2. Why is security necessary?
Symptoms of an attacked computer
Malware:
Viruses
Worms
Keyloggers
Spyware
Hacker
Crackers
Pharming
Phishing
Antivirus and Proxy
Prevention first
Webgraphy
3. Why is security necessary?
Protect our personal
information
Protect our computer
form malicious softwares
4. Symptoms of an
attacked
computer
I. The computer takes longer
time than usual to boot
II. The system displays
strange colors and
unrequested files come up
III. Computer occasionally
freezes
IV. When on the internet,
browser becomes very slow
V. When vital and confidential
files and programs are no
longer accessible
7. HACKER
A hacker is someone who
illegally accesses a
private computer network.
Pharming is a cyber
attack intended to
redirect a website's
traffic to another, bogus
site.
PHARMING
A cracker is a person who
breaks into or otherwise
violates the system integrity
of remote machines, with
malicious intent
CRACKER
8. Phishing is the theft of
personal and / or
financial user, through
forging a trusted entity
10. PREVENTION FIRST
(FROM ARTICLES 1 AND 2)
I. Installing and running anti-virus software.
II. Download security patches
III. Restrict access to suspicious websites
IV. Be wary of opening any email attachment.
V. Choose secure passwords.
VI. Keep your passwords secure
VII. Use a pop-up blocker
VIII. Beware of phishing and spam
IX. Don't leave your computer operating idly for
any length of time
X. Be careful when loading external media.
11. WEBGRAPHY
http://www.whatismyip.com/what-is-a-proxy Author: unknown, 8, April 2014
http://www.webroot.com. Author:Linda Criddle. 8 April 2014
http://www.infospyware.com Author: Marcelo Rivero, 22 April 2014
http://www.infospyware.com/articulos/que-son-los-spywares. Author: Marcelo
Rivero, 22 April 2014
http://en.wikipedia.org/wiki/Pharming. Author: Unknown. 22 April 2014
http://infotechnology.hubpages.com/hub Author: Salvatore Vuono 24 April
2014
http://www.wisegeek.org/what-is-a-hacker.htm . Author: Unknown. 25 April
2014
https://answers.yahoo.com/question/index?qid=20060912204431AA5xm4f.
Author: Dan M. 25 April 2014.
http://kb.eset.com/esetkb/index?page=content&id=SOLN130
Author:Unknown 27 April 2014
http://anti-virus-software-review.toptenreviews.com Author:Charles R. Hooper
27 April 2014