SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
INFORMÁTICA: Amenazas



A firewall is a part of a computer system or network that is designed to block
unauthorized access while permitting authorized communications. It is a device or
set of devices configured to permit, deny, encrypts, decrypt all (in and out)
computer traffic between different security domains based upon a set of rules and
other criteria.

Firewalls can be implemented in either hardware or software, or a combination of
both. Firewalls are frequently used to prevent unauthorized Internet users from
accessing private networks connected to the Internet, especially intranets. All
messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security
criteria.

Antivirus (or anti-virus) software is used to prevent, detect, and remove
malware, including computer viruses, worms, and trojan horses. Such programs
may also prevent and remove adware, spyware, and other forms of malware.

A variety of strategies are typically employed. Signature-based detection involves
searching for known malicious patterns in executable code. However, it is possible
for a user to be infected with new malware in which no signature exists yet.

Some antivirus software can also predict what a file will do if opened/run by
emulating it in a sandbox and analyzing what it does to see if it performs any
malicious actions. If it does, this could mean the file is malicious.

However, no matter how useful antivirus software is, it can sometimes have
drawbacks. Antivirus software can degrade computer performance if it is not
designed efficiently. Inexperienced users may have trouble understanding the
prompts and decisions that antivirus software presents them with. An incorrect
decision may lead to a security breach.

Virus hoaxes are messages, usually sent by email, that amount to little more than
chain letters. They pretend to alert you to the latest "undetectable" virus and simply
waste your time and Internet bandwidth. The best course of action is to delete
these hoaxes - they can cause genuine fear and alarm in the disabled, elderly and
other vulnerable groups.

Signature based detection is the most common method. To identify viruses and
other malware, antivirus software compares the contents of a file to a dictionary of
virus signatures. Because viruses can embed themselves in existing files, the entire
file is searched, not just as a whole, but also in pieces.

Malicious activity detection is another approach used to identify malware. In this
approach, antivirus software monitors the system for suspicious program behavior.

Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz     Página 1
INFORMÁTICA: Amenazas



If suspicious behavior is detected, the suspect program may be further investigated,
using signature based detection or another method listed in this section. This type
of detection can be used to identify unknown viruses or variants on existing viruses.

Heuristic-based detection, like malicious activity detection, can be used to identify
unknown viruses. This can be accomplished in one of two ways: file analysis and file
emulation.

File analysis is the process of searching a suspect file for virus-like instructions. For
example, if a program has instructions to reformat the C drive, the antivirus
software might further investigate the file. One downside of this feature is the large
amount of computer resources needed to analyse every file, resulting in slow
operation.

File emulation is another heuristic approach. File emulation involves executing a
program in a virtual environment and logging what actions the program performs.
Depending on the actions logged, the antivirus software can determine if the
program is malicious or not and then carry out the appropriate disinfection actions.

Symptoms of a virus on your system:

   •   Slow PC performance
   •   Erratic computer behavior
   •   Unexplained data loss
   •   Frequent computer crashes



Anti-Spam: E-mail spam, also known as junk e-mail, is a subset of spam that
involves nearly identical messages sent to numerous recipients by e-mail.

To prevent e-mail spam, both end users and administrators of e-mail systems use
various anti-spam techniques. Some of these techniques have been embedded in
products, services and software.

Anti-Spyware: Spyware is a type of malware that is installed on computer and
collects information about users without their knowledge. The presence of spyware
is typically hidden from the user. Typically, spyware is secretly installed on the user's
personal computer. Sometimes, however, spywares such as keyloggers are installed
by the owner of a shared, corporate, or public computer on purpose in order to
secretly monitor other users.




Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz        Página 2
INFORMÁTICA: Amenazas



Programs such as Lavasoft's Ad-Aware SE y Spybot - Search & Destroy rapidly gained
popularity as effective tools to remove, and in some cases intercept, spyware
programs.

Anti-spyware programs can combat spyware in two ways:

   1. They can provide real time protection against the installation of spyware
      software on your computer. This type of spyware protection works the same
      way as that of anti-virus protection in that the anti-spyware software scans
      all incoming network data for spyware software and blocks any threats it
      comes across.
   2. Anti-spyware software programs can be used solely for detection and
      removal of spyware software that has already been installed onto your
      computer.

Such programs inspect the contents of the Windows registry, the operating system
files, and installed programs, and remove files and entries which match a list of
known spyware components. Real-time protection from spyware works identically
to real-time anti-virus protection: the software scans disk files at download time,
and blocks the activity of components known to represent spyware.

Phising: Masquerading as a trustworthy person or business, phishers attempt to
steal sensitive financial or personal information through fraudulent email or instant
messages. How can you tell the difference between a legitimate message and a
phishing scam? Educate yourself on the latest tricks and scams.

What can phishing do to me?

After you’ve responded to a phishing scam, the attacker can:

   •   Hijack your usernames and passwords
   •   Steal your money and open credit card and bank accounts in your name
   •   Request new account Personal Identification Numbers (PINs) or additional
       credit cards
   •   Make purchases
   •   Add themselves or an alias that they control as an authorized user so it’s
       easier to use your credit
   •   Obtain cash advances
   •   Use and abuse your Social Security number
   •   Sell your information to other parties who will use it for illicit or illegal
       purposes




Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz    Página 3
INFORMÁTICA: Amenazas



How will I know?

Phishers often pretend to be legitimate companies. Their messages may sound
genuine and their sites can look remarkably like the real thing. It can be hard to tell
the difference, but you may be dealing with a phishing scam if you see the
following:

   •   Requests for confidential information via email or instant message
   •   Emotional language using scare tactics or urgent requests to respond
   •   Misspelled URLs, spelling mistakes or the use of sub-domains
   •   Links within the body of a message
   •   Lack of a personal greeting or customized information within a message.
       Legitimate emails from banks and credit card companies will often include
       partial account numbers, user name or password.



Hackers & Predators: People, not computers, create computer security threats
and malware. Hackers and predators are programmers who victimize others for
their own gain by breaking into computer systems to steal, change or destroy
information as a form of cyber-terrorism. What scams are they using lately? Learn
how to combat dangerous malware and stay safe online.

What can hackers and predators do to me?

While your computer is connected to the Internet, the malware a hacker has
installed on your PC quietly transmits your personal and financial information
without your knowledge or consent. Or, a predator may pounce on the private
information you unwittingly revealed. In either case, they can do the same as a
Phising attack.




Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz      Página 4

Más contenido relacionado

La actualidad más candente

IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
Data Security
Data SecurityData Security
Data Securitybackdoor
 
Security communication
Security communicationSecurity communication
Security communicationSay Shyong
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSMd Abu Syeem Dipu
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalResham Acharya
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
Cyber modified
Cyber modifiedCyber modified
Cyber modifiedvjom
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethicsNikki Shree
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID SystemGayathridevi120
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3Denise Bailey
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRameesha1
 

La actualidad más candente (20)

internet security
internet securityinternet security
internet security
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
Data Security
Data SecurityData Security
Data Security
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Security communication
Security communicationSecurity communication
Security communication
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Ransomware
RansomwareRansomware
Ransomware
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Cyber modified
Cyber modifiedCyber modified
Cyber modified
 
Computer security
Computer securityComputer security
Computer security
 
Computing and ethics
Computing and ethicsComputing and ethics
Computing and ethics
 
System Security- Firewalls and ID System
System Security- Firewalls and ID SystemSystem Security- Firewalls and ID System
System Security- Firewalls and ID System
 
Ransomware and email security ver - 1.3
Ransomware and email security   ver - 1.3Ransomware and email security   ver - 1.3
Ransomware and email security ver - 1.3
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 

Similar a Amenazas Informática

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.pptErAdityaSingh1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smartKanha Sahu
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 

Similar a Amenazas Informática (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Computer security
Computer securityComputer security
Computer security
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Spyware risk it's time to get smart
Spyware risk it's time to get smartSpyware risk it's time to get smart
Spyware risk it's time to get smart
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Más de Dani Díaz

Internet con google
Internet con googleInternet con google
Internet con googleDani Díaz
 
Photoshop atajos de teclado
Photoshop  atajos de tecladoPhotoshop  atajos de teclado
Photoshop atajos de tecladoDani Díaz
 
2. photoshop piel de piedra
2. photoshop  piel de piedra2. photoshop  piel de piedra
2. photoshop piel de piedraDani Díaz
 
1. photoshop retoque facial
1. photoshop  retoque facial1. photoshop  retoque facial
1. photoshop retoque facialDani Díaz
 
Premiere conceptos básicos
Premiere  conceptos básicosPremiere  conceptos básicos
Premiere conceptos básicosDani Díaz
 
Wordpress Consejos
Wordpress ConsejosWordpress Consejos
Wordpress ConsejosDani Díaz
 
Navegadores Web
Navegadores WebNavegadores Web
Navegadores WebDani Díaz
 
Carpetas Y Win Rar
Carpetas Y Win RarCarpetas Y Win Rar
Carpetas Y Win RarDani Díaz
 
Propiedad Intelectual Oficial
Propiedad Intelectual OficialPropiedad Intelectual Oficial
Propiedad Intelectual OficialDani Díaz
 
Propiedad Intelectual Documento Oficial
Propiedad Intelectual Documento OficialPropiedad Intelectual Documento Oficial
Propiedad Intelectual Documento OficialDani Díaz
 
Imagen Digital
Imagen DigitalImagen Digital
Imagen DigitalDani Díaz
 
EvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas OperativosEvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas OperativosDani Díaz
 
Diseño Web Y Estructuras
Diseño Web Y EstructurasDiseño Web Y Estructuras
Diseño Web Y EstructurasDani Díaz
 
Mantenimiento Pc
Mantenimiento PcMantenimiento Pc
Mantenimiento PcDani Díaz
 
1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios Asociados1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios AsociadosDani Díaz
 
1º Bach Tema 1 TecnologíAs De La InformacióN
1º Bach Tema 1   TecnologíAs De La InformacióN1º Bach Tema 1   TecnologíAs De La InformacióN
1º Bach Tema 1 TecnologíAs De La InformacióNDani Díaz
 
Trabajar Con Win Rar
Trabajar Con Win RarTrabajar Con Win Rar
Trabajar Con Win RarDani Díaz
 
Trabajar En Word
Trabajar En WordTrabajar En Word
Trabajar En WordDani Díaz
 

Más de Dani Díaz (20)

Internet con google
Internet con googleInternet con google
Internet con google
 
Photoshop atajos de teclado
Photoshop  atajos de tecladoPhotoshop  atajos de teclado
Photoshop atajos de teclado
 
2. photoshop piel de piedra
2. photoshop  piel de piedra2. photoshop  piel de piedra
2. photoshop piel de piedra
 
1. photoshop retoque facial
1. photoshop  retoque facial1. photoshop  retoque facial
1. photoshop retoque facial
 
Premiere conceptos básicos
Premiere  conceptos básicosPremiere  conceptos básicos
Premiere conceptos básicos
 
Wordpress Consejos
Wordpress ConsejosWordpress Consejos
Wordpress Consejos
 
Navegadores Web
Navegadores WebNavegadores Web
Navegadores Web
 
Carpetas Y Win Rar
Carpetas Y Win RarCarpetas Y Win Rar
Carpetas Y Win Rar
 
Propiedad Intelectual Oficial
Propiedad Intelectual OficialPropiedad Intelectual Oficial
Propiedad Intelectual Oficial
 
Propiedad Intelectual Documento Oficial
Propiedad Intelectual Documento OficialPropiedad Intelectual Documento Oficial
Propiedad Intelectual Documento Oficial
 
Redes
RedesRedes
Redes
 
Imagen Digital
Imagen DigitalImagen Digital
Imagen Digital
 
EvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas OperativosEvolucióN De Los Sistemas Operativos
EvolucióN De Los Sistemas Operativos
 
Diseño Web Y Estructuras
Diseño Web Y EstructurasDiseño Web Y Estructuras
Diseño Web Y Estructuras
 
Mantenimiento Pc
Mantenimiento PcMantenimiento Pc
Mantenimiento Pc
 
Diseño Web
Diseño WebDiseño Web
Diseño Web
 
1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios Asociados1º Bach Web 2.0 Y Servicios Asociados
1º Bach Web 2.0 Y Servicios Asociados
 
1º Bach Tema 1 TecnologíAs De La InformacióN
1º Bach Tema 1   TecnologíAs De La InformacióN1º Bach Tema 1   TecnologíAs De La InformacióN
1º Bach Tema 1 TecnologíAs De La InformacióN
 
Trabajar Con Win Rar
Trabajar Con Win RarTrabajar Con Win Rar
Trabajar Con Win Rar
 
Trabajar En Word
Trabajar En WordTrabajar En Word
Trabajar En Word
 

Último

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 

Último (20)

Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Amenazas Informática

  • 1. INFORMÁTICA: Amenazas A firewall is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices configured to permit, deny, encrypts, decrypt all (in and out) computer traffic between different security domains based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware. A variety of strategies are typically employed. Signature-based detection involves searching for known malicious patterns in executable code. However, it is possible for a user to be infected with new malware in which no signature exists yet. Some antivirus software can also predict what a file will do if opened/run by emulating it in a sandbox and analyzing what it does to see if it performs any malicious actions. If it does, this could mean the file is malicious. However, no matter how useful antivirus software is, it can sometimes have drawbacks. Antivirus software can degrade computer performance if it is not designed efficiently. Inexperienced users may have trouble understanding the prompts and decisions that antivirus software presents them with. An incorrect decision may lead to a security breach. Virus hoaxes are messages, usually sent by email, that amount to little more than chain letters. They pretend to alert you to the latest "undetectable" virus and simply waste your time and Internet bandwidth. The best course of action is to delete these hoaxes - they can cause genuine fear and alarm in the disabled, elderly and other vulnerable groups. Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces. Malicious activity detection is another approach used to identify malware. In this approach, antivirus software monitors the system for suspicious program behavior. Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 1
  • 2. INFORMÁTICA: Amenazas If suspicious behavior is detected, the suspect program may be further investigated, using signature based detection or another method listed in this section. This type of detection can be used to identify unknown viruses or variants on existing viruses. Heuristic-based detection, like malicious activity detection, can be used to identify unknown viruses. This can be accomplished in one of two ways: file analysis and file emulation. File analysis is the process of searching a suspect file for virus-like instructions. For example, if a program has instructions to reformat the C drive, the antivirus software might further investigate the file. One downside of this feature is the large amount of computer resources needed to analyse every file, resulting in slow operation. File emulation is another heuristic approach. File emulation involves executing a program in a virtual environment and logging what actions the program performs. Depending on the actions logged, the antivirus software can determine if the program is malicious or not and then carry out the appropriate disinfection actions. Symptoms of a virus on your system: • Slow PC performance • Erratic computer behavior • Unexplained data loss • Frequent computer crashes Anti-Spam: E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail. To prevent e-mail spam, both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and software. Anti-Spyware: Spyware is a type of malware that is installed on computer and collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users. Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 2
  • 3. INFORMÁTICA: Amenazas Programs such as Lavasoft's Ad-Aware SE y Spybot - Search & Destroy rapidly gained popularity as effective tools to remove, and in some cases intercept, spyware programs. Anti-spyware programs can combat spyware in two ways: 1. They can provide real time protection against the installation of spyware software on your computer. This type of spyware protection works the same way as that of anti-virus protection in that the anti-spyware software scans all incoming network data for spyware software and blocks any threats it comes across. 2. Anti-spyware software programs can be used solely for detection and removal of spyware software that has already been installed onto your computer. Such programs inspect the contents of the Windows registry, the operating system files, and installed programs, and remove files and entries which match a list of known spyware components. Real-time protection from spyware works identically to real-time anti-virus protection: the software scans disk files at download time, and blocks the activity of components known to represent spyware. Phising: Masquerading as a trustworthy person or business, phishers attempt to steal sensitive financial or personal information through fraudulent email or instant messages. How can you tell the difference between a legitimate message and a phishing scam? Educate yourself on the latest tricks and scams. What can phishing do to me? After you’ve responded to a phishing scam, the attacker can: • Hijack your usernames and passwords • Steal your money and open credit card and bank accounts in your name • Request new account Personal Identification Numbers (PINs) or additional credit cards • Make purchases • Add themselves or an alias that they control as an authorized user so it’s easier to use your credit • Obtain cash advances • Use and abuse your Social Security number • Sell your information to other parties who will use it for illicit or illegal purposes Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 3
  • 4. INFORMÁTICA: Amenazas How will I know? Phishers often pretend to be legitimate companies. Their messages may sound genuine and their sites can look remarkably like the real thing. It can be hard to tell the difference, but you may be dealing with a phishing scam if you see the following: • Requests for confidential information via email or instant message • Emotional language using scare tactics or urgent requests to respond • Misspelled URLs, spelling mistakes or the use of sub-domains • Links within the body of a message • Lack of a personal greeting or customized information within a message. Legitimate emails from banks and credit card companies will often include partial account numbers, user name or password. Hackers & Predators: People, not computers, create computer security threats and malware. Hackers and predators are programmers who victimize others for their own gain by breaking into computer systems to steal, change or destroy information as a form of cyber-terrorism. What scams are they using lately? Learn how to combat dangerous malware and stay safe online. What can hackers and predators do to me? While your computer is connected to the Internet, the malware a hacker has installed on your PC quietly transmits your personal and financial information without your knowledge or consent. Or, a predator may pounce on the private information you unwittingly revealed. In either case, they can do the same as a Phising attack. Colegio Escolapias Gandia. Departamento de Nuevas Tecnologías. Dani Díaz Página 4