Brief presentation on information security. Presentation "the problem of information security". Information security concept




Information threats Random: User errors Programming errors Failure, failure of equipment Force majeure Random: User errors Programming errors Failure, failure of equipment Force majeure Intentional: Theft of information Computer viruses Physical impact on the equipment Intentional: Theft of information Computer viruses Physical impact for equipment


Channels through which it is possible to carry out theft, change or destruction of information: Through a person: theft of information carriers; reading information from the screen or keyboard; reading information from a printout. Through a person: theft of information carriers; reading information from the screen or keyboard; reading information from a printout. Through the program: interception of passwords; decryption of encrypted information; copying information from media. Through the program: interception of passwords; decryption of encrypted information; copying information from media. Through hardware: connection of specially designed hardware that provides access to information; interception of spurious electromagnetic radiation from equipment, communication lines, power supply networks, etc. Through equipment: connection of specially designed hardware that provides access to information; interception of spurious electromagnetic radiation from equipment, communication lines, power supply networks, etc.



COMPLIANCE WITH THE INFORMATION SECURITY MODE: legislative level: laws, regulations, standards, etc. moral and ethical level: norms of behavior, non-compliance with which leads to a drop in the prestige of a particular person or the whole organization; administrative level: general actions taken by the management of the organization; physical level: mechanical, electro- and electronic-mechanical obstacles on possible penetration paths of potential violators; hardware-software level: electronic devices and special information security programs.


INFORMATION SECURITY when using third party software: INFORMATION SECURITY when using third party software: commercial software demoware or trialware shareware freeware free, but with certain limitations in functionality compared to the main version shareware, the use of which is subject to the fulfillment of certain conditions


commercial software demoware or trialware shareware freeware , the use of which is associated with the fulfillment of some conditions free software, the license agreement of which does not require any payment to the copyright holder SOFTWARE: INFORMATION SECURITY when using third-party software: INFORMATION SECURITY when using third-party software: carefully read the contents of the license agreement and strictly comply with it; - do not use "pirated" methods of converting paid programs into free ones; - install free (freeware) software obtained only from reliable sources; - update the installed software in a timely manner.


When working with information on the INTERNET, beware of: websites that collect or provide information about you; Internet service providers or employers who track the pages you visit; malware that monitors keystrokes; data collection by hidden client applications; “downloaded” information that has not been checked by an anti-virus program.
Control questions: 1.What does the term "information security" mean? 2. What are the information threats? 3. Name the channels through which theft, change, destruction of information can be carried out. 4. In what areas are measures taken to comply with the information security regime? 5. What do you need to know when installing (installing) new software on a computer? 6. What dangers can be encountered while working on the Internet?


GBOU SPO "Klintsovsky Pedagogical College" Office of Informatics Kosmachev Vladimir Konstantinovich

slide 1

slide 2

slide 3

slide 4

slide 5

slide 6

Slide 7

Slide 8

Slide 9

Slide 10

slide 11

slide 12

slide 13

Slide 14

slide 15

slide 16

Slide 17

Slide 18

Slide 19

Slide 20

slide 21

slide 22

slide 23

slide 24

Slide 25

slide 26

Slide 27

Slide 28

Slide 29

slide 30

Slide 31

The presentation on the topic "Information Security" can be downloaded absolutely free of charge on our website. Project subject: Informatics. Colorful slides and illustrations will help you keep your classmates or audience interested. To view the content, use the player, or if you want to download the report, click on the appropriate text under the player. The presentation contains 31 slide(s).

Presentation slides

slide 1

Information Security

The media security lesson was prepared by Lifanova N.V., class teacher of the 10th grade of the MOU Kosmyninskaya secondary school

slide 2

media literacy

competent use by children and their teachers of tools that provide access to information, development critical analysis content of information and instilling communication skills, promoting vocational training children and their educators for their positive and responsible use of information and communication technologies and services.

slide 3

Normative base

the federal law No. 436-FZ "On the protection of children from information harmful to their health and development" Establishes the rules for the media safety of children in the circulation in Russia of media products, printed, audiovisual products on any type of media, computer programs and databases, as well as information placed in information and telecommunication networks and networks of mobile radiotelephone communications.

slide 4

Information security of children

this is a state of protection for children, in which there is no risk associated with causing information, including information distributed on the Internet, harm to their health, physical, mental, spiritual and moral development (Federal Law of December 29, 2010 No. 436-ФЗ "On the Protection of Children from information harmful to their health and development").

slide 5

Statistics

10 million children under the age of 14 actively use the Internet, which is 18% of the Internet audience in our country.

(Data from the Center for Safer Internet in Russia)

slide 6

In the world, 1,600,000,000 young boys and girls use mobile phones Already in 2003, the number of mobile phones in Russia reached 31.5 million and exceeded the number of stationary devices At the end of February 2010, the subscriber base of cellular operators totaled 210.05 million users (Data Center for Safer Internet in Russia)

Slide 7

Poll data in Europe

About 90% of children aged 12 to 19 have mobile phones and about half of those aged 9 to 12. In some countries, it is generally customary to give children “mobiles” when they reach the age of eight.

Slide 8

sociological research

88% of four-year-olds go online with their parents. At the age of 8-9, children increasingly go online on their own. By the age of 14, only 7% of adolescents share the network, family use of the network. More than half of Internet users under the age of 14 browse sites with inappropriate content. 39% of children visit porn sites, 19% watch scenes of violence, 16% are addicted to gambling. 14% of children are interested in drugs and alcohol, 11% of underage users visit extremist and nationalist resources

Slide 9

Types of online threats

Explicit materials of a sexual nature Virtual acquaintances and friends Cyberbullying (cyberbullying) - teenage virtual terror Bullicide - driving a child to suicide through psychological violence Electronic resources containing materials of an extremist and terrorist nature.

Slide 10

Electronic resources created and maintained by destructive religious sects. Computer scammers, spammers, phishers. Promotion of drugs, violence and cruelty, suicidal behavior, abortion, self-harm Dubious entertainment: online games that promote sex, cruelty and violence. Painful predilection for participation in network processes, the so-called "Internet addiction"

slide 11

slide 12

internet addiction

Obsessive Web Surfing - Endless Journeys Through world wide web, search for information. Addiction to virtual communication and virtual acquaintances - large volumes of correspondence, constant participation in chats, web forums, redundancy of acquaintances and friends on the Web. Gaming addiction is an obsessive fascination with computer games over the network. Obsessive financial need - online gambling, unnecessary purchases in online stores or constant participation in online auctions. Addiction to watching movies via the Internet, when the patient can spend the whole day in front of the screen without stopping due to the fact that almost any movie or program can be watched on the network. Cyber ​​addiction is a compulsive urge to visit porn sites and engage in cybersex.

slide 13

Signs of Internet Addiction:

excessive, unmotivated abuse of the duration of work on the network, not due to professional, educational or other creative activities; the use of the Internet as the predominant means of communication; creation and operation of virtual images that are extremely far from real ones; attraction to Internet games and (or) the creation of malicious programs (without any purpose); subjectively perceived impossibility to do without networking

Slide 14

It's important to know!

When you register on the sites, do not provide personal information (number mobile phone, address of residence and other data). Use the webcam only when chatting with friends. Make sure that strangers do not have the opportunity to see your conversation. Learn how to turn your webcam on and off by yourself. You should know that if you post photos or videos on the Internet, everyone can see them.

slide 15

Don't post photos that show other people. Do it only with their consent. Publish only such information, the publication of which you will not regret. Unwanted emails from strangers are called Spam. If you receive such a letter, do not reply to it. If you reply to such an email, the sender will know that you are using your email inbox and will continue to spam you.

slide 16

If you receive a message from an unknown address, it is better not to open it. Such emails may contain viruses. Do not add strangers to your contact list in ICQ. If you receive letters with unpleasant or offensive content, if someone behaves inappropriately towards you, tell an adult about it. If a person you met on the Internet invites you to meet in real life, then warn him that you will come to meet an adult. If your virtual friend is really who he claims to be, he will normally react to your concern for his own safety.

Slide 17

If you have questions or problems while working in an online environment, be sure to tell someone you trust about it. Your parents or other adults can help or give good advice about what you should do. Any problem can be solved! You can contact the Children Online help line by phone: 88002500015 (toll-free in Russia) or by e-mail: [email protected] Experts will advise you on what to do.

Slide 18

Internet etiquette

When communicating online, treat other people the way you would like to be treated. Avoid foul language and don't say things that will make someone feel bad. Learn "netiquette" when you're online. What is considered good to do and say and what is not? For example, if you type a message in CAPITAL LETTERS, your interlocutor may think that you are yelling at him. If someone says something rude or something unpleasant, don't answer. Leave the chat or forum immediately.

Slide 19

Watch your back!

If you see or know that your friend is being bullied online, support him and report it to an adult. After all, you would want him to do the same for you. Do not send messages or images that may harm or upset anyone. Even if you didn't start it, you will be considered part of the bullying circle. Always be on the lookout if someone, especially a stranger, wants to talk to you about an adult relationship. Remember that online you can never be sure of the true nature of a person and his intentions. Contacting a child or teenager with sexual intent is always a serious cause for concern. You should tell an adult you trust about this so that you can report the embarrassing situation to law enforcement. If you have been lured or tricked into engaging in sexual activity or sharing sexual images with you, you should definitely tell a trusted adult in order to get advice or help. No adult has the right to demand this from a child or teenager - the responsibility always lies with an adult.

Slide 20

Set your limits

Using social networks or any other online services, take care of your privacy and the privacy of your family and friends. If you have registered with a social networking site, use your privacy settings to protect your online profile so that only your friends can view it. Ask your parents to help with the settings if you find it difficult yourself. This rule is very important.

slide 21

Keep your personal data private, especially when communicating with adults social networks. Use a nickname instead of your real name on any online service where a lot of strangers can read your information. Ask your parents before giving your name, address, phone number, or any other personal information to anyone online. Think twice before posting or talking about anything online. Are you ready to tell everyone who is online about this: your close friends, as well as strangers? Remember that once you post information, photos or any other material online, you will never be able to remove it from the Internet or prevent other people from using it. Before you enter any information about yourself on any site, find out how that information may be used. Can all or part of the information be published and, if so, where? If you are uncomfortable with the amount of information requested, if you do not trust the site, do not give information. Look for another similar service that requires less information to work with, or its administration promises to treat your data more carefully.

slide 22

It is important!

1. Ignore the bad behavior of other users, get away from unpleasant conversations or sites with inappropriate content. As in real life, there are people who, for various reasons, behave aggressively, offensively or provocatively towards others or want to spread malicious content. It is usually best to ignore and then block such users. 2. Don't post anything that you don't want others to know that you would never tell them in person. 3. Respect other people's content that you post or share. For example, a photo a friend gave you is his property, not yours. You may only post it online if you have his permission to do so and you must indicate where you got it from. 4. It is important to refrain from responding to provocative messages received via SMS, MMS, instant messaging programs, emails, chats or while communicating online with other users. Instead, you need to take steps to help eliminate or limit attempts to provoke you.

slide 23

If you are being bullied online:

Ignore. Don't answer the offender. If he doesn't get a response, he might get bored and leave. Block this person. This will protect you from viewing the messages of a particular user. Tell someone. Tell your mom or dad or another adult you trust. Save the evidence. This can be useful for finding someone who tried to intimidate you. Save texts, emails, online conversations or voicemail as evidence.

slide 24

Report it:

leadership of your school. The educational institution should have its own policy for the bullying situation. Your Internet service provider, mobile operator or website administrator. They can take steps to help you. To the police. If you think that there is a threat to your safety, one of the adults, or you yourself, should contact law enforcement. To the help line "Children Online" by phone: 88002500015 (toll-free in Russia) or by e-mail: [email protected] Experts will advise you on the best way to proceed

Slide 25

Your rights online

You have rights - and other people should respect them. You should never tolerate harassment or intimidation from other people. The laws of real life also apply in the online environment. You have the right to use modern technologies to develop your personality and expand your capabilities. You have the right to protect your personal information.

slide 26

You have the right to access information and services appropriate to your age and personal desires. You have the right to express yourself freely and the right to respect yourself, and at the same time, you must always respect others. You are free to discuss and criticize anything posted or available online. You have the right to say NO to someone who asks you for something online that makes you feel uncomfortable.

Slide 27

Safe use of your computer

Make sure you have firewall and antivirus software installed on your computer. Learn to use them correctly. Remember that these programs must be updated in a timely manner. Get to know your computer's operating system (Windows, Linux, etc.) well. Know how to fix bugs and make updates. If you have a parental control program installed on your computer, talk to your parents and agree on the settings of this program so that they suit your age and needs. Do not try to hack or bypass such a program! If you receive a file that you are not sure about or don't know who sent it, DO NOT open it. This is how Trojans and viruses infect your computer.

Slide 28

Do not go to the Internet at night children

Do not go at night, children, to the Internet. There is nothing good on the Internet. There you can see your aunt naked. What will happen to the baby then? There, monsters with machine guns run everywhere and shoot at the guys with terrible force. Terrible monsters live there And rush on the heels of the youngsters. A black hole opened there for a day. And four schoolchildren disappeared yesterday. Do not go, children, to the Internet at night: Suddenly, a skeleton will jump out at you from the screen! He's awful, he's not afraid, he'll bite you off. And, digging in the jaws, on their own bones will go. There you can see an evil spider - then HE will eat the child for sure. He will entangle you with huge claws with nets. The bones will crunch, but you have to be patient. And only panties and boots will hang in the cobweb. And keep in mind, pranksters, there is a dangerous site "Odnoklassniki" - Everyone who gets there for several years disappears. Let my lectures bore you- But children often disappear on the Internet. Many children have disappeared on the Internet. (E Ouspensky)

Slide 29

They bought a computer for the girl Masha And they taught her how to access the Internet, Masha does not eat, Masha does not sleep, She sits on the Internet all night. Mashenka's appearance also changed abruptly: Puffy lips have not been painted for a long time, Bags under the eyes and yellow teeth. Posture, to hell, began to smoke, Money for beer, with difficulty gained. She hasn’t combed her hair for a long time, dandruff in her shoulders, Claws half a meter long on her arms and legs .... But in chats Masha has things to do, everything is okay, The boys go, the crowd follows her, Write letters to her, send her postcards, compose poems and songs sing.

Masha-beauty, everyone says, Smack, hello, soar with love, Sex-virtual, stronghold of friendship, Masha rules, without any hassle. What happened to the men in the chats, That virtual Masha is all in gold, And a modest girl, without the Internet, Sheds a tear, a mirror color? And the fact that the machine's photo is hung, On a well-known site that gives her benefits, And the fact that ten years, the photo is already long, For some reason, nobody cares deeply .... The meaning of this little work, Everyone should remember sometimes: you, not only the Internet ... Bordak at home, hungry children Mom spends all day on the Internet ..

slide 30

  • No need to overload your project slides with text blocks, more illustrations and a minimum of text will better convey information and attract attention. Only the key information should be on the slide, the rest is better to tell the audience orally.
  • The text must be well readable, otherwise the audience will not be able to see the information provided, will be greatly distracted from the story, trying to make out at least something, or completely lose all interest. To do this, you need to choose the right font, taking into account where and how the presentation will be broadcast, and also choose the right combination of background and text.
  • It is important to rehearse your report, think over how you will greet the audience, what you will say first, how you will finish the presentation. All comes with experience.
  • Choose the right outfit, because. The speaker's clothing also plays a big role in the perception of his speech.
  • Try to speak confidently, fluently and coherently.
  • Try to enjoy the performance so you can be more relaxed and less anxious.
  • slide 1

    Information security The lesson of media security was prepared by Lifanova N.V., class teacher of the 10th grade of the MOU Kosmyninskaya secondary school

    slide 2

    Media literacy the competent use by children and their teachers of tools that provide access to information, the development of a critical analysis of the content of information and the inculcation of communication skills, the promotion of the professional training of children and their teachers for the positive and responsible use of information and communication technologies and services.

    slide 3

    Regulatory Framework Federal Law No. 436-FZ “On the Protection of Children from Information Harmful to Their Health and Development” Establishes the rules for the media safety of children in the circulation in Russia of media products, printed, audiovisual products on any type of media, computer programs and databases data, as well as information placed in information and telecommunication networks and mobile radiotelephone networks.

    slide 4

    Information security of children is a state of protection of children, in which there is no risk associated with causing information, including information distributed on the Internet, harm to their health, physical, mental, spiritual and moral development (Federal Law of December 29, 2010 No. 436-FZ " On the protection of children from information harmful to their health and development).

    slide 5

    Statistics 10 million children under the age of 14 actively use the Internet, which is 18% of the Internet audience in our country. (Data from the Center for Safer Internet in Russia)

    slide 6

    Statistics In the world, 1,600,000,000 young boys and girls use mobile phones Already in 2003, the number of mobile phones in Russia reached 31.5 million and exceeded the number of stationary devices At the end of February 2010, the subscriber base of cellular operators totaled 210.05 million users ( Data from the Safer Internet Center in Russia)

    Slide 7

    Poll data in Europe About 90% of children aged 12 to 19 have mobile phones and about half of children aged 9 to 12. In some countries, it is generally customary to give children "mobiles" when they reach the age of eight.

    Slide 8

    Sociological research 88% of four-year-olds go online with their parents. At the age of 8-9, children increasingly go online on their own. By the age of 14, only 7% of adolescents share the network, family use of the network. More than half of Internet users under the age of 14 browse sites with inappropriate content. 39% of children visit porn sites, 19% watch scenes of violence, 16% are addicted to gambling. 14% of children are interested in drugs and alcohol, 11% of underage users visit extremist and nationalist resources

    Slide 9

    Types of online threats Explicit materials of a sexual nature Virtual acquaintances and friends Cyberbullying (cyberbullying) - teenage virtual terror Bullicide - driving a child to suicide through psychological abuse Electronic resources containing materials of an extremist and terrorist nature.

    slide 10

    Types of online threats Electronic resources created and maintained by destructive religious sects. Computer scammers, spammers, phishers. Promotion of drugs, violence and cruelty, suicidal behavior, abortion, self-harm Dubious entertainment: online games that promote sex, cruelty and violence. Painful predilection for participation in network processes, the so-called "Internet addiction"

    slide 11

    PEGI logos Bad Language - Profanity The game contains rude and obscene language. Discrimination The presence in the product of scenes or material that may defame or discriminate against some social groups. Fear: The content in the game can be scary and intimidating for young children. Gambling - Gambling The game has the ability to play games of chance and bet, including - real money. Sexual Content The game contains nudity and/or scenes of sexual intercourse. Violence - Violence The game is replete with violent scenes.

    slide 12

    Internet addiction Obsessive web surfing - endless travel on the World Wide Web, search for information. Addiction to virtual communication and virtual acquaintances - large volumes of correspondence, constant participation in chats, web forums, redundancy of acquaintances and friends on the Web. Gaming addiction is an obsessive fascination with computer games over the network. Obsessive financial need - online gambling, unnecessary purchases in online stores or constant participation in online auctions. Addiction to watching movies via the Internet, when the patient can spend the whole day in front of the screen without stopping due to the fact that almost any movie or program can be watched on the network. Cyber ​​addiction is a compulsive urge to visit porn sites and engage in cybersex.

    slide 13

    Signs of Internet addiction: excessive, unmotivated abuse of the duration of work on the network, not due to professional, educational or other creative activities; the use of the Internet as the predominant means of communication; creation and operation of virtual images that are extremely far from real ones; attraction to Internet games and (or) the creation of malicious programs (without any purpose); subjectively perceived impossibility to do without networking

    slide 14

    It's important to know! When you register on the sites, do not provide personal information (mobile phone number, residential address and other data). Use the webcam only when chatting with friends. Make sure that strangers do not have the opportunity to see your conversation. Learn how to turn your webcam on and off by yourself. You should know that if you post photos or videos on the Internet, everyone can see them.

    slide 15

    It's important to know! Don't post photos that show other people. Do it only with their consent. Publish only such information, the publication of which you will not regret. Unwanted emails from strangers are called Spam. If you receive such a letter, do not reply to it. If you reply to such an email, the sender will know that you are using your email inbox and will continue to spam you.

    slide 16

    It's important to know! If you receive a message from an unknown address, it is better not to open it. Such emails may contain viruses. Do not add strangers to your contact list in ICQ. If you receive letters with unpleasant or offensive content, if someone behaves inappropriately towards you, tell an adult about it. If a person you met on the Internet invites you to meet in real life, then warn him that you will come to meet an adult. If your virtual friend is really who he claims to be, he will normally react to your concern for his own safety.

    slide 17

    It's important to know! If you have questions or problems while working in an online environment, be sure to tell someone you trust about it. Your parents or other adults can help or give good advice about what to do. Any problem can be solved! You can contact the Children Online help line by phone: 88002500015 (toll-free in Russia) or by e-mail: [email protected] Experts will advise you on what to do.

    slide 18

    Internet etiquette When you communicate online, treat other people the way you would like to be treated. Avoid foul language and don't say things that will make someone feel bad. Learn "netiquette" when you're online. What is considered good to do and say and what is not? For example, if you type a message in CAPITAL LETTERS, your interlocutor may think that you are yelling at him. If someone says something rude or something unpleasant, don't answer. Leave the chat or forum immediately.

    slide 19

    Watch your back! If you see or know that your friend is being bullied online, support him and report it to an adult. After all, you would want him to do the same for you. Do not send messages or images that may harm or upset anyone. Even if you didn't start it, you will be considered part of the bullying circle. Always be on the lookout if someone, especially a stranger, wants to talk to you about an adult relationship. Remember that online you can never be sure of the true nature of a person and his intentions. Contacting a child or teenager with sexual intent is always a serious cause for concern. You should tell an adult you trust so that you can report the situation to law enforcement. If you have been lured or tricked into engaging in sexual activity or sharing sexual images with you, you should definitely tell a trusted adult in order to get advice or help. No adult has the right to demand this from a child or teenager - the responsibility always lies with an adult.

    slide 20

    Set your limits Use social networks or any other online services to take care of your privacy and the privacy of your family and friends. If you have registered with a social networking site, use your privacy settings to protect your online profile so that only your friends can view it. Ask your parents to help with the settings if you find it difficult yourself. This rule is very important.

    slide 21

    Set your limits Keep your personal information private, especially when interacting with adult social networks. Use a nickname instead of your real name on any online service where a lot of strangers can read your information. Ask your parents before giving your name, address, phone number, or any other personal information to anyone online. Think twice before posting or talking about anything online. Are you ready to tell everyone who is online about this: your close friends, as well as strangers? Remember that once you post information, photos or any other material online, you will never be able to remove it from the Internet or prevent other people from using it. Before you enter any information about yourself on any site, find out how that information may be used. Can all or part of the information be published and, if so, where? If you are uncomfortable with the amount of information requested, if you do not trust the site, do not give information. Look for another similar service that requires less information to work with, or its administration promises to treat your data more carefully.

    slide 22

    It is important! 1. Ignore the bad behavior of other users, get away from unpleasant conversations or sites with inappropriate content. As in real life, there are people who, for various reasons, behave aggressively, offensively or provocatively towards others or want to spread malicious content. It is usually best to ignore and then block such users. 2. Don't post anything that you don't want others to know that you would never tell them in person. 3. Respect other people's content that you post or share. For example, a photo a friend gave you is his property, not yours. You may only post it online if you have his permission to do so and you must indicate where you got it from. 4. It is important to refrain from responding to provocative messages received via SMS, MMS, instant messaging programs, emails, chats or while communicating online with other users. Instead, you need to take steps to help eliminate or limit attempts to provoke you.

    slide 23

    If you are being bullied online: Ignore. Don't answer the offender. If he doesn't get a response, he might get bored and leave. Block this person. This will protect you from viewing the messages of a particular user. Tell someone. Tell your mom or dad or another adult you trust. Save the evidence. This can be useful for finding someone who tried to intimidate you. Save texts, emails, online conversations or voicemail as evidence.

    slide 24

    Report it to: Leadership of your school. The educational institution should have its own policy for the bullying situation. Your Internet service provider, mobile operator or website administrator. They can take steps to help you. To the police. If you think that there is a threat to your safety, one of the adults, or you yourself, should contact law enforcement. To the help line "Children Online" by phone: 88002500015 (toll-free in Russia) or by e-mail: [email protected] Experts will advise you on the best way to proceed Your rights online You have the right to access information and services that are appropriate for your age and personal desires. You have the right to express yourself freely and the right to respect yourself, and at the same time, you must always respect others. You are free to discuss and criticize anything posted or available online. You have the right to say NO to someone who asks you for something online that makes you feel uncomfortable.

    slide 27

    Using Your Computer Safely Make sure you have firewall and antivirus software installed on your computer. Learn to use them correctly. Remember that these programs must be updated in a timely manner. Get to know your computer's operating system (Windows, Linux, etc.) well. Know how to fix bugs and make updates. If you have a parental control program installed on your computer, talk to your parents and agree on the settings of this program so that they suit your age and needs. Do not try to hack or bypass such a program! If you receive a file that you are not sure about or don't know who sent it, DO NOT open it. This is how Trojans and viruses infect your computer.

    slide 28

    Do not go to the Internet at night children Do not go to the Internet at night, children. There is nothing good on the Internet. There you can see your aunt naked. What will happen to the baby then? There, monsters with machine guns run everywhere and shoot at the guys with terrible force. Terrible monsters live there And rush on the heels of the youngsters. A black hole opened there for a day. And four schoolchildren disappeared yesterday. Do not go, children, to the Internet at night: Suddenly, a skeleton will jump out at you from the screen! He's awful, he's not afraid, he'll bite you off. And, digging in the jaws, on their own bones will go. There you can see an evil spider - then HE will eat the child for sure. He will entangle you with huge claws with nets. The bones will crunch, but you have to be patient. And only panties and boots will hang in the cobweb. And keep in mind, pranksters, there is a dangerous site "Odnoklassniki" - Everyone who gets there for several years disappears. Let my lectures bore you- But children often disappear on the Internet. Many children have disappeared on the Internet. (E Ouspensky)

    slide 29

    They bought a computer for the girl Masha And they taught her how to access the Internet, Masha does not eat, Masha does not sleep, She sits on the Internet all night. Mashenka's appearance also changed abruptly: Puffy lips have not been painted for a long time, Bags under the eyes and yellow teeth. Posture, to hell, began to smoke, Money for beer, with difficulty gained. She hasn’t combed her hair for a long time, dandruff in her shoulders, Claws half a meter long on her arms and legs .... But in chats Masha has things to do, everything is okay, The boys go, the crowd follows her, Write letters to her, send her postcards, compose poems and songs sing. Masha-beauty, everyone says, Smack, hello, soar with love, Sex-virtual, stronghold of friendship, Masha rules, without any hassle. What happened to the men in the chats, That virtual Masha is all in gold, And a modest girl, without the Internet, Sheds a tear, a mirror color? And the fact that the machine's photo is hung, On a well-known site that gives her benefits, And the fact that ten years, the photo is already long, For some reason, nobody cares deeply .... The meaning of this little work, Everyone should remember sometimes: you, not only the Internet ... Bordak at home, hungry children Mom spends all day on the Internet ..

    slide 30

    Using the Internet is a joy. Get the most out of it while staying safe.

    slide 31

    The problem of information security of the individual, society and the state. Legal regulation problems related to information and computers. The problem of information security of the individual, society and the state.

    • As we move towards the information society, the problem of protecting the right of the individual, society and the state to the confidentiality of certain types of information becomes more and more acute. Already today, in countries where computer networks are used on a massive scale, great efforts are being made to protect information. every person who entrusts information about himself to a state body or firm has the right to expect that it will not be disclosed or used to his detriment.
    • In Russia in 2000 adopted Doctrine of information security of the Russian Federation.
    To objects of information security of the Russian Federation relate:
    • all types of information resources;
    • citizens' rights, legal entities and states to receive, disseminate and use information, protection of information and intellectual property;
    • information system, dissemination and use of information resources, including information systems different class and appointments, libraries, archives, databases and data banks, etc.
    • information infrastructure, including information processing and analysis centers, information exchange channels and telecommunications, etc.
    • a system of formation of public consciousness, based on the media and propaganda.
    National interests of the Russian Federation include:
    • a) observance of the constitutional rights and freedoms of man and citizen in the field of obtaining information and its use, ensuring the spiritual development of Russia, preserving and strengthening the values ​​of society;
    • b) information support of the state policy of the Russian Federation, connected with bringing to the Russian and international public reliable information about the state policy of the Russian Federation;
    • c) the development of modern information technologies public information industry;
    • d) protection of information resources from unauthorized access, ensuring the security of information and telecommunication systems.
    The doctrine formulates countries, including legal, organizational, technical and economic, as well as features of ensuring the information security of the Russian Federation in various fields public life: economic, political, in the field of defense, science and technology, etc.
    • The doctrine formulates information security methods countries, including legal, organizational, technical and economic, as well as the specifics of ensuring the information security of the Russian Federation in various spheres of public life: economic, political, defense, science and technology, etc.
    • One of the most important problems in the area under discussion, the doctrine declares the problem of information inequality.
    Information security methods It is especially important to overcome the manifestations of information inequality in education, because:
    • there is a tendency to divide educational institutions on elite and mass with a corresponding difference in resource provision;
    • there is a large difference in the income levels of families of students;
    • there is a significant gap in the amount of financial support for educational institutions in different regions of the country.
    Legal regulation of problems related to information and computers. Legal regulation in the information sphere is a new and difficult task for the state. In the Russian Federation there are a number of laws in this area. Law "On Legal Protection of Computer Programs and Databases" He determined that Copyright applies to the specified objects, which are the result of the creative activity of the author. The authors have the exclusive right to publish programs and databases, their distribution, modification and other use. However property rights to the specified objects created in the order of execution official duties or on the instructions of the employer, belong to the employer. For state of the art In our society, it is the issues related to the infringement of copyright and property rights that are the most relevant. Law "On Information, Informatization and Information Protection". The law creates conditions for the inclusion of Russia in the international information exchange, lays the foundations for preventing mismanagement of information resources and informatization, partially ensures information security and the rights of legal and individuals for information. The law considers information resources in two aspects: as a material product that can be bought and sold, and as an intellectual product, which is subject to intellectual property rights, copyright. In 1996 in Criminal Code The section "Crimes in the sphere of computer information" was introduced for the first time. He determined the punishment for certain types of crimes: In 1996, in Criminal Code The section "Crimes in the sphere of computer information" was introduced for the first time. He determined the punishment for certain types of crimes:
    • illegal access to computer information;
    • creation, use and distribution of malicious programs for computers;
    • intentional violation of the rules for the operation of computers and their networks.
    Thank you for your attention!

    Information security

    Slides: 17 Words: 1122 Sounds: 0 Effects: 0

    Beginnings of information security. documented information. Public. Limited access. State secret. Trade secret. Official secret. Another secret. Personal Information. professional secret. banking secrecy. Notarial secret. procedural secrets. Medical secrecy. Lawyer secrecy. The secret of insurance. Communication secret. Adoption mystery. The secret of confession. enlarged plan organizational measures aimed at ensuring information security (What? Establishing a list of information that should be categorized as "secret". Determining the circle of persons allowed to work with restricted information. - Information security.ppt

    Information Security

    Slides: 37 Words: 2177 Sounds: 0 Effects: 0

    Protection of information. Ensuring the security of information. Constant enhancement of the role of information. Potential event. Classification of information threats. natural threats. artificial threats. Exposure to strong magnetic fields. Errors in the operation of the equipment. Disclosure. Deliberate (deliberate) threats. Disabling subsystems. Breaking cryptographic ciphers. Unauthorized access to information. Unauthorized access. Features of NSD. The need to ensure legal significance. electromagnetic radiation. Information leak. Unauthorized modification of structures. - Information security.ppt

    Security and information protection

    Slides: 20 Words: 996 Sounds: 0 Effects: 0

    Informatics, law, society and the Internet. System and informatics. Legal information. Basic properties of legal information. Information. Legal system. Methods for obtaining and updating information. Legal information, system and informatics. Educational role of legal informatics. Cryptology. Breaking the cipher. Cryptographic conversion. Information Security. The main types of threats to computer systems. Security Measures information systems. Security policy. Ensuring information security of the individual. The goal of information confrontation in modern world. - Security and information protection.ppt

    Aspects of information security

    Slides: 20 Words: 807 Sounds: 0 Effects: 5

    Humanitarian aspects of information security. Information Security. humanitarian aspect. complex problem. Humanitarian problems of information security. Place and role. Information Society Development Strategy. Technology of the educational process. Seminars in Serednikovo. Formation of the culture of the information society. Information security culture. System of values. Industry. Development vector. Society. Education. multinational education. Preservation of national culture. Legacy of Genghis Khan. - Aspects of information security.ppt

    The problem of information security

    Slides: 32 Words: 2176 Sounds: 0 Effects: 0

    Information Security. The concept of information security. Problems of information security. Computer crime. Global Study. Threats to information security. Information properties. Threat realization examples. Data integrity threats. Malicious software. Protection of information. Examples of implementation of the access denial threat. The concept of an attack on an information system. Classification of attacks. Classification of network attacks. network attacks. transmitted messages. Data flow modification. Creation of a false stream. Reuse. - The problem of information security.ppt

    Fundamentals of information security

    Slides: 50 Words: 1388 Sounds: 0 Effects: 0

    Fundamentals of information security. Basic documents. Basic laws. The concept of "information security". Public policy. Information war. national interests. MEDIA. Threats to information security. Information security objects. Information confidentiality. Information integrity. Availability of information. Hardware and software. Penetration threats. Opposition to technical reconnaissance means. Ways to implement threats to information security. Threats of disclosure of system parameters. Threat of privacy violation. Access Denial Threat. - Fundamentals of information security.ppt

    Ensuring information security

    Slides: 21 Words: 463 Sounds: 0 Effects: 3

    Information Security. Dynamics of changes in the information environment. Information society and education. The structure of the "parallel school". parallel school. Color engravings. Weekly applications. Virtuous geisha. prospects modern education. Education requirements. Media culture. Media education in the modern educational environment. Ways of formation of media culture at school. School media. Technical equipment. School press. Regional Center for Media Education. School television. The goals of the formation of media culture. - Ensuring information security.ppt

    Legal basis for information security

    Slides: 26 Words: 2336 Sounds: 0 Effects: 59

    Fundamentals of information security. Information Security. Measures to ensure information security. Legal basis information security. The federal law. Acts that lead to damage or destruction of information. About personal data. Criminal Code Russian Federation. Illegal access to legally protected computer information. Creation of computer programs. Violation of the rules for the operation of computers. Punishments for creating malware. famous hackers. Fundamentals of licensing policy. Software types. Commercial software. Trial versions of programs. - Legal basis of information security.ppt

    Information security concept

    Slides: 12 Words: 555 Sounds: 0 Effects: 48

    Information Security. A set of measures to protect the information environment. information threats. Channels. How can information be stored. Regime compliance. Commercial software. Software. Internet. Security. Test questions. - Information security concept.ppsx

    Computer security

    Slides: 297 Words: 26245 Sounds: 0 Effects: 2246

    Theoretical foundations of computer security. Distribution and transfer of the presentation to third parties is prohibited. Specialty of study: "Computer Security", 5th year. Lecture 1.1 Content and basic concepts of computer security. Lecture 1.2 Security threats in computer systems. Lecture 1.3 Policy and security models in computer systems. general characteristics specialty 075200 "Computer security". GOS GOS 075200 "Computer security". Course program. 1. Initial provisions of the theory of computer security. 2. Models of security of computer systems. - Computer security.ppt

    Security of personal data

    Slides: 33 Words: 2583 Sounds: 0 Effects: 25

    Ensuring the security of personal data. What started it all. Regulatory framework for the protection of personal data. Legislation on personal data. By-laws of the Government of the Russian Federation. By-laws of departments. FSTEC Methodological Documents ("DSP"). Methodological documents of the FSB. Complete list of normative legal acts. State bodies. Roskomnadzor. Federal Law "On Personal Data". Defined the concept of PD, singled out special categories of PD. Personal data - any information. Confidentiality of personal data. Information systems are divided into standard and special. - Security of personal data.ppt

    ISPD class

    Slides: 15 Words: 1401 Sounds: 0 Effects: 2

    Methodology for determining the class of ISPD. Stages of classification. Initial data. Categories of personal data. Legislation. Personal Information. Biometric personal data. Personal data of subjects. Types of information systems. The structure of information systems. Technical means. Classes of information systems. Table to define the class. Hint table. Results of classification of information systems. - Class ISPDn.PPTX

    Computer crimes

    Slides: 6 Words: 254 Sounds: 0 Effects: 0

    Computer crimes. Concept. In many countries of the world, the growth of computer crimes has increased. Despite the adoption of a number of specific measures, the number of such crimes does not decrease. Interference often causes irreparable property losses. Legal protection of programs and databases. Protection of information. Protection against unauthorized access to information. Passwords are used to protect against unauthorized access to data stored on your computer. - Computer crimes.ppt

    hacking

    Slides: 30 Words: 1237 Sounds: 0 Effects: 0

    Hacking. The role of information. A group of people. activities of the hacker movement. User survey. activities of hackers. The meaning of the term "hacker". The origin and development of hacking. Operation Sundevil. Currents of the hacker movement. Justin Pietersen. Virus writers. Cyberspies. The ten most wanted hackers in history. Kevin Mitnick. Hackers in our country. Vladimir Levin. Motives for hackers. Positive aspects of hacking. "White" hackers. Richard Stallman. Mark Zuckerberg. Hackers are helpful. Generalizing character. Antivirus. Perspective for the future. -

    Loading...Loading...