SlideShare una empresa de Scribd logo
1 de 21
A PRESENTATION BY: JESSICA FASHANT, ASHLEY ZIMMERMAN, STEPHANIE ROMANELLO Computer and Internet Security
Topic ,[object Object],[object Object],[object Object]
Elements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet ,[object Object],[object Object],[object Object]
Hackers ,[object Object],[object Object],[object Object],[object Object]
What Hackers Look For ,[object Object],[object Object],[object Object],[object Object],[object Object]
Important Info ,[object Object],[object Object],[object Object],[object Object]
Business Security ,[object Object],[object Object],[object Object]
What is Malware? ,[object Object],[object Object]
Key Loggers ,[object Object],[object Object]
Trojan Horse and Other Viruses ,[object Object],[object Object],[object Object]
Passwords ,[object Object],[object Object]
How to Choose a Spyware Program ,[object Object],[object Object],[object Object],[object Object],[object Object]
How to Choose an Anti-Virus Program ,[object Object],[object Object],[object Object],[object Object],[object Object]
Signs Your Computer May be Infected ,[object Object],[object Object],[object Object],[object Object],[object Object]
Articles ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking Today ,[object Object],[object Object],[object Object],[object Object]
Problems in Privacy and Security of Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Solutions to Social Networking Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Points ,[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
aztechtchr
 

La actualidad más candente (20)

What is malware
What is malwareWhat is malware
What is malware
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Malware
MalwareMalware
Malware
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Computer security and
Computer security andComputer security and
Computer security and
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Information security awareness
Information security awarenessInformation security awareness
Information security awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Information security
Information security Information security
Information security
 
cyber security
cyber securitycyber security
cyber security
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Implementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptxImplementing cybersecurity best practices and new technology ppt (1).pptx
Implementing cybersecurity best practices and new technology ppt (1).pptx
 

Destacado

Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
Pratik Gupta
 
Paper 2 iGCSE Revision Guide
Paper 2 iGCSE Revision GuidePaper 2 iGCSE Revision Guide
Paper 2 iGCSE Revision Guide
BradonEnglish
 

Destacado (14)

IGSE 1 worksheet for Text 1B
IGSE 1 worksheet for Text 1B IGSE 1 worksheet for Text 1B
IGSE 1 worksheet for Text 1B
 
IGCSE Science Double Award Specification
IGCSE Science Double Award SpecificationIGCSE Science Double Award Specification
IGCSE Science Double Award Specification
 
Ict paper1
Ict paper1Ict paper1
Ict paper1
 
Output device revision for IGCSE ICT
Output device revision for IGCSE ICTOutput device revision for IGCSE ICT
Output device revision for IGCSE ICT
 
Chapter 4 computer networks
Chapter 4   computer networksChapter 4   computer networks
Chapter 4 computer networks
 
iGCSE networks
iGCSE networksiGCSE networks
iGCSE networks
 
Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes Cambridge IGCSE ICT Revision Notes
Cambridge IGCSE ICT Revision Notes
 
Welcome book biology new syllabus commitment
Welcome book biology new syllabus commitmentWelcome book biology new syllabus commitment
Welcome book biology new syllabus commitment
 
IGCSE ICT
IGCSE ICTIGCSE ICT
IGCSE ICT
 
Paper 2 iGCSE Revision Guide
Paper 2 iGCSE Revision GuidePaper 2 iGCSE Revision Guide
Paper 2 iGCSE Revision Guide
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
IGCSE Chemistry Revision Notes
IGCSE Chemistry Revision NotesIGCSE Chemistry Revision Notes
IGCSE Chemistry Revision Notes
 
Useful vocabulary for the IGCSE examination
Useful vocabulary for the IGCSE examinationUseful vocabulary for the IGCSE examination
Useful vocabulary for the IGCSE examination
 
Chemistry Revision Notes - IGCSE
Chemistry Revision Notes - IGCSEChemistry Revision Notes - IGCSE
Chemistry Revision Notes - IGCSE
 

Similar a Computer And Internet Security

Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 

Similar a Computer And Internet Security (20)

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Hamza
HamzaHamza
Hamza
 
Emp tech las-week-2
Emp tech las-week-2Emp tech las-week-2
Emp tech las-week-2
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
100812 internet security2.0
100812 internet security2.0100812 internet security2.0
100812 internet security2.0
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Users guide
Users guideUsers guide
Users guide
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security
SecuritySecurity
Security
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Computer And Internet Security

  • 1. A PRESENTATION BY: JESSICA FASHANT, ASHLEY ZIMMERMAN, STEPHANIE ROMANELLO Computer and Internet Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.