Internet security


Published on

Published in: Education, Technology
1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Internet security

  1. 1. English for Computing<br /><ul><li>TrầnThị Mai
  2. 2. NguyễnThịHồngNgọc
  3. 3. DươngThịThanhThúy
  4. 4. NguyễnThịAnhThư
  5. 5. VũThịTrâm</li></li></ul><li>INTERNET SECURITY<br />
  6. 6. 1. Security on the Web<br />
  7. 7. Security is crucial when you send confidential information online<br />
  8. 8. Buying a book<br />
  9. 9. Set all security alerts to high on your web browser<br />
  10. 10. Web browser:software application for retrieving, presenting, and traversing information resources on the WWW<br />
  11. 11. Lock disable or delete cookies<br />
  12. 12. Acookie (web cookie, browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser<br />
  13. 13. Digital certificate  files that are like digital identification cards to identify users & servers<br />
  14. 14. Secure Sockets Layer (SSL)<br />is a commonly-used protocol for managing the security of a message transmission on the Internet<br />
  15. 15. 2. Email privacy<br />
  16. 16. Email travels across the Net<br />Can be copied temporarily onto many computers<br />Can be read by others<br />
  17. 17.  Encode it with some form of encryption<br />
  18. 18. Pretty Good Privacy (PGP)<br />A freeware program written by Phil Zimmerman<br />
  19. 19.
  20. 20. 3. Network security<br />
  21. 21. Passwordsfor access control<br />
  22. 22. Firewalls <br />A system designed to prevent unauthorized access to or from a private network<br />
  23. 23. Several types of firewall techniques:<br />Packet filter<br />Application gateway<br />Circuit-level gateway<br />Proxy server<br />
  24. 24. Encryption and decryption systems<br />
  25. 25. 4. Malware protection<br />
  26. 26. <ul><li>Malware (malicious software) : programs designed to infiltrate or damage our computer
  27. 27. For example: viruses</li></ul>worms<br />Trojans<br />spyware<br />adware<br />
  28. 28. Viruses <br /><ul><li> A program or piece of code that is loaded onto your computer via a disc drive or the Internet without your knowledge
  29. 29. Attachesitself to a program or file enabling it to spread from one computer to another</li></li></ul><li><ul><li> Can copy itself
  30. 30. Cannot infect your computer unless you run or open the malicious program</li></li></ul><li>Worms<br /><ul><li> Similar to a virus by design and is considered to be a sub-class of a virus.
  31. 31. Has the capability to spread from computer to computer without any human action</li></li></ul><li><ul><li> Has the capability to replicateitself and use memory
  32. 32. Cannot attach itself to other programs</li></li></ul><li>Trojans horse<br /><ul><li> A destructive program that masquerades as a benign application
  33. 33. Do not replicate themselves </li></li></ul><li>One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. <br />
  34. 34. Spyware <br />Atype of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge<br />
  35. 35. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity<br />
  36. 36. Adware<br />Software application in which advertising banners are displayed while the program is running<br />
  37. 37. SOME ANTI- VIRUS SOFTWARE:<br />BkavPro Internet Securityis antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây)<br />
  38. 38. Kaspersky Internet Security 2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information<br />
  39. 39. 5. Types of computer crimes<br />
  40. 40. Computer crimes: criminal activities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data<br />
  41. 41. Some types:<br /><ul><li> Hacking:The activity of breaking into a computer system to gain an unauthorized access
  42. 42. Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source</li></li></ul><li><ul><li> Computer Viruses:Computer viruses are computer programs that can replicate themselves and harm the computer systems on a network without the knowledge of the system users
  43. 43. Cyberstalking:The use of communication technology, mainly the Internet, to torture other individuals is known as cyberstalking</li></li></ul><li><ul><li> Identity Theft:This is one of the most serious frauds as it involves stealing money and obtaining other benefits through the use of a false identity</li></li></ul><li>PUZZLE<br />Users have to enter a _____ to gain access to a network.<br />A _____ Protects a company intranet from outside attacks.<br />A ____ is a person who uses computer skills to enter computers and network illegally.<br />_____ can infect your files and corrupt your hard drive<br />You can download ____ from the net; this type of software is available free of charge but protected by copyright.<br />Encoding data so that unauthorized users can’t read it is know as_____.<br />This company uses _____ techniques to decode secret data.<br />Most____ is designed to obtain personal information without the user’s permission.<br />F<br />R<br />E<br />E<br />W<br />A<br />R<br />E<br />N<br />C<br />R<br />Y<br />P<br />T<br />I<br />O<br />E<br />C<br />R<br />Y<br />P<br />T<br />I<br />O<br />F<br />I<br />R<br />E<br />W<br />A<br />L<br />L<br />P<br />A<br />S<br />S<br />W<br />O<br />R<br />D<br />1<br />1<br />2<br />2<br />H<br />A<br />C<br />K<br />E<br />R<br />V<br />I<br />R<br />U<br />S<br />E<br />3<br />3<br />S<br />4<br />4<br />5<br />5<br />E<br />N<br />D<br />N<br />6<br />6<br />7<br />7<br />S<br />P<br />Y<br />W<br />A<br />R<br />E<br />8<br />8<br />
  44. 44. THANKS FOR LISTENING<br />
  45. 45. THANKS FOR LISTENING<br />