internet security it

Post on 02-Dec-2014

113 Views

Category:

Technology

3 Downloads

Preview:

Click to see full reader

DESCRIPTION

This a presentation made by Nicole and Me about Internet secuirity. Hope you like it!

TRANSCRIPT

Nicole Villavicencio and Steffi Medina

Why is security necessary?Symptoms of an attacked computerMalware: Viruses Worms KeyloggersSpywareHackerCrackersPharmingPhishingAntivirus and ProxyPrevention firstWebgraphy

Why is security necessary?

Protect our personal informationProtect our computer form malicious softwares

Symptoms of an attacked computer

I. The computer takes longer time than usual to boot

II. The system displays strange colors and unrequested files come up

III. Computer occasionally freezes

IV. When on the internet, browser becomes very slow

V. When vital and confidential files and programs are no longer accessible

Malware (Malicious Software):Computer program or code whose function is to damage a system

Viruses Worms and Keyloggers

SPYWARE (Spy software):

Steal our dataSpy our movements through the network.

HACKER

A hacker is someone who illegally accesses a private computer network.

 Pharming is a cyber attack intended to redirect a website's traffic to another, bogus site.

PHARMING

A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent

CRACKER

Phishing is the theft of personal and / or financial user, through forging a trusted entity

Antivirus and proxy

AntivirusProxy

PREVENTION FIRST (FROM ARTICLES 1 AND 2)

I. Installing and running anti-virus software.II. Download security patches III. Restrict access to suspicious websitesIV. Be wary of opening any email attachment.V. Choose secure passwords. VI. Keep your passwords secureVII. Use a pop-up blockerVIII. Beware of phishing and spam IX. Don't leave your computer operating idly for

any length of timeX. Be careful when loading external media.

WEBGRAPHYhttp://www.whatismyip.com/what-is-a-proxy Author: unknown, 8, April 2014

http://www.webroot.com. Author:Linda Criddle. 8 April 2014

http://www.infospyware.com Author: Marcelo Rivero, 22 April 2014

http://www.infospyware.com/articulos/que-son-los-spywares. Author: Marcelo Rivero, 22 April 2014

http://en.wikipedia.org/wiki/Pharming. Author: Unknown. 22 April 2014

http://infotechnology.hubpages.com/hub Author: Salvatore Vuono 24 April 2014

http://www.wisegeek.org/what-is-a-hacker.htm . Author: Unknown. 25 April 2014

https://answers.yahoo.com/question/index?qid=20060912204431AA5xm4f. Author: Dan M. 25 April 2014.

http://kb.eset.com/esetkb/index?page=content&id=SOLN130 Author:Unknown 27 April 2014

http://anti-virus-software-review.toptenreviews.com Author:Charles R. Hooper 27 April 2014

top related