Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.

Slides:



Advertisements
Similar presentations
®® Microsoft Windows 7 for Power Users Tutorial 7 Enhancing Your Computers Security.
Advertisements

Cloud Computing EDT Cloud Computing Overview Cloud Computing can be defined as a network of applications, services, and infrastructure that are.
Thank you to IT Training at Indiana University Computer Malware.
{ Making Microsoft Office work for you Organizing Your Life at work and home in the Cloud Presented by: Matthew Baker (321)
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Security, Privacy, and Ethics Online Computer Crimes.
Explanations Of Software Utilities By Tim Wong.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 2 This material was developed by Oregon Health.
Tutorial 1: Browser Basics.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Sean Nagelski, Kristina Klima, and Kelly Sipko.
Chapter 3 Software. Learning Objectives Upon successful completion of this chapter, you will be able to: Define the term software Describe the two primary.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Web Browsing *TAKE NOTES*. Millions of people browse the Web every day for research, shopping, job duties and entertainment. Installing a web browser.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
 Internet –INTERnational NETwork is the network of computer networks.  It is a Wide Area Network(WLAN).You can have unlimited access to internet. 
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Computer Security Keeping you and your computer safe in the digital world.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Information Technology Acceptable Use An Overview
Managing Windows Security
Lesson #8 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 8 Configuring Applications and Internet Explorer.
Which is right for your business, Office 365 or Microsoft 365?
Which is right for your business, Office 365 or Microsoft 365?
Browsing in Private Mode
Presentation transcript:

Jeff Reintjes, Kevin Hao, Carinne Rawlins

Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen

Information IP address Whether or not a human or computer is using Bing’s search engine Facebook information (posts, pictures, interest) Purchases Search histories

Value on Information Microsoft and Bing work hard to protect your personal information Stored on databases SQL and Cosmos Credible companies can access it MSIT is the primary protector of personal information

Hardware Comes from Dell and HP Cost between $1,000 to $2,000 per server Employees have their company Laptops Tablets Phones Company equipment is either Windows, Lenovo, or Acer

Software Microsoft 2012 Windows 8 and 8.1 Microsoft SQL Cosmos

Network: With Customers Users from Bing.com Web Crawler IndexSearch Results

Network: Employees In the same corporate network o s and other communication o Anything saved in the server is all in the corporate network o Microsoft alias to sign in o Private network for different data centers o Different centers require proper credentials Sharepoint o Collaborating software o Connect with employees across the enterprise o Store, sync, share info o Allow IT departments to manage cost, risk and their time

Network: IT Outlook servers for IM Written codes are also stored in servers Developers go to those servers and examine code so everyone has the consistent copy Everyone can connect and modify same document Access granted to those who have the need, engineers, or the server personnel

IT/IS Positions Microsoft information technology (MSIT) In charge of the things like security for their computers Required to get certain updates periodically In charge of firewalls, antivirus software, installation of windows and copying other images to hard drive If computer has problems you can contact them

Use of the Web Usually there are about an average of 2-5 million search results Images section: categories and subcategories like famous people, animals, and nature Videos section: YouTube, Hulu, ABC news, and Dailymotion Map section: is mainly used for navigation to business places, national parks, or anywhere that has an address News section: recent or significance in the US and the world Advertisements: can put your business on Bing and make it relevant depending on how much money you put in the website

Security and Privacy MSIT Responsible for the security for their computers Hackers Try to take down or overload the system: they block requests Know the IP Address Customer Privacy If you go to the settings of your Internet browser, you can block cookies, traffic levels, popups, and delete history Private browsing mode Algorithms to detect and block spam/malicious websites from coming up in search results Trojan horse virus

Recommendations/Evalua tions While security algorithms detect malicious websites they don’t block all of them Proper credentials to access security systems More relevant search results