Download presentation
Presentation is loading. Please wait.
Published byAlexander Tucker Modified over 9 years ago
1
Sean Nagelski, Kristina Klima, and Kelly Sipko
3
Internet Security Establish rules and measure to use against attacks over the Internet Privacy Settings Firewalls
4
Schools Pros: Cons: Kids stay focused Safety Learn how to use academic search engines Can’t research Reduces teaching options Less options for resources
5
Businesses Pros: Cons: Helps prevent fraud/hacking Increase costumer satisfaction Stay focused Affordability Too much security
6
Privacy Settings Settings that allow the administrator to control the collection, use, and distribution of personal data Facebook Twitter Tumblr YouTube Facebook/Twitter Activity
7
Real Life Stories YouTube Video
8
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through email, destroy hard drive Contracted through emails, downloads, CDs, etc can be instantaneous or dormant
9
Viruses Some types: Worm: replicates self through email attachments File infectors: attached to files; when program loads, so does virus Macro viruses: attack Word; inserts unwanted words/phrases Spyware: pop-up windows that literally spy on your computer by sending out private info
10
Viruses The best way to guard against viruses is to know the origin of every program and everything you download
11
Firewalls “Hardware or software that slows the invasion of a computer system by blocking viruses and hackers” (Gil) Monitors traffic and blocks certain ports while only allowing specified program and services Routers: limit traffic from certain IP addresses
12
Antivirus Most protect against more than just viruses, such as any “malicious software” Security Suites Need to be updated because viruses and other malicious software are constantly updated
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.