SlideShare a Scribd company logo
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.
Index
Slide 1: Computer security.
Slide 2: Active and passive security.
Slides 3,4 & 5: Malware and silent threats.
Slide 6 & 7: Computer security software.
Slide 8: Web Security.
Slide 9: News related to cybersecurity or computer attacks.
Computer security
Set of actions, tools and devices. Its objective is to provide a computer system with
integrity, confidentiality and availability.
Protect us from:
● Ourselves
● Accidents and breakdowns
● Intrusive users
● Malicious software and malware
Some active security techniques are:
-Use an adequate password.
-Encrypt your data.
-Use a security I.T. software.
Active and passive security
Some passive security techniques are:
-Use an adequate hardware.
-Back up your data.
Malware and silent threats
Virus: program in the PC without the user’s knowledge.
Worms: infects all nodes on a computer network. Accompany malicious emails.
Spies: programme installed in the computer without user's knowledge.
Trojans: small application that has an input to our computer.
There are two types of Fraud by social
engineering.
-Phishing: Consists of asking for
confidential information persuading people
with money or other stuff.
-Rogue software: It’s a fake antivirus
system that contains a virus.
Malware and silent threats
Some applications alter the way we access
internet. They make us navigate through
fake websites and use telephone billing.
The different applications are:
-Dialer: Makes calls that give economic
benefits to the creator of the modem and
makes the user lose money. This can be
avoid using an ADSL router.
-Pharming: Impersonates the web pages to
get bank data.
-Hijacking: Consists of hijacking any
computer element.
Malware and silent threats
Spam: bulk email marketing
Keylogger: record every keystroke made by a user.
Obtaining sensitive information (passwords, bank data, etc)
New mobile devices: appearance of new mobile devices makes malware grow up.
Computer security hardware
Antivirus: detects malicious software, stops it from running, and removes it.
Compares the scanned files on the computer with their own signatures.
Heuristic systems: analyzes the internal code of the file and determines if it is a virus.
Levels: resident level or complete analisis level.
Firewall: allows or prohibits communication between the applications of our team and
the Network through the protocol TCP/IP.
Antispyware: collects information about our browsing habits and the ability to hijack our
browser home page by hijacking it by sending us to another page.
Computer security hardware
There are different security hardwares. The most recommendable Antivirus are:
For Windows: Avast and McAfee.
For Android: Avast Mobile.
For Apple: Sophos.
Web security
Advices for a safer navigation:
- Avoid suspicious web pages (http).
- Download from an official website.
- Update antivirus.
- Don’t click links from unknowns.
- Don’t put personal information.
- Inform about a product before buying.
- Be careful with .exe files.
- Use strong passwords.
- Read terms and services.
Advices for a safer smartphone:
- Use a strong password.
- Update the system.
- Install security programs.
- Don’t install unknown applications.
- Deactivate Bluetooth if it’s not in use.
- Avoid rooting.
- Avoid talking with unknowns.
News related to cybersecurity or computer
attacks.
● The cyber attacks of 2021 and those that will arrive in 2022
● 79% of Spaniards believe they are tracked by cybercriminals
● The UOC suffers a cyber attack that blocks its virtual campus
● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs
● Ukraine denounces a large-scale cyber attack against the
government's computer system
● Drones, another option that cybercriminals use to steal
information
● The next-gen of cybercriminals starts from an early age
SECURITY I.T.
Made by: Hugo Barrionuevo and Mariana Gil.
SECURITY I.T.

More Related Content

What's hot

Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómezSergioGmezOrtiz
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Jeopardy
JeopardyJeopardy
Jeopardyzed_o07
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internetdpd
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I Kazman21
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 

What's hot (19)

Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
Presentation about security i.t. by antonio espiga and sergio gómez
Presentation about security i.t. by  antonio espiga and sergio gómezPresentation about security i.t. by  antonio espiga and sergio gómez
Presentation about security i.t. by antonio espiga and sergio gómez
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Spyware
SpywareSpyware
Spyware
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Malware
MalwareMalware
Malware
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
INTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDSINTERNET SAFETY FOR KIDS
INTERNET SAFETY FOR KIDS
 
Tutorial 9 - Security on the Internet
Tutorial 9 - Security on the InternetTutorial 9 - Security on the Internet
Tutorial 9 - Security on the Internet
 
Computer and network security
Computer and network securityComputer and network security
Computer and network security
 
Internet security software
Internet security softwareInternet security software
Internet security software
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Tip sheet
 Tip sheet Tip sheet
Tip sheet
 

Similar to Presentation about security i.t.

computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfAnkitShrestha37
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfShantanuDharekar
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2SIMONTHOMAS S
 

Similar to Presentation about security i.t. (20)

Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Seguridad informatica
Seguridad informaticaSeguridad informatica
Seguridad informatica
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
Network security
Network securityNetwork security
Network security
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Cyber security
Cyber securityCyber security
Cyber security
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
cybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdfcybersecurityprt-131017183506-phpapp02.pdf
cybersecurityprt-131017183506-phpapp02.pdf
 
IT6701-Information Management Unit 2
IT6701-Information Management Unit 2IT6701-Information Management Unit 2
IT6701-Information Management Unit 2
 

Recently uploaded

How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?Linksys Velop Login
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shoplaozhuseo02
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfSiskaFitrianingrum
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxGal Baras
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxabhinandnam9997
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxlaozhuseo02
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理aagad
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyDamar Juniarto
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
 

Recently uploaded (12)

How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?How Do I Begin the Linksys Velop Setup Process?
How Do I Begin the Linksys Velop Setup Process?
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Pvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdfPvtaan Social media marketing proposal.pdf
Pvtaan Social media marketing proposal.pdf
 
The AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdfThe AI Powered Organization-Intro to AI-LAN.pdf
The AI Powered Organization-Intro to AI-LAN.pdf
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Article writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptxArticle writing on excessive use of internet.pptx
Article writing on excessive use of internet.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
一比一原版UTS毕业证悉尼科技大学毕业证成绩单如何办理
 
The Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case StudyThe Use of AI in Indonesia Election 2024: A Case Study
The Use of AI in Indonesia Election 2024: A Case Study
 
The Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI StudioThe Best AI Powered Software - Intellivid AI Studio
The Best AI Powered Software - Intellivid AI Studio
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 

Presentation about security i.t.

  • 1. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.
  • 2. Index Slide 1: Computer security. Slide 2: Active and passive security. Slides 3,4 & 5: Malware and silent threats. Slide 6 & 7: Computer security software. Slide 8: Web Security. Slide 9: News related to cybersecurity or computer attacks.
  • 3. Computer security Set of actions, tools and devices. Its objective is to provide a computer system with integrity, confidentiality and availability. Protect us from: ● Ourselves ● Accidents and breakdowns ● Intrusive users ● Malicious software and malware
  • 4. Some active security techniques are: -Use an adequate password. -Encrypt your data. -Use a security I.T. software. Active and passive security Some passive security techniques are: -Use an adequate hardware. -Back up your data.
  • 5. Malware and silent threats Virus: program in the PC without the user’s knowledge. Worms: infects all nodes on a computer network. Accompany malicious emails. Spies: programme installed in the computer without user's knowledge. Trojans: small application that has an input to our computer.
  • 6. There are two types of Fraud by social engineering. -Phishing: Consists of asking for confidential information persuading people with money or other stuff. -Rogue software: It’s a fake antivirus system that contains a virus. Malware and silent threats Some applications alter the way we access internet. They make us navigate through fake websites and use telephone billing. The different applications are: -Dialer: Makes calls that give economic benefits to the creator of the modem and makes the user lose money. This can be avoid using an ADSL router. -Pharming: Impersonates the web pages to get bank data. -Hijacking: Consists of hijacking any computer element.
  • 7. Malware and silent threats Spam: bulk email marketing Keylogger: record every keystroke made by a user. Obtaining sensitive information (passwords, bank data, etc) New mobile devices: appearance of new mobile devices makes malware grow up.
  • 8. Computer security hardware Antivirus: detects malicious software, stops it from running, and removes it. Compares the scanned files on the computer with their own signatures. Heuristic systems: analyzes the internal code of the file and determines if it is a virus. Levels: resident level or complete analisis level. Firewall: allows or prohibits communication between the applications of our team and the Network through the protocol TCP/IP. Antispyware: collects information about our browsing habits and the ability to hijack our browser home page by hijacking it by sending us to another page.
  • 9. Computer security hardware There are different security hardwares. The most recommendable Antivirus are: For Windows: Avast and McAfee. For Android: Avast Mobile. For Apple: Sophos.
  • 10. Web security Advices for a safer navigation: - Avoid suspicious web pages (http). - Download from an official website. - Update antivirus. - Don’t click links from unknowns. - Don’t put personal information. - Inform about a product before buying. - Be careful with .exe files. - Use strong passwords. - Read terms and services. Advices for a safer smartphone: - Use a strong password. - Update the system. - Install security programs. - Don’t install unknown applications. - Deactivate Bluetooth if it’s not in use. - Avoid rooting. - Avoid talking with unknowns.
  • 11. News related to cybersecurity or computer attacks. ● The cyber attacks of 2021 and those that will arrive in 2022 ● 79% of Spaniards believe they are tracked by cybercriminals ● The UOC suffers a cyber attack that blocks its virtual campus ● Theft of more than 34 million dollars in Bitcoin and Ethereum occurs ● Ukraine denounces a large-scale cyber attack against the government's computer system ● Drones, another option that cybercriminals use to steal information ● The next-gen of cybercriminals starts from an early age
  • 12. SECURITY I.T. Made by: Hugo Barrionuevo and Mariana Gil. SECURITY I.T.