SlideShare a Scribd company logo
1 of 8
DIGITAL SECURITY
By: Conner Stacy and Michael Riley
WHAT IS DIGITAL SECURITY?
 Digital security is the protection of your digital identity.
 Protects and keeps things like passwords and accounts secure.
 Personal information could potentially be stolen like credit card
information.
SIGNIFICANCE
 Digital security is vital, because it keeps our things private and
only allows us to have control.
 Hackers and digital criminals are more prevalent now since our
lives revolve around technology.
RECOGNIZED HACKERS
 Johnathon James
 Kevin Mitnick
 Gary McKinnon
JOHNATHON JAMES
 Nickname- c0mrade
 Age- 15
 hacked into:Bell South, Miami-Dade, the U.S. Department of
Defense, and NASA.
 Downloaded 1.7$ million in information
KEVIN MITNICK
 Breached the national defense warning system and stealing
corporate secrets.
 Known as “The most wanted digital hacker in U.S.”
 Now after serving 5 years in a computer security consultant
GARY MCKINNON
 Nickname- Solo
 Biggest Military hacker in the world
 illegally gained access to 97 computers belonging to the U.S.
Armed Forces and NASA.
 Claimed he was searching for “UFO coverups”
 Caused 700,000$ in damages to military computer equipment
 To this day is avoiding extradition to the U.S.
CONCLUSION
 In order to keep your information safe, improve your digital
security
 Hackers today can find a way to access all of your information if
you don’t take the right precautions.

More Related Content

What's hot

Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...IT Arena
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
Cognitive hacking
Cognitive hackingCognitive hacking
Cognitive hackingvishnu1236
 
Protecting your brand from fraud, infringement and data breach
Protecting your brand from fraud, infringement and data breachProtecting your brand from fraud, infringement and data breach
Protecting your brand from fraud, infringement and data breachMichael Steck, JD / CIPP-US
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCentre Technologies
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Kim Zetter - The Year in Hacks 2015
Kim Zetter - The Year in Hacks 2015Kim Zetter - The Year in Hacks 2015
Kim Zetter - The Year in Hacks 2015SeniorStoryteller
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )Sameer Paradia
 
Information Security
Information SecurityInformation Security
Information Securityikonick
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareCSNP
 

What's hot (14)

Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...Iurii Garasym. The future crimes and predestination of cyber security. Though...
Iurii Garasym. The future crimes and predestination of cyber security. Though...
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
Cognitive hacking
Cognitive hackingCognitive hacking
Cognitive hacking
 
Protecting your brand from fraud, infringement and data breach
Protecting your brand from fraud, infringement and data breachProtecting your brand from fraud, infringement and data breach
Protecting your brand from fraud, infringement and data breach
 
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre TechnologiesCyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
Cyber Attacks: How to Ninja-Proof Your Data - Centre Technologies
 
Cyber terroristism
Cyber terroristismCyber terroristism
Cyber terroristism
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Kim Zetter - The Year in Hacks 2015
Kim Zetter - The Year in Hacks 2015Kim Zetter - The Year in Hacks 2015
Kim Zetter - The Year in Hacks 2015
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cyber War ( World War 3 )
Cyber War ( World War 3 )Cyber War ( World War 3 )
Cyber War ( World War 3 )
 
Information Security
Information SecurityInformation Security
Information Security
 
DefendEdge - Negotiating Ransomware
DefendEdge - Negotiating RansomwareDefendEdge - Negotiating Ransomware
DefendEdge - Negotiating Ransomware
 

Viewers also liked (13)

Central Hills 4WD Club
Central Hills 4WD ClubCentral Hills 4WD Club
Central Hills 4WD Club
 
Page1
Page1Page1
Page1
 
Juegos Mario Combat
Juegos Mario CombatJuegos Mario Combat
Juegos Mario Combat
 
check1
check1check1
check1
 
Epidemics - University of Hong Kong
Epidemics - University of Hong KongEpidemics - University of Hong Kong
Epidemics - University of Hong Kong
 
Check2
Check2Check2
Check2
 
Page1
Page1Page1
Page1
 
Pills Shapes for PowerPoint
Pills Shapes for PowerPointPills Shapes for PowerPoint
Pills Shapes for PowerPoint
 
Link3
Link3Link3
Link3
 
Kaizen
KaizenKaizen
Kaizen
 
que es un blog
que es un blogque es un blog
que es un blog
 
NCCN Guidelines for Patients: Ovarian Cancer
NCCN Guidelines for Patients: Ovarian CancerNCCN Guidelines for Patients: Ovarian Cancer
NCCN Guidelines for Patients: Ovarian Cancer
 
Polypharmacy and medication errors
Polypharmacy and medication errorsPolypharmacy and medication errors
Polypharmacy and medication errors
 

Similar to Digital Security

Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxDaniel Gorita
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
This week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many attaThis week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many attarochellwa9f
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfdeepakarora871
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxMerrileeDelvalle969
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The CinemaAdrian Mikeliunas
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security ProtectionShawn Crimson
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 

Similar to Digital Security (20)

Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Hack
HackHack
Hack
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Cyber war
Cyber warCyber war
Cyber war
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Social Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptxSocial Engineering - Enterprise Phishing.pptx
Social Engineering - Enterprise Phishing.pptx
 
Cyber espionage
Cyber espionageCyber espionage
Cyber espionage
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
This week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many attaThis week were hired consultants working on one of the many atta
This week were hired consultants working on one of the many atta
 
This is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdfThis is a 1 -2 page essay on an issue you found interesting while re.pdf
This is a 1 -2 page essay on an issue you found interesting while re.pdf
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
 
Cyber Security At The Cinema
Cyber Security At The CinemaCyber Security At The Cinema
Cyber Security At The Cinema
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Axxera End Point Security Protection
Axxera End Point Security ProtectionAxxera End Point Security Protection
Axxera End Point Security Protection
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 

Recently uploaded

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Digital Security

  • 1. DIGITAL SECURITY By: Conner Stacy and Michael Riley
  • 2. WHAT IS DIGITAL SECURITY?  Digital security is the protection of your digital identity.  Protects and keeps things like passwords and accounts secure.  Personal information could potentially be stolen like credit card information.
  • 3. SIGNIFICANCE  Digital security is vital, because it keeps our things private and only allows us to have control.  Hackers and digital criminals are more prevalent now since our lives revolve around technology.
  • 4. RECOGNIZED HACKERS  Johnathon James  Kevin Mitnick  Gary McKinnon
  • 5. JOHNATHON JAMES  Nickname- c0mrade  Age- 15  hacked into:Bell South, Miami-Dade, the U.S. Department of Defense, and NASA.  Downloaded 1.7$ million in information
  • 6. KEVIN MITNICK  Breached the national defense warning system and stealing corporate secrets.  Known as “The most wanted digital hacker in U.S.”  Now after serving 5 years in a computer security consultant
  • 7. GARY MCKINNON  Nickname- Solo  Biggest Military hacker in the world  illegally gained access to 97 computers belonging to the U.S. Armed Forces and NASA.  Claimed he was searching for “UFO coverups”  Caused 700,000$ in damages to military computer equipment  To this day is avoiding extradition to the U.S.
  • 8. CONCLUSION  In order to keep your information safe, improve your digital security  Hackers today can find a way to access all of your information if you don’t take the right precautions.