Download presentation
Presentation is loading. Please wait.
Published byLynette Franklin Modified over 9 years ago
1
Computer Security Dylan, Robert, Matanel, Jordan
2
Topics Covered Password Security Security softwares Consequences of computer insecurity Preventing hacks
3
Password Security Consequences of weak passwords Results of a strong password Tips for password security “Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers.” - Chris Pirillo “Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it with strangers.” - Chris Pirillo
4
Password Security (Cont.) Weak Password ExamplesStrong Password Examples john1234 abc123 qwerty Password 12345678 jelly22fi$h RollTide%.%.Susan53 $m3llycat d3ltagamm@
5
Antivirus Software Antivirus software definition What do viruses do? Identification methods Data mining: algorithms used to analyze behavior of files
6
Antivirus Software Types Antivirus Softwares Firewall: gatekeeper; keeps out incoming attacks Antivirus software: scans viruses, stops them from being installed Antispyware software: scans computer, removes spyware
7
Antivirus Software Programs Examples of programs: Norton Antivirus Bitdefender Internet Security McAfee AntiVirus Kaspersky Internet Security Rogers Online Protection
8
Malware Popularity
9
Firewall Security system that controls network traffic Works as barrier Firewalls built in with operating systems
10
Firewall Types Packet filter Application gateway Circuit level layer Proxy server
11
Consequences of Computer Insecurity Info and identity loss / theft Tracking a user’s actions Data manipulation
12
Preventing Hacks Strong password Backing up info Having firewalls/antivirus softwares Never click on suspicious emails
13
Resources "Data Mining: What Is Data Mining?" Data Mining: What Is Data Mining? Web. 22 May 2015 "What Are Heuristics?" We Live Security RSS 20. 29 Dec. 2010. Web. 22 May 2015. "How Firewalls Work - HowStuffWorks." HowStuffWorks. Web. 25 May 2015. "What Is a Firewall?" Firewall: What It Is and How It Works. Web. 25 May 2015. Oak, Manali. "What Are the Effects of Computer Hacking?" Buzzle. Buzzle.com. Web. 25 May 2015. "How to Prevent Hacking." WikiHow. Web. 25 May 2015.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.