SlideShare a Scribd company logo
Digital Security
By: ryan tarrie
Basic info
 Digital security involves the security of computers internet account and files
from intrusion by an outside user.
 There is software that can be downloaded to prevent a computer from being
hacked and having their information stolen.
Types of software
Two-Factor authorization
 Many password protected websites offer two-factor authorization or (2fa),
and you should take as much advantage of it as u can.
 Basically what two-factor authorization is after you put in your password for
you computer, it makes you verify your identity, such as what is your favorite
pets name, or what city was your mother or father born.
Ways to be unsafe online
 Downloading not familiar links
 Clicking on ads
 Going to unsecure sites
 Not having security on ur computer
Ways to clean ur computer
 Microsoft essentials cleaner
 You can buy a cleaner
 Buy a new computer
 Send it to an expert
How viruses can effect your computer
 They can access your personal files
 Slow your computer down
 Destroy your computer hard-drive and can potentially ruin your computer to
where it is unusable.
Types of viruses
 Macro viruses
 Memory resident viruses
 Over-right viruses
 Direct action viruses
 Web scripting viruses
Conlusion
 There are many ways for you to be unsafe on the internet, and if you follow
the correct guidelines your computer will stay virus free.

More Related Content

What's hot

Phishing demo
Phishing demoPhishing demo
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Avinash Navin
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Bushra22
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
Jagan Mohan
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
Harsh Tekriwal
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussainaisha747
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
Md. Mehadi Hassan Bappy
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
Devsena Mishra
 
Data breach
Data breachData breach
Data breach
Burhan Ahmed
 
Hacking
HackingHacking
Hacking
sajeena81
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
Quick Heal Technologies Ltd.
 
Netiquette
NetiquetteNetiquette
Netiquette
sajeena81
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
Nikolaos Georgitsopoulos
 
Cyber security
Cyber securityCyber security
Cyber security
RIPPER95
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing

What's hot (20)

Aiman
AimanAiman
Aiman
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Data breach
Data breachData breach
Data breach
 
Hacking
HackingHacking
Hacking
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 

Viewers also liked

How GST works
How GST worksHow GST works
How GST works
Nishant Bhardwaj
 
mechanical unit module
mechanical unit modulemechanical unit module
mechanical unit moduleAkina Chiang
 
Social media gulick
Social media gulickSocial media gulick
Social media gulick
brandongulick8
 
ComAv 2015 Overview Presentation
ComAv 2015 Overview PresentationComAv 2015 Overview Presentation
ComAv 2015 Overview PresentationCraig Garrick, Jr.
 
Flormar 5-6
Flormar 5-6Flormar 5-6
Exc cap5
Exc cap5Exc cap5
Exc cap5cahepa
 
La guerra fria
La guerra friaLa guerra fria
La guerra fria
raquel10313
 
Taller exploracion neurologica
Taller exploracion neurologicaTaller exploracion neurologica
Taller exploracion neurologica
Isabel Sánchez
 
World News - CNNMoney
World News - CNNMoneyWorld News - CNNMoney
World News - CNNMoney
aheadhysteria4067
 
Sistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la saludSistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la saludedomarino
 
Facebook advertising the why and how
Facebook advertising the why and howFacebook advertising the why and how
Facebook advertising the why and howGODigitalMarketing
 
Guaritoprezi
GuaritopreziGuaritoprezi
Guaritoprezi
guarogb
 
gemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantilesgemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantiles
Paula Andree
 
Arte cultura (terminado)
Arte cultura (terminado)Arte cultura (terminado)
Arte cultura (terminado)carlaibacache
 
manuel pena la literatura infantil en chile
 manuel pena  la literatura infantil en chile manuel pena  la literatura infantil en chile
manuel pena la literatura infantil en chile
Paula Andree
 
Pesquisa em Consórcio
Pesquisa em ConsórcioPesquisa em Consórcio
Pesquisa em Consórcio
João Alberto
 
Investigação-ação educacional
Investigação-ação educacionalInvestigação-ação educacional
Investigação-ação educacional
João Alberto
 
Práticas de Análise de Conteúdo
Práticas de Análise de ConteúdoPráticas de Análise de Conteúdo
Práticas de Análise de Conteúdo
João Alberto
 

Viewers also liked (20)

ME-team-plan
ME-team-planME-team-plan
ME-team-plan
 
How GST works
How GST worksHow GST works
How GST works
 
mechanical unit module
mechanical unit modulemechanical unit module
mechanical unit module
 
Social media gulick
Social media gulickSocial media gulick
Social media gulick
 
moding
modingmoding
moding
 
ComAv 2015 Overview Presentation
ComAv 2015 Overview PresentationComAv 2015 Overview Presentation
ComAv 2015 Overview Presentation
 
Flormar 5-6
Flormar 5-6Flormar 5-6
Flormar 5-6
 
Exc cap5
Exc cap5Exc cap5
Exc cap5
 
La guerra fria
La guerra friaLa guerra fria
La guerra fria
 
Taller exploracion neurologica
Taller exploracion neurologicaTaller exploracion neurologica
Taller exploracion neurologica
 
World News - CNNMoney
World News - CNNMoneyWorld News - CNNMoney
World News - CNNMoney
 
Sistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la saludSistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la salud
 
Facebook advertising the why and how
Facebook advertising the why and howFacebook advertising the why and how
Facebook advertising the why and how
 
Guaritoprezi
GuaritopreziGuaritoprezi
Guaritoprezi
 
gemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantilesgemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantiles
 
Arte cultura (terminado)
Arte cultura (terminado)Arte cultura (terminado)
Arte cultura (terminado)
 
manuel pena la literatura infantil en chile
 manuel pena  la literatura infantil en chile manuel pena  la literatura infantil en chile
manuel pena la literatura infantil en chile
 
Pesquisa em Consórcio
Pesquisa em ConsórcioPesquisa em Consórcio
Pesquisa em Consórcio
 
Investigação-ação educacional
Investigação-ação educacionalInvestigação-ação educacional
Investigação-ação educacional
 
Práticas de Análise de Conteúdo
Práticas de Análise de ConteúdoPráticas de Análise de Conteúdo
Práticas de Análise de Conteúdo
 

Similar to Digital security

Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
K. A. M Lutfullah
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
ArindamGhosal6
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Salma Zafar
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
Froilan Cantillo
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
maryrowling
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
aisha747
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
Mirza Ćutuk
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
DigitalLifeAdvisor.com
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
William Mann
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
AFROZULLA KHAN Z
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
DhruvLuthra8
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
ErAdityaSingh1
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
9784
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 

Similar to Digital security (20)

Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 

Digital security

  • 2. Basic info  Digital security involves the security of computers internet account and files from intrusion by an outside user.  There is software that can be downloaded to prevent a computer from being hacked and having their information stolen.
  • 4. Two-Factor authorization  Many password protected websites offer two-factor authorization or (2fa), and you should take as much advantage of it as u can.  Basically what two-factor authorization is after you put in your password for you computer, it makes you verify your identity, such as what is your favorite pets name, or what city was your mother or father born.
  • 5.
  • 6. Ways to be unsafe online  Downloading not familiar links  Clicking on ads  Going to unsecure sites  Not having security on ur computer
  • 7. Ways to clean ur computer  Microsoft essentials cleaner  You can buy a cleaner  Buy a new computer  Send it to an expert
  • 8. How viruses can effect your computer  They can access your personal files  Slow your computer down  Destroy your computer hard-drive and can potentially ruin your computer to where it is unusable.
  • 9. Types of viruses  Macro viruses  Memory resident viruses  Over-right viruses  Direct action viruses  Web scripting viruses
  • 10. Conlusion  There are many ways for you to be unsafe on the internet, and if you follow the correct guidelines your computer will stay virus free.