SlideShare une entreprise Scribd logo
1  sur  10
The main threats to data security
and how to deal with them
• Who knows what a threat to data security could be?
• Who is responsible of making data secure?
• How can we prevent this from happening?
• To understand about data security and what is
involved in protecting a network and data.
• To understand the different types of threat to
data security how they interact, and how they
affect cost and performance.
• – Computer viruses
• – Trojans
• – Worms
• – Phishing
• – Spyware
• – Adware
• – Hacking
• – DENIAL of Service (DoS) attacks
• – Physical threats
• To understand what kind of threats there are to
data security.
• To understand why data security is important.
• To understand how what interventions can be
put in place to protect data.
We are going to design and create our own revision
materials based on the topic of Data security.
You need to get into 10 teams no more than 3 in a group
please.
Use the videos that can be found on the shared drive to
help you create your revision resource.
You can create a pod cast, video, Power Point, a song the
choice is yours.
Create a set of personal rules for data security that
someone would need to follow in order to make sure their
data is kept secure.
You can use the existing resources (videos) on the shared
drive or look at what other groups have made to help you.
Topic Team
1
2
3
4
5
6
7
8
9
10
In pairs you have 2 minutes to share one thing
you have learnt in today’s lesson and how it will
help you.
That’s 1 minute each to talk about what you
have learnt in todays lesson.
Data security

Contenu connexe

Similaire à Data security

Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
UISGCON
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
NetSPI
 

Similaire à Data security (20)

Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9Mark Arena - Cyber Threat Intelligence #uisgcon9
Mark Arena - Cyber Threat Intelligence #uisgcon9
 
Security.pdf
Security.pdfSecurity.pdf
Security.pdf
 
Cybersecurity…real world solutions
Cybersecurity…real world solutions Cybersecurity…real world solutions
Cybersecurity…real world solutions
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Ethical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer SecurityEthical Hacking - Introduction to Computer Security
Ethical Hacking - Introduction to Computer Security
 
Information security
 Information security Information security
Information security
 
Declaration of malWARe
Declaration of malWAReDeclaration of malWARe
Declaration of malWARe
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Staying safe on the internet
Staying safe on the internetStaying safe on the internet
Staying safe on the internet
 
Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)Internet Issues (How to Deal on Internet Security)
Internet Issues (How to Deal on Internet Security)
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02Internetsecuritypowerpoint 130404101055-phpapp02
Internetsecuritypowerpoint 130404101055-phpapp02
 

Plus de Jimmy Edwards

Plus de Jimmy Edwards (20)

Tutor program term 2
Tutor program term 2Tutor program term 2
Tutor program term 2
 
Tutor program term 1
Tutor program term 1Tutor program term 1
Tutor program term 1
 
Creative i media r082 new brief
Creative i media r082   new briefCreative i media r082   new brief
Creative i media r082 new brief
 
Creative i media r087
Creative i media r087Creative i media r087
Creative i media r087
 
Creative i media r086
Creative i media r086Creative i media r086
Creative i media r086
 
Creative i media r081
Creative i media r081Creative i media r081
Creative i media r081
 
Creative i media r085
Creative i media r085Creative i media r085
Creative i media r085
 
Creative i media r082
Creative i media r082Creative i media r082
Creative i media r082
 
The penrice experience 9
The penrice experience 9The penrice experience 9
The penrice experience 9
 
The penrice experience 8
The penrice experience 8The penrice experience 8
The penrice experience 8
 
The penrice experience 7
The penrice experience 7The penrice experience 7
The penrice experience 7
 
The penrice experience 8
The penrice experience 8The penrice experience 8
The penrice experience 8
 
The penrice experience 6
The penrice experience 6The penrice experience 6
The penrice experience 6
 
The penrice experience 5
The penrice experience 5The penrice experience 5
The penrice experience 5
 
The penrice experience 4
The penrice experience 4The penrice experience 4
The penrice experience 4
 
The penrice experience 3
The penrice experience 3The penrice experience 3
The penrice experience 3
 
The penrice experience 2
The penrice experience 2The penrice experience 2
The penrice experience 2
 
The penrice experience 24
The penrice experience 24The penrice experience 24
The penrice experience 24
 
The penrice experience 23
The penrice experience 23The penrice experience 23
The penrice experience 23
 
The penrice experience 22
The penrice experience 22The penrice experience 22
The penrice experience 22
 

Dernier

Dernier (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Data security

  • 1. The main threats to data security and how to deal with them
  • 2. • Who knows what a threat to data security could be? • Who is responsible of making data secure? • How can we prevent this from happening?
  • 3. • To understand about data security and what is involved in protecting a network and data. • To understand the different types of threat to data security how they interact, and how they affect cost and performance.
  • 4. • – Computer viruses • – Trojans • – Worms • – Phishing • – Spyware • – Adware • – Hacking • – DENIAL of Service (DoS) attacks • – Physical threats
  • 5. • To understand what kind of threats there are to data security. • To understand why data security is important. • To understand how what interventions can be put in place to protect data.
  • 6. We are going to design and create our own revision materials based on the topic of Data security. You need to get into 10 teams no more than 3 in a group please. Use the videos that can be found on the shared drive to help you create your revision resource. You can create a pod cast, video, Power Point, a song the choice is yours.
  • 7. Create a set of personal rules for data security that someone would need to follow in order to make sure their data is kept secure. You can use the existing resources (videos) on the shared drive or look at what other groups have made to help you.
  • 9. In pairs you have 2 minutes to share one thing you have learnt in today’s lesson and how it will help you. That’s 1 minute each to talk about what you have learnt in todays lesson.