SlideShare una empresa de Scribd logo
1 de 21
A PRESENTATION BY: JESSICA FASHANT, ASHLEY ZIMMERMAN, STEPHANIE ROMANELLO Computer and Internet Security
Topic ,[object Object],[object Object],[object Object]
Elements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet ,[object Object],[object Object],[object Object]
Hackers ,[object Object],[object Object],[object Object],[object Object]
What Hackers Look For ,[object Object],[object Object],[object Object],[object Object],[object Object]
Important Info ,[object Object],[object Object],[object Object],[object Object]
Business Security ,[object Object],[object Object],[object Object]
What is Malware? ,[object Object],[object Object]
Key Loggers ,[object Object],[object Object]
Trojan Horse and Other Viruses ,[object Object],[object Object],[object Object]
Passwords ,[object Object],[object Object]
How to Choose a Spyware Program ,[object Object],[object Object],[object Object],[object Object],[object Object]
How to Choose an Anti-Virus Program ,[object Object],[object Object],[object Object],[object Object],[object Object]
Signs Your Computer May be Infected ,[object Object],[object Object],[object Object],[object Object],[object Object]
Articles ,[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking Today ,[object Object],[object Object],[object Object],[object Object]
Problems in Privacy and Security of Social Networking ,[object Object],[object Object],[object Object],[object Object],[object Object]
Solutions to Social Networking Issues ,[object Object],[object Object],[object Object],[object Object],[object Object]
Key Points ,[object Object],[object Object],[object Object],[object Object]
References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Information Security for the Jobseeker
Information Security for the JobseekerInformation Security for the Jobseeker
Information Security for the Jobseeker
Allison Peirce
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 

La actualidad más candente (20)

Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & MoreTechnology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
 
Danger on Your Desktop
Danger on Your DesktopDanger on Your Desktop
Danger on Your Desktop
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
 
Ten Important Rules
Ten Important RulesTen Important Rules
Ten Important Rules
 
C 7
C 7C 7
C 7
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Security At Home
Security At HomeSecurity At Home
Security At Home
 
Empowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and EtiquetteEmpowerment Technologies - Online Safety, Ethics and Etiquette
Empowerment Technologies - Online Safety, Ethics and Etiquette
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Information Security for the Jobseeker
Information Security for the JobseekerInformation Security for the Jobseeker
Information Security for the Jobseeker
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Spyware
SpywareSpyware
Spyware
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 

Similar a Computer And Internet Security

Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
thowell
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
Hem Pokhrel
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
leahg118
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 

Similar a Computer And Internet Security (20)

Protect Yourself From Internet Pests
Protect Yourself From Internet PestsProtect Yourself From Internet Pests
Protect Yourself From Internet Pests
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Hamza
HamzaHamza
Hamza
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Users guide
Users guideUsers guide
Users guide
 
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptxCYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
CYBER SECURITY AND CYBER CRIME COMPLETE GUIDE.pLptx
 
Year 7 - Week 5 esafety
Year 7 - Week 5   esafetyYear 7 - Week 5   esafety
Year 7 - Week 5 esafety
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security
SecuritySecurity
Security
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 

Computer And Internet Security

  • 1. A PRESENTATION BY: JESSICA FASHANT, ASHLEY ZIMMERMAN, STEPHANIE ROMANELLO Computer and Internet Security
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.