Learn about cibersecurity with this presentation! You are going to learn about all the dangerous treats that you can find in the internet and how to avoid them.
4. RULES
The system has
to be secure
and
confidential
with your data,
also it has to
be available.
Cybersecurity Information
WHAT IS?
The set of
actions, tools
and devices
whose objective
is to provide a
computer
system with
integrity,
confidentiality
and availability
DANGERS
1. Ourselves
2. Damages
3. Intruders
4. Malwares
Malwares
Are softwares
created to
damage the
electronic
device of
others.
9. Treats
Softwares that hide
behind other software
for us to download.
TROJANS
Are softwares that
spread into other
devices to perform a
specific action.
VIRUSES
11. Disturbances in internet access
PHARMING
It’s the farthest
planet from the Sun
DIALER
Mercury is the smallest
and innermost planet
HIJACKING
Despite being red, Mars
is a very cold place
13. The Spam
What is?
Masive gmail
sending of
advertisements.
Damages
Gmail servers
saturation.
Purpose
Sell the products.
Defense
Put the contacts in
the black list of
spam.
14. The Keyloggers
What is?
A software that
stocks everything
we type.
Damages
Some malwares
can use this
softwares to get
your passwords.
Purpose
Stock everything
we type.
Defense
Have a strong
antivirus and be
careful.
16. Computer security software
Firewall
A firewall or firewall
program is a program
whose purpose is to allow
or prohibit
communication between
the applications on our
computer and the
Internet.
Antispyware
Spyware collect
information about our
browsing habits,
installed programs, etc.
Antivirus
An antivirus program is
a program whose
purpose is to detect
malicious software,
prevent it from running,
and remove it.
19. Tips for a secure internet navigation
Downloads
Only from
official
websites.
Links
Don’t click on
everything.
Passwords
Use strong
passwords.
Data
Don’t give
away your
personal data.
O.S
Have a strong
antivirus.
Online shops
Look for
qualifications
and opinions.
20. Security tips for smartphones
Install a security
system that includes
antivirus and a
location tool in case
of theft or loss
If you root your
mobile you will have
administrator control,
which increases
security risks
Avoid messaging with
strangers, their
shipments could
introduce malware
Disable your
Bluetooth connection
if you are not going to
use it or configure it
as hidden to avoid
attacks on the mobile
Don't install
mobile apps from
unknown sources
Keep your system
updated.