SlideShare a Scribd company logo
1 of 12
Download to read offline
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.
Index
Slide 1: Computer security.
Slide 2: Active and passive security.
Slides 3,4 & 5: Malware and silent threats.
Slide 6 & 7: Computer security software.
Slide 8: Web Security.
Slide 9: News related to cybersecurity or computer attacks.
Computer security
Set of actions, tools and devices. Its objective is to provide a computer system with
integrity, confidentiality and availability.
Protect us from:
● Ourselves
● Accidents and breakdowns
● Intrusive users
● Malicious software and malware
Some active security techniques are:
-Use an adequate password.
-Encrypt your data.
-Use a security I.T. software.
Active and passive security
Some passive security techniques are:
-Use an adequate hardware.
-Back up your data.
Malware and silent threats
Virus: program in the PC without the user’s knowledge.
Worms: infects all nodes on a computer network. Accompany malicious emails.
Spies: programme installed in the computer without user's knowledge.
Trojans: small application that has an input to our computer.
There are two types of Fraud by social
engineering.
-Phishing: Consists of asking for
confidential information persuading people
with money or other stuff.
-Rogue software: It’s a fake antivirus
system that contains a virus.
Malware and silent threats
Some applications alter the way we access
internet. They make us navigate through
fake websites and use telephone billing.
The different applications are:
-Dialer: Makes calls that give economic
benefits to the creator of the modem and
makes the user lose money. This can be
avoid using an ADSL router.
-Pharming: Impersonates the web pages to
get bank data.
-Hijacking: Consists of hijacking any
computer element.
Malware and silent threats
Spam: bulk email marketing
Keylogger: record every keystroke made by a user.
Obtaining sensitive information (passwords, bank data, etc)
New mobile devices: appearance of new mobile devices makes malware grow up.
Computer security hardware
Antivirus: detects malicious software, stops it from running, and removes it.
Compares the scanned files on the computer with their own signatures.
Heuristic systems: analyzes the internal code of the file and determines if it is a virus.
Levels: resident level or complete analisis level.
Firewall: allows or prohibits communication between the applications of our team and
the Network through the protocol TCP/IP.
Antispyware: collects information about our browsing habits and the ability to hijack our
browser home page by hijacking it by sending us to another page.
Computer security hardware
There are different security hardwares. The most recommendable Antivirus are:
For Windows: Avast and McAfee.
For Android: Avast Mobile.
For Apple: Sophos.
Web security
Advices for a safer navigation:
- Avoid suspicious web pages (http).
- Download from an official website.
- Update antivirus.
- Don’t click links from unknowns.
- Don’t put personal information.
- Inform about a product before buying.
- Be careful with .exe files.
- Use strong passwords.
- Read terms and services.
Advices for a safer smartphone:
- Use a strong password.
- Update the system.
- Install security programs.
- Don’t install unknown applications.
- Deactivate Bluetooth if it’s not in use.
- Avoid rooting.
- Avoid talking with unknowns.
News related to cybersecurity or computer
attacks.
● The cyber attacks of 2021 and those that will arrive in 2022
● 79% of Spaniards believe they are tracked by cybercriminals
● The UOC suffers a cyber attack that blocks its virtual campus
● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs
● Ukraine denounces a large-scale cyber attack against the
government's computer system
● Drones, another option that cybercriminals use to steal
information
● The next-gen of cybercriminals starts from an early age
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.

More Related Content

What's hot

Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómezSergioGmezOrtiz
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 

What's hot (19)

Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Spyware
SpywareSpyware
Spyware
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Malware
MalwareMalware
Malware
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 

Similar to Presentation about security I.T.

computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2SIMONTHOMAS S
 

Similar to Presentation about security I.T. (20)

Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Network security
Network securityNetwork security
Network security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
 

Recently uploaded

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 

Presentation about security I.T.

  • 1. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.
  • 2. Index Slide 1: Computer security. Slide 2: Active and passive security. Slides 3,4 & 5: Malware and silent threats. Slide 6 & 7: Computer security software. Slide 8: Web Security. Slide 9: News related to cybersecurity or computer attacks.
  • 3. Computer security Set of actions, tools and devices. Its objective is to provide a computer system with integrity, confidentiality and availability. Protect us from: ● Ourselves ● Accidents and breakdowns ● Intrusive users ● Malicious software and malware
  • 4. Some active security techniques are: -Use an adequate password. -Encrypt your data. -Use a security I.T. software. Active and passive security Some passive security techniques are: -Use an adequate hardware. -Back up your data.
  • 5. Malware and silent threats Virus: program in the PC without the user’s knowledge. Worms: infects all nodes on a computer network. Accompany malicious emails. Spies: programme installed in the computer without user's knowledge. Trojans: small application that has an input to our computer.
  • 6. There are two types of Fraud by social engineering. -Phishing: Consists of asking for confidential information persuading people with money or other stuff. -Rogue software: It’s a fake antivirus system that contains a virus. Malware and silent threats Some applications alter the way we access internet. They make us navigate through fake websites and use telephone billing. The different applications are: -Dialer: Makes calls that give economic benefits to the creator of the modem and makes the user lose money. This can be avoid using an ADSL router. -Pharming: Impersonates the web pages to get bank data. -Hijacking: Consists of hijacking any computer element.
  • 7. Malware and silent threats Spam: bulk email marketing Keylogger: record every keystroke made by a user. Obtaining sensitive information (passwords, bank data, etc) New mobile devices: appearance of new mobile devices makes malware grow up.
  • 8. Computer security hardware Antivirus: detects malicious software, stops it from running, and removes it. Compares the scanned files on the computer with their own signatures. Heuristic systems: analyzes the internal code of the file and determines if it is a virus. Levels: resident level or complete analisis level. Firewall: allows or prohibits communication between the applications of our team and the Network through the protocol TCP/IP. Antispyware: collects information about our browsing habits and the ability to hijack our browser home page by hijacking it by sending us to another page.
  • 9. Computer security hardware There are different security hardwares. The most recommendable Antivirus are: For Windows: Avast and McAfee. For Android: Avast Mobile. For Apple: Sophos.
  • 10. Web security Advices for a safer navigation: - Avoid suspicious web pages (http). - Download from an official website. - Update antivirus. - Don’t click links from unknowns. - Don’t put personal information. - Inform about a product before buying. - Be careful with .exe files. - Use strong passwords. - Read terms and services. Advices for a safer smartphone: - Use a strong password. - Update the system. - Install security programs. - Don’t install unknown applications. - Deactivate Bluetooth if it’s not in use. - Avoid rooting. - Avoid talking with unknowns.
  • 11. News related to cybersecurity or computer attacks. ● The cyber attacks of 2021 and those that will arrive in 2022 ● 79% of Spaniards believe they are tracked by cybercriminals ● The UOC suffers a cyber attack that blocks its virtual campus ● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs ● Ukraine denounces a large-scale cyber attack against the government's computer system ● Drones, another option that cybercriminals use to steal information ● The next-gen of cybercriminals starts from an early age
  • 12. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.