SlideShare una empresa de Scribd logo
1 de 10
Digital Security
By: ryan tarrie
Basic info
 Digital security involves the security of computers internet account and files
from intrusion by an outside user.
 There is software that can be downloaded to prevent a computer from being
hacked and having their information stolen.
Types of software
Two-Factor authorization
 Many password protected websites offer two-factor authorization or (2fa),
and you should take as much advantage of it as u can.
 Basically what two-factor authorization is after you put in your password for
you computer, it makes you verify your identity, such as what is your favorite
pets name, or what city was your mother or father born.
Ways to be unsafe online
 Downloading not familiar links
 Clicking on ads
 Going to unsecure sites
 Not having security on ur computer
Ways to clean ur computer
 Microsoft essentials cleaner
 You can buy a cleaner
 Buy a new computer
 Send it to an expert
How viruses can effect your computer
 They can access your personal files
 Slow your computer down
 Destroy your computer hard-drive and can potentially ruin your computer to
where it is unusable.
Types of viruses
 Macro viruses
 Memory resident viruses
 Over-right viruses
 Direct action viruses
 Web scripting viruses
Conlusion
 There are many ways for you to be unsafe on the internet, and if you follow
the correct guidelines your computer will stay virus free.

Más contenido relacionado

La actualidad más candente

Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
Linda Barron
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
aisha747
 

La actualidad más candente (20)

Aiman
AimanAiman
Aiman
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Computer Project on Cyber Safety
Computer Project on Cyber SafetyComputer Project on Cyber Safety
Computer Project on Cyber Safety
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
Data breach
Data breachData breach
Data breach
 
Hacking
HackingHacking
Hacking
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Netiquette
NetiquetteNetiquette
Netiquette
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Teaching Your Staff About Phishing
Teaching Your Staff About PhishingTeaching Your Staff About Phishing
Teaching Your Staff About Phishing
 

Destacado

mechanical unit module
mechanical unit modulemechanical unit module
mechanical unit module
Akina Chiang
 
ComAv 2015 Overview Presentation
ComAv 2015 Overview PresentationComAv 2015 Overview Presentation
ComAv 2015 Overview Presentation
Craig Garrick, Jr.
 
Exc cap5
Exc cap5Exc cap5
Exc cap5
cahepa
 
Sistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la saludSistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la salud
edomarino
 
Facebook advertising the why and how
Facebook advertising the why and howFacebook advertising the why and how
Facebook advertising the why and how
GODigitalMarketing
 
gemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantilesgemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantiles
Paula Andree
 
Arte cultura (terminado)
Arte cultura (terminado)Arte cultura (terminado)
Arte cultura (terminado)
carlaibacache
 
manuel pena la literatura infantil en chile
 manuel pena  la literatura infantil en chile manuel pena  la literatura infantil en chile
manuel pena la literatura infantil en chile
Paula Andree
 

Destacado (20)

ME-team-plan
ME-team-planME-team-plan
ME-team-plan
 
How GST works
How GST worksHow GST works
How GST works
 
mechanical unit module
mechanical unit modulemechanical unit module
mechanical unit module
 
Social media gulick
Social media gulickSocial media gulick
Social media gulick
 
moding
modingmoding
moding
 
ComAv 2015 Overview Presentation
ComAv 2015 Overview PresentationComAv 2015 Overview Presentation
ComAv 2015 Overview Presentation
 
Flormar 5-6
Flormar 5-6Flormar 5-6
Flormar 5-6
 
Exc cap5
Exc cap5Exc cap5
Exc cap5
 
La guerra fria
La guerra friaLa guerra fria
La guerra fria
 
Taller exploracion neurologica
Taller exploracion neurologicaTaller exploracion neurologica
Taller exploracion neurologica
 
World News - CNNMoney
World News - CNNMoneyWorld News - CNNMoney
World News - CNNMoney
 
Sistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la saludSistemas de salud como determinantes de la salud
Sistemas de salud como determinantes de la salud
 
Facebook advertising the why and how
Facebook advertising the why and howFacebook advertising the why and how
Facebook advertising the why and how
 
Guaritoprezi
GuaritopreziGuaritoprezi
Guaritoprezi
 
gemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantilesgemma lluch textos y paratextos en los libros infantiles
gemma lluch textos y paratextos en los libros infantiles
 
Arte cultura (terminado)
Arte cultura (terminado)Arte cultura (terminado)
Arte cultura (terminado)
 
manuel pena la literatura infantil en chile
 manuel pena  la literatura infantil en chile manuel pena  la literatura infantil en chile
manuel pena la literatura infantil en chile
 
Pesquisa em Consórcio
Pesquisa em ConsórcioPesquisa em Consórcio
Pesquisa em Consórcio
 
Investigação-ação educacional
Investigação-ação educacionalInvestigação-ação educacional
Investigação-ação educacional
 
Práticas de Análise de Conteúdo
Práticas de Análise de ConteúdoPráticas de Análise de Conteúdo
Práticas de Análise de Conteúdo
 

Similar a Digital security

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 

Similar a Digital security (20)

Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Living in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptxLiving in the IT Era - Lesson 6.pptx
Living in the IT Era - Lesson 6.pptx
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
Ao4 powerpoint mrs hussain
Ao4  powerpoint mrs hussainAo4  powerpoint mrs hussain
Ao4 powerpoint mrs hussain
 
Effects of using IT
Effects of using ITEffects of using IT
Effects of using IT
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
26-Security.ppt
26-Security.ppt26-Security.ppt
26-Security.ppt
 
Cyber Security-Foundation.ppt
Cyber Security-Foundation.pptCyber Security-Foundation.ppt
Cyber Security-Foundation.ppt
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Digital security

  • 2. Basic info  Digital security involves the security of computers internet account and files from intrusion by an outside user.  There is software that can be downloaded to prevent a computer from being hacked and having their information stolen.
  • 4. Two-Factor authorization  Many password protected websites offer two-factor authorization or (2fa), and you should take as much advantage of it as u can.  Basically what two-factor authorization is after you put in your password for you computer, it makes you verify your identity, such as what is your favorite pets name, or what city was your mother or father born.
  • 5.
  • 6. Ways to be unsafe online  Downloading not familiar links  Clicking on ads  Going to unsecure sites  Not having security on ur computer
  • 7. Ways to clean ur computer  Microsoft essentials cleaner  You can buy a cleaner  Buy a new computer  Send it to an expert
  • 8. How viruses can effect your computer  They can access your personal files  Slow your computer down  Destroy your computer hard-drive and can potentially ruin your computer to where it is unusable.
  • 9. Types of viruses  Macro viruses  Memory resident viruses  Over-right viruses  Direct action viruses  Web scripting viruses
  • 10. Conlusion  There are many ways for you to be unsafe on the internet, and if you follow the correct guidelines your computer will stay virus free.