Internet Security IT

226 views

Published on

This a presentation made by Nicole and Me about Internet secuirity.
Hope you like it!

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
226
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet Security IT

  1. 1. Nicole Villavicencio and Steffi Medina
  2. 2. Why is security necessary? Symptoms of an attacked computer Malware: Viruses Worms Keyloggers Spyware Hacker Crackers Pharming Phishing Antivirus and Proxy Prevention first Webgraphy
  3. 3. Why is security necessary? Protect our personal information Protect our computer form malicious softwares
  4. 4. Symptoms of an attacked computer I. The computer takes longer time than usual to boot II. The system displays strange colors and unrequested files come up III. Computer occasionally freezes IV. When on the internet, browser becomes very slow V. When vital and confidential files and programs are no longer accessible
  5. 5. Viruses Worms and Keyloggers
  6. 6. SPYWARE (Spy software): Steal our data Spy our movements through the network.
  7. 7. HACKER A hacker is someone who illegally accesses a private computer network. Pharming is a cyber attack intended to redirect a website's traffic to another, bogus site. PHARMING A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent CRACKER
  8. 8. Phishing is the theft of personal and / or financial user, through forging a trusted entity
  9. 9. Antivirus and proxy Antivirus Proxy
  10. 10. PREVENTION FIRST (FROM ARTICLES 1 AND 2) I. Installing and running anti-virus software. II. Download security patches III. Restrict access to suspicious websites IV. Be wary of opening any email attachment. V. Choose secure passwords. VI. Keep your passwords secure VII. Use a pop-up blocker VIII. Beware of phishing and spam IX. Don't leave your computer operating idly for any length of time X. Be careful when loading external media.
  11. 11. WEBGRAPHY http://www.whatismyip.com/what-is-a-proxy Author: unknown, 8, April 2014 http://www.webroot.com. Author:Linda Criddle. 8 April 2014 http://www.infospyware.com Author: Marcelo Rivero, 22 April 2014 http://www.infospyware.com/articulos/que-son-los-spywares. Author: Marcelo Rivero, 22 April 2014  http://en.wikipedia.org/wiki/Pharming. Author: Unknown. 22 April 2014 http://infotechnology.hubpages.com/hub Author: Salvatore Vuono 24 April 2014 http://www.wisegeek.org/what-is-a-hacker.htm . Author: Unknown. 25 April 2014 https://answers.yahoo.com/question/index?qid=20060912204431AA5xm4f. Author: Dan M. 25 April 2014. http://kb.eset.com/esetkb/index?page=content&id=SOLN130 Author:Unknown 27 April 2014 http://anti-virus-software-review.toptenreviews.com Author:Charles R. Hooper 27 April 2014
  12. 12. Hope you have liked it

×