Website on Computer Security By: Brittany Freeman.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Implications and Security Issues of the Internet By Neelesh Patel.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
INTERNET SAFETY FOR STUDENTS
HIPAA Security Standards What’s happening in your office?
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
The Expressions for Internet & e-Commerce Complied by Terri Yueh.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Unit 28- Website Development Assignment 1- THEORY P3
THE BASICS OF THE WEB Davison Web Design. Introduction to the Web Main Ideas The Internet is a worldwide network of hardware. The World Wide Web is part.
E-Safety Quiz Keeping safe online! A guide for parents & children.
INTERNET SAFETY FOR STUDENTS
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
STAY SAFE ONLINE. STAY SAFE ONLINE! PLEASE MAKE SURE YOU LOGIN AT THE CORRECT BANK URL / ADDRESS 1.NEVER LOGIN VIA LINKS 2.NEVER REVEAL YOUR PIN.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
1 E-Wallets Your Logo Here Jennifer Hart. 2 Why We “Need” E-Wallets For frequent online shoppers, it becomes a hassle to fill out order forms with the.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
Web Site Security Andrew Cormack JANET-CERT ©The JNT Association, 1999.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Keeping Safe While Using the Internet. We live in a community. What are some safety rules we have in our community? Cyberspace is also a community. What.
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Working safely By tom squire. Keeping secrets Never tell anybody you password for you website as they could take information or mess up your website.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
Digital Citizenship. What is a Digital Citizen? Digital Citizens are people who use technology often and appropriately. Digital Citizens are people who.
The World Wide Web. What is the worldwide web? The content of the worldwide web is held on individual pages which are gathered together to form websites.
Mr C Johnston ICT Teacher
Society & Computers PowerPoint
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Policies and Security for Internet Access
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
ICT in Product Manufacture ISDN, LAN, WAN, Intranets and extranets, global networks
Welcome to Milton’s Parts Express
Technology Vocabulary Words
Internet Basics.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
5 Techniques for a Proper Website Security Testing.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Your Safety Net MSTI Safety on the Internet Tuesday March 30, 2010
Computer Security.
IGraphic Social impacts of IT
WEB PAGES AND WEB SITES.
Internet Vocabulary Terms
Do You Have Multiple Amazon Seller Accounts? Amazon Knows it! By EsellersCare Contact : +1 (855)
Presentation transcript:

Website on Computer Security By: Brittany Freeman

 To techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords. Data encryption is the translation of data into a form that is unintelligible without a deciphering mechanism. A password is a secret word or phrase that gives a user access to a particular program or system. What is Computer Security?

Problem  The problem now is the theft within the computer system and this web page will protect you from getting robbed of important and personal documents. Objective  The objective is to stop thefts from getting your information and protecting your computer. With this I constructed a website to show the things that can be done to prevent and protect your computer. Problem and Objective

 You will need a plan on how exactly the web site will look.  You need to construct panels where you can divide all the different topics you need to talk about.  Design each page to contain the topic you’re talking about or to catch the person’s attention.  Make sure that the web site is operating properly. The Process

Result of Web site

Result of Webpage II

 Help stop the crime of having your computer hacked.  Have the opportunity of purchasing software to protect computer.  Have opportunities of giving your advice about the website.  With this web page if you need any consultation, they will be located in the same country as you to help assist in finding the best way to protect your computer and what you will need to do that. Advantages of Web site

 M5 Internet Hosting is an Internet Hosting that will be linked with the Computer Security Web page. This website has different serves associated with it such as in Linux and BSD dedicated servers.  To design this website, I used Dreamweaver for a design aspect. Hosting & Design

 The website many people might not agree to.  The software available to people, some people may already have it.  The information given to customers may not be helpful or need more different information. Disadvantages of Web site

 There’s some things that people don’t know about computer security. There has to be trust. Trust in people and things you may hear on the radio or news that gives you insight on new information.  There’s something that people shouldn’t do unless they have no choice I put things out there on the Internet such as their credit card number or anything that may cause other people to get and run up your credit or cause things in your life to go wrong. Insight about Web site

 This website has the way of having customers explore to what can happen if they and their computer isn’t protected.  This website will have customers educated and informed at protecting themselves from hackers by having different software that prohibits people from getting their personal information and protecting the computer from viruses and such. Conclusion

 Software Engineering Institute. ( ). Retrieved March 29, 2012, from rity/  (2012). Retrieved March 29, 2012, from Safety & Security Center:  References