SlideShare una empresa de Scribd logo
1 de 12
Nicole Villavicencio and Steffi Medina
Why is security necessary?
Symptoms of an attacked computer
Malware:
Viruses
Worms
Keyloggers
Spyware
Hacker
Crackers
Pharming
Phishing
Antivirus and Proxy
Prevention first
Webgraphy
Why is security necessary?
Protect our personal
information
Protect our computer
form malicious softwares
Symptoms of an
attacked
computer
I. The computer takes longer
time than usual to boot
II. The system displays
strange colors and
unrequested files come up
III. Computer occasionally
freezes
IV. When on the internet,
browser becomes very slow
V. When vital and confidential
files and programs are no
longer accessible
Viruses Worms and Keyloggers
SPYWARE (Spy software):
Steal our data
Spy our movements
through the network.
HACKER
A hacker is someone who
illegally accesses a
private computer network.
Pharming is a cyber
attack intended to
redirect a website's
traffic to another, bogus
site.
PHARMING
A cracker is a person who
breaks into or otherwise
violates the system integrity
of remote machines, with
malicious intent
CRACKER
Phishing is the theft of
personal and / or
financial user, through
forging a trusted entity
Antivirus and proxy
Antivirus
Proxy
PREVENTION FIRST
(FROM ARTICLES 1 AND 2)
I. Installing and running anti-virus software.
II. Download security patches
III. Restrict access to suspicious websites
IV. Be wary of opening any email attachment.
V. Choose secure passwords.
VI. Keep your passwords secure
VII. Use a pop-up blocker
VIII. Beware of phishing and spam
IX. Don't leave your computer operating idly for
any length of time
X. Be careful when loading external media.
WEBGRAPHY
http://www.whatismyip.com/what-is-a-proxy Author: unknown, 8, April 2014
http://www.webroot.com. Author:Linda Criddle. 8 April 2014
http://www.infospyware.com Author: Marcelo Rivero, 22 April 2014
http://www.infospyware.com/articulos/que-son-los-spywares. Author: Marcelo
Rivero, 22 April 2014
 http://en.wikipedia.org/wiki/Pharming. Author: Unknown. 22 April 2014
http://infotechnology.hubpages.com/hub Author: Salvatore Vuono 24 April
2014
http://www.wisegeek.org/what-is-a-hacker.htm . Author: Unknown. 25 April
2014
https://answers.yahoo.com/question/index?qid=20060912204431AA5xm4f.
Author: Dan M. 25 April 2014.
http://kb.eset.com/esetkb/index?page=content&id=SOLN130
Author:Unknown 27 April 2014
http://anti-virus-software-review.toptenreviews.com Author:Charles R. Hooper
27 April 2014
Hope you have liked it

Más contenido relacionado

La actualidad más candente

Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
Nithilan1
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
Elizabeth Hall
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
Souman Guha
 
Possible security issues with data
Possible security issues with dataPossible security issues with data
Possible security issues with data
Colonel_Black
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
webhostingguy
 

La actualidad más candente (20)

Class 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crimeClass 11 ca chapter 17 computer ethics and cyber crime
Class 11 ca chapter 17 computer ethics and cyber crime
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
High Tech (Cyber) Crimes
High Tech (Cyber) CrimesHigh Tech (Cyber) Crimes
High Tech (Cyber) Crimes
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
S01.L06 - Internet Security
S01.L06 - Internet SecurityS01.L06 - Internet Security
S01.L06 - Internet Security
 
Introduction to Web Server Security
Introduction to Web Server SecurityIntroduction to Web Server Security
Introduction to Web Server Security
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Top 10 common hacking techniques
Top 10 common hacking techniquesTop 10 common hacking techniques
Top 10 common hacking techniques
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Possible security issues with data
Possible security issues with dataPossible security issues with data
Possible security issues with data
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Web Server Security Guidelines
Web Server Security GuidelinesWeb Server Security Guidelines
Web Server Security Guidelines
 
Web security
Web securityWeb security
Web security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
My presentation
My presentationMy presentation
My presentation
 

Destacado

introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
Mario Reascos
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 

Destacado (17)

Computer virus
Computer virusComputer virus
Computer virus
 
Virus
VirusVirus
Virus
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
11 virus vs. antivirus
11 virus vs. antivirus11 virus vs. antivirus
11 virus vs. antivirus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Societal Impact Of IT
Societal Impact Of IT Societal Impact Of IT
Societal Impact Of IT
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Viruses, Worms And Trojan Horses
Viruses, Worms And Trojan HorsesViruses, Worms And Trojan Horses
Viruses, Worms And Trojan Horses
 
Virus worm trojan
Virus worm trojanVirus worm trojan
Virus worm trojan
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
The Power of Women
The Power of WomenThe Power of Women
The Power of Women
 
How to Use Crawlboard
How to Use CrawlboardHow to Use Crawlboard
How to Use Crawlboard
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Designing Teams for Emerging Challenges
Designing Teams for Emerging ChallengesDesigning Teams for Emerging Challenges
Designing Teams for Emerging Challenges
 

Similar a Internet Security IT

Internet security
Internet securityInternet security
Internet security
at1211
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
hazirma
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
TechGenie
 

Similar a Internet Security IT (20)

Internet security
Internet securityInternet security
Internet security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx2_2 DangersComputerCrime.pptx
2_2 DangersComputerCrime.pptx
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
NS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdfNS UNIT 3 COMBINED.pdf
NS UNIT 3 COMBINED.pdf
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Untitled presentation.pptx
Untitled presentation.pptxUntitled presentation.pptx
Untitled presentation.pptx
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
CS 1.ppt
CS 1.pptCS 1.ppt
CS 1.ppt
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Internet Security IT

  • 1. Nicole Villavicencio and Steffi Medina
  • 2. Why is security necessary? Symptoms of an attacked computer Malware: Viruses Worms Keyloggers Spyware Hacker Crackers Pharming Phishing Antivirus and Proxy Prevention first Webgraphy
  • 3. Why is security necessary? Protect our personal information Protect our computer form malicious softwares
  • 4. Symptoms of an attacked computer I. The computer takes longer time than usual to boot II. The system displays strange colors and unrequested files come up III. Computer occasionally freezes IV. When on the internet, browser becomes very slow V. When vital and confidential files and programs are no longer accessible
  • 5. Viruses Worms and Keyloggers
  • 6. SPYWARE (Spy software): Steal our data Spy our movements through the network.
  • 7. HACKER A hacker is someone who illegally accesses a private computer network. Pharming is a cyber attack intended to redirect a website's traffic to another, bogus site. PHARMING A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent CRACKER
  • 8. Phishing is the theft of personal and / or financial user, through forging a trusted entity
  • 10. PREVENTION FIRST (FROM ARTICLES 1 AND 2) I. Installing and running anti-virus software. II. Download security patches III. Restrict access to suspicious websites IV. Be wary of opening any email attachment. V. Choose secure passwords. VI. Keep your passwords secure VII. Use a pop-up blocker VIII. Beware of phishing and spam IX. Don't leave your computer operating idly for any length of time X. Be careful when loading external media.
  • 11. WEBGRAPHY http://www.whatismyip.com/what-is-a-proxy Author: unknown, 8, April 2014 http://www.webroot.com. Author:Linda Criddle. 8 April 2014 http://www.infospyware.com Author: Marcelo Rivero, 22 April 2014 http://www.infospyware.com/articulos/que-son-los-spywares. Author: Marcelo Rivero, 22 April 2014  http://en.wikipedia.org/wiki/Pharming. Author: Unknown. 22 April 2014 http://infotechnology.hubpages.com/hub Author: Salvatore Vuono 24 April 2014 http://www.wisegeek.org/what-is-a-hacker.htm . Author: Unknown. 25 April 2014 https://answers.yahoo.com/question/index?qid=20060912204431AA5xm4f. Author: Dan M. 25 April 2014. http://kb.eset.com/esetkb/index?page=content&id=SOLN130 Author:Unknown 27 April 2014 http://anti-virus-software-review.toptenreviews.com Author:Charles R. Hooper 27 April 2014
  • 12. Hope you have liked it