SlideShare a Scribd company logo
1 of 17
THREATS ABOUT ICT
Darryl Arnett, Robert Dean & Steven
Pennie
MALPRACTICE
 Not backing up work
 Going behind employers back
 Looking at porn
 Using download sites for music and
films
 Staying logged on
 Looking at irrelevant websites
 Sharing usernames and passwords with
other people
PROTECTING AGAINST INTERNAL
THREATS
 Passwords
 Attach computers to desks
 Staff Training
 Anti-virus software
 Code of conduct
PROTECTING AGAINST
EXTERNAL THREATS
 Firewalls to prevent hacking
 ICT facilities not in flood risk area
 Laptop data encrypted to help prevent loss
when stolen
 Uninterruptible power supply
 Use security codes on doors etc to prevent
access from unauthorised people
CRIME
 Copying software
 Hacking
 Stealing peoples information
 Fraud
 Stealing disks and programs, even data
 Having illegal/pirate software
 Spreading viruses
NATURAL DISASTERS
 Fire
 Floods and Other Water Damage can result in a
loss of equipment and data
TO PREVENT IT
 Use Firewalls
 You don’t have ICT facilities in potential
areas prone to flooding
 Use keypads/biometric measures to prevent
unauthorised access ICT rooms/equipment
 Encrypt data on laptops so if they are stolen
the security of the data is not compromised
 Install an interruptible power supply to
prevent loss of power
INTERNAL THREATS
INTERNAL THREATS
 Examples of Internal threats are:
 Employees introducing viruses
 Staff deliberately damaging software, hardware and data
 Staff accidentally loosing or damaging data.
 Staff leaving computers logged on.
 Staff letting other people know their passwords.
 Staff hacking in to ICT systems.
PROTECTING AGAINST
INTERNAL THREATS
 Train staff to prevent mistakes.
 Use passwords to prevent unauthorised access.
 Attach computers to desks to prevent theft
 Install virus checking software.
 Change passwords regularly.
 Have an acceptable use policy.
Definition ofDefinition of
MalpracticeMalpractice
•Malpractice is the word used to describe the act of
careless and improper use of ICT.
•At the workplace, the rules are stated in an ICT
policy. Malpractice involves breaking these rules
without malicious intent.
•Malpractice is not against the law
Examples ofExamples of
MalpracticeMalpractice
•Downloading material which is not appropriate to
your job
•Surfing the internet in work hours.
•Not backing up your work.
•Compromising company security by not logging off
from your workstation.
By Joe C & Joe H
EXAMPLES OF CRIME INCLUDE:
HACKING
A hacker is a term for a computer criminal
which steals your identity or information without
permission
IDENTITY THEFT
Identity theft is a term used to refer to fraud that
involves pretending to be someone else in order
to steal money
FRAUD
A fraud is a deception made for personal gain or
damage to another individual

More Related Content

What's hot

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and usechrispaul8676
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security roughNathaniel (Nate) Tuenge
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Vulnerabilities Of IoT
Vulnerabilities Of IoT Vulnerabilities Of IoT
Vulnerabilities Of IoT Centextech
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Hannah Jane del Castillo
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abusePrakash Raval
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItSonali Srivastava
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaChinnu Shimna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information SecurityAna Meskovska
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 

What's hot (20)

Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Unauthorized access and use
Unauthorized access and useUnauthorized access and use
Unauthorized access and use
 
Do’s & don’ts of computer security rough
Do’s & don’ts of computer security  roughDo’s & don’ts of computer security  rough
Do’s & don’ts of computer security rough
 
Network Security
Network SecurityNetwork Security
Network Security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Vulnerabilities Of IoT
Vulnerabilities Of IoT Vulnerabilities Of IoT
Vulnerabilities Of IoT
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
System vulnerability and abuse
System vulnerability and abuseSystem vulnerability and abuse
System vulnerability and abuse
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Internet
InternetInternet
Internet
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Threats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - ShimnaThreats to Information Resources - MIS - Shimna
Threats to Information Resources - MIS - Shimna
 
3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security3 Most Common Threats Of Information Security
3 Most Common Threats Of Information Security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Computer security and
Computer security andComputer security and
Computer security and
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 

Viewers also liked

fortalezas y debilidades de las tic en la educacion y comunicacion
fortalezas y debilidades de las tic en la educacion y comunicacionfortalezas y debilidades de las tic en la educacion y comunicacion
fortalezas y debilidades de las tic en la educacion y comunicacionLuis Felipe Montoya Gomez
 
Funciones y formulas en excel 2010
Funciones y formulas en excel 2010Funciones y formulas en excel 2010
Funciones y formulas en excel 2010mililema
 
Cocktail Party Venues Perth - Raffles Hotel
Cocktail Party Venues Perth - Raffles HotelCocktail Party Venues Perth - Raffles Hotel
Cocktail Party Venues Perth - Raffles Hotelclaricelinton
 
3Com 3C10384VCX
3Com 3C10384VCX3Com 3C10384VCX
3Com 3C10384VCXsavomir
 
Ez cast dongle an hdmi dongle-based tv streamer
Ez cast dongle   an hdmi dongle-based tv streamerEz cast dongle   an hdmi dongle-based tv streamer
Ez cast dongle an hdmi dongle-based tv streamerwifi ezcast dongle
 
Ανακαίνιση ξενοδοχείου
Ανακαίνιση ξενοδοχείουΑνακαίνιση ξενοδοχείου
Ανακαίνιση ξενοδοχείουdomi anakainisi
 
Wellstream Processing sales presentation
Wellstream Processing sales presentation Wellstream Processing sales presentation
Wellstream Processing sales presentation Ingjerd Jensen
 
3Com 3CRVH701396A
3Com 3CRVH701396A3Com 3CRVH701396A
3Com 3CRVH701396Asavomir
 
3Com 3C95006PS-2
3Com 3C95006PS-23Com 3C95006PS-2
3Com 3C95006PS-2savomir
 

Viewers also liked (16)

Impact of ict in education
Impact of ict in educationImpact of ict in education
Impact of ict in education
 
Digital competence strategy
Digital competence strategyDigital competence strategy
Digital competence strategy
 
Microsoft excel
Microsoft excelMicrosoft excel
Microsoft excel
 
Excel educacion
Excel educacionExcel educacion
Excel educacion
 
fortalezas y debilidades de las tic en la educacion y comunicacion
fortalezas y debilidades de las tic en la educacion y comunicacionfortalezas y debilidades de las tic en la educacion y comunicacion
fortalezas y debilidades de las tic en la educacion y comunicacion
 
Funciones y formulas en excel 2010
Funciones y formulas en excel 2010Funciones y formulas en excel 2010
Funciones y formulas en excel 2010
 
Cocktail Party Venues Perth - Raffles Hotel
Cocktail Party Venues Perth - Raffles HotelCocktail Party Venues Perth - Raffles Hotel
Cocktail Party Venues Perth - Raffles Hotel
 
3Com 3C10384VCX
3Com 3C10384VCX3Com 3C10384VCX
3Com 3C10384VCX
 
Ez cast dongle an hdmi dongle-based tv streamer
Ez cast dongle   an hdmi dongle-based tv streamerEz cast dongle   an hdmi dongle-based tv streamer
Ez cast dongle an hdmi dongle-based tv streamer
 
Ανακαίνιση ξενοδοχείου
Ανακαίνιση ξενοδοχείουΑνακαίνιση ξενοδοχείου
Ανακαίνιση ξενοδοχείου
 
What JS? Itself
What JS? ItselfWhat JS? Itself
What JS? Itself
 
Wellstream Processing sales presentation
Wellstream Processing sales presentation Wellstream Processing sales presentation
Wellstream Processing sales presentation
 
3Com 3CRVH701396A
3Com 3CRVH701396A3Com 3CRVH701396A
3Com 3CRVH701396A
 
3Com 3C95006PS-2
3Com 3C95006PS-23Com 3C95006PS-2
3Com 3C95006PS-2
 
Blee
BleeBlee
Blee
 
Despertar
DespertarDespertar
Despertar
 

Similar to Safety and security of data student work

Similar to Safety and security of data student work (20)

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Internet security powerpoint
Internet security powerpointInternet security powerpoint
Internet security powerpoint
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
Computer
ComputerComputer
Computer
 
Hacking
HackingHacking
Hacking
 
Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
information security and backup system
information security and backup systeminformation security and backup system
information security and backup system
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber_security_.pdf
Cyber_security_.pdfCyber_security_.pdf
Cyber_security_.pdf
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Ppt
PptPpt
Ppt
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
IT Threats and Computer Security
IT Threats and Computer SecurityIT Threats and Computer Security
IT Threats and Computer Security
 
Educational Technology Chapter 8
Educational Technology Chapter 8Educational Technology Chapter 8
Educational Technology Chapter 8
 

More from Jorge Arturo Ortiz

More from Jorge Arturo Ortiz (11)

Excel
ExcelExcel
Excel
 
Educaplay
EducaplayEducaplay
Educaplay
 
Semana 04 - unidad 2 - tema 1
Semana   04 - unidad 2 - tema 1Semana   04 - unidad 2 - tema 1
Semana 04 - unidad 2 - tema 1
 
Electronic portfolios for students
Electronic portfolios for studentsElectronic portfolios for students
Electronic portfolios for students
 
Digital portfolio
Digital portfolioDigital portfolio
Digital portfolio
 
Matrix of ict skills for learning
Matrix of ict skills for learningMatrix of ict skills for learning
Matrix of ict skills for learning
 
Decision making for integrating ICT into Education
Decision making for integrating ICT into EducationDecision making for integrating ICT into Education
Decision making for integrating ICT into Education
 
Uso de excel en educación
Uso de excel en educaciónUso de excel en educación
Uso de excel en educación
 
Uso de excel en educación
Uso de excel en educaciónUso de excel en educación
Uso de excel en educación
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
Latinoamérica o el desafío del sur
Latinoamérica o el desafío del surLatinoamérica o el desafío del sur
Latinoamérica o el desafío del sur
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Safety and security of data student work

  • 1. THREATS ABOUT ICT Darryl Arnett, Robert Dean & Steven Pennie
  • 2. MALPRACTICE  Not backing up work  Going behind employers back  Looking at porn  Using download sites for music and films  Staying logged on  Looking at irrelevant websites  Sharing usernames and passwords with other people
  • 3. PROTECTING AGAINST INTERNAL THREATS  Passwords  Attach computers to desks  Staff Training  Anti-virus software  Code of conduct
  • 4. PROTECTING AGAINST EXTERNAL THREATS  Firewalls to prevent hacking  ICT facilities not in flood risk area  Laptop data encrypted to help prevent loss when stolen  Uninterruptible power supply  Use security codes on doors etc to prevent access from unauthorised people
  • 5. CRIME  Copying software  Hacking  Stealing peoples information  Fraud  Stealing disks and programs, even data  Having illegal/pirate software  Spreading viruses
  • 6. NATURAL DISASTERS  Fire  Floods and Other Water Damage can result in a loss of equipment and data
  • 7. TO PREVENT IT  Use Firewalls  You don’t have ICT facilities in potential areas prone to flooding  Use keypads/biometric measures to prevent unauthorised access ICT rooms/equipment  Encrypt data on laptops so if they are stolen the security of the data is not compromised  Install an interruptible power supply to prevent loss of power
  • 9. INTERNAL THREATS  Examples of Internal threats are:  Employees introducing viruses  Staff deliberately damaging software, hardware and data  Staff accidentally loosing or damaging data.  Staff leaving computers logged on.  Staff letting other people know their passwords.  Staff hacking in to ICT systems.
  • 10. PROTECTING AGAINST INTERNAL THREATS  Train staff to prevent mistakes.  Use passwords to prevent unauthorised access.  Attach computers to desks to prevent theft  Install virus checking software.  Change passwords regularly.  Have an acceptable use policy.
  • 11. Definition ofDefinition of MalpracticeMalpractice •Malpractice is the word used to describe the act of careless and improper use of ICT. •At the workplace, the rules are stated in an ICT policy. Malpractice involves breaking these rules without malicious intent. •Malpractice is not against the law
  • 12. Examples ofExamples of MalpracticeMalpractice •Downloading material which is not appropriate to your job •Surfing the internet in work hours. •Not backing up your work. •Compromising company security by not logging off from your workstation.
  • 13. By Joe C & Joe H
  • 14. EXAMPLES OF CRIME INCLUDE:
  • 15. HACKING A hacker is a term for a computer criminal which steals your identity or information without permission
  • 16. IDENTITY THEFT Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money
  • 17. FRAUD A fraud is a deception made for personal gain or damage to another individual