computer security slides-diapositivas power point
DESCRIPTION
diapositivas de ingles tecnicoTRANSCRIPT
![Page 1: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/1.jpg)
INSTRUCTIONS/INSTRUCCIONES
• PRINT THESE POWERPOINT SLIDES AND ORGANIZE IN YOUR PORTFOLIOS. (4 SLIDES PER PAGE). STUDY THEM FOR THE QUIZ.
• IMPRIMA LAS DIAPOSITIVAS Y ORGANIZARLAS EN SUS PORTAFOLIOS (4 DIAPOSITIVAS POR PÁGINA). REPASAR LAS DIAPOSITIVAS PARA LA LECCIÓN.
![Page 2: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/2.jpg)
COMPUTER SECURITY
![Page 3: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/3.jpg)
Back - door
A backdoor in a computer system (or cryptosystem or algorithm is a method of bypassing normal authentication, securing unauthorized remote access to a
computer, obtaining access to plaintext , and so on, while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back
Orifice) or may subvert the system through a rootkitDefault passwords an function as backdoors if they are not changed by the user. Some debugging features can also act as backdoors if they are not removed in the
release version.
![Page 4: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/4.jpg)
BACKDOOR
is a computer system is a special sequence in the programming code, by which you can avoid the security systems of the algorithm (authentication) to access the system. Although these doors can be used for malicious purposes and espionage are not always a mistake, they may have been designed with the intention of having a secret entrance.
Fuente:hptt.www.Wikipedia.com
![Page 5: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/5.jpg)
In computing, a back door (or backdoor English) in a computer system is a special sequence in the programming code , by which you can avoid the security systems of the algorithm (authentication ) to access the system. Although these dosis can be used for malicious purposes and espionage are not always a mistake , they may have been designed with the intention of having a secret entrance .
backdoor
![Page 6: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/6.jpg)
PHISHING
![Page 7: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/7.jpg)
IT´S THE ATTEMPT TO ACQUIRE SENSITIVE INFOMATION SUCH AS USERNAMES,
PASSWORDS, AND CREDIT CARD DETAILS BY MASQUERADING AS A TRUSTWORTHY ENTITY
IN AN ELECTRONIC COMMUNICATION.
BESIDES PHISHING IS TYPICALLY CARRIED OUT BY EMAIL SPOOFING OR INSTANT
MESSAGING.
![Page 8: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/8.jpg)
SUPLANTACIÓN DE IDENTIDAD
• ES EL INTENTO DE ADQUIRIR INFORMACION CONFIDENCIAL COMO NOMBRES DE USUARIOS,
CONTRASEÑAS, Y DETALLES DE TARJETAS DE CRÉDITOS POR MEDIO DE LA SUPLANTACIÓN DE SUPUESTAS ENTIDADES FIDEDIGNAS EN UNA COMUNICACIÓN
ELECTRÓNICA.
• LA SUPLANTACIÓN DE IDENTIDAD LA REALIZAN POR MEDIO DE CORREOS ELECTRONICOS O MENSAJERIA
INSTANTÁNEA.
![Page 9: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/9.jpg)
A virus is a computer program that is designed
to detect and remove viruses and other harmful
before or after entering the system programs.
Among the most common virus have: WORMS, TROJANS, SPYWARE
Are types of software which are usually implemented
without the consent (or even knowledge) of the user or owner of a computer and
meet various harmful functions for the system.
These include theft and data loss, impaired functioning,
disruption of the system and spread to other computers.
ANTIVIRUS MORE KNOWN
![Page 10: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/10.jpg)
ANTIVIRUS
That detects the presence of a computer virus on a floppy disk or
computer and delete it.
Que detecta la presencia de un virus informático en un disquete o en una computadora y lo elimina.
INGLESESPAÑOL
![Page 11: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/11.jpg)
In computing, a user is an individual who uses a computer, operating system, service or any computer system. Usually it is a unique person.
En informática, un usuario es un individuo que utiliza una computadora, sistema operativo, servicio o cualquier sistema informático. Por lo general es una única persona.
Thanks very much for attention.
USERNAME
ESPAÑOL: USUARIO
![Page 12: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/12.jpg)
Counterfeiting (Falsificación)Intentional and calculated reproduction of a genuine article (such as money or trademark) for the purpose of misleading the recipient or buyer into believing he or she is receiving or buying the genuine article itself.
![Page 13: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/13.jpg)
BACKUPCOPIA DE SEGURIDAD.
![Page 14: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/14.jpg)
SPAM
Spam or are all those spam messages we receive from strangers who have not requested information and generally having a commercial purpose directly or fraudulent.
In spanish spam o correo basura son todos aquellos mensajes que recibimos de desconocidos con información que no hemos solicitado y que generalmente tienen una finalidad comercial o directamente fraudulenta.
![Page 15: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/15.jpg)
• he spam is what is known as a method to prevent spam.
• Application or tool that is responsible for detecting and eliminating spam.
ANTISPAM
![Page 16: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/16.jpg)
ANTI SPAMAplicación o herramienta informática que se encarga de detectar y eliminar el spam y los correos no deseados. Algunos antivirus y firewalls (cortafuegos) poseen incorporadas herramientas antispam. El principal objetivo de una herramienta antispam, es lograr un buen porcentaje de filtrado de correo no deseado
ANTI SPAMApplication or tool that is responsible for detecting and eliminating spam and spam. Some antivirus and firewall (firewall) have incorporated anti-spam tools. The main purpose of a spam tool, you get a good percentage of filtering spam
Joffre Solano Franco 4to. Informatica "D"
![Page 17: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/17.jpg)
also called barware, malicious code, malware, or malicious software, is software that is designed to infiltrate or damage a computer system or information without the consent of the owner. The term malware is used by computer professionals to mean a variety of hostile software annoying, or intrusive. The term computer virus is often applied in a wrong to refer to all types of malware,
including true viruses.
Software is considered malware based on the effects, designed by the creator, cause a computer. The term malware includes viruses, worms, Trojan horses, most root kits, shareware, spyware,
intrusive adware, crime ware and other malicious and unwanted software.
![Page 18: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/18.jpg)
MALWARE
Malware ( malicious software English ) , also called badware , malicious code , malware, or malicious software, is software that is designed to infiltrate or damage a computer system or information without the consent of the owner. The term malware is often used by computer professionals.
El malware (del inglés malicious software), también llamado badware, código maligno, software malicioso o software malintencionado, es un tipo de software que tiene como objetivo infiltrarse o dañar una computadora o sistema de información sin el consentimiento de su propietario. El término malware es muy utilizado por profesionales de la informática
![Page 19: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/19.jpg)
UPDATE Update, which
involves modification of data in either a file as a database or a eplicación generally being generally associated with the word "Patch" which is also used as a synonym.
![Page 20: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/20.jpg)
RAID
• RAIDRedundant Array of Independent Disks ", refers to a data storage system that uses multiple storage drives (hard disks or SSD) between distributed or replicated data.
Conjunto redundante de discos independientes», hace referencia a un sistema de almacenamiento de datos que usa múltiples unidades de almacenamiento de datos (discos duros o SSD) entre los que se distribuyen o replican los datos.
![Page 21: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/21.jpg)
SPYWAREOr spyware is software that gathers information from a computer and then transmits this information to a foreign entity without the knowledge or consent of the computer owner . The term spyware more broadly to refer to other products that are not strictly spyware also used . These products perform different functions , such as displaying unsolicited advertisements (pop -up) , collect private information, redirect page requests and installing dialers . A typical spyware auto installs on the affected system so that it runs every time you turn on the computer ( using CPU and RAM , reducing the stability of the computer) , and it works all the time , controlling the use made Internet and showing ads related .
![Page 22: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/22.jpg)
PROGRAMAS ESPIAS El spyware o programa espía es un software que recopila información de un ordenador y después transmite esta información a una entidad externa sin el conocimiento o el consentimiento del propietario del ordenador. El término spyware también se utiliza más ampliamente para referirse a otros productos que no son estrictamente spyware. Estos productos, realizan diferentes funciones, como mostrar anuncios no solicitados (pop-up), recopilar información privada, redirigir solicitudes de páginas e instalar marcadores de teléfono.Un spyware típico se auto instala en el sistema afectado de forma que se ejecuta cada vez que se pone en marcha el ordenador (utilizando CPU y memoria RAM, reduciendo la estabilidad del ordenador), y funciona todo el tiempo, controlando el uso que se hace de Internet y mostrando anuncios relacionados.
![Page 23: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/23.jpg)
Back-Door
English
are designed to open a "back door" in our system so as to allow the creator of backdoor access to the system and do what you want with it.
Spanish
son diseñados para abrir una "puerta trasera" en nuestro sistema de modo tal de permitir al creador del backdoor tener acceso al sistema y hacer lo que desee con
![Page 24: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/24.jpg)
* UPTADE
IS that task or activity that involves the updating of
something that was delayed for some reason.
![Page 25: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/25.jpg)
BROWSERIn Spanish: Es un software que permite el acceso a Internet.
![Page 26: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/26.jpg)
ADWARE
es un software que muestra publicidad en el equipo o anima a los usuarios a instalar falsos programas antivirus. Los adware se instalan generalmente sin que nosotros lo deseemos.
Los adware suelen rastrear el uso del ordenador para mostrar publicidad relacionada con los sitios web que visitas. Por lo tanto, estos adware tienen un poco de espía.
IT IS A SOFTWARE THAT SHOWS PUBLICITY IN THE EQUIPMENT OR ANIMATES TO THE USERS TO INSTALL FALSE PROGRAMS ANTIVIRUS. ADWARE SETTLES GENERALLY WITHOUT WE WISH IT.
ADWARE USUALLY TRACKS THE USE OF THE COMPUTER TO SHOW TO PUBLICITY RELATED TO THE WEB SITES THAT VISITS. THEREFORE, THESE ADWARE HAVE A LITTLE SPY.
![Page 27: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/27.jpg)
These are programs that display advertising using any means, for example, pop-ups, banners, changes to the home, etc. Adware means notice in Spanish.
ADWARE
![Page 28: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/28.jpg)
¿Qué es Raid?RAID It stands for Redundant Array of Independent Disks. it is a technology that combines multiple hard disks (HD) to form a single logical unit, where the same data is stored on all disks (redundancy).
Su definición en español sería "Matriz Redundante de Discos Independientes"Se trata de una tecnología que combina varios discos rígidos (HD) para formar una única unidad lógica, donde los mismos datos son almacenados en todos los discos (redundancia).
Ejemplo The raid is a consolidated technology.
![Page 29: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/29.jpg)
DIGITAL SIGNATURE – FIRMA ELECTRONICA
• The digital signature is applied in those areas where it is important to be able to verify the authenticity and the integrity of certain data, for example electronic documents or software, since it provides a tool to detect the forgery y the manipulation of the content.
• La firma digital se aplica en aquellas áreas donde es importante poder verificar la autenticidad y la integridad de ciertos datos, por ejemplo documentos electrónicos o software, ya que proporciona una herramienta para detectar la falsificación y la manipulación del contenido.
![Page 30: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/30.jpg)
THE PASSWORD
• IT'S A SECRET CHARACTER SERIES THAT ALLOWS A USER ACCESS TO A FILE, TO A COMPUTER OR A PROGRAM. THESE HELP ENSURE THAT USERS HAVE NO UNAUTHORIZED ACCESS TO COMPUTER
![Page 31: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/31.jpg)
A hacker is a person skilled in a branch of technology, often computer dedicated to intervene and / or make technical alterations with good or bad intentions about a product or device.
HACKER
![Page 32: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/32.jpg)
GOOD MORNING TEACHER RUTHAND CLASS MATES, MY NAME IS.ESTEFANIA REZABALAMY TOPIC IS PRYVATE-KEY
The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key
CLAVE PRIVADA La mitad secreta de un par de claves criptográfica que se utiliza con un algoritmo de clave pública. Las claves privadas se utilizan típicamente para descifrar una clave de sesión simétrica, firmar digitalmente datos o descifrar los datos que ha sido cifradas con la clave pública correspondiente.
IN SPANISH
![Page 33: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/33.jpg)
ENCRYPTIONEncryption allows us to hide the message content so that
only the intended recipient can read it. They are not mutually exclusive , can be used to create an email
message signed and encrypted .
![Page 34: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/34.jpg)
How Phishing Work?
• Phishing involves the theft of personal and / or financial user through the forging of a trusted entity. Thus, the user creates the data into their trusted site when in fact, they are sent directly to the attacker.
![Page 35: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/35.jpg)
![Page 36: Computer Security Slides-diapositivas Power Point](https://reader035.vdocument.in/reader035/viewer/2022062305/55cf92a4550346f57b9843b4/html5/thumbnails/36.jpg)
Defining firewall
A firewall is a defense system based on the fact that all traffic in a network must necessarily pass through a security system capable of allowing, denying, and take note of everything that happens, according to an access control policy between networks.
FIREWALL