Download presentation
Presentation is loading. Please wait.
1
Network security threats
2
NETWORK SECURITY THREATS
In computer security a threat is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm.
3
Click the shield to begin
Security Threat Click the shield to begin MEMORY QUIZ
4
PHISHING Trojan Hacking Data Theft Virus Eavesdropping Phishing
THREATS Click the threat that matches the clue in the image. Trojan Hacking Data Theft Virus Eavesdropping PHISHING Phishing
5
HACKING Trojan Hacking Data Theft Virus Eavesdropping Phishing THREATS
Click the threat that matches the clue in the image. Trojan Hacking Data Theft Virus Eavesdropping HACKING Phishing
6
VIRUS Trojan Hacking Data Theft Virus Eavesdropping Phishing THREATS
Click the threat that matches the clue in the image. Trojan Hacking Data Theft Virus Eavesdropping VIRUS Phishing
7
TROJAN Trojan Hacking Data Theft Virus Eavesdropping Phishing THREATS
Click the threat that matches the clue in the image. Trojan Hacking Data Theft Virus Eavesdropping TROJAN Phishing
8
EAVESDROPPING Trojan Hacking Data Theft Virus Eavesdropping Phishing
THREATS Click the threat that matches the clue in the image. Trojan Hacking Data Theft Virus Eavesdropping EAVESDROPPING Phishing
9
DATA THEFT Trojan Hacking Data Theft Virus Eavesdropping Phishing
THREATS Click the threat that matches the clue in the image. Trojan Hacking Data Theft Virus Eavesdropping DATA THEFT Phishing
10
Identify the threat that the definition best describes
A piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data ________ The attempt to obtain financial or other confidential information from Internet users, typically by sending an that looks as if it is from a legitimate organization. _____________________ A type of malware that is often disguised as legitimate software or advertisement that seems appealing. _____________________ An unauthorized intrusion into a computer or a network.____________ Unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference. _____________________ The act of stealing computer-based information from an unknowing victim with the intent of compromising privacy or obtaining confidential information___________________________
11
Network security measures
12
Click the shield to begin
Security Click the shield to begin MEMORY QUIZ
13
FIREWALL Locks Encryption Private Filtering Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall FIREWALL Password Biometrics Anti-spyware
14
LOCKS Locks Encryption Private Filtering Anti-Virus Firewall Password
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall LOCKS Password Biometrics Anti-spyware
15
BIOMETRICS Locks Encryption Private Filtering Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall BIOMETRICS Password Biometrics Anti-spyware
16
PASSWORD Locks Encryption Private Filtering Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall PASSWORD Password Biometrics Anti-spyware
17
PRIVATE FILTERS Locks Encryption Private Filters Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filters Anti-Virus Firewall PRIVATE FILTERS Password Biometrics Anti-spyware
18
ANTI-VIRUS Locks Encryption Private Filtering Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall ANTI-VIRUS Password Biometrics Anti-spyware
19
ENCRYPTION Locks Encryption Private Filtering Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall ENCRYPTION Password Biometrics Anti-spyware
20
ANTI-SPYWARE Locks Encryption Private Filtering Anti-Virus Firewall
Click the security measure that matches the clue in the image. SECURITY Locks Encryption Private Filtering Anti-Virus Firewall ANTI-SPYWARE Password Biometrics Anti-spyware
21
IT’S TIME TO RESEARCH Your task is to research the meaning of each security measure term! You can perform advance search by extending your criteria, using operators, in the search bar
22
Performing advanced search
You can perform advanced search by using various criteria, such as Selecting your search engine (one other than Google) Indicate the file type you wish to access You could specify the country Year Imagine you wish to search for computer security measures. Instead of typing the keywords “Computer security measures” in the search box, you could be more specific, for example Computer security measures + doc This means that you wish to view a DOCUMENT file posted in 2017
23
In the image below, I used ‘Dogpile’ search engine, and at performed advanced search using the ‘+’ operator.
24
Identify the security measure that the definition best describes
A software designed to detect and destroy computer viruses. _________________ The process of converting information or data into a code, especially to prevent unauthorized access. _________________________ A network security system designed to prevent unauthorized access to or from a private network. _____________________________ A type of program designed to prevent and detect unwanted program installations which are hidden on the user’s computer without his/her knowledge ____________ A feature that enables you to block you from malicious websites _______________ A secret word or phrase that must be used to gain admission to a place a computer system __________ The analysis of facial features or patterns for the authentication or recognition of an individuals identity. _______________________ A mechanism for keeping a door, window, lid, or container fastened, typically operated by a key.
25
Write the answers in your notebook.
For each threat, recommend TWO ideal security measure that will prevent or mitigate such threat. Justify your answer. Threat Security Justification Phishing Anti-spyware Privacy filters Anti-spyware will prevent unknown applications stealing personal information. Privacy filters will guard against personal information being read by onlookers. Hacking Virus Trojan Eavesdropping Data theft Write the answers in your notebook.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.