Enviar búsqueda
Cargar
Its presentation
•
Descargar como ODP, PDF
•
0 recomendaciones
•
225 vistas
M
Morten Nielsen
Seguir
IT security presentation. Basic stuff.
Leer menos
Leer más
Educación
Denunciar
Compartir
Denunciar
Compartir
1 de 15
Descargar ahora
Recomendados
Online safety and security
Online safety and security
jovellconde1
Viruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
guest71ebd38
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
guest9850e5
At Your Expense
At Your Expense
Dan Oblak
An Advanced persistent threats
An Advanced persistent threats
pcsafe
Anti phishing presentation
Anti phishing presentation
BokangMalunga
Virus
Virus
CHITRA S
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
William Mann
Recomendados
Online safety and security
Online safety and security
jovellconde1
Viruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
guest71ebd38
Viruses, Biometrics, & Encryptions
Viruses, Biometrics, & Encryptions
guest9850e5
At Your Expense
At Your Expense
Dan Oblak
An Advanced persistent threats
An Advanced persistent threats
pcsafe
Anti phishing presentation
Anti phishing presentation
BokangMalunga
Virus
Virus
CHITRA S
Technology Training - Security, Passwords & More
Technology Training - Security, Passwords & More
William Mann
Tha security awareness training
Tha security awareness training
Rob Valdez
Email phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
Protect the personal
Protect the personal
Durban Chamber of Commerce and Industry
computer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
Phishing Awareness
Phishing Awareness
mphadden
Internet And Facebook Safety
Internet And Facebook Safety
J.D. Wade
Phishing awareness
Phishing awareness
PhishingBox
Internet security
Internet security
rfukunaga
Internet Threats
Internet Threats
Leelet1121
Malwares
Malwares
Abolfazl Naderi
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
Hackingppt 160730081605
Hackingppt 160730081605
RAKESH SHARMA
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
Internet Threats
Internet Threats
Ronalyn_Cao
Internet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
Internet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
Security threats and trends topic-3
Security threats and trends topic-3
Neha Raju k
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
TheRealEdwin
Computer Security
Computer Security
Danz Magdaraog
ITET3 Networking P2P
ITET3 Networking P2P
Morten Nielsen
Itt1 intro project management
Itt1 intro project management
Morten Nielsen
Persentation layer
Persentation layer
Hanif Musaid
Más contenido relacionado
La actualidad más candente
Tha security awareness training
Tha security awareness training
Rob Valdez
Email phishing and countermeasures
Email phishing and countermeasures
Jorge Sebastiao
Protect the personal
Protect the personal
Durban Chamber of Commerce and Industry
computer virus ppt.pptx
computer virus ppt.pptx
Abiniyavk
Phishing Awareness
Phishing Awareness
mphadden
Internet And Facebook Safety
Internet And Facebook Safety
J.D. Wade
Phishing awareness
Phishing awareness
PhishingBox
Internet security
Internet security
rfukunaga
Internet Threats
Internet Threats
Leelet1121
Malwares
Malwares
Abolfazl Naderi
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Shyam Kumar Singh
Hackingppt 160730081605
Hackingppt 160730081605
RAKESH SHARMA
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
JazzyNF
Internet Threats
Internet Threats
Ronalyn_Cao
Internet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
Internet Safety Lw Spammer
Internet Safety Lw Spammer
guest2e06031d
Security threats and trends topic-3
Security threats and trends topic-3
Neha Raju k
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
TheRealEdwin
Computer Security
Computer Security
Danz Magdaraog
La actualidad más candente
(19)
Tha security awareness training
Tha security awareness training
Email phishing and countermeasures
Email phishing and countermeasures
Protect the personal
Protect the personal
computer virus ppt.pptx
computer virus ppt.pptx
Phishing Awareness
Phishing Awareness
Internet And Facebook Safety
Internet And Facebook Safety
Phishing awareness
Phishing awareness
Internet security
Internet security
Internet Threats
Internet Threats
Malwares
Malwares
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
Hackingppt 160730081605
Hackingppt 160730081605
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
Internet Threats
Internet Threats
Internet Safety Lw Spammer
Internet Safety Lw Spammer
Internet Safety Lw Spammer
Internet Safety Lw Spammer
Security threats and trends topic-3
Security threats and trends topic-3
Does Twitter have a positive impact in the United States?
Does Twitter have a positive impact in the United States?
Computer Security
Computer Security
Destacado
ITET3 Networking P2P
ITET3 Networking P2P
Morten Nielsen
Itt1 intro project management
Itt1 intro project management
Morten Nielsen
Persentation layer
Persentation layer
Hanif Musaid
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odp
Morten Nielsen
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
AMIT GUPTA
OSI MODEL - A PROJECT
OSI MODEL - A PROJECT
Abhi shreshtha
Osi model
Osi model
Priyanka Sharma
Osi model
Osi model
Online
OSI Model
OSI Model
Rahul Bandhe
OSI Model of Networking
OSI Model of Networking
Mukesh Tekwani
Destacado
(10)
ITET3 Networking P2P
ITET3 Networking P2P
Itt1 intro project management
Itt1 intro project management
Persentation layer
Persentation layer
ITET1 Routing Application layer.odp
ITET1 Routing Application layer.odp
THE COMPLETE OSI MODEL
THE COMPLETE OSI MODEL
OSI MODEL - A PROJECT
OSI MODEL - A PROJECT
Osi model
Osi model
Osi model
Osi model
OSI Model
OSI Model
OSI Model of Networking
OSI Model of Networking
Similar a Its presentation
100812 internet security2.0
100812 internet security2.0
dkp205
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Blue Coat
Protect Yourself From Internet Pests
Protect Yourself From Internet Pests
peterhitch
IT security awareness
IT security awareness
Dr. Ramkumar Lakshminarayanan
091005 Internet Security
091005 Internet Security
dkp205
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
JOHN BABATUNDE LEE
Edu 03 assingment
Edu 03 assingment
Aswani34
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
Security At Home
Security At Home
Angela Samuels
Cyber security 101
Cyber security 101
Travis Good
Social Networks And Phishing
Social Networks And Phishing
ecarrow
Presented to Compass
Presented to Compass
tapan_sengupta
You are the weakest link
You are the weakest link
Sergio Dutra
The Net is Dangerous
The Net is Dangerous
Gihan Dias
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
kbzdox ivanovich
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
John Bambenek
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Sukhdev48
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Mark Jhon Oxillo
Cybercrime
Cybercrime
Keller Williams Lynchburg
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
DiveshK4
Similar a Its presentation
(20)
100812 internet security2.0
100812 internet security2.0
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Protect Yourself From Internet Pests
Protect Yourself From Internet Pests
IT security awareness
IT security awareness
091005 Internet Security
091005 Internet Security
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
CYBERSPACE SAFETY TIPS FOR SMEs.ppt
Edu 03 assingment
Edu 03 assingment
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Security At Home
Security At Home
Cyber security 101
Cyber security 101
Social Networks And Phishing
Social Networks And Phishing
Presented to Compass
Presented to Compass
You are the weakest link
You are the weakest link
The Net is Dangerous
The Net is Dangerous
Rainer+3e Student Pp Ts Ch03
Rainer+3e Student Pp Ts Ch03
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Online Safety, Security, Ethics, and Netiquette - Empowerment Technologies
Cybercrime
Cybercrime
UserSecurityAwarenessUniversityTemplate.ppt
UserSecurityAwarenessUniversityTemplate.ppt
Más de Morten Nielsen
Itt1 intro knowing and doing
Itt1 intro knowing and doing
Morten Nielsen
Itt2 its pki and certificates
Itt2 its pki and certificates
Morten Nielsen
Itt2 its ssl and services
Itt2 its ssl and services
Morten Nielsen
Itt2 its ids
Itt2 its ids
Morten Nielsen
Itt2 its encrypted storage
Itt2 its encrypted storage
Morten Nielsen
Itt2 its introduction
Itt2 its introduction
Morten Nielsen
Itt2 its introduction
Itt2 its introduction
Morten Nielsen
Itt3 virtual machines
Itt3 virtual machines
Morten Nielsen
Itt1 sd requirements
Itt1 sd requirements
Morten Nielsen
Itt1 sd uml and oo
Itt1 sd uml and oo
Morten Nielsen
Itt3 its acl
Itt3 its acl
Morten Nielsen
Itt3 its social engineering
Itt3 its social engineering
Morten Nielsen
Itet3 its forensics
Itet3 its forensics
Morten Nielsen
Diagram cookbook
Diagram cookbook
Morten Nielsen
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
Morten Nielsen
ITET3 ITS governance
ITET3 ITS governance
Morten Nielsen
Routing vlans
Routing vlans
Morten Nielsen
Itet2 its social engineering
Itet2 its social engineering
Morten Nielsen
Itet2 its counter recon
Itet2 its counter recon
Morten Nielsen
Itet2 its anatomy
Itet2 its anatomy
Morten Nielsen
Más de Morten Nielsen
(20)
Itt1 intro knowing and doing
Itt1 intro knowing and doing
Itt2 its pki and certificates
Itt2 its pki and certificates
Itt2 its ssl and services
Itt2 its ssl and services
Itt2 its ids
Itt2 its ids
Itt2 its encrypted storage
Itt2 its encrypted storage
Itt2 its introduction
Itt2 its introduction
Itt2 its introduction
Itt2 its introduction
Itt3 virtual machines
Itt3 virtual machines
Itt1 sd requirements
Itt1 sd requirements
Itt1 sd uml and oo
Itt1 sd uml and oo
Itt3 its acl
Itt3 its acl
Itt3 its social engineering
Itt3 its social engineering
Itet3 its forensics
Itet3 its forensics
Diagram cookbook
Diagram cookbook
ITET1 Routing Transport layer.odp
ITET1 Routing Transport layer.odp
ITET3 ITS governance
ITET3 ITS governance
Routing vlans
Routing vlans
Itet2 its social engineering
Itet2 its social engineering
Itet2 its counter recon
Itet2 its counter recon
Itet2 its anatomy
Itet2 its anatomy
Último
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
JhezDiaz1
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
Conquiztadors- the Quiz Society of Sri Venkateswara College
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
iammrhaywood
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
TechSoup
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
MaryGraceBautista27
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Mr Bounab Samir
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
thorishapillay1
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
MiaBumagat1
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
nelietumpap1
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
SpandanaRallapalli
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
ChelloAnnAsuncion2
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
JoshuaGantuangco2
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
SherlyMaeNeri
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Celine George
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Mark Reed
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
navabharathschool99
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
YousafMalik24
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Postal Advocate Inc.
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
MIPLM
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Último
(20)
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Its presentation
1.
IT security A
quick introduction (featuring statistics) 2011 Spring Morten Bo Nielsen [email_address]
2.
3.
4.
Questions
5.
6.
Don't share PIN
7.
Lock doors
8.
Avoid bad neighborhoods
9.
10.
Antivirus
11.
Firewalls
12.
Browsing habits
13.
Awareness
14.
And more...
15.
16.
Chrome
17.
Firefox
18.
19.
20.
21.
Malicious activity This
discussion is beyond the scope of this presentation
22.
23.
Faking emails are
easy
24.
HTML and javascript
makes it worse
25.
26.
27.
Could be fake
email from e.g. a bank or ebay (Example on next slide)
28.
29.
Difference between email
source domain and “click here” domain” Limitted time offer They have paired my email address and my name. Taken from the EAL homepage?
30.
31.
Automatic updates from
MS
32.
33.
13 vendors average
34.
Automatic updates? Might
not exist.
35.
36.
Lolitta from Russia
has not single you out
37.
38.
Beware of social
media
39.
Be extra careful
when money is involved
40.
41.
USB pens are
virus carriers
42.
43.
Do backups
44.
Decide on your
level of security
45.
46.
Networked devices (Router,
printer)
47.
More networked devices
(TVs, refrigerators, etc.) It is not that bad, but I got your attention, no?
48.
Descargar ahora