SlideShare a Scribd company logo
Part 3
Part 3
Information security
Information security
 Some files contain sensitive data
Some files contain sensitive data
like ( research for new product ,
like ( research for new product ,
management accounts )
management accounts )
 so we should protect it
so we should protect it
We must protect data against
 Lose data
Hackers
viruses
Lose data
The Importance of shutting down your
The Importance of shutting down your
Computer
Computer
 When you are using a windows , its
When you are using a windows , its
important to remember that switching off
important to remember that switching off
the computer or losing power (power
the computer or losing power (power
cut) can cause lose data , to protect
cut) can cause lose data , to protect
against this you should save your work
against this you should save your work
regularly
regularly
 When you shutdown your computer you
When you shutdown your computer you
data will save automatically
data will save automatically
UPS ( Un – interruptible power supply )
UPS ( Un – interruptible power supply )
 Its device which you can
Its device which you can
attached to your
attached to your
computer which will
computer which will
guard against power
guard against power
cuts
cuts
 It contains a batteries
It contains a batteries
which will keep your
which will keep your
computer alive along
computer alive along
enough for you to use
enough for you to use
the shutdown
the shutdown
Back up
Back up
 The most important thing that you
The most important thing that you
store on your computer is
store on your computer is
information.
information.
 Often the contents of a hard disk
Often the contents of a hard disk
can represent years of work.
can represent years of work.
 If the hard disk stops working one
If the hard disk stops working one
day you could lose all those
day you could lose all those
years of work.
years of work.
 For this reason it is VITAL that
For this reason it is VITAL that
you take regular backups of the
you take regular backups of the
information that is stored on the
information that is stored on the
computer.
computer.
 Organize your computer for more
Organize your computer for more
efficient backups
efficient backups
 Complete vs. incremental backups
Complete vs. incremental backups
 Use 'off-site' storage
Use 'off-site' storage
 Beware of 'open files‘
Beware of 'open files‘
Hackers
Access right
Access right
 Are intended to protect a company intellectual property
Are intended to protect a company intellectual property
 Determine which files individuals can read or change on
Determine which files individuals can read or change on
the network
the network
 You can access to the network by using User name and
You can access to the network by using User name and
Password
Password
User ID and Password
User ID and Password
 A user ID is normally use to log in to a computer or
A user ID is normally use to log in to a computer or
computer network
computer network
 Use a password which is only known to you
Use a password which is only known to you
 The password guarantees that no one can access
The password guarantees that no one can access
network and impersonate you
network and impersonate you
 The idea of access rights is that you only have the ability
The idea of access rights is that you only have the ability
to connect to or share devices which you have authority
to connect to or share devices which you have authority
to use
to use
Using a secure password
Using a secure password
 Is important to chose a password which
Is important to chose a password which
can not be easily guessed by other people
can not be easily guessed by other people
 It should be at least 8 characters and
It should be at least 8 characters and
contain mixture of number and word
contain mixture of number and word
 You should to change your password
You should to change your password
regularly
regularly
What if your laptop stolen
What if your laptop stolen
 You must have a back up to
You must have a back up to
your important file to
your important file to restore it
restore it
 You must make a password to
You must make a password to
your laptop
your laptop
to prevent
to prevent misuse the
misuse the
confidential data
confidential data
Virus
Virus
Computer Virus
Computer Virus
 What are computer
What are computer
viruses?
viruses?
 How infect your
How infect your
computer
computer
 How do you protect
How do you protect
computers from
computers from
attacks
attacks
 Anti virus update
Anti virus update

More Related Content

Similar to IT-Part3 for icdl exams and internet .ppt (20)

PPT
IT Security Awareness-v1.7.ppt
OoXair
 
PPTX
computing
Eliza Batool
 
PPT
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
 
PPT
End User Security Awareness - Information Security
WorldTrade3
 
PPT
Computer Security
Cristian Mihai
 
PPT
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
PPT
Information security awareness
CAS
 
PPTX
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
PPTX
Security Awareness 101
HaroldCo
 
PPTX
Basic_computerHygiene
EricK Gasana
 
PPTX
InformationSecurity
learnt
 
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
PPTX
Introduction to Information Security
Shreedevi Tharanidharan
 
PPTX
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
PPTX
Cyber security
Dr. B T Sampath Kumar
 
PPTX
kmf.pptx
akashpatil146883
 
PPTX
Network Security
SOBXTECH
 
PPTX
Senior Technology Education
Summerpair77
 
PPTX
Senior Education
Summerpair77
 
IT Security Awareness-v1.7.ppt
OoXair
 
computing
Eliza Batool
 
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
 
End User Security Awareness - Information Security
WorldTrade3
 
Computer Security
Cristian Mihai
 
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Information security awareness
CAS
 
INFORMATION AND CYBER SECURITY
Nishant Pawar
 
Security Awareness 101
HaroldCo
 
Basic_computerHygiene
EricK Gasana
 
InformationSecurity
learnt
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Introduction to Information Security
Shreedevi Tharanidharan
 
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
Cyber security
Dr. B T Sampath Kumar
 
Network Security
SOBXTECH
 
Senior Technology Education
Summerpair77
 
Senior Education
Summerpair77
 

Recently uploaded (20)

PPTX
b6057ea5-8e8c-4415-90c0-ed8e9666ffcd.pptx
Anees487379
 
PDF
R Cookbook - Processing and Manipulating Geological spatial data with R.pdf
OtnielSimopiaref2
 
PDF
Early_Diabetes_Detection_using_Machine_L.pdf
maria879693
 
PPTX
ER_Model_with_Diagrams_Presentation.pptx
dharaadhvaryu1992
 
PDF
The European Business Wallet: Why It Matters and How It Powers the EUDI Ecosy...
Lal Chandran
 
PPTX
apidays Helsinki & North 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (A...
apidays
 
PPTX
apidays Singapore 2025 - Designing for Change, Julie Schiller (Google)
apidays
 
PDF
apidays Helsinki & North 2025 - API-Powered Journeys: Mobility in an API-Driv...
apidays
 
PPTX
apidays Helsinki & North 2025 - Vero APIs - Experiences of API development in...
apidays
 
PPTX
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays
 
PDF
Data Chunking Strategies for RAG in 2025.pdf
Tamanna
 
PPTX
apidays Singapore 2025 - From Data to Insights: Building AI-Powered Data APIs...
apidays
 
PDF
Web Scraping with Google Gemini 2.0 .pdf
Tamanna
 
PDF
Copia de Strategic Roadmap Infographics by Slidesgo.pptx (1).pdf
ssuserd4c6911
 
PDF
Product Management in HealthTech (Case Studies from SnappDoctor)
Hamed Shams
 
PPT
Growth of Public Expendituuure_55423.ppt
NavyaDeora
 
PPTX
The _Operations_on_Functions_Addition subtruction Multiplication and Division...
mdregaspi24
 
PPTX
Advanced_NLP_with_Transformers_PPT_final 50.pptx
Shiwani Gupta
 
PDF
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays
 
PPTX
Dr djdjjdsjsjsjsjsjsjjsjdjdjdjdjjd1.pptx
Nandy31
 
b6057ea5-8e8c-4415-90c0-ed8e9666ffcd.pptx
Anees487379
 
R Cookbook - Processing and Manipulating Geological spatial data with R.pdf
OtnielSimopiaref2
 
Early_Diabetes_Detection_using_Machine_L.pdf
maria879693
 
ER_Model_with_Diagrams_Presentation.pptx
dharaadhvaryu1992
 
The European Business Wallet: Why It Matters and How It Powers the EUDI Ecosy...
Lal Chandran
 
apidays Helsinki & North 2025 - Agentic AI: A Friend or Foe?, Merja Kajava (A...
apidays
 
apidays Singapore 2025 - Designing for Change, Julie Schiller (Google)
apidays
 
apidays Helsinki & North 2025 - API-Powered Journeys: Mobility in an API-Driv...
apidays
 
apidays Helsinki & North 2025 - Vero APIs - Experiences of API development in...
apidays
 
apidays Munich 2025 - Building Telco-Aware Apps with Open Gateway APIs, Subhr...
apidays
 
Data Chunking Strategies for RAG in 2025.pdf
Tamanna
 
apidays Singapore 2025 - From Data to Insights: Building AI-Powered Data APIs...
apidays
 
Web Scraping with Google Gemini 2.0 .pdf
Tamanna
 
Copia de Strategic Roadmap Infographics by Slidesgo.pptx (1).pdf
ssuserd4c6911
 
Product Management in HealthTech (Case Studies from SnappDoctor)
Hamed Shams
 
Growth of Public Expendituuure_55423.ppt
NavyaDeora
 
The _Operations_on_Functions_Addition subtruction Multiplication and Division...
mdregaspi24
 
Advanced_NLP_with_Transformers_PPT_final 50.pptx
Shiwani Gupta
 
apidays Helsinki & North 2025 - How (not) to run a Graphql Stewardship Group,...
apidays
 
Dr djdjjdsjsjsjsjsjsjjsjdjdjdjdjjd1.pptx
Nandy31
 
Ad

IT-Part3 for icdl exams and internet .ppt

  • 2. Information security Information security  Some files contain sensitive data Some files contain sensitive data like ( research for new product , like ( research for new product , management accounts ) management accounts )  so we should protect it so we should protect it We must protect data against  Lose data Hackers viruses
  • 4. The Importance of shutting down your The Importance of shutting down your Computer Computer  When you are using a windows , its When you are using a windows , its important to remember that switching off important to remember that switching off the computer or losing power (power the computer or losing power (power cut) can cause lose data , to protect cut) can cause lose data , to protect against this you should save your work against this you should save your work regularly regularly  When you shutdown your computer you When you shutdown your computer you data will save automatically data will save automatically
  • 5. UPS ( Un – interruptible power supply ) UPS ( Un – interruptible power supply )  Its device which you can Its device which you can attached to your attached to your computer which will computer which will guard against power guard against power cuts cuts  It contains a batteries It contains a batteries which will keep your which will keep your computer alive along computer alive along enough for you to use enough for you to use the shutdown the shutdown
  • 6. Back up Back up  The most important thing that you The most important thing that you store on your computer is store on your computer is information. information.  Often the contents of a hard disk Often the contents of a hard disk can represent years of work. can represent years of work.  If the hard disk stops working one If the hard disk stops working one day you could lose all those day you could lose all those years of work. years of work.  For this reason it is VITAL that For this reason it is VITAL that you take regular backups of the you take regular backups of the information that is stored on the information that is stored on the computer. computer.
  • 7.  Organize your computer for more Organize your computer for more efficient backups efficient backups  Complete vs. incremental backups Complete vs. incremental backups  Use 'off-site' storage Use 'off-site' storage  Beware of 'open files‘ Beware of 'open files‘
  • 9. Access right Access right  Are intended to protect a company intellectual property Are intended to protect a company intellectual property  Determine which files individuals can read or change on Determine which files individuals can read or change on the network the network  You can access to the network by using User name and You can access to the network by using User name and Password Password
  • 10. User ID and Password User ID and Password  A user ID is normally use to log in to a computer or A user ID is normally use to log in to a computer or computer network computer network  Use a password which is only known to you Use a password which is only known to you  The password guarantees that no one can access The password guarantees that no one can access network and impersonate you network and impersonate you  The idea of access rights is that you only have the ability The idea of access rights is that you only have the ability to connect to or share devices which you have authority to connect to or share devices which you have authority to use to use
  • 11. Using a secure password Using a secure password  Is important to chose a password which Is important to chose a password which can not be easily guessed by other people can not be easily guessed by other people  It should be at least 8 characters and It should be at least 8 characters and contain mixture of number and word contain mixture of number and word  You should to change your password You should to change your password regularly regularly
  • 12. What if your laptop stolen What if your laptop stolen  You must have a back up to You must have a back up to your important file to your important file to restore it restore it  You must make a password to You must make a password to your laptop your laptop to prevent to prevent misuse the misuse the confidential data confidential data
  • 14. Computer Virus Computer Virus  What are computer What are computer viruses? viruses?  How infect your How infect your computer computer  How do you protect How do you protect computers from computers from attacks attacks  Anti virus update Anti virus update