Create a strong password and test it at http://bit.ly/33SlTqm
To make a strong password worthwhile, you must be able to memorise it!
Do not write down any passwords you use!
Identify and compare different threats to technology
Identify, describe and compare different security software
Malware is malicious software, designed to cause as many problems on a computer as possible. It is distributed, normally through the Internet, by someone who wishes to cause damage to an individual or company.
There are many kinds of malware, but the most common types are:
Spyware is used to spy on your computer using a program called a keylogger. A keylogger records every key pressed by the user and then sends them to a remote computer when it is connected to the internet. This allows the criminal to steal all sorts of information such as passwords or even email addresses.
Adware is used to simply force adverts on to a user.
For example when the user open your web browser it opens several advertising websites instead of the normal homepage.
Computer viruses are small computer programs made with normal code that have a malicious intent.
A virus normally is activated when a normal program, such as Microsoft Word, is started.
A virus can be used to slow down the computer, or it may be designed to delete everything on a computer.
Viruses can also often self-replicate to other devices or computers
As of 2019, there are around 100,000 different computer viruses.
Worms are likes viruses, except that unlike viruses worms do not need to attach themselves to emails or applications and can run themselves whenever they want to.
The most common types of worms clog up a computer system after self-replicating themselves.
Eventually the worm spreads across a network the computer system is connected to.
One of the most famous worms was the Blaster worm.
Worms differ from viruses as they don’t need to attach themselves to a program and can run without a program to run them.
A trojan horse is a piece of malware that disguises itself as a piece of useful software.
A trojan horse attacks the computer it is hosted on.
Other than passing themselves around a network, malware is often distributed through emails or downloaded from websites.
Junk emails often include links to other websites that download files onto your computer
Running programs without knowing where they came from
Anti-virus software is used to scan for all kinds of malware including viruses, worms, adware, spyware and trojans.
Anti-virus software can also, sometimes, remove malware.
The process of phishing is very common nowadays. The process for phishing is:
Sending a user an email or text pretending to be someone such as their bank and asking them to confirm details such as the bank account numbers (the bite)
Getting the user to ‘confirm’ (give) their details to the scammer.
The scammer using their details to access their account
Find four anti-virus software programs and compare them in terms of price.
The next task is to create a slideshow or poster about the different computer crimes.
What threats are there to computers?
What ways can we keep our computers safe?
How can we keep safe when online?
The following are key shortcuts for using BalfSlideView and reveal.js.
|→, PAGE DOWN, SPACE||Next slide|
|←, PAGE UP||Previous slide|
|SHIFT + →||Last Slide|
|SHIFT + ←||First slide|
|W||Widget Board/White Screen|
|C||Toggle Notes Canvas|
|DEL||Clears Whiteboard/Notes Canvas|
|S||Show Presenter Mode|
|SHIFT + D||Toggle Dark Mode|
|H||Goes to the Home Slide|
|META + P||Show Print options window|
In order to use the 'Start Remote' feature, you'll need to download JB Slide Controls from the Apple App Store. Once you have this you'll be able to control the slides using the app from you Apple Watch.
BalfSlideView and jamiebalfour.scot are copyright © Jamie B Balfour 2017 - 2023, 2010 - 2023. Content is copyright © Jamie B Balfour