SlideShare a Scribd company logo
1 of 12
Download to read offline
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.
Index
Slide 1: Computer security.
Slide 2: Active and passive security.
Slides 3,4 & 5: Malware and silent threats.
Slide 6 & 7: Computer security software.
Slide 8: Web Security.
Slide 9: News related to cybersecurity or computer attacks.
Computer security
Set of actions, tools and devices. Its objective is to provide a computer system with
integrity, confidentiality and availability.
Protect us from:
● Ourselves
● Accidents and breakdowns
● Intrusive users
● Malicious software and malware
Some active security techniques are:
-Use an adequate password.
-Encrypt your data.
-Use a security I.T. software.
Active and passive security
Some passive security techniques are:
-Use an adequate hardware.
-Back up your data.
Malware and silent threats
Virus: program in the PC without the user’s knowledge.
Worms: infects all nodes on a computer network. Accompany malicious emails.
Spies: programme installed in the computer without user's knowledge.
Trojans: small application that has an input to our computer.
There are two types of Fraud by social
engineering.
-Phishing: Consists of asking for
confidential information persuading people
with money or other stuff.
-Rogue software: It’s a fake antivirus
system that contains a virus.
Malware and silent threats
Some applications alter the way we access
internet. They make us navigate through
fake websites and use telephone billing.
The different applications are:
-Dialer: Makes calls that give economic
benefits to the creator of the modem and
makes the user lose money. This can be
avoid using an ADSL router.
-Pharming: Impersonates the web pages to
get bank data.
-Hijacking: Consists of hijacking any
computer element.
Malware and silent threats
Spam: bulk email marketing
Keylogger: record every keystroke made by a user.
Obtaining sensitive information (passwords, bank data, etc)
New mobile devices: appearance of new mobile devices makes malware grow up.
Computer security hardware
Antivirus: detects malicious software, stops it from running, and removes it.
Compares the scanned files on the computer with their own signatures.
Heuristic systems: analyzes the internal code of the file and determines if it is a virus.
Levels: resident level or complete analisis level.
Firewall: allows or prohibits communication between the applications of our team and
the Network through the protocol TCP/IP.
Antispyware: collects information about our browsing habits and the ability to hijack our
browser home page by hijacking it by sending us to another page.
Computer security hardware
There are different security hardwares. The most recommendable Antivirus are:
For Windows: Avast and McAfee.
For Android: Avast Mobile.
For Apple: Sophos.
Web security
Advices for a safer navigation:
- Avoid suspicious web pages (http).
- Download from an official website.
- Update antivirus.
- Don’t click links from unknowns.
- Don’t put personal information.
- Inform about a product before buying.
- Be careful with .exe files.
- Use strong passwords.
- Read terms and services.
Advices for a safer smartphone:
- Use a strong password.
- Update the system.
- Install security programs.
- Don’t install unknown applications.
- Deactivate Bluetooth if it’s not in use.
- Avoid rooting.
- Avoid talking with unknowns.
News related to cybersecurity or computer
attacks.
● The cyber attacks of 2021 and those that will arrive in 2022
● 79% of Spaniards believe they are tracked by cybercriminals
● The UOC suffers a cyber attack that blocks its virtual campus
● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs
● Ukraine denounces a large-scale cyber attack against the
government's computer system
● Drones, another option that cybercriminals use to steal
information
● The next-gen of cybercriminals starts from an early age
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.

More Related Content

What's hot

Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómezSergioGmezOrtiz
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 

What's hot (19)

Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Spyware
SpywareSpyware
Spyware
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Malware
MalwareMalware
Malware
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 

Similar to IT SECURITY PRESENTATION

computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2SIMONTHOMAS S
 

Similar to IT SECURITY PRESENTATION (20)

Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Network security
Network securityNetwork security
Network security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
 

Recently uploaded

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 

Recently uploaded (20)

Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

IT SECURITY PRESENTATION

  • 1. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.
  • 2. Index Slide 1: Computer security. Slide 2: Active and passive security. Slides 3,4 & 5: Malware and silent threats. Slide 6 & 7: Computer security software. Slide 8: Web Security. Slide 9: News related to cybersecurity or computer attacks.
  • 3. Computer security Set of actions, tools and devices. Its objective is to provide a computer system with integrity, confidentiality and availability. Protect us from: ● Ourselves ● Accidents and breakdowns ● Intrusive users ● Malicious software and malware
  • 4. Some active security techniques are: -Use an adequate password. -Encrypt your data. -Use a security I.T. software. Active and passive security Some passive security techniques are: -Use an adequate hardware. -Back up your data.
  • 5. Malware and silent threats Virus: program in the PC without the user’s knowledge. Worms: infects all nodes on a computer network. Accompany malicious emails. Spies: programme installed in the computer without user's knowledge. Trojans: small application that has an input to our computer.
  • 6. There are two types of Fraud by social engineering. -Phishing: Consists of asking for confidential information persuading people with money or other stuff. -Rogue software: It’s a fake antivirus system that contains a virus. Malware and silent threats Some applications alter the way we access internet. They make us navigate through fake websites and use telephone billing. The different applications are: -Dialer: Makes calls that give economic benefits to the creator of the modem and makes the user lose money. This can be avoid using an ADSL router. -Pharming: Impersonates the web pages to get bank data. -Hijacking: Consists of hijacking any computer element.
  • 7. Malware and silent threats Spam: bulk email marketing Keylogger: record every keystroke made by a user. Obtaining sensitive information (passwords, bank data, etc) New mobile devices: appearance of new mobile devices makes malware grow up.
  • 8. Computer security hardware Antivirus: detects malicious software, stops it from running, and removes it. Compares the scanned files on the computer with their own signatures. Heuristic systems: analyzes the internal code of the file and determines if it is a virus. Levels: resident level or complete analisis level. Firewall: allows or prohibits communication between the applications of our team and the Network through the protocol TCP/IP. Antispyware: collects information about our browsing habits and the ability to hijack our browser home page by hijacking it by sending us to another page.
  • 9. Computer security hardware There are different security hardwares. The most recommendable Antivirus are: For Windows: Avast and McAfee. For Android: Avast Mobile. For Apple: Sophos.
  • 10. Web security Advices for a safer navigation: - Avoid suspicious web pages (http). - Download from an official website. - Update antivirus. - Don’t click links from unknowns. - Don’t put personal information. - Inform about a product before buying. - Be careful with .exe files. - Use strong passwords. - Read terms and services. Advices for a safer smartphone: - Use a strong password. - Update the system. - Install security programs. - Don’t install unknown applications. - Deactivate Bluetooth if it’s not in use. - Avoid rooting. - Avoid talking with unknowns.
  • 11. News related to cybersecurity or computer attacks. ● The cyber attacks of 2021 and those that will arrive in 2022 ● 79% of Spaniards believe they are tracked by cybercriminals ● The UOC suffers a cyber attack that blocks its virtual campus ● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs ● Ukraine denounces a large-scale cyber attack against the government's computer system ● Drones, another option that cybercriminals use to steal information ● The next-gen of cybercriminals starts from an early age
  • 12. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.