SlideShare a Scribd company logo
1 of 10
Kam&TyroneProductions
DIGITAL SECURITY
Digital Security
 The electronic precautions to
guarantee safety
 Any computer connected
24/7 to the Internet without
firewall protection is
defenseless. Having a
wireless network without
security is an open field to
hackers. That’s were different
security companies step in.
 Technology protection
 Spyware
 Data Backup
 Firewall
 Technology disaster
protection
Key Words and Example
 Protecting hardware and
network security
 Protecting personal security:
identity theft, phishing, online
stalking
 Protecting school security:
hackers, viruses
 Protecting community
security: terrorist threat
 Internet security involves the protection of a computer's
internet account and files from intrusion by an outside
user
 Some big brands are Symantec (Norton Anti-Virus) and
McAfee they protect the computer from viruses and
provide secure firewalls to protect against spy ware
 Center for Internet Security (CIS) provides resources for
measuring information security status and making rational
security investment decisions .The CIS is proof of the
importance of maintaining adequate internet security.
Computers and Internet
Hackers
0%
100%
200%
300%
400%
500%
600%
Men Women
Hacker Gender
Series 1 Series 2 Series 3
Bad digital security
 When teachers or students fail to maintain software
updates that protect their computers from viruses and
exploitation.
 Students fail to protect their identity when using email,
social networking, or texting.
Good Digital Security
 People take the time to make sure their virus protection
and firewalls are updated and configured to protect their
personal information.
 When teachers and parents talk to students about the
dangers of providing personal info to anyone over the
Social Media.
Digital Security Companies
 Symantec
 McAfee
Digital security

More Related Content

What's hot

IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
Atlantic Training, LLC.
 

What's hot (19)

ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber Law and Security
Cyber Law and SecurityCyber Law and Security
Cyber Law and Security
 
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data SecureSmartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
Smartphone Security Guide: The Easiest Way to Keep Your Phone & Data Secure
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Cyber security certification course
Cyber security certification courseCyber security certification course
Cyber security certification course
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Infosec
InfosecInfosec
Infosec
 
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
Cybersecurity Career Paths | Skills Required in Cybersecurity Career | Learn ...
 
Instructional Security Consultants
Instructional Security ConsultantsInstructional Security Consultants
Instructional Security Consultants
 
Cscu exam-info-and-test-objective
Cscu exam-info-and-test-objectiveCscu exam-info-and-test-objective
Cscu exam-info-and-test-objective
 
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | EdurekaComputer Security | Types of Computer Security | Cybersecurity Course | Edureka
Computer Security | Types of Computer Security | Cybersecurity Course | Edureka
 
Cybersecurity at school - SPANISH TEAM
Cybersecurity at school - SPANISH TEAMCybersecurity at school - SPANISH TEAM
Cybersecurity at school - SPANISH TEAM
 
International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)International Journal of Mobile ad hoc and sensor networks(IJMSN)
International Journal of Mobile ad hoc and sensor networks(IJMSN)
 
Teori 1 pengantar keamanan
Teori 1 pengantar keamananTeori 1 pengantar keamanan
Teori 1 pengantar keamanan
 
EC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU ProgramEC-Council Certified Secure Computer User C|SCU Program
EC-Council Certified Secure Computer User C|SCU Program
 
Smartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkitsSmartphone Ownage: The state of mobile botnets and rootkits
Smartphone Ownage: The state of mobile botnets and rootkits
 

Viewers also liked

SmirnovGarciaFinalProject
SmirnovGarciaFinalProjectSmirnovGarciaFinalProject
SmirnovGarciaFinalProject
Denis Smirnov
 
All word cuttings from PLACEMENT
All word cuttings from PLACEMENTAll word cuttings from PLACEMENT
All word cuttings from PLACEMENT
Megan Neveling
 
In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...
Esthercox
 

Viewers also liked (20)

SmirnovGarciaFinalProject
SmirnovGarciaFinalProjectSmirnovGarciaFinalProject
SmirnovGarciaFinalProject
 
Eyeballing subscriber lists – an email list hygiene trick
Eyeballing subscriber lists – an email list hygiene trickEyeballing subscriber lists – an email list hygiene trick
Eyeballing subscriber lists – an email list hygiene trick
 
Wat te spenderen.
Wat te spenderen.Wat te spenderen.
Wat te spenderen.
 
رعاية أمهات التسمين - هبرد كلاسيك
رعاية أمهات التسمين - هبرد كلاسيك رعاية أمهات التسمين - هبرد كلاسيك
رعاية أمهات التسمين - هبرد كلاسيك
 
amit
amitamit
amit
 
2016-02-10 Agile Talks #12 - Adaptive Planning
2016-02-10 Agile Talks #12 - Adaptive Planning2016-02-10 Agile Talks #12 - Adaptive Planning
2016-02-10 Agile Talks #12 - Adaptive Planning
 
Corporate Presentation 2015
Corporate Presentation 2015Corporate Presentation 2015
Corporate Presentation 2015
 
sistemas
sistemas sistemas
sistemas
 
Queston 5
Queston 5Queston 5
Queston 5
 
تربية دجاج الاحم في دولة بليز الأمريكية
تربية دجاج الاحم في دولة بليز الأمريكيةتربية دجاج الاحم في دولة بليز الأمريكية
تربية دجاج الاحم في دولة بليز الأمريكية
 
Evaluation
EvaluationEvaluation
Evaluation
 
My last vacation
My  last vacationMy  last vacation
My last vacation
 
Organic compounds
Organic compounds  Organic compounds
Organic compounds
 
brochure skin 2013
brochure skin 2013brochure skin 2013
brochure skin 2013
 
Social Media Report
Social Media ReportSocial Media Report
Social Media Report
 
Presentation4
Presentation4Presentation4
Presentation4
 
All word cuttings from PLACEMENT
All word cuttings from PLACEMENTAll word cuttings from PLACEMENT
All word cuttings from PLACEMENT
 
Expression of luxS
Expression of luxSExpression of luxS
Expression of luxS
 
amit
amitamit
amit
 
In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...
 

Similar to Digital security

Similar to Digital security (20)

What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
What is Cyber security.pdf
What is Cyber security.pdfWhat is Cyber security.pdf
What is Cyber security.pdf
 
Cyber security course in India - GICSEH.pdf
Cyber security course in India - GICSEH.pdfCyber security course in India - GICSEH.pdf
Cyber security course in India - GICSEH.pdf
 
cyber security services | MasGlobal Services
cyber security services | MasGlobal Servicescyber security services | MasGlobal Services
cyber security services | MasGlobal Services
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cybersecurity-210715084148.pdf
cybersecurity-210715084148.pdfcybersecurity-210715084148.pdf
cybersecurity-210715084148.pdf
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber security Cyber security
Cyber security
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber safety and cyber security
Cyber safety and cyber securityCyber safety and cyber security
Cyber safety and cyber security
 
Network Security for Employees
Network Security for Employees Network Security for Employees
Network Security for Employees
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

Recently uploaded (20)

Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableNanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Nanded Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
WheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond InsightsWheelTug Short Pitch Deck 2024 | Byond Insights
WheelTug Short Pitch Deck 2024 | Byond Insights
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
Only Cash On Delivery Call Girls In Sikandarpur Gurgaon ❤️8448577510 ⊹Escorts...
 
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
Bangalore Call Girl Just Call♥️ 8084732287 ♥️Top Class Call Girl Service Avai...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book nowKOTA 💋 Call Girl 9827461493 Call Girls in  Escort service book now
KOTA 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableCuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Cuttack Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 MonthsSEO Case Study: How I Increased SEO Traffic & Ranking by 50-60%  in 6 Months
SEO Case Study: How I Increased SEO Traffic & Ranking by 50-60% in 6 Months
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 

Digital security

  • 2. Digital Security  The electronic precautions to guarantee safety  Any computer connected 24/7 to the Internet without firewall protection is defenseless. Having a wireless network without security is an open field to hackers. That’s were different security companies step in.
  • 3.  Technology protection  Spyware  Data Backup  Firewall  Technology disaster protection Key Words and Example  Protecting hardware and network security  Protecting personal security: identity theft, phishing, online stalking  Protecting school security: hackers, viruses  Protecting community security: terrorist threat
  • 4.  Internet security involves the protection of a computer's internet account and files from intrusion by an outside user  Some big brands are Symantec (Norton Anti-Virus) and McAfee they protect the computer from viruses and provide secure firewalls to protect against spy ware  Center for Internet Security (CIS) provides resources for measuring information security status and making rational security investment decisions .The CIS is proof of the importance of maintaining adequate internet security. Computers and Internet
  • 6. Bad digital security  When teachers or students fail to maintain software updates that protect their computers from viruses and exploitation.  Students fail to protect their identity when using email, social networking, or texting.
  • 7. Good Digital Security  People take the time to make sure their virus protection and firewalls are updated and configured to protect their personal information.  When teachers and parents talk to students about the dangers of providing personal info to anyone over the Social Media.
  • 8.
  • 9. Digital Security Companies  Symantec  McAfee