecpcerq
 
A colheita
A colheitaA colheita
A colheitaiecpcerq
 
A minha vida é do mestre
A minha vida  é do mestre   A minha vida  é do mestre
A minha vida é do mestre iecpcerq
 
áGuas purificadoras
áGuas purificadoras  áGuas purificadoras
áGuas purificadoras iecpcerq
 
Ainda que a figueira
Ainda que a figueira  Ainda que a figueira
Ainda que a figueira iecpcerq
 

Viewers also liked (20)

Camila alejandra proyecto terminado como el profe jhon lo pidio
Camila alejandra proyecto terminado como el profe jhon lo     pidioCamila alejandra proyecto terminado como el profe jhon lo     pidio
Camila alejandra proyecto terminado como el profe jhon lo pidio
 
Historia de la contabilidad
Historia de la contabilidadHistoria de la contabilidad
Historia de la contabilidad
 
Inspírate viajando
Inspírate viajandoInspírate viajando
Inspírate viajando
 
Titulo 7
Titulo 7Titulo 7
Titulo 7
 
σεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσεις
σεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσειςσεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσεις
σεμινάριο τα επίπεδα γλωσσομάθειας-διπλώματα-εξετάσεις
 
Contaminacion en colombia 02
Contaminacion en colombia 02Contaminacion en colombia 02
Contaminacion en colombia 02
 
DPS screenshot - Emily Climer
DPS screenshot - Emily ClimerDPS screenshot - Emily Climer
DPS screenshot - Emily Climer
 
Calidad de vida en el trabajo recursos humanos 2(1)
Calidad de vida en el trabajo recursos humanos 2(1)Calidad de vida en el trabajo recursos humanos 2(1)
Calidad de vida en el trabajo recursos humanos 2(1)
 
A doçura do teu falar
A doçura do teu falar  A doçura do teu falar
A doçura do teu falar
 
A mensagem da cruz
A mensagem da cruz   A mensagem da cruz
A mensagem da cruz
 
A ele a glória
A ele a glória   A ele a glória
A ele a glória
 
A alegria do senhor
A alegria do senhor   A alegria do senhor
A alegria do senhor
 
A colheita
A colheitaA colheita
A colheita
 
A minha vida é do mestre
A minha vida  é do mestre   A minha vida  é do mestre
A minha vida é do mestre
 
áGuas purificadoras
áGuas purificadoras  áGuas purificadoras
áGuas purificadoras
 
A coroa
A coroa   A coroa
A coroa
 
Alegria
Alegria   Alegria
Alegria
 
Ainda que a figueira
Ainda que a figueira  Ainda que a figueira
Ainda que a figueira
 
43693417 patricia navarro rodriguez grupo 2
43693417 patricia navarro rodriguez grupo 243693417 patricia navarro rodriguez grupo 2
43693417 patricia navarro rodriguez grupo 2
 
Ensayo argumentativo
Ensayo argumentativoEnsayo argumentativo
Ensayo argumentativo
 

Similar to Safety and security of data student work

Similar to Safety and security of data student work (20)

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Computer
ComputerComputer
Computer
 
Hacking
HackingHacking
Hacking
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Ppt
PptPpt
Ppt
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 

More from Jorge Arturo Ortiz

More from Jorge Arturo Ortiz (13)

Excel
ExcelExcel
Excel
 
Educaplay
EducaplayEducaplay
Educaplay
 
Semana 04 - unidad 2 - tema 1
Semana   04 - unidad 2 - tema 1Semana   04 - unidad 2 - tema 1
Semana 04 - unidad 2 - tema 1
 
Electronic portfolios for students
Electronic portfolios for studentsElectronic portfolios for students
Electronic portfolios for students
 
Digital portfolio
Digital portfolioDigital portfolio
Digital portfolio
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learning
 
Decision making for integrating ICT into Education
Decision making for integrating ICT into EducationDecision making for integrating ICT into Education
Decision making for integrating ICT into Education
 
Uso de excel en educación
Uso de excel en educaciónUso de excel en educación
Uso de excel en educación
 
Uso de excel en educación
Uso de excel en educaciónUso de excel en educación
Uso de excel en educación
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
 
Digital competence strategy
Digital competence strategyDigital competence strategy
Digital competence strategy
 
Latinoamérica o el desafío del sur
Latinoamérica o el desafío del surLatinoamérica o el desafío del sur
Latinoamérica o el desafío del sur
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

Safety and security of data student work

  • 1. THREATS ABOUT ICT Darryl Arnett, Robert Dean & Steven Pennie
  • 2. MALPRACTICE  Not backing up work  Going behind employers back  Looking at porn  Using download sites for music and films  Staying logged on  Looking at irrelevant websites  Sharing usernames and passwords with other people
  • 3. PROTECTING AGAINST INTERNAL THREATS  Passwords  Attach computers to desks  Staff Training  Anti-virus software  Code of conduct
  • 4. PROTECTING AGAINST EXTERNAL THREATS  Firewalls to prevent hacking  ICT facilities not in flood risk area  Laptop data encrypted to help prevent loss when stolen  Uninterruptible power supply  Use security codes on doors etc to prevent access from unauthorised people
  • 5. CRIME  Copying software  Hacking  Stealing peoples information  Fraud  Stealing disks and programs, even data  Having illegal/pirate software  Spreading viruses
  • 6. NATURAL DISASTERS  Fire  Floods and Other Water Damage can result in a loss of equipment and data
  • 7. TO PREVENT IT  Use Firewalls  You don’t have ICT facilities in potential areas prone to flooding  Use keypads/biometric measures to prevent unauthorised access ICT rooms/equipment  Encrypt data on laptops so if they are stolen the security of the data is not compromised  Install an interruptible power supply to prevent loss of power
  • 9. INTERNAL THREATS  Examples of Internal threats are:  Employees introducing viruses  Staff deliberately damaging software, hardware and data  Staff accidentally loosing or damaging data.  Staff leaving computers logged on.  Staff letting other people know their passwords.  Staff hacking in to ICT systems.
  • 10. PROTECTING AGAINST INTERNAL THREATS  Train staff to prevent mistakes.  Use passwords to prevent unauthorised access.  Attach computers to desks to prevent theft  Install virus checking software.  Change passwords regularly.  Have an acceptable use policy.
  • 11. Definition ofDefinition of MalpracticeMalpractice •Malpractice is the word used to describe the act of careless and improper use of ICT. •At the workplace, the rules are stated in an ICT policy. Malpractice involves breaking these rules without malicious intent. •Malpractice is not against the law
  • 12. Examples ofExamples of MalpracticeMalpractice •Downloading material which is not appropriate to your job •Surfing the internet in work hours. •Not backing up your work. •Compromising company security by not logging off from your workstation.
  • 13. By Joe C & Joe H
  • 14. EXAMPLES OF CRIME INCLUDE:
  • 15. HACKING A hacker is a term for a computer criminal which steals your identity or information without permission
  • 16. IDENTITY THEFT Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money
  • 17. FRAUD A fraud is a deception made for personal gain or damage to another individual