SlideShare a Scribd company logo
1 of 13
Stop in the name of Norton
Adam Jackson, Stuart Kiely, Luke Newcomer, Joe Lichty
5. The Importance of Computer and
Internet Security (BCGA)
• Why?
– Technology is evolving every day and more people
are using it for more important things in their
life's.
– We feel that without the knowledge of security,
potentially it could be a disaster to your life. E.g.
credit card details, Social Security, address etc.
OvErViEw
• Internet Crimes
• Internet security for your own personal
security
• How viruses come about
• Preventions of Internet crime and viruses
Internet Crimes
• FRAUD - refers to the use of internet services to present
fraudulent solicitations to prospective victims, to conduct
fraudulent transactions, or to transmit the proceeds of fraud
to financial institutions or to others connected with the
scheme.
• HACKING – many different forms but most common is
entering a network which is intended to be private or
changing the content of another person’s web site.
(Adebanjo)
Crimes Cont.
• SCAMS -A typical Internet scam is to put up a bogus Web site
which is just a front for criminal activity. Only slightly more
sophisticated is the ‘get rich quick’ site. This offers grants or
payments in return for credit card or bank account details.
• CYBERSTALKING – Cyber stalking is the use of the Internet or
other electronic means to stalk or harass an individual, a
group of individuals, or an organization.
(Adebanjo)
What is a computer virus and how
do you get one?
• A computer virus is a computer program that can copy itself
and infect a computer.
HOW YOU GET A COMPUTER VIRUS
• One of the most frequent ways of acquiring a computer virus
is by booting from an infected diskette
• Opening files that are shared
• Downloading off the internet
• Attachments in emails
PREVENTIONS OF INTERNET
VIRUSES
• Always be cautious about opening attachments you receive in an email.
Especially if the mail comes from someone you do not know.
• When you need to distribute a Microsoft Word file to someone, send the
RTF (Rich Text Format) file instead. By doing this, you can ensure that you
won't be sending an infected file.
• Change your system's CMOS Setup configuration to prevent it from
booting from the diskette drive.
• Be cautious about the information you provide on the internet
• Beware of hackers.
• Download music from secure online programs such as iTunes.
(Computer virus information)
Internet Security for your own
personal use
Online Banking
Credit Card Information
Social Security
Internet Security for your own
personal use
• Keeping personal information safe
• In 2009 over 222 million protected records
were exposed
• Identity theft is when personal information is
stolen through the Internet
– Credit Card information
– Social Security number
– Access to online banking
(“Investigating digital finger prints”)
(Knight)
Norton (Anti-virus)
(“Kimbo slice vs”)
Conclusion
• We feel that security for computers is getting
more and more needed due to the
development of the internet and accessibility
of hacking.
• It’s important to be aware of what you put on
your computer and who has access to view it.
References
• About identity theft. (n.d.). Retrieved from
http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.htm
• Adebanjo, V. (n.d.). Crime on the internet. Retrieved from
http://rogerdarlington.me.uk/crimeonthenet.htm
• Computer virus information. (n.d.). Retrieved from
http://www.ontrackdatarecovery.com/computer-virus-information
• Kimbo slice vs caterpillar: security software - ufc fights | norton. (n.d.). Retrieved from
http://www.youtube.com/watch?v=VRnPbSKUMEs
• Knight, E.. (2010). Investigating digital fingerprints: advanced log analysis. Network
Security, 2010(10), 17-20. Retrieved November 29, 2010, from ABI/INFORM Global.
(Document ID: 2173222451).

More Related Content

What's hot

Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Nigel D'souza
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide showBeckusq
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationRubal Sagwal
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspaceoudesign
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationJacqueline Fick
 
Digital law
Digital lawDigital law
Digital lawzrh48
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan projectSyed Bokhari
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Abzetdin Adamov
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORDharmik Navadiya
 
Name parul
Name parulName parul
Name parulParul231
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security Arah Louise
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 

What's hot (19)

Cyber crime (do's&dont's)
Cyber crime (do's&dont's)Cyber crime (do's&dont's)
Cyber crime (do's&dont's)
 
Cyberspace slide show
Cyberspace   slide showCyberspace   slide show
Cyberspace slide show
 
Cyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space OperationCyber Space Operation- Offensive Cyber Space Operation
Cyber Space Operation- Offensive Cyber Space Operation
 
Computer security
Computer securityComputer security
Computer security
 
Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?Mikial Singh Nijjar | Where Is Information Technology Headed?
Mikial Singh Nijjar | Where Is Information Technology Headed?
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CST 20363 Session 6 Cyberspace
CST 20363 Session 6 CyberspaceCST 20363 Session 6 Cyberspace
CST 20363 Session 6 Cyberspace
 
Understanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisationUnderstanding and preventing cyber crime and its impact on your organisation
Understanding and preventing cyber crime and its impact on your organisation
 
Digital law
Digital lawDigital law
Digital law
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime faizan project
Cyber crime faizan projectCyber crime faizan project
Cyber crime faizan project
 
Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....Steps and Tips to Protect Yourself and your Private Information while Online....
Steps and Tips to Protect Yourself and your Private Information while Online....
 
CYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIORCYBERSPACE & CRIMINAL BEHAVIOR
CYBERSPACE & CRIMINAL BEHAVIOR
 
Name parul
Name parulName parul
Name parul
 
Online Safety and Security
Online Safety and Security Online Safety and Security
Online Safety and Security
 
C3 and digital citizenship
C3 and digital citizenshipC3 and digital citizenship
C3 and digital citizenship
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Viewers also liked

P4 Cl Unit12 Cihui (E Learning)
P4 Cl Unit12 Cihui (E Learning)P4 Cl Unit12 Cihui (E Learning)
P4 Cl Unit12 Cihui (E Learning)xnpsp4
 
Konstisi Yang Pernah Berlaku di Indonesia
Konstisi Yang Pernah Berlaku di IndonesiaKonstisi Yang Pernah Berlaku di Indonesia
Konstisi Yang Pernah Berlaku di Indonesiaomcivics
 
Lesson1 skin hairsweat
Lesson1 skin hairsweatLesson1 skin hairsweat
Lesson1 skin hairsweatwschukraft
 
Cours 11 05_07_mak_maclassecopte_free_fr
Cours 11 05_07_mak_maclassecopte_free_frCours 11 05_07_mak_maclassecopte_free_fr
Cours 11 05_07_mak_maclassecopte_free_frHermione220589
 
ACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICA
ACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICAACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICA
ACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICAInstitut Català de la Salut
 
Aborigines and settlers in port phillip
Aborigines and settlers in port phillipAborigines and settlers in port phillip
Aborigines and settlers in port phillipestherholt
 
Olivene Pearl Barnett 6
Olivene Pearl Barnett 6Olivene Pearl Barnett 6
Olivene Pearl Barnett 6guest4d0e64
 
Uso básico de internet 2003
Uso básico de internet 2003Uso básico de internet 2003
Uso básico de internet 2003Beatriz Martínez
 
Class thursday 3.26.15 a
Class thursday 3.26.15 aClass thursday 3.26.15 a
Class thursday 3.26.15 aAllan Jackson
 
Presentacion de las funciones
Presentacion de las funcionesPresentacion de las funciones
Presentacion de las funcionesRichard Quivera
 
Royer mendoza becerra
Royer mendoza becerraRoyer mendoza becerra
Royer mendoza becerra75611564
 

Viewers also liked (20)

Beni Culturali 1.3 Web 2.0
Beni Culturali 1.3  Web 2.0Beni Culturali 1.3  Web 2.0
Beni Culturali 1.3 Web 2.0
 
P4 Cl Unit12 Cihui (E Learning)
P4 Cl Unit12 Cihui (E Learning)P4 Cl Unit12 Cihui (E Learning)
P4 Cl Unit12 Cihui (E Learning)
 
Konstisi Yang Pernah Berlaku di Indonesia
Konstisi Yang Pernah Berlaku di IndonesiaKonstisi Yang Pernah Berlaku di Indonesia
Konstisi Yang Pernah Berlaku di Indonesia
 
Lesson1 skin hairsweat
Lesson1 skin hairsweatLesson1 skin hairsweat
Lesson1 skin hairsweat
 
Cours 11 05_07_mak_maclassecopte_free_fr
Cours 11 05_07_mak_maclassecopte_free_frCours 11 05_07_mak_maclassecopte_free_fr
Cours 11 05_07_mak_maclassecopte_free_fr
 
Adss cable 35 kv (12,48,96 cores )
Adss cable 35 kv (12,48,96 cores )Adss cable 35 kv (12,48,96 cores )
Adss cable 35 kv (12,48,96 cores )
 
Mgd09 lab01
Mgd09 lab01Mgd09 lab01
Mgd09 lab01
 
ACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICA
ACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICAACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICA
ACTUALITZACIÓ EN TERAPÈUTICA FARMACOLÒGICA I PRÀCTICA CLÍNICA
 
Aborigines and settlers in port phillip
Aborigines and settlers in port phillipAborigines and settlers in port phillip
Aborigines and settlers in port phillip
 
Olivene Pearl Barnett 6
Olivene Pearl Barnett 6Olivene Pearl Barnett 6
Olivene Pearl Barnett 6
 
Uso básico de internet 2003
Uso básico de internet 2003Uso básico de internet 2003
Uso básico de internet 2003
 
Programa curs MEDICINA BASADA EN L'EVIDÈNCIA
Programa curs MEDICINA BASADA EN L'EVIDÈNCIAPrograma curs MEDICINA BASADA EN L'EVIDÈNCIA
Programa curs MEDICINA BASADA EN L'EVIDÈNCIA
 
Hurricanes
HurricanesHurricanes
Hurricanes
 
Twizel fiona's1
Twizel fiona's1Twizel fiona's1
Twizel fiona's1
 
Class thursday 3.26.15 a
Class thursday 3.26.15 aClass thursday 3.26.15 a
Class thursday 3.26.15 a
 
Session 1
Session 1Session 1
Session 1
 
Presentacion de las funciones
Presentacion de las funcionesPresentacion de las funciones
Presentacion de las funciones
 
Erialakompa failid
Erialakompa failidErialakompa failid
Erialakompa failid
 
Arantzazu
ArantzazuArantzazu
Arantzazu
 
Royer mendoza becerra
Royer mendoza becerraRoyer mendoza becerra
Royer mendoza becerra
 

Similar to Stop in the name of norton

An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsSophiaJohnson39
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and EthicsMohsin Riaz
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptxjondon17
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentationJamesDempsey1
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptxssuser84f16f
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online Nader Alkeinay
 

Similar to Stop in the name of norton (20)

An Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogsAn Introductory Guide To Internet Security - TechDogs
An Introductory Guide To Internet Security - TechDogs
 
Cyber_Crime_Security.pptx
Cyber_Crime_Security.pptxCyber_Crime_Security.pptx
Cyber_Crime_Security.pptx
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Computer Security and Ethics
Computer Security and EthicsComputer Security and Ethics
Computer Security and Ethics
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Is6120 data security presentation
Is6120 data security presentationIs6120 data security presentation
Is6120 data security presentation
 
3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx3Nov Challanges to Inernal Security.pptx
3Nov Challanges to Inernal Security.pptx
 
Online Security and How to Make Money Online
Online Security and How to Make Money Online Online Security and How to Make Money Online
Online Security and How to Make Money Online
 

Recently uploaded

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Stop in the name of norton

  • 1. Stop in the name of Norton Adam Jackson, Stuart Kiely, Luke Newcomer, Joe Lichty
  • 2. 5. The Importance of Computer and Internet Security (BCGA) • Why? – Technology is evolving every day and more people are using it for more important things in their life's. – We feel that without the knowledge of security, potentially it could be a disaster to your life. E.g. credit card details, Social Security, address etc.
  • 3. OvErViEw • Internet Crimes • Internet security for your own personal security • How viruses come about • Preventions of Internet crime and viruses
  • 4. Internet Crimes • FRAUD - refers to the use of internet services to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme. • HACKING – many different forms but most common is entering a network which is intended to be private or changing the content of another person’s web site. (Adebanjo)
  • 5. Crimes Cont. • SCAMS -A typical Internet scam is to put up a bogus Web site which is just a front for criminal activity. Only slightly more sophisticated is the ‘get rich quick’ site. This offers grants or payments in return for credit card or bank account details. • CYBERSTALKING – Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. (Adebanjo)
  • 6. What is a computer virus and how do you get one? • A computer virus is a computer program that can copy itself and infect a computer. HOW YOU GET A COMPUTER VIRUS • One of the most frequent ways of acquiring a computer virus is by booting from an infected diskette • Opening files that are shared • Downloading off the internet • Attachments in emails
  • 7. PREVENTIONS OF INTERNET VIRUSES • Always be cautious about opening attachments you receive in an email. Especially if the mail comes from someone you do not know. • When you need to distribute a Microsoft Word file to someone, send the RTF (Rich Text Format) file instead. By doing this, you can ensure that you won't be sending an infected file. • Change your system's CMOS Setup configuration to prevent it from booting from the diskette drive. • Be cautious about the information you provide on the internet • Beware of hackers. • Download music from secure online programs such as iTunes. (Computer virus information)
  • 8. Internet Security for your own personal use Online Banking Credit Card Information Social Security
  • 9. Internet Security for your own personal use • Keeping personal information safe • In 2009 over 222 million protected records were exposed • Identity theft is when personal information is stolen through the Internet – Credit Card information – Social Security number – Access to online banking (“Investigating digital finger prints”) (Knight)
  • 11. Conclusion • We feel that security for computers is getting more and more needed due to the development of the internet and accessibility of hacking. • It’s important to be aware of what you put on your computer and who has access to view it.
  • 12.
  • 13. References • About identity theft. (n.d.). Retrieved from http://www.ftc.gov/bcp/edu/microsites/idtheft//consumers/about-identity-theft.htm • Adebanjo, V. (n.d.). Crime on the internet. Retrieved from http://rogerdarlington.me.uk/crimeonthenet.htm • Computer virus information. (n.d.). Retrieved from http://www.ontrackdatarecovery.com/computer-virus-information • Kimbo slice vs caterpillar: security software - ufc fights | norton. (n.d.). Retrieved from http://www.youtube.com/watch?v=VRnPbSKUMEs • Knight, E.. (2010). Investigating digital fingerprints: advanced log analysis. Network Security, 2010(10), 17-20. Retrieved November 29, 2010, from ABI/INFORM Global. (Document ID: 2173222451).