2. Index
● 9. computer security
● 9.1 Active and passive safety
● 9.2 Malware and silent threats
● 9.3 computer security software
● 9.4 Network security
● 10.News about security and computer attacks
3. 9. Computer security
Set of actions, tools and devices. Its objective is to provide a computer system
with integrity, confidentiality and availability.
Protect us from:
● Ourselves
● Accidents and breakdowns
● Intrusive users
● Malicious software and malware
4. 9.1 Active and passive safety
Active security techniques:
- use of adequate passwords
- data encryption
- The use of computer security software
passive safety techniques:
- Use of proper hardware
- making data backups
5. 9.2 Malware and silent threats
The virus is a program that is installed on the computer without the user's knowledge.
One type of virus is the computer worm, whose objective is to multiply and infect the nodes
of a computer network.
The Trojan is a small hidden application, whose purpose is to have a gateway to the data on
our computer
6. 9.2 Malware and silent threats
There are applications that alter the way we connect to the network, and
cause us to browse fake sites
- Dialer
- Pharming
- Hijacking
7. 9.2 Malware and silent threats
Spam, also known as junk mail, consists of sending advertising e-mail in bulk.
There is a type of applications that store everything we type in our keylogger
The appearance of new electronic devices such as tablets and smartphones has also led
to a proliferation of malware programs that attack these devices
8. 9.3 Computer security software
An antivirus program is a program designed to detect malicious software, prevent
it from running, and remove it.
9. 9.4 network security
When we browse the internet we run the risk of possible cyber attacks.
- Avoid web pages of doubtful origin
- Keep your operating system and antivirus program up to date
- download apps from official sites
- do not follow links in unknown messages
- never provide important personal data too easily.
10. 10.News about security and computer attacks
- https://www.20minutos.es/tecnologia/ciberseguridad/asi-han-logrado-robar-mas-de-30-
millones-de-dolares-en-criptomonedas-en-un-mismo-ciberataque-a-crypto-com-4944577/
- https://www.20minutos.es/tecnologia/ciberseguridad/rusia-desmantela-a-revil-la-banda-de-
cibercriminales-mas-grande-del-mundo-4942022/
- https://elpais.com/tecnologia/2021-11-22/un-ciberataque-mantiene-en-jaque-a-distintos-medios-
de-comunicacion-espanoles-desde-el-viernes.html
- https://elpais.com/economia/2021-11-11/un-ataque-informatico-obliga-a-paralizar-la-principal-
planta-de-la-cervecera-damm.html