SlideShare a Scribd company logo
Introduction to computer
system security
Alicia Pedrosa Sánchez 1
OXFORD - JULY 2014
ERASMUS+ KA1
Introduction
• Same examples…
• May 21, 2012
A hacker group hacked the website of IBM Research
• May 22, 2012
• A hacker group called Anonymous attacked the website of
the U.S. Department of Justice, filtering about 1.7GB of
information, including internal staff email
Alicia Pedrosa Sánchez 2
Introduction
• Let’s see more examples
Alicia Pedrosa Sánchez IES José Rodrigo Botet 3
Introduction
• After watching this video:
• It’s important to secure a computer system?
• And your personal computer at home?
Alicia Pedrosa Sánchez IES José Rodrigo Botet 4
Introduction
YES, OF COURSE IT IS!!!!!
• We have to reach a compromise between
the value of what I have to assure and how
much I can spend on secure them
• Do we really need it?
Alicia Pedrosa Sánchez 5
Exercise 1:
How much I know about security?
• Let’s check how much
we know about
computer system
security by doing a
crossword in pairs
Alicia Pedrosa Sánchez IES José Rodrigo Botet 6
Computer security as a global
approach
The security level of a system is effective only
if the security level of the weakest link is
Computer security system is as strong as the
weak link
Alicia Pedrosa Sánchez 7
Computer security as a global
approach
•Unfortunatelly, users
are the weakest link
Alicia Pedrosa Sánchez 8
Computer security as a global
approach
Alicia Pedrosa Sánchez 9
Social engineering
• What we have seen in the video are
different practices of social engineering
• Social engineering is based on the weakest
link is the user
• 1. We want to help
2. We always trust the others
3. We don’t like to say “no”
4. We like to be praised
Alicia Pedrosa Sánchez 10
Social Engineering
Social engineering is the art of manipulating
people so they give up confidential
information
For instance: by changing their password by a
pen
Alicia Pedrosa Sánchez 11
Exercise 2:
Will I be fired from work?
• Find the heading of these social
engineering technics
• Work in pairs
Alicia Pedrosa Sánchez IES José Rodrigo Botet 12
Some definitions
• Threat is a possible danger that might exploit
a vulnerability to breach security and thus
cause possible damage
• Vulnerability is a weakness which allows an
attacker to reduce a system's security
• Attack is any attempt to destroy, expose, alter,
disable, steal or gain unauthorized access to or
make unauthorized use of computer system
Alicia Pedrosa Sánchez IES José Rodrigo Botet 13
Threats
• Logical threats
• Physical threats
• Human Threats
Alicia Pedrosa Sánchez IES José Rodrigo Botet 14
One last recommendation
• Your password is like your toothbrush
• Choose a good one
• Use it every day
• Change it from time to time
• DON’T SHARE IT with anyone
Alicia Pedrosa Sánchez IES José Rodrigo Botet 15
Alicia Pedrosa Sánchez IES José Rodrigo Botet 16
END
CLIL MATERIAL FOR TEACHING
COMPUTER SCIENCES

More Related Content

Similar to Sad English. Oxford July 2014. Erasmus + KA1

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
Rashid Khatmey
 
Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
Evan Francen
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Robi Sen
 
Team black
Team blackTeam black
Team black
hetvi naik
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
APNIC
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
National Information Standards Organization (NISO)
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
Phish training final
Phish training finalPhish training final
Phish training final
Jen Ruhman
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
LYRASIS
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
TechSoup
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
EmanAzam
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
Sean Whalen
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
FRSecure
 
Social engineering
Social engineeringSocial engineering
Social engineering
ankushmohanty
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network Security
Maruf Hasan
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
Arthur Landry
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
ssuser3e6464
 
Assessing Your security
Assessing Your securityAssessing Your security

Similar to Sad English. Oxford July 2014. Erasmus + KA1 (20)

4 . future uni presentation
4 . future uni presentation4 . future uni presentation
4 . future uni presentation
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917MHTA Social Engineering Presentation - 050917
MHTA Social Engineering Presentation - 050917
 
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
 
Team black
Team blackTeam black
Team black
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
Carver IT Security for Librarians
Carver IT Security for LibrariansCarver IT Security for Librarians
Carver IT Security for Librarians
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Phish training final
Phish training finalPhish training final
Phish training final
 
Keeping you and your library safe and secure
Keeping you and your library safe and secureKeeping you and your library safe and secure
Keeping you and your library safe and secure
 
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
Webinar - Keep Your Connected Nonprofit or Library Secure - 2015-10-01
 
02-overview.pptx
02-overview.pptx02-overview.pptx
02-overview.pptx
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1Slide Deck - CISSP Mentor Program Class Session 1
Slide Deck - CISSP Mentor Program Class Session 1
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Software Security & Network Security
Software Security & Network SecuritySoftware Security & Network Security
Software Security & Network Security
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Network Security introduction.pdf
Network Security introduction.pdfNetwork Security introduction.pdf
Network Security introduction.pdf
 
Assessing Your security
Assessing Your securityAssessing Your security
Assessing Your security
 

More from M.Amparo

Political party Bulgaria. Meeting in Sibiu
Political party Bulgaria. Meeting in SibiuPolitical party Bulgaria. Meeting in Sibiu
Political party Bulgaria. Meeting in Sibiu
M.Amparo
 
Social Capital and solidarity. Meeting in Rize. April 2017
Social Capital and solidarity. Meeting in Rize. April 2017Social Capital and solidarity. Meeting in Rize. April 2017
Social Capital and solidarity. Meeting in Rize. April 2017
M.Amparo
 
The Franquisme in Spain, the dictatorship
The Franquisme in Spain, the dictatorshipThe Franquisme in Spain, the dictatorship
The Franquisme in Spain, the dictatorship
M.Amparo
 
Factors that weaken democracies
Factors that weaken democraciesFactors that weaken democracies
Factors that weaken democracies
M.Amparo
 
Forums in eTwinning
Forums in eTwinningForums in eTwinning
Forums in eTwinning
M.Amparo
 
44th school neophyte bozveli, Sofia, Bulgaria
44th school neophyte bozveli, Sofia, Bulgaria44th school neophyte bozveli, Sofia, Bulgaria
44th school neophyte bozveli, Sofia, Bulgaria
M.Amparo
 
Democratic institutions in Bulgaria
Democratic institutions in BulgariaDemocratic institutions in Bulgaria
Democratic institutions in Bulgaria
M.Amparo
 
Democracy at school. bulgarian team
Democracy at school. bulgarian teamDemocracy at school. bulgarian team
Democracy at school. bulgarian team
M.Amparo
 
Unidad didactica: ¡Conociendo Europa! 2016
Unidad didactica: ¡Conociendo Europa! 2016Unidad didactica: ¡Conociendo Europa! 2016
Unidad didactica: ¡Conociendo Europa! 2016
M.Amparo
 
Robotics 2.0
Robotics 2.0Robotics 2.0
Robotics 2.0
M.Amparo
 
School council in IES.josé Rodrigo Botet, Manises-Valencia. SPAIN
School council in IES.josé Rodrigo Botet, Manises-Valencia. SPAINSchool council in IES.josé Rodrigo Botet, Manises-Valencia. SPAIN
School council in IES.josé Rodrigo Botet, Manises-Valencia. SPAIN
M.Amparo
 
Robotics presentation
Robotics presentationRobotics presentation
Robotics presentation
M.Amparo
 
Democratic Institutions in Spain
Democratic Institutions in SpainDemocratic Institutions in Spain
Democratic Institutions in Spain
M.Amparo
 
School introduction. New environments. Joensuu. Finland
School introduction.  New environments. Joensuu. FinlandSchool introduction.  New environments. Joensuu. Finland
School introduction. New environments. Joensuu. Finland
M.Amparo
 
Democracy for us
Democracy for usDemocracy for us
Democracy for us
M.Amparo
 
The History of Democracy in France
The History of Democracy in FranceThe History of Democracy in France
The History of Democracy in France
M.Amparo
 
Nuestro pais: España
Nuestro pais: EspañaNuestro pais: España
Nuestro pais: España
M.Amparo
 
España, nuestras comunidades y ciudades
España, nuestras comunidades y ciudadesEspaña, nuestras comunidades y ciudades
España, nuestras comunidades y ciudades
M.Amparo
 
España, nuestro pais
España, nuestro paisEspaña, nuestro pais
España, nuestro pais
M.Amparo
 
SPAIN: CITIES, LANGUAGES, MONUMENTS...
SPAIN: CITIES, LANGUAGES, MONUMENTS...SPAIN: CITIES, LANGUAGES, MONUMENTS...
SPAIN: CITIES, LANGUAGES, MONUMENTS...
M.Amparo
 

More from M.Amparo (20)

Political party Bulgaria. Meeting in Sibiu
Political party Bulgaria. Meeting in SibiuPolitical party Bulgaria. Meeting in Sibiu
Political party Bulgaria. Meeting in Sibiu
 
Social Capital and solidarity. Meeting in Rize. April 2017
Social Capital and solidarity. Meeting in Rize. April 2017Social Capital and solidarity. Meeting in Rize. April 2017
Social Capital and solidarity. Meeting in Rize. April 2017
 
The Franquisme in Spain, the dictatorship
The Franquisme in Spain, the dictatorshipThe Franquisme in Spain, the dictatorship
The Franquisme in Spain, the dictatorship
 
Factors that weaken democracies
Factors that weaken democraciesFactors that weaken democracies
Factors that weaken democracies
 
Forums in eTwinning
Forums in eTwinningForums in eTwinning
Forums in eTwinning
 
44th school neophyte bozveli, Sofia, Bulgaria
44th school neophyte bozveli, Sofia, Bulgaria44th school neophyte bozveli, Sofia, Bulgaria
44th school neophyte bozveli, Sofia, Bulgaria
 
Democratic institutions in Bulgaria
Democratic institutions in BulgariaDemocratic institutions in Bulgaria
Democratic institutions in Bulgaria
 
Democracy at school. bulgarian team
Democracy at school. bulgarian teamDemocracy at school. bulgarian team
Democracy at school. bulgarian team
 
Unidad didactica: ¡Conociendo Europa! 2016
Unidad didactica: ¡Conociendo Europa! 2016Unidad didactica: ¡Conociendo Europa! 2016
Unidad didactica: ¡Conociendo Europa! 2016
 
Robotics 2.0
Robotics 2.0Robotics 2.0
Robotics 2.0
 
School council in IES.josé Rodrigo Botet, Manises-Valencia. SPAIN
School council in IES.josé Rodrigo Botet, Manises-Valencia. SPAINSchool council in IES.josé Rodrigo Botet, Manises-Valencia. SPAIN
School council in IES.josé Rodrigo Botet, Manises-Valencia. SPAIN
 
Robotics presentation
Robotics presentationRobotics presentation
Robotics presentation
 
Democratic Institutions in Spain
Democratic Institutions in SpainDemocratic Institutions in Spain
Democratic Institutions in Spain
 
School introduction. New environments. Joensuu. Finland
School introduction.  New environments. Joensuu. FinlandSchool introduction.  New environments. Joensuu. Finland
School introduction. New environments. Joensuu. Finland
 
Democracy for us
Democracy for usDemocracy for us
Democracy for us
 
The History of Democracy in France
The History of Democracy in FranceThe History of Democracy in France
The History of Democracy in France
 
Nuestro pais: España
Nuestro pais: EspañaNuestro pais: España
Nuestro pais: España
 
España, nuestras comunidades y ciudades
España, nuestras comunidades y ciudadesEspaña, nuestras comunidades y ciudades
España, nuestras comunidades y ciudades
 
España, nuestro pais
España, nuestro paisEspaña, nuestro pais
España, nuestro pais
 
SPAIN: CITIES, LANGUAGES, MONUMENTS...
SPAIN: CITIES, LANGUAGES, MONUMENTS...SPAIN: CITIES, LANGUAGES, MONUMENTS...
SPAIN: CITIES, LANGUAGES, MONUMENTS...
 

Recently uploaded

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 

Recently uploaded (20)

S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 

Sad English. Oxford July 2014. Erasmus + KA1

  • 1. Introduction to computer system security Alicia Pedrosa Sánchez 1 OXFORD - JULY 2014 ERASMUS+ KA1
  • 2. Introduction • Same examples… • May 21, 2012 A hacker group hacked the website of IBM Research • May 22, 2012 • A hacker group called Anonymous attacked the website of the U.S. Department of Justice, filtering about 1.7GB of information, including internal staff email Alicia Pedrosa Sánchez 2
  • 3. Introduction • Let’s see more examples Alicia Pedrosa Sánchez IES José Rodrigo Botet 3
  • 4. Introduction • After watching this video: • It’s important to secure a computer system? • And your personal computer at home? Alicia Pedrosa Sánchez IES José Rodrigo Botet 4
  • 5. Introduction YES, OF COURSE IT IS!!!!! • We have to reach a compromise between the value of what I have to assure and how much I can spend on secure them • Do we really need it? Alicia Pedrosa Sánchez 5
  • 6. Exercise 1: How much I know about security? • Let’s check how much we know about computer system security by doing a crossword in pairs Alicia Pedrosa Sánchez IES José Rodrigo Botet 6
  • 7. Computer security as a global approach The security level of a system is effective only if the security level of the weakest link is Computer security system is as strong as the weak link Alicia Pedrosa Sánchez 7
  • 8. Computer security as a global approach •Unfortunatelly, users are the weakest link Alicia Pedrosa Sánchez 8
  • 9. Computer security as a global approach Alicia Pedrosa Sánchez 9
  • 10. Social engineering • What we have seen in the video are different practices of social engineering • Social engineering is based on the weakest link is the user • 1. We want to help 2. We always trust the others 3. We don’t like to say “no” 4. We like to be praised Alicia Pedrosa Sánchez 10
  • 11. Social Engineering Social engineering is the art of manipulating people so they give up confidential information For instance: by changing their password by a pen Alicia Pedrosa Sánchez 11
  • 12. Exercise 2: Will I be fired from work? • Find the heading of these social engineering technics • Work in pairs Alicia Pedrosa Sánchez IES José Rodrigo Botet 12
  • 13. Some definitions • Threat is a possible danger that might exploit a vulnerability to breach security and thus cause possible damage • Vulnerability is a weakness which allows an attacker to reduce a system's security • Attack is any attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorized use of computer system Alicia Pedrosa Sánchez IES José Rodrigo Botet 13
  • 14. Threats • Logical threats • Physical threats • Human Threats Alicia Pedrosa Sánchez IES José Rodrigo Botet 14
  • 15. One last recommendation • Your password is like your toothbrush • Choose a good one • Use it every day • Change it from time to time • DON’T SHARE IT with anyone Alicia Pedrosa Sánchez IES José Rodrigo Botet 15
  • 16. Alicia Pedrosa Sánchez IES José Rodrigo Botet 16 END CLIL MATERIAL FOR TEACHING COMPUTER SCIENCES