Name : Ahmed S. Eleyan No. : 120100230 Teacher : Rasha Attalah Subject : Secure Your Data Date : 20 / 12 / 2010 College of Engineering.

Slides:



Advertisements
Similar presentations
HAVE YOUR PHOTOS DIGITIZED PCNA: GET YOUR OLD PHOTOS CONVERTED TO A DIGITAL FORMAT FOR YOU.
Advertisements

Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Let’s Set Up Google. Open your Google Chrome Browser.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Jason Rich CIS  The purpose of this project is to inform the audience about the act of phishing. Phishing is when fake websites are created.
Login to University Web Site Enter in to login in which click Institution login.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Digital Certificate Installation & User Guide For Class - 2 Certificates.
It is not necessary to login to use the card catalog, but extra features are available when you are logged in. It is the same user name and password as.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Access the forum from the Support section of the GWB Student website or go directly to forum.gwb.com.
Computer Information Use your own login and password if possible. To get a password, you must turn in the AUP sheet handed out at registration or sent.
IT Security for Users By Matthew Moody.
Reliability & Desirability of Data
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Cyber Security… Compiled by J. Camp Benfer Elementary Klein ISD March 2009 …or How to Keep Your Computer & Your Personal Information Safer …or How to Keep.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
By: Nick Burman, Austin Corbin, Megan Nieszala, Taylor Marshall One of the largest services in the world with more than 360 million active acounts.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
© All Rights Reserved What is a computer virus? A computer virus is a piece of software or programming code.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Computer security By Shreya Houji. VirusesViruses.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
At the Log in page enter your college provided username and password then click submit to login to Owl Link.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
EBC Flex Help Accessing the website and your account.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Internet Security and Your Computer Welcome to Boot Camp.
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
Internet 1) John R. Levine, Margaret Levine Young, The Internet for Dummies. Wiley Publishing, 12 th Edition, 2010.
All you need to know to keep you and your computer safe!!!
Getting Started. Package Overview (GradeQuick)‏ Web-based grade book –Access Anywhere –Always Current Paper grade book “look and feel” Flexible grading.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Day 1 on Tech Use March 26, Students ◦ Log in at:  j.mp/cmsgaggle (don’t use www or  use FireFox browser ◦ Username: flastxxxx  first.
Helping Students Use Turnitin.com Lillie Craton Lander University Fall 2012.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
PHISHING METHODS BY UMESH KHIVASARA FOR HACKING FACEBOOK
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
Cybersecurity Test Review Introduction to Digital Technology.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Yahoo Help Phone Number Get Instant Help.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Avoid plagiarism Save time and aggravation Make your life EASIER!
Cyber security. Malicious Code Social Engineering Detect and prevent.
Unit 4 IT Security.
How to Install and Setup Quick Heal Antivirus Call
Reset AOL Mail Password Online How to Reset AOL Mail Password Online? Call AOL Technical Support Number to Reset AOL Mail Password by AOL.
How to Recover the Disabled Facebook Account
Check the buttons at the bottom of your Alert
Create an Account Click on the button next to the Create Account Click
Computer Security.
What you will need to Register
This presentation uses a free template provided by FPPT.com Hotmail Help Contact Number USA
This presentation uses a free template provided by FPPT.com Hotmail Help Contact Number USA
Hotmail Customer Care Number USA Toll Free Number

Presentation transcript:

Name : Ahmed S. Eleyan No. : Teacher : Rasha Attalah Subject : Secure Your Data Date : 20 / 12 / 2010 College of Engineering

Agenda Your Data is very important How to Protect my self from Hacking ? What Should I do If my STOLEN ?!

Your Data is very important You must keep your Security data and information in safty Place which no Unwanted Spy can enter it. Viruses & Torjans Conquered the world. Its first target is stole your security data. The security consists of : Computer security National security Physical security We will consider Computer Security ( Internet ).

How to Protect your self from Hacking ? 1.Your Antivirus Must be Up to date to protect your pc from any new virus.

How to Protect your self from Hacking ? 2. Viruses & Trojans Some times when you explore the internet website, Suddenly you face a fantastic Program This program Do alot of things, but its size : 900 kb! You should know that this file could have VIRUS ! You reatch your antivirus program and let it scan the file and the result no virus ! Don’t trust your antivirus always, because there was a system in hacker called Encryption.

How to Protect your self from Hacking ? This website can scan your file over 43 Antivirus program

How to Protect your self from Hacking ? And here we see the result of scanning

How to Protect your self from Hacking ? 2.Phishing Websites : it’s a fake website has a typically design of a original website designed for Spy Reason. Let us see what is the difference ?

How to Protect your self from Hacking ? 2.Phishing Websites : it’s a fake website has a typically design of a original website designed for Spy Reason. Let us see what is the difference ?

How to Protect your self from Hacking ? 3.Don’t Check on Save my password on important program & Websites Because ( If ) the hacker attack your pc, first thing he do is Export your saved password.

What Can I Do If my Stolen? – We will explain ( Hotmail ) Service – Login to your hotmail account at : – – Then go to Account details (password, aliases, time zone) Account details (password, aliases, time zone)

What Can I Do If my Stolen?

– First thing you should do is to save the lasts data in txt file. – Save this file in safe place ( USB Flash, CD, alternative hard disk,.. Etc ) – Now we will consider that your has been hacked, what should you do ?

What Can I Do If my Stolen? 1.Reach your Browser ( Firefox,Chrome,..) and go to : set.aspx set.aspx 2.Click on Continue 3.Click on Continue too 4.Then you will see a page require from you to type address that Hotmail team will contact you.

What Can I Do If my Stolen? 5.Write your stolen and hit continue

6.As we see here,Hotmail Required some information To trust that you are the Owner of address Like: – Full Name – Country – Ip ( you can get it from ( – Your last Nick Name – Your Folder’s Name

What Can I Do If my Stolen? 7.At the end of page there was a Big Rectangle You can write Any additional info that might be useful in validating the ownership of the account Like Unique ID 8. After that hit continue and you will get Special Pin Code, Save it.

What Can I Do If my Stolen? 9. After ( 24 Hours ) Open your , you will receive a special link from Hotmail team, Click on it and type your new password