2. Index
1. What should we protect ourselves?
2. Active and passive security
3. Malware and threats Silent
4. Malware and silent threats
5. Malware and silent threats
6. Computer security software (antivirus, firewall, antispyware)
7. Computer security software (list of free security applications)
8. Web Security
9. News related to cybersecurity or computer attacks
3. Active and passive security
Techniques of active security:
- Suitable passwords
- Encryption of the data
- Software of I.T. security
Techniques of passive security:
- Suitable hardware
- Make security copies of the
data.
4. Malware and threats Silent
- Virus and I.T. worms: A virus is a type of program that you install in the
computer without the knowledge of the user.
- Spyes and trojans horse in my computer: They install it in our computer
through programmes. The purpose of the trojan horse is to have a door of
entrance to our computer.
5. Malware and silent threats
- -The problem of spam: consists in the delivery of an advertising mail in a
massive form to any existing address.
- They want to know what we type: It’s a type of app that stores up everything
that we types in our computer, its function is register all of the taps that the
user makes.
- Viruses reach mobile devices: The most common doctors of propagation are
because of the navigation of infiltrated web pages or because of the
transmission of files by Bluetooth.
6. Computer security software
- Antivirus: its purpose is to detect malicious software. They have different levels
of protection: resident level and full scan level
- Firewalls: Its purpose is to allow or prohibit communication between the apps
of our team and the network.
- Software antiespia: collect information about our browsing habits
7. List of security applications
- Antivirus: Avast Free, AVG Antivirus, Avira Free, Sophos
- Antivirus y antispyware: Ad-Aware Free Antivirus, Panda Free antivirus, Microsoft security
essentials, lobit Malware, Fighter free
- Antispyware: Malwarebytes anti-malware, Spybot search & destroy, adwCleaner
- Mobile antivirus: Norton Mobile, Avast Mobile,
- Analysis utility: Bluebox security scanner, Kaspersky Security Scan
8. Web security
- Avoid web pages of dubious origin
- Download apps from official sites
- Keep your antivirus program up to date
- Don't follow links
- Do not provide data
- Use passwords
- Avoid messages from strangers
9. Informatic attack
Un hackeo deja a una cárcel sin cámaras de seguridad y con las celdas bloqueadas
Los ataques de descargas no autorizadas: un grave riesgo de filtración de 'malware' y violaciones de seguridad
Seguridad Nacional reacciona por el ataque de ransomware: "no es una fuga de datos"