1 slide
2 slide
Information security is the state of security of the information environment. Information protection – actions to prevent possible damage or destruction of information, as well as unauthorized access to it (but at the same time, ensuring unhindered access to information by legitimate users)
3 slide
Measures to ensure information security, technical and legal Hardware and software and technologies for protection against malware, external network attacks, etc. (including anti-virus programs) A set of regulations and legal acts governing information security issues
4 slide
Legal basis of information security Federal Law No. 149-FZ “On information, information technologies and information protection” (adopted on July 27, 2006) Article 1 states that this law “regulates relations arising in: 1) the exercise of the right to search, receiving, transmitting, producing and distributing information; 2) application of information technologies; 3) ensuring the protection of information.” Article 3 formulates the concepts of “security” and “information protection” within the framework of the principles of legal regulation of relations in the field of information, information technology and information protection. One of the basic principles is postulated to “ensure the security of the Russian Federation during the creation of information systems, their operation and the protection of the information contained in them.”
5 slide
Legal basis of information security Federal Law No. 149-FZ “On information, information technologies and information protection” (adopted on July 27, 2006) Article 10 “Dissemination of information or provision of information” addresses the problem of spam mailings. Article 16 discusses the basic concepts and provisions relating to information protection. Article 17 defines liability for offenses in the field of information, information technology and information protection.
6 slide
Legal basis of information security Federal Law No. 149-FZ “On Information, Information Technologies and Information Protection” (adopted on July 27, 2006) Any actions leading to damage or destruction of information, its intentional distortion, as well as the desire to gain unauthorized access accessing someone else's confidential information (what the authors of viruses, trojans and other malware do) is a crime
Slide 7
Legal basis of information security Federal Law No. 152-FZ “On Personal Data” (adopted on July 27, 2006) defines the basic concepts and provisions for the protection of personal, i.e. personal information of each person. Article 3 states that personal data is “any information relating to an individual identified or determined on the basis of such information (subject of personal data), including his last name, first name, patronymic, year, month, date and place of birth, address , family, social, property status, education, profession, income, other information.”
8 slide
Legal basis of information security The Criminal Code of the Russian Federation (CC RF) No. 63-FZ (adopted on June 13, 1996) defines penalties for crimes related to computer information. Chapter 28 Article 272. Unlawful access to computer information. Article 273. Creation, use and distribution of malicious computer programs. Article 274. Violation of the rules for operating computers, computer systems or their networks.
Slide 9
Legal basis of information security Criminal Code of the Russian Federation (Criminal Code of the Russian Federation) No. 63-FZ (adopted on June 13, 1996) Chapter 28. Article 272 1. Unlawful access to legally protected computer information, that is, information on computer media, in electronic computing machine (computer), computer system or their network, if this act entailed the destruction, blocking, modification or copying of information, disruption of the operation of the computer, computer system or their network - is punishable by a fine in the amount of up to two hundred thousand rubles or in the amount of wages or other income of the convicted person for a period of up to eighteen months, or correctional labor for a term of six months to one year, or imprisonment for a term of up to two years. 2. The same act, committed by a group of persons by prior conspiracy or by an organized group or by a person using his official position, as well as having access to a computer, a computer system or their network, is punishable by a fine in the amount of one hundred thousand to three hundred thousand rubles or the amount of wages or other income of the convicted person for a period of one to two years, or correctional labor for a term of one to two years, or arrest for a term of three to six months, or imprisonment for a term of up to five years.
10 slide
Legal basis of information security Criminal Code of the Russian Federation (Criminal Code of the Russian Federation) No. 63-FZ (adopted on June 13, 1996) Chapter 28. Article 273 1. Creating computer programs or making changes to existing programs, knowingly leading to unauthorized destruction, blocking, modification or copying of information, disruption of the operation of a computer, computer system or their network, as well as the use or distribution of such programs or computer media with such programs - is punishable by imprisonment for a term of up to three years with a fine of up to two hundred thousand rubles or in the amount of wages. or other income of the convicted person for a period of up to eighteen months. 2. The same acts, which through negligence entailed grave consequences, are punishable by imprisonment for a term of three to seven years.
11 slide
Legal basis of information security Criminal Code of the Russian Federation (Criminal Code of the Russian Federation) No. 63-FZ (adopted on June 13, 1996) Chapter 28. Article 274 1. Violation of the rules for operating a computer, computer system or their network by a person with access to a computer, computer system or their networks, resulting in the destruction, blocking or modification of computer information protected by law, if this act caused significant harm, is punishable by deprivation of the right to hold certain positions or engage in certain activities for a term of up to five years, or by compulsory labor for a term of one hundred eighty to two hundred and forty hours, or restriction of freedom for up to two years. 2. The same act, which has caused grave consequences through negligence, is punishable by imprisonment for a term of up to four years.
12 slide
Legal basis of information security Penalties for creating malware fine and confiscation of computer equipment prison term death penalty (Philippines)
Slide 13
Legal basis of information security Famous hackers Kevin Mitnick - arrested on February 15, 1995, sentenced to 46 months real and three years of suspended imprisonment, as well as to pay a significant fine (released on January 21, 2000). Pierre-Guy Lavoie, a 22-year-old Canadian hacker, was sentenced under Canadian law to 12 months of community service and a suspended sentence of 12 months for guessing passwords to break into other people's computers. 26-year-old Vasily Gorshkov from Chelyabinsk - on October 10, 2001, sentenced to 20 counts of charges for numerous computer crimes. Oleg Zezev, citizen of Kazakhstan - on July 1, 2003, sentenced by the Manhattan Federal Court to 51 months in prison for computer extortion /
14 slide
License (user license) – a set of rules for the distribution, access and use of information, established (within the limits permitted by law) by the owner of the program - its creator or seller. Licensing policy is a comprehensive mechanism that defines the entire set of conditions for providing a particular program to users, including a system of price discounts and restrictions and special conditions for its use specified in the license. Fundamentals of licensing policy in the field of distribution of programs and data
15 slide
Types of software Proprietary (proprietary) Free and open source Commercial (commercia) Trial (trial) and demo versions (demo) Shareware (freeware) Free (free software) Open (open source)
16 slide
Programs distributed only through sale. An option is possible when the program itself is provided free of charge, and a subscription to online or other services provided using this program is sold. It is possible that the fee is charged both for the program itself (once upon purchase) and in the form of a subscription fee for a certain period of time. Commercial software
18 slide
Programs that can be obtained and used for free, but with certain restrictions specified in the license (for example, free use only for non-commercial, personal or educational purposes), or that ask the user for a small voluntary monetary donation as a reward to the author as an incentive to further improve the program if the user liked it. Shareware
Slide 19
Programs that, according to the license, do not require any monetary payments to the author at all. Only possible actions of the user in relation to this program are limited - for example, only its personal use “as is” is allowed, but it is not allowed to change anything in the executable code, rewrite the program to others, etc. As a rule, these are programs created by individual enthusiasts “for themselves and for friends” or written by novice programmers who want to “create a name for themselves.” Free software
20 slide
It assumes that the user (according to a special, free license) is granted the rights (“freedom”) to unlimited installation, launch, free use, study, distribution and modification (improvement) of such programs. Free software The main emphasis is on providing, along with the executable program, its source program code (listing), open for viewing, studying and making changes. An open license allows you to modify an open program (make changes and corrections to its source code and then compile it into a new version of the executable program) and use fragments of its source code to create your own programs. However, open source software does not have to be free or even free, although most open source software is also free. Open source software
21 slides
Commercial license Typical conditions specified in a license (license agreement) for a commercial program: 1) exclusive property rights to all components of the software package belong to the copyright holder, the purchase of the program does not transfer to the user any property rights, but only the rights listed in the license to use this program, subject to a number of specified conditions, as well as the right to receive updates and services specified in the license; 2) to legally fix the agreement between the copyright holder and the user, it is enough for the user to express his consent by clicking on the Agree button (or similar) and continuing to install the program, rather than interrupting this process; 3) it is clearly stated what the user can do with the program (or with its help) and what other services (and under what conditions) he can receive from the copyright holder;
22 slide
Commercial license Typical conditions specified in a license (license agreement) for a commercial program: 4) determines the ability for the user to make for himself an “insurance” (archival) copy of the program, as well as to completely transfer his rights, stipulated by the license, to another user; 5) actions on the program that the user is prohibited from performing are indicated; 6) there are a number of indications of situations in which the copyright holder (program manufacturer) declines responsibility for incorrect operation or complete inoperability of the program, as well as for possible direct or indirect damage from its use.
24 slide
GNU GPL open license Unlike the commercial one, the open license (GNU General Public License, GNU GPL) certifies that this software is free for all its users and guarantees them the following rights (“freedoms”): freedom to run the program for any purpose; freedom to study the source code of the program, the principles of its operation and its improvement (modification); freedom to distribute copies of the program; freedom to improve and modify the program and release new versions of it to the public. In addition, the GNU GPL license ensures that users of all programs created from the said source code also receive all of the above rights. For example, it is prohibited to create any other software based on a free program with a GPL license that does not include an open source listing.
25 slide
Threats when using unlicensed software Unlicensed (pirated) - refers to software obtained and/or used in an illegal way, i.e. in violation of the user license rules (usually from third parties or through third parties who do not have the rights to distribute such a program ).
26 slide
Threats when using unlicensed software Distribution and use of unlicensed software is a violation of the Copyright Law, for which the culprit bears civil, administrative or criminal liability. By “breaking” the protection of a program, a hacker can unknowingly damage its code. The work of a “hacked” program becomes unstable. In addition, hackers use “hacked” programs as “bait” by embedding “Trojan programs” into them. Websites and disks through which “hacked” programs or tools for “hacking” them are distributed can be infected with various malicious programs Using unlicensed software , you are putting the data on your computer at risk. As a result, at best, you will need to reinstall the operating system and all application software, and at worst, this may lead to the irreparable loss of your work over a long period of time or to the fact that your confidential information (and possibly money) will be lost. in the hands of attackers. Such damage may be significantly greater than the cost of the licensed version of the program.
Main goals and objectives of information securityThe information environment is a set of
conditions, means and methods based on
computer systems designed for
creation and use of information
resources.
Information threat is a set of
factors that pose a danger to
functioning of the information environment.
Information security – totality
measures to protect the information environment
society and man.
Slide 1
Slide 2
Slide 3
Slide 4
Slide 5
Slide 6
Slide 7
Slide 8
Slide 9
Slide 10
A presentation on the topic “Information Security” (grade 9) can be downloaded absolutely free on our website. Project subject: Computer science. Colorful slides and illustrations will help you engage your classmates or audience. To view the content, use the player, or if you want to download the report, click on the corresponding text under the player. The presentation contains 10 slide(s).
Slide 1
PROJECT in computer science
Information Security
Completed by: Igonina Marina Aleksandrovna
9th grade student of the municipal educational institution "Tazinskaya basic secondary school" of the Bolshebereznikovsky municipal district of the Republic of Moldova
Slide 2
Get acquainted with the basics of information security, determine the main directions of development of this area of knowledge, and form the elements of “information culture”.
Objective of the project:
Slide 3
INFORMATION SECURITY -
security of information and its supporting infrastructure from any accidental or malicious influences that may result in damage to the information itself, its owners or supporting infrastructure
INFORMATION SECURITY TASKS -
minimizing damage, predicting and preventing malicious influences
Slide 4
What threatens information security
targeted theft or destruction of data on a workstation or server; Damage to data by the user as a result of careless actions.
Slide 5
2. "Electronic" methods of influence carried out by hackers
unauthorized entry into computer networks; DOS attacks.
Hackers are people who engage in computer crimes both professionally (including as part of competition) and simply out of curiosity.
A DOS attack (abbreviated from Denial of Service) is an external attack on enterprise network nodes responsible for its safe and efficient operation (file, mail servers). Attackers organize massive sending of data packets to these nodes in order to overload them and, as a result, put them out of action for some time. This, as a rule, entails disruptions in the business processes of the victim company, loss of customers, damage to reputation, etc.
Slide 6
3. Computer viruses
A separate category of electronic methods of influence are computer viruses and other malicious programs. They represent a real danger for modern businesses that widely use computer networks, the Internet and e-mail. The penetration of a virus into corporate network nodes can lead to disruption of their functioning, loss of working time, loss of data, theft of confidential information and even direct theft of financial resources. A virus program that has penetrated a corporate network can give attackers partial or complete control over the company's activities.
Slide 8
email has recently become the main channel for the spread of malware; spam takes a lot of time to view and subsequently delete messages, causing employees a feeling of psychological discomfort; both individuals and organizations become victims of fraudulent schemes carried out by spammers (victims often try not to disclose such events); important correspondence is often deleted along with spam, which can lead to the loss of customers, broken contracts and other unpleasant consequences; the danger of losing correspondence especially increases when using RBL blacklists and other “crude” spam filtering methods.
Slide 9
5. “Natural” threats
A company’s information security can be affected by a variety of external factors: data loss can be caused by improper storage, theft of computers and media, force majeure, etc.
The problem of information security of the individual, society and state. Legal regulation of problems related to information and computers. The problem of information security of the individual, society and state.
deliberate violation of the rules for operating computers and their networks.
Thank you for your attention!Slide 1
Information security The media security lesson was prepared by Lifanova N.V., class teacher of the 10th grade, Kosmyninskaya secondary schoolSlide 2
Regulatory framework Federal Law No. 436-FZ “On the protection of children from information harmful to their health and development” Establishes rules for the media safety of children when circulating media products, printed, audiovisual products on any type of media, computer programs and databases in Russia data, as well as information posted in information and telecommunication networks and mobile radiotelephone networks.Slide 4
Information security of children is a state of protection of children in which there is no risk associated with information, including information distributed on the Internet, causing harm to their health, physical, mental, spiritual and moral development (Federal Law of December 29, 2010 No. 436-FZ " On the protection of children from information harmful to their health and development").Slide 5
Statistics: 10 million children under the age of 14 actively use the Internet, which makes up 18% of the Internet audience in our country. (Data from the Center for Safe Internet in Russia)Slide 6
Statistics In the world, 1,600,000,000 young boys and girls use mobile phones Already in 2003, the number of mobile phones in Russia reached 31.5 million and exceeded the number of landline devices. At the end of February 2010, the subscriber base of cellular operators totaled 210.05 million users ( Data from the Center for Safe Internet in Russia)Slide 7
Survey data in Europe About 90% of children aged 12 to 19 years old have mobile phones and about half - aged 9-12 years. In some countries, it is generally customary to give children “mobile phones” when they reach eight years of age.Slide 8
Sociological research: 88% of four-year-old children go online with their parents. At the age of 8-9, children increasingly go online on their own. By the age of 14, joint, family use of the network remains only for 7% of adolescents. More than half of Internet users under the age of 14 view sites with inappropriate content. 39% of children visit porn sites, 19% watch scenes of violence, 16% are addicted to gambling. 14% of children are interested in drugs and alcohol, 11% of minor users visit extremist and nationalist resourcesSlide 9
Types of online threats Explicit materials of a sexual nature Virtual acquaintances and friends Cyberbullying - teenage virtual terror Bullicide - driving a child to suicide through psychological violence Electronic resources containing materials of an extremist and terrorist nature.Slide 10
Types of online threats Electronic resources created and supported by destructive religious sects. Computer scammers, spammers, phishers. Propaganda of drugs, violence and cruelty, suicidal behavior, abortion, self-harm. Dubious entertainment: online games that promote sex, cruelty and violence. A morbid addiction to participating in online processes, the so-called “Internet addiction” Social networks and blogs, on which a child leaves a lot of real information about himself, makes unsafe acquaintances, and is often subjected to destructive psychological, moral and spiritual treatment unnoticed by him.Slide 11
PEGI logos Bad Language - Profanity The game contains rude and obscene language. Discrimination - Discrimination The presence in a product of scenes or materials that may denigrate or discriminate against certain social groups. Fear: The game materials may be scary and frightening for young children. Gambling - Gambling The game offers the opportunity to gamble and place a bet, including with real money. Sexual Content - Obscene Game contains nudity and/or sexual content. Violence - Violence The game is replete with scenes of violence.Slide 12
Internet addiction Obsessive web surfing - endless travel on the World Wide Web, searching for information. Addiction to virtual communication and virtual dating - large volumes of correspondence, constant participation in chat rooms, web forums, redundancy of acquaintances and friends on the Internet. Gaming addiction is an obsessive passion for playing computer games online. Obsessive financial need - online gambling, unnecessary purchases in online stores or constant participation in online auctions. Addiction to watching movies via the Internet, when the patient can spend the whole day in front of the screen without stopping due to the fact that you can watch almost any movie or program online. Cybersex addiction is an obsessive desire to visit porn sites and engage in cybersex.Slide 13
Signs of Internet addiction: excessive, unmotivated abuse of time spent working on the Internet, not due to professional, educational or other creative activities; use of the Internet as the predominant means of communication; creation and operation of virtual images that are extremely far from real ones; attraction to Internet games and/or creation of malicious programs (without any purpose); subjectively perceived inability to cope without working onlineSlide 14
This is important to know! When you register on sites, do not provide personal information (mobile phone number, residential address and other data). Use your webcam only when chatting with friends. Make sure that strangers do not have the opportunity to see your conversation. Learn how to turn your webcam on and off yourself. You should know that if you publish photos or videos on the Internet, everyone can see them.Slide 15
This is important to know! Don't post photos that show other people. Do this only with their consent. Publish only such information that you will not regret publishing. Unsolicited emails from strangers are called “Spam”. If you receive such a letter, do not respond to it. If you reply to such an email, the sender will know that you are using your email account and will continue to send you spam.Slide 16
This is important to know! If you receive a message from an unfamiliar address, it is better not to open it. Such emails may contain viruses. Do not add strangers to your ICQ contact list. If you receive letters with unpleasant or insulting content, or if someone behaves inappropriately towards you, tell an adult about it. If a person you met on the Internet invites you to meet in real life, then warn him that you will come to meet him with an adult. If your virtual friend is really who he claims to be, he will normally react to your concern for his own safety.Slide 17
This is important to know! If you have questions or problems while working in an online environment, be sure to talk to someone you trust about it. Your parents or other adults can help or give good advice about what to do. Any problem can be solved! You can contact the “Children Online” helpline by phone: 88002500015 (toll-free in Russia) or by e-mail: [email protected]. Experts will advise you what to do.Slide 18
Internet Etiquette When communicating online, treat other people the way you would like to be treated. Avoid using bad language and don't say things that will make someone feel bad. Learn "netiquette" when you're online. What is considered good to do and say and what is not? For example, if you type a message in CAPITAL LETTERS, your interlocutor may think that you are yelling at him. If someone says something rude or unpleasant, don't respond. Leave the chat or forum immediately.Slide 19
Watch your back! If you see or know that a friend is being bullied online, support them and tell an adult. After all, you would want him to do the same for you. Do not send messages or images that may harm or upset anyone. Even if you didn't start it, you will be considered part of the bullying circle. Always be on guard if someone, especially a stranger, wants to talk to you about adult relationships. Remember that online you can never be sure of a person’s true nature and intentions. Approaching a child or teenager with sexual intentions is always a serious cause for concern. You should tell a trusted adult about this so that you can report the unpleasant situation to law enforcement. If you have been lured or tricked into performing sexual acts or sharing sexual images of yourself, you should always tell a trusted adult to get advice or help. No adult has the right to demand this from a child or teenager - the responsibility always lies with the adult.Slide 20
Set your limits When using social networks or any other online services, take care of your privacy and the privacy of your family and friends. If you've signed up for a social networking site, use your privacy settings to protect your online profile so that only your friends can view it. Ask your parents to help with the settings if you find it difficult. This rule is very important.Slide 21
Set your limits Keep your personal information secret, especially when communicating on adult social networks. Use a nickname instead of your real name on any online service where many strangers can read your information. Ask your parents before giving your name, address, phone number or any other personal information to anyone online. Think twice before you post or talk about anything online. Are you ready to tell everyone online about this: your close friends, as well as strangers? Remember that once you post information, photographs or any other material online, you will never be able to remove it from the Internet or prevent other people from using it. Before you enter any information about yourself on any site, find out how that information may be used. Can all or part of the information be published and, if yes, where? If you feel uncomfortable with the amount of information requested, if you do not trust the site, do not provide information. Look for another similar service that requires less information to work with, or its administration promises to handle your data more carefully.Slide 22
It is important! 1. Ignore the bad behavior of other users, get away from unpleasant conversations or sites with inappropriate content. Just like in real life, there are people who, for various reasons, behave aggressively, offensively or provocatively towards others or want to spread harmful content. It is usually best to ignore and then block such users. 2. Don't post anything that you wouldn't want others to know, that you would never tell them in person. 3. Respect other people's content that you post or share. For example, a photo a friend gave you is his property, not yours. You may only post it online if you have his permission to do so and you must indicate where you got it from. 4. It is important to refrain from responding to provocative messages received through SMS, MMS, instant messaging programs, emails, chat rooms or while communicating in online environments with other users. Instead, you need to take steps to eliminate or limit attempts to provoke you.Slide 23
If you are being bullied online: Ignore. Don't answer the offender. If he doesn't get a response, he may get bored and leave. Block this person. This will protect you from viewing messages from a specific user. Tell someone. Tell your mom or dad or another adult you trust. Save the evidence. This can be helpful in finding whoever was trying to intimidate you. Save texts, emails, online conversations, or voicemails as evidence.Slide 24
Report this to: Your school management. The educational institution must have a policy for dealing with bullying. Your internet service provider, mobile operator or website administrator. They can take steps to help you. To the police. If you believe that there is a threat to your safety, either an adult or you yourself should contact law enforcement. Call the “Children Online” helpline by phone: 88002500015 (free call in Russia) or by e-mail: [email protected]. Experts will tell you what to do best Your rights online You have the right to access information and services that are appropriate to your age and personal preferences. You have the right to freely express yourself and the right to be respected, and at the same time, you must always respect others. You can freely discuss and criticize everything that is published or available on the Internet. You have the right to say NO to someone who asks you to do something online that makes you feel uncomfortable.Slide 27
Use your computer safely Make sure you have a firewall and antivirus software installed on your computer. Learn to use them correctly. Remember that these programs must be updated in a timely manner. Know your computer's operating system (Windows, Linux, etc.) well. Know how to fix bugs and make updates. If you have a parental control program installed on your computer, talk to your parents and agree on settings for the program that are appropriate for your age and needs. Do not try to hack or bypass such a program! If you receive a file that you are not sure about or don't know who sent it, DO NOT open it. This is how Trojans and viruses infect your computer.Slide 28
Children, do not go on the Internet at night. Children, do not go on the Internet at night. There is nothing good on the Internet. You can see your aunt naked there. What will happen to the baby then!? There are monsters running around everywhere with machine guns and shooting at the kids with terrible force. Terrible monsters live there And rush on the heels of youngsters. A Black Hole opened there for a day. And four schoolchildren died yesterday. Children, don’t go on the Internet at night: Suddenly a skeleton will jump out at you from the screen! He's terrible, he won't chicken out, he'll bite you off. And, delving into the jaws, he will go on his bones. You can see an evil spider there - then HE will probably eat the child. He will entangle you in nets with his huge claws. The bones will crunch, but you will have to be patient. And only panties and shoes will hang in the web. And keep in mind, pranksters, there is a dangerous site called Odnoklassniki - everyone who goes there disappears for several years. Let my lectures bore you - But children often disappear on the Internet. Many children have disappeared on the Internet. (E Uspensky)Slide 29
For the girl Masha, they bought a computer and taught her how to access the Internet, Masha doesn’t eat, Masha doesn’t sleep, she spends all night on the Internet. Mashenka’s appearance has also changed dramatically: plump lips have not been painted for a long time, bags under the eyes and yellow teeth. My posture is in vain, I started smoking, I had a hard time getting money for beer. I haven’t combed my hair for a long time, there’s dandruff on my shoulders, half a meter long claws on my hands and feet... But in Masha’s chats everything is going well, the boys follow her in a crowd, they write her letters, send her postcards, they compose poems and songs sing. Masha is a beauty, everyone talks, Smacks, greetings, soar with love, Virtual sex, a stronghold of friendship, Masha rules, without any hassle. What happened to men in chats, That virtual Masha is all covered in gold, And a modest girl, without the Internet, Sheds a mirror-colored tear? And the fact that the photo of the car was posted, On a well-known website that gives her benefits, And the fact that the photo is already ten years old, For some reason, no one really cares.... The meaning of this small work, Everyone should remember sometimes: C you, not only the Internet... There is a mess at home, hungry children. Mom sits on the Internet all day..Slide 30
Using the Internet is a joy. Have the most fun while staying safe.Slide 31