Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Dylan, Robert, Matanel, Jordan.

Similar presentations


Presentation on theme: "Computer Security Dylan, Robert, Matanel, Jordan."— Presentation transcript:

1 Computer Security Dylan, Robert, Matanel, Jordan

2 Topics Covered Password Security Security softwares Consequences of computer insecurity Preventing hacks

3 Password Security Consequences of weak passwords Results of a strong password Tips for password security “Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers.” - Chris Pirillo “Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers.” - Chris Pirillo

4 Password Security (Cont.) Weak Password ExamplesStrong Password Examples john1234 abc123 qwerty Password 12345678 jelly22fi$h RollTide%.%.Susan53 $m3llycat d3ltagamm@

5 Antivirus Software Antivirus software definition What do viruses do? Identification methods Data mining: algorithms used to analyze behavior of files

6 Antivirus Software Types Antivirus Softwares Firewall: gatekeeper; keeps out incoming attacks Antivirus software: scans viruses, stops them from being installed Antispyware software: scans computer, removes spyware

7 Antivirus Software Programs Examples of programs:  Norton Antivirus  Bitdefender Internet Security  McAfee AntiVirus  Kaspersky Internet Security  Rogers Online Protection

8 Malware Popularity

9 Firewall Security system that controls network traffic Works as barrier Firewalls built in with operating systems

10 Firewall Types Packet filter Application gateway Circuit level layer Proxy server

11 Consequences of Computer Insecurity Info and identity loss / theft Tracking a user’s actions Data manipulation

12 Preventing Hacks Strong password Backing up info Having firewalls/antivirus softwares Never click on suspicious emails

13 Resources "Data Mining: What Is Data Mining?" Data Mining: What Is Data Mining? Web. 22 May 2015 "What Are Heuristics?" We Live Security RSS 20. 29 Dec. 2010. Web. 22 May 2015. "How Firewalls Work - HowStuffWorks." HowStuffWorks. Web. 25 May 2015. "What Is a Firewall?" Firewall: What It Is and How It Works. Web. 25 May 2015. Oak, Manali. "What Are the Effects of Computer Hacking?" Buzzle. Buzzle.com. Web. 25 May 2015. "How to Prevent Hacking." WikiHow. Web. 25 May 2015.


Download ppt "Computer Security Dylan, Robert, Matanel, Jordan."

Similar presentations


Ads by Google