Top Banner
Nicole Villavicencio and Steffi Medina
12

Internet Security IT

Dec 02, 2014

Download

Technology

STEFFI_MEDINA

This a presentation made by Nicole and Me about Internet secuirity.
Hope you like it!
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internet Security IT

Nicole Villavicencio and Steffi Medina

Page 2: Internet Security IT

Why is security necessary?Symptoms of an attacked computerMalware: Viruses Worms KeyloggersSpywareHackerCrackersPharmingPhishingAntivirus and ProxyPrevention firstWebgraphy

Page 3: Internet Security IT

Why is security necessary?

Protect our personal informationProtect our computer form malicious softwares

Page 4: Internet Security IT

Symptoms of an attacked computer

I. The computer takes longer time than usual to boot

II. The system displays strange colors and unrequested files come up

III. Computer occasionally freezes

IV. When on the internet, browser becomes very slow

V. When vital and confidential files and programs are no longer accessible

Page 5: Internet Security IT

Malware (Malicious Software):Computer program or code whose function is to damage a system

Viruses Worms and Keyloggers

Page 6: Internet Security IT

SPYWARE (Spy software):

Steal our dataSpy our movements through the network.

Page 7: Internet Security IT

HACKER

A hacker is someone who illegally accesses a private computer network.

 Pharming is a cyber attack intended to redirect a website's traffic to another, bogus site.

PHARMING

A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent

CRACKER

Page 8: Internet Security IT

Phishing is the theft of personal and / or financial user, through forging a trusted entity

Page 9: Internet Security IT

Antivirus and proxy

AntivirusProxy

Page 10: Internet Security IT

PREVENTION FIRST (FROM ARTICLES 1 AND 2)

I. Installing and running anti-virus software.II. Download security patches III. Restrict access to suspicious websitesIV. Be wary of opening any email attachment.V. Choose secure passwords. VI. Keep your passwords secureVII. Use a pop-up blockerVIII. Beware of phishing and spam IX. Don't leave your computer operating idly for

any length of timeX. Be careful when loading external media.

Page 11: Internet Security IT

WEBGRAPHYhttp://www.whatismyip.com/what-is-a-proxy Author: unknown, 8, April 2014

http://www.webroot.com. Author:Linda Criddle. 8 April 2014

http://www.infospyware.com Author: Marcelo Rivero, 22 April 2014

http://www.infospyware.com/articulos/que-son-los-spywares. Author: Marcelo Rivero, 22 April 2014

http://en.wikipedia.org/wiki/Pharming. Author: Unknown. 22 April 2014

http://infotechnology.hubpages.com/hub Author: Salvatore Vuono 24 April 2014

http://www.wisegeek.org/what-is-a-hacker.htm . Author: Unknown. 25 April 2014

https://answers.yahoo.com/question/index?qid=20060912204431AA5xm4f. Author: Dan M. 25 April 2014.

http://kb.eset.com/esetkb/index?page=content&id=SOLN130 Author:Unknown 27 April 2014

http://anti-virus-software-review.toptenreviews.com Author:Charles R. Hooper 27 April 2014