Cybersecurity By Sri Kankanahalli.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Don’t Be Tricked Beware of Zombies. Malicious zombie code infects computer Internet.
Cyber Security Quiz By: Alex Alberg. Q. A good password is: A. 8 characters or more B. Contains upper and lower case letters C. Contains special characters.
Aim: What strategies can we use to keep our financial information safe online? Do Now: What do you do to protect your information online?
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
COMMON COMPUTER SECURITY ISSUES. Jade Walker Jade Walker Campsmount Academy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Microsoft Office 2007 – Illustrated Introductory, Premium Video Edition Understanding Essential Computer Concepts.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Safety By Adam T Introduction  This PowerPoint will show give you advice on how to stay safe on the internet.  You will be told how to stay.
Introduction to Firewalls TEC 236. What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Protecting Students on the School Computer Network Enfield High School.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Safe Downloading & Malware Prevention. Adobe Flash Update One program that will ask you to update often is Adobe Flash. While updating Flash is important,
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
What is Spam? d min.
Internet safety By Suman Nazir
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Latest Issues Related To The AVG Antivirus 2017
Windows Tutorial 5 Protecting Your Computer
Chapter 40 Internet Security.
Managing Windows Security
Computer Security.
GlobalTech Squad Toll Free : AVG Antivirus Support
Unit 4 IT Security.
Viruses, worms and trojans.
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
© 2015 Air Force Association
TET1 Task 1: Ethics Charles Rich 5 November, 2016.
Malware aka- malicious software By: Ken Fogel
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
OCR Nationals – ICT Safe Working Practices
Step-By-Step Guide To Install Kaspersky Internet Security For Mac.
Protecting your personal information and privacy
6 Figure Grid Map skills Quiz Reference Quiz
How to Fix Windows 10 Update Error 0x ?.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Risk of the Internet At Home
Data integrity and security
Stay Safe While Using The Internet
Bethesda Cybersecurity Club
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Quiz Name Here Click to start.
CYBERSAFETY & Personal information
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
What devices use the internet?
Cybersecurity at WAJ What is it? Are we at risk?.
Presentation transcript:

Cybersecurity By Sri Kankanahalli

Table of Contents Secure Passwords Protecting Against Viruses Firewalls Spyware Quiz

Secure Passwords At least 6 letters long Contains both letters and numbers Uses mix of upper + lowercase Uses symbols “password” is not a good password.

Protecting Against Viruses Malicious programs which harm your computer Use anti-virus software Update anti-virus software regularly

Firewalls Most viruses received through Internet Security guys realized this, invented firewall Protects against malicious or unnecessary Internet traffic

Spyware Malicious software that collects private data Can collect usernames/passwords Don’t click pop-up windows To get rid of spyware, use your anti-virus software

QUIZ TIME!

Question 1 Which one of these (usually) harms your computer? 1. A virus 2. A bacteria 3. George Clooney

Click the button to try again… YOU'RE WRONG! Click the button to try again…

Click the button to go to the next question! YOU'RE RIGHT! Click the button to go to the next question!

Question 2 Which one of these protects your computer from unnecessary or malicious Internet traffic? 1. A waterwall 2. A firewall 3. Any kind of wall works!

Click the button to go to the next question! YOU'RE RIGHT! Click the button to go to the next question!

Question 3 Which one of these is a good password? 1. “password” 3. “fgSFds$19$94”

You are now ready to use the Internet safely. CONGRATULATIONS! You are now ready to use the Internet safely.