SlideShare a Scribd company logo
1 of 42
English for Computing ,[object Object]
NguyễnThịHồngNgọc
DươngThịThanhThúy
NguyễnThịAnhThư
VũThịTrâm,[object Object]
1. Security on the Web
Security is crucial when you send confidential information online
Buying a book
Set all security alerts to high on your web browser
Web browser:software application for retrieving, presenting, and traversing information resources on the WWW
Lock disable or delete cookies
Acookie (web cookie, browser cookie, and HTTP cookie) is a piece of text stored on a user's computer by their web browser
Digital certificate  files that are like digital identification cards to identify users & servers
Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet
2. Email privacy
Email travels across the Net Can be copied temporarily onto  many computers Can be read by others
 Encode it with some form of encryption
Pretty Good Privacy (PGP) A freeware program written by Phil Zimmerman
3. Network security
Passwordsfor access control
Firewalls  A system designed to prevent unauthorized access to or from a private network
Several types of firewall techniques: Packet filter Application gateway Circuit-level gateway Proxy server
Encryption and decryption systems
4. Malware protection
[object Object]
 For example: virusesworms Trojans spyware adware
Viruses  ,[object Object]
 Attachesitself to a program or file enabling it to spread from one computer to another,[object Object]
 Cannot infect your computer unless you run or open the malicious program,[object Object]
 Has the capability to spread from computer to computer without any human action,[object Object]
 Cannot attach itself to other programs,[object Object]
 Do not replicate themselves ,[object Object]
Spyware  Atype of malware that can be installed on computers, and which collects small pieces of information about users without their knowledge
Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity
Adware Software application in which advertising banners are displayed while the program is running
SOME ANTI- VIRUS SOFTWARE: BkavPro Internet Securityis antivirus software pioneer in the use of cloud technology (công nghệ điện toán đám mây)
Kaspersky Internet Security 2011 provides comprehensive protection for your computer from known and emerging threats, network attacks and phishing, spam and other unwanted information
5. Types of computer crimes
Computer crimes: criminal activities, involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data
Some types: ,[object Object]
 Phishing:Phishing is the act of attempting to acquire sensitive information like usernames, passwords and credit card details by disguising as a trustworthy source,[object Object]

More Related Content

What's hot

Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 

What's hot (20)

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
NIST cybersecurity framework
NIST cybersecurity frameworkNIST cybersecurity framework
NIST cybersecurity framework
 
What is network security and Types
What is network security and TypesWhat is network security and Types
What is network security and Types
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
spyware
spywarespyware
spyware
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 

Viewers also liked

Plan your own cybercafé
Plan your own cybercaféPlan your own cybercafé
Plan your own cybercafé
João Nourdin
 
Financial statements analysis
Financial statements analysisFinancial statements analysis
Financial statements analysis
navdeep_kumar
 
100 летию первого внеаэродромного состязания
100 летию первого внеаэродромного состязания100 летию первого внеаэродромного состязания
100 летию первого внеаэродромного состязания
Marina Lebedeva
 

Viewers also liked (20)

Plan your own cybercafé
Plan your own cybercaféPlan your own cybercafé
Plan your own cybercafé
 
Post
PostPost
Post
 
ThailandPost Presentation
ThailandPost PresentationThailandPost Presentation
ThailandPost Presentation
 
Financial statements analysis
Financial statements analysisFinancial statements analysis
Financial statements analysis
 
GPS Tracking by Tracking.in.th
GPS Tracking by Tracking.in.thGPS Tracking by Tracking.in.th
GPS Tracking by Tracking.in.th
 
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
PIANO DITUTELA DELLE ACQUE Gestori e PTA: adempimenti richiesti, scadenze e p...
 
Dragaggi e competitività
Dragaggi e competitivitàDragaggi e competitività
Dragaggi e competitività
 
PATTO DEI SINDACI: AZIONI ENERGETICHE E DI MOBILITÀ VERSO LA SOSTENIBILITÀ DE...
PATTO DEI SINDACI: AZIONI ENERGETICHE E DI MOBILITÀ VERSO LA SOSTENIBILITÀ DE...PATTO DEI SINDACI: AZIONI ENERGETICHE E DI MOBILITÀ VERSO LA SOSTENIBILITÀ DE...
PATTO DEI SINDACI: AZIONI ENERGETICHE E DI MOBILITÀ VERSO LA SOSTENIBILITÀ DE...
 
NMAI Environmental Challenge_example
NMAI Environmental Challenge_exampleNMAI Environmental Challenge_example
NMAI Environmental Challenge_example
 
Il Fondo per l’Energia
 Il Fondo per l’Energia Il Fondo per l’Energia
Il Fondo per l’Energia
 
KBS選抜ファンドのご案内20110517
KBS選抜ファンドのご案内20110517KBS選抜ファンドのご案内20110517
KBS選抜ファンドのご案内20110517
 
Il Progetto di raccolta rifiuti per la città della Spezia
Il Progetto di raccolta rifiuti per la città della SpeziaIl Progetto di raccolta rifiuti per la città della Spezia
Il Progetto di raccolta rifiuti per la città della Spezia
 
100 летию первого внеаэродромного состязания
100 летию первого внеаэродромного состязания100 летию первого внеаэродромного состязания
100 летию первого внеаэродромного состязания
 
Pu s pa
Pu s paPu s pa
Pu s pa
 
GESTIONE DELLE ACQUE METEORICHE DA INSEDIAMENTI PRODUTTIVI DGR n.842 del 15/5...
GESTIONE DELLE ACQUE METEORICHE DA INSEDIAMENTI PRODUTTIVI DGR n.842 del 15/5...GESTIONE DELLE ACQUE METEORICHE DA INSEDIAMENTI PRODUTTIVI DGR n.842 del 15/5...
GESTIONE DELLE ACQUE METEORICHE DA INSEDIAMENTI PRODUTTIVI DGR n.842 del 15/5...
 
Controlli e autocontrolli dei gestori: le modalità operative
Controlli e autocontrolli dei gestori: le modalità operativeControlli e autocontrolli dei gestori: le modalità operative
Controlli e autocontrolli dei gestori: le modalità operative
 
Ritratto Tecnico del progetto Green Site
Ritratto Tecnico del progetto Green SiteRitratto Tecnico del progetto Green Site
Ritratto Tecnico del progetto Green Site
 
WORKSHOPeA: "DUE DILIGENCE: accertamento delle passività ambientali nei contr...
WORKSHOPeA: "DUE DILIGENCE: accertamento delle passività ambientali nei contr...WORKSHOPeA: "DUE DILIGENCE: accertamento delle passività ambientali nei contr...
WORKSHOPeA: "DUE DILIGENCE: accertamento delle passività ambientali nei contr...
 
Fm growth 7 11-11
Fm growth 7 11-11Fm growth 7 11-11
Fm growth 7 11-11
 
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato StampaVIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
VIAGGIO NEL VENETO DELLE QUALITA’ - Comunicato Stampa
 

Similar to Internet security

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Similar to Internet security (20)

INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
computer security
computer securitycomputer security
computer security
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer security and
Computer security andComputer security and
Computer security and
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Data security
Data securityData security
Data security
 
Computer security
Computer securityComputer security
Computer security
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Computer security
Computer securityComputer security
Computer security
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Internet security