SlideShare a Scribd company logo
1 of 10
Protection
How do we protect our valuables? Security alarms in our homes Security bars on our windows Security alarms built into our vehicles
How do we protect our Personal Computers
Personal Firewalls Examine the received packets of information Check  what IP address is sending the information Identify the port which the packet will be transmitted
How do firewalls protect The firewalls block selected ports from entering your PC Tell you when programs from your PC attempt to connect to the internet  Allowing only programs you know are safe to access
Which ports to block Personal Firewalls log which ports have attempted to attack your Personal Computer and then block those ports
What is an attack An intruder that could steal or damage important information Damage your computer Use your computers resources
How does it attack Many ways but the most popular is to plant a infamous “Back Orifice Trojan horse” in your personal computer
Routers  What do routers do to help  Routers for many home networks include a hardware-based personal firewall that protect you from the internet
You hold the key to your protection

More Related Content

What's hot

What's hot (19)

Pure retail training presentation v2
Pure retail training presentation v2Pure retail training presentation v2
Pure retail training presentation v2
 
Pure retail training presentation
Pure retail training presentationPure retail training presentation
Pure retail training presentation
 
VenkaSure Total Security+
VenkaSure Total Security+VenkaSure Total Security+
VenkaSure Total Security+
 
Module5 desktop-laptop-security-b
Module5 desktop-laptop-security-bModule5 desktop-laptop-security-b
Module5 desktop-laptop-security-b
 
online and offline computer security
online and offline computer securityonline and offline computer security
online and offline computer security
 
Alpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossaryAlpha Tech Module7 8 glossary
Alpha Tech Module7 8 glossary
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
Hacking
Hacking Hacking
Hacking
 
Digital security
Digital securityDigital security
Digital security
 
Digital security
Digital securityDigital security
Digital security
 
IT Security for Small Business
IT Security for Small BusinessIT Security for Small Business
IT Security for Small Business
 
Security terms & definitions
Security terms & definitionsSecurity terms & definitions
Security terms & definitions
 
Computer security
Computer securityComputer security
Computer security
 
Public WiFi Hot Spots
Public WiFi Hot SpotsPublic WiFi Hot Spots
Public WiFi Hot Spots
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Internet terms
Internet termsInternet terms
Internet terms
 
Internet Securities Issues
Internet Securities IssuesInternet Securities Issues
Internet Securities Issues
 

Viewers also liked

Utilizando o Wiziq nas Palestras On-Line
Utilizando o Wiziq nas Palestras On-LineUtilizando o Wiziq nas Palestras On-Line
Utilizando o Wiziq nas Palestras On-LineFelipe Goulart
 
Estuary training program content june25
Estuary training program content june25Estuary training program content june25
Estuary training program content june25David Radovanovic
 
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...Dana Gardner
 
Stm2 tc3 tc4 scope of work part 4
Stm2 tc3 tc4 scope of work part 4Stm2 tc3 tc4 scope of work part 4
Stm2 tc3 tc4 scope of work part 4Kosin Tossanaithada
 
Storia della cardio chirurgia vascolare
Storia della cardio chirurgia vascolareStoria della cardio chirurgia vascolare
Storia della cardio chirurgia vascolareSAVIO SCARAMUZZI
 
Glue con2011 Jeff Malek from BigDoor
Glue con2011 Jeff Malek from BigDoorGlue con2011 Jeff Malek from BigDoor
Glue con2011 Jeff Malek from BigDoorCarrie Peters
 
Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...
Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...
Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...Andrea Rossetti
 
Apresentação 3 t08
Apresentação 3 t08Apresentação 3 t08
Apresentação 3 t08MagnesitaRI
 
Thesis Presentation on Energy Efficiency Improvement in Data Centers
Thesis Presentation on Energy Efficiency Improvement in Data CentersThesis Presentation on Energy Efficiency Improvement in Data Centers
Thesis Presentation on Energy Efficiency Improvement in Data CentersMonica Vitali
 

Viewers also liked (16)

Domani...l'aurora!
Domani...l'aurora!Domani...l'aurora!
Domani...l'aurora!
 
intelliGEST
intelliGESTintelliGEST
intelliGEST
 
Utilizando o Wiziq nas Palestras On-Line
Utilizando o Wiziq nas Palestras On-LineUtilizando o Wiziq nas Palestras On-Line
Utilizando o Wiziq nas Palestras On-Line
 
Feedback v2
Feedback v2Feedback v2
Feedback v2
 
Estuary training program content june25
Estuary training program content june25Estuary training program content june25
Estuary training program content june25
 
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
SOA Re-emerges to Provide Needed Support to Enterprise Architecture in Cloud,...
 
Stm2 tc3 tc4 scope of work part 4
Stm2 tc3 tc4 scope of work part 4Stm2 tc3 tc4 scope of work part 4
Stm2 tc3 tc4 scope of work part 4
 
Storia della cardio chirurgia vascolare
Storia della cardio chirurgia vascolareStoria della cardio chirurgia vascolare
Storia della cardio chirurgia vascolare
 
Ccna cap03 mod01
Ccna cap03 mod01Ccna cap03 mod01
Ccna cap03 mod01
 
Stylework2
Stylework2Stylework2
Stylework2
 
Hybridization
HybridizationHybridization
Hybridization
 
Glue con2011 Jeff Malek from BigDoor
Glue con2011 Jeff Malek from BigDoorGlue con2011 Jeff Malek from BigDoor
Glue con2011 Jeff Malek from BigDoor
 
Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...
Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...
Marco tullio giordano, Facebook e arresti domiciliari. il divieto di comunica...
 
Apresentação 3 t08
Apresentação 3 t08Apresentação 3 t08
Apresentação 3 t08
 
Potenzialità della Comunicazione "Social": l'esempio di FA-RETE di Unindustria
Potenzialità della Comunicazione "Social": l'esempio di FA-RETE di UnindustriaPotenzialità della Comunicazione "Social": l'esempio di FA-RETE di Unindustria
Potenzialità della Comunicazione "Social": l'esempio di FA-RETE di Unindustria
 
Thesis Presentation on Energy Efficiency Improvement in Data Centers
Thesis Presentation on Energy Efficiency Improvement in Data CentersThesis Presentation on Energy Efficiency Improvement in Data Centers
Thesis Presentation on Energy Efficiency Improvement in Data Centers
 

Similar to Protection

Similar to Protection (20)

Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Itc chapter # 11
Itc   chapter # 11Itc   chapter # 11
Itc chapter # 11
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
internet security
internet securityinternet security
internet security
 
Internet security
Internet securityInternet security
Internet security
 
Firewall
FirewallFirewall
Firewall
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
Computer security
Computer securityComputer security
Computer security
 
1. Introduction to Cyber Security.pptx
1. Introduction to Cyber Security.pptx1. Introduction to Cyber Security.pptx
1. Introduction to Cyber Security.pptx
 
Network seurity
Network seurityNetwork seurity
Network seurity
 
Internet security
Internet securityInternet security
Internet security
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
NewIinternet security
NewIinternet securityNewIinternet security
NewIinternet security
 
New internet security
New internet securityNew internet security
New internet security
 
COMPUTER SECURITY
COMPUTER SECURITYCOMPUTER SECURITY
COMPUTER SECURITY
 
Network management and security
Network management and securityNetwork management and security
Network management and security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
COB4 Computer Crime
COB4 Computer CrimeCOB4 Computer Crime
COB4 Computer Crime
 
edu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptxedu03firewall,Antivirus software.pptx
edu03firewall,Antivirus software.pptx
 

Recently uploaded

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 

Protection

  • 2. How do we protect our valuables? Security alarms in our homes Security bars on our windows Security alarms built into our vehicles
  • 3. How do we protect our Personal Computers
  • 4. Personal Firewalls Examine the received packets of information Check what IP address is sending the information Identify the port which the packet will be transmitted
  • 5. How do firewalls protect The firewalls block selected ports from entering your PC Tell you when programs from your PC attempt to connect to the internet Allowing only programs you know are safe to access
  • 6. Which ports to block Personal Firewalls log which ports have attempted to attack your Personal Computer and then block those ports
  • 7. What is an attack An intruder that could steal or damage important information Damage your computer Use your computers resources
  • 8. How does it attack Many ways but the most popular is to plant a infamous “Back Orifice Trojan horse” in your personal computer
  • 9. Routers What do routers do to help Routers for many home networks include a hardware-based personal firewall that protect you from the internet
  • 10. You hold the key to your protection

Editor's Notes

  1. We live in a world of information overload and how do we know what to store and what we can let escape like the sand through an hour glass.You only have to remember one thing about what I communicate to you today.
  2. We don’t want to live in a paranoid bubble but more so we don’t want to have to start over from behind the starting line.Hopefully we put a security alarm into our homes before we are broken into and our family treasures are taken from us. We sometimes put bars on our windows to prevent uninvited guests from entering into our homes.We even put security alarms on our vehicles to protect our investments that are moveable.
  3. Anyone who uses high speed connections like cable modems at home can be prone to hacker’s attacking.So how do we protect our personal computers from something we can’t see, feel or hear?????To protect home computers, many people are turning to personal firewalls – software that runs on the computer and protects the computer against internet attacks.
  4. Information between your computer and the internet come through an internet port.When you make an internet connection, many of these connections are opened up, and each has its own number & purpose.Example would be an e-mail software usually uses port 110 on a mail server to get mail and uses port 25 to send mail.Personal firewalls examines these data packets your computer receives.
  5. The firewalls block selected ports from your personal computersThey tell you when programs from your personal computers attempt to connect to the internetThey allow only programs you know are safe to access your computer
  6. Personal Firewalls log which ports have attempted to attack your personal computer and then blocks these ports from transmitting information in the future. The logs of these attempted attacking ports are sent to your (ISP) Internet service provider and they track down the hackers and shut them down.
  7. So what is an attack on our computer and why should you be concerned about it?An attack is an intruder that can steal important information from your computer like you banking information or other personal confidential information.An attack is an intruder that can damage the important information you have saved in your computerAn attack can damage your computer An attacker can get into your computer to use its resources.
  8. How does it attack your computer and get information , damage your computer or even use its resources?The Trojan horse that is planted in your PC can then connect to a hacker of its own, giving this hacker complete control over your computer.
  9. Routers for many home networks include a hardware – based personal firewall that protects you from the internet using a technique called Network Address Translation (NAT). You true IP address is shielded from the evils that lie within the internet – it can’t be seen by anyone or any application outside your home network. It’s invisible and can’t be reached by hackers.Personal Firewalls provide great protection from hackers getting into your personal computer system.
  10. You hold the key to protect your personal information and your privacy.