Top Banner
Cyber Security Cyber Security By:Jerusa Miller By:Jerusa Miller July 7, 2008 July 7, 2008
12

Cyber Security

Jan 23, 2016

Download

Documents

Gill Gill

By:Jerusa Miller July 7, 2008. Cyber Security. What Is Cyber Security?. The protection of data and systems in networks that are connected to the Internet. Internet Issues. Viruses Worms Trojan Horses Hackers. What are they all? What do they do?. - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cyber Security

Cyber SecurityCyber Security

By:Jerusa MillerBy:Jerusa Miller

July 7, 2008July 7, 2008

Page 2: Cyber Security

What Is Cyber Security?What Is Cyber Security?

•The protection of The protection of data and systems in data and systems in networks that are networks that are connected to the connected to the Internet .Internet .

Page 3: Cyber Security

Internet IssuesInternet IssuesVirusesViruses

WormsWorms

Trojan HorsesTrojan Horses

HackersHackers

What are they all?

What do they do?

Page 4: Cyber Security

VirusesViruses

A small piece of A small piece of manmade code manmade code that is loaded that is loaded onto your onto your computer without computer without your knowledge your knowledge and runs without and runs without granted accesgranted acces

Viruses can replicate Viruses can replicate itself over and over itself over and over againagain

Rapidly use all your Rapidly use all your memorymemory

Slow down system Slow down system and/or bring to a haltand/or bring to a halt

Transmit itself across Transmit itself across networks and bypass networks and bypass security systemssecurity systems

What is a Virus What do they do

Page 5: Cyber Security

WormsWorms A special type of A special type of

Virus that Virus that replicates itself replicates itself over a computer over a computer network and network and usually performs usually performs malicious malicious actions.actions.

Use computer Use computer memorymemory

Use computer Use computer resourcesresources

Bring system to a Bring system to a halthalt

Possibly shut the Possibly shut the entire system down entire system down in other terms crash in other terms crash your computeryour computer

What is a WORM? What does a WORM do?

Page 6: Cyber Security

Trojan HorsesTrojan Horses

A destructive A destructive program that program that masquerades as a masquerades as a benign application benign application that does not that does not replicate itselfreplicate itself

A program that A program that claims it rids your claims it rids your computer or viruses computer or viruses but in actuality but in actuality introduces viruses introduces viruses onto your computeronto your computer

Remote acces tojans Remote acces tojans Date Sending TrojansDate Sending Trojans Destrcutive TrojansDestrcutive Trojans Proxy TrojansProxy Trojans FTP TrojansFTP Trojans Security Software Security Software

disabler Trojansdisabler Trojans Denial-of-Service Attck Denial-of-Service Attck

TrojansTrojans

Types of TrojansWhat is a Trojan

Page 7: Cyber Security

Computer HackersComputer Hackers

An individual An individual that gains that gains unauthorized unauthorized access to access to computer computer systems for the systems for the purpose of purpose of stealing and stealing and corrupting data.corrupting data.

Page 8: Cyber Security

What Is a PasswordWhat Is a Password

A password is A password is a private a private series of series of characters that characters that enables a user enables a user to access files, to access files, computer, computer, and/or and/or programs.programs.

Page 9: Cyber Security

Is your Password Strong?Is your Password Strong?

6-12 characterts6-12 characterts Uppercase lettersUppercase letters Lower Case lettersLower Case letters NumbersNumbers Special CharactersSpecial Characters (*%$#)(*%$#)

A strong password should consist of,

Page 10: Cyber Security

Methods to Prevent Malicious objectsPurchase or download spywareMake sure you are protected by firewareTurn on pop-up blockersBe cautious of what information you submit and who you submit it to.

Create strong passwordsBe cautious of the sites and programs that your enterPay attention of ALL warnings directed at you

Page 11: Cyber Security

HAPPY BROWSING!!!!!HAPPY BROWSING!!!!!

Page 12: Cyber Security

Work Citations Work Citations http://www.pcmag.com/encyclopedia_term/0,254http://www.pcmag.com/encyclopedia_term/0,254

2,t=2,t=cybersecurity&icybersecurity&i=40643,00.asp=40643,00.asp

http://www.ssqq.com/information/images/computhttp://www.ssqq.com/information/images/computer%20girl%20gary.jpger%20girl%20gary.jpg

http://www.webopedia.com/TERM/V/virus.htmlhttp://www.webopedia.com/TERM/V/virus.html http://www.webopedia.com/TERM/w/worm.htmlhttp://www.webopedia.com/TERM/w/worm.html http://www.webopedia.com/TERM/T/http://www.webopedia.com/TERM/T/

Trojan_horse.htmlTrojan_horse.html http://instructors.cwrl.utexas.edu/jbrown/files/http://instructors.cwrl.utexas.edu/jbrown/files/

hackers_cartoons.jpghackers_cartoons.jpg http://www.webopedia.com/TERM/h/hacker.htmlhttp://www.webopedia.com/TERM/h/hacker.html http://www.webopedia.com/TERM/p/http://www.webopedia.com/TERM/p/

password.htmlpassword.html