Download presentation
Presentation is loading. Please wait.
Published byEunice Moore Modified over 8 years ago
1
Cyber Security By:Jerusa Miller July 7, 2008
2
What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet. The protection of data and systems in networks that are connected to the Internet.
3
Internet Issues VirusesWorms Trojan Horses Hackers What are they all? What do they do?
4
Viruses A small piece of manmade code that is loaded onto your computer without your knowledge and runs without granted acces A small piece of manmade code that is loaded onto your computer without your knowledge and runs without granted acces Viruses can replicate itself over and over again Rapidly use all your memory Slow down system and/or bring to a halt Transmit itself across networks and bypass security systems What is a Virus What do they do
5
Worms A special type of Virus that replicates itself over a computer network and usually performs malicious actions. A special type of Virus that replicates itself over a computer network and usually performs malicious actions. Use computer memory Use computer resources Bring system to a halt Possibly shut the entire system down in other terms crash your computer What is a WORM? What does a WORM do?
6
Trojan Horses A destructive program that masquerades as a benign application that does not replicate itself A destructive program that masquerades as a benign application that does not replicate itself A program that claims it rids your computer or viruses but in actuality introduces viruses onto your computer A program that claims it rids your computer or viruses but in actuality introduces viruses onto your computer Remote acces tojans Remote acces tojans Date Sending Trojans Date Sending Trojans Destrcutive Trojans Destrcutive Trojans Proxy Trojans Proxy Trojans FTP Trojans FTP Trojans Security Software disabler Trojans Security Software disabler Trojans Denial-of-Service Attck Trojans Denial-of-Service Attck Trojans Types of Trojans What is a Trojan
7
Computer Hackers An individual that gains unauthorized access to computer systems for the purpose of stealing and corrupting data. An individual that gains unauthorized access to computer systems for the purpose of stealing and corrupting data.
8
What Is a Password A password is a private series of characters that enables a user to access files, computer, and/or programs. A password is a private series of characters that enables a user to access files, computer, and/or programs.
9
Is your Password Strong? 6-12 characterts 6-12 characterts Uppercase letters Uppercase letters Lower Case letters Lower Case letters Numbers Numbers Special Characters Special Characters (*%$#) (*%$#) A strong password should consist of,
10
Methods to Prevent Malicious objects Purchase or download spyware Make sure you are protected by fireware Turn on pop-up blockers Be cautious of what information you submit and who you submit it to. Create strong passwords Be cautious of the sites and programs that your enter Pay attention of ALL warnings directed at you
11
HAPPY BROWSING!!!!!
12
Work Citations http://www.pcmag.com/encyclopedia_term/0,254 2,t=cybersecurity&i=40643,00.asp http://www.pcmag.com/encyclopedia_term/0,254 2,t=cybersecurity&i=40643,00.asp http://www.pcmag.com/encyclopedia_term/0,254 2,t=cybersecurity&i=40643,00.asp http://www.ssqq.com/information/images/comput er%20girl%20gary.jpg http://www.ssqq.com/information/images/comput er%20girl%20gary.jpg http://www.ssqq.com/information/images/comput er%20girl%20gary.jpg http://www.webopedia.com/TERM/V/virus.html http://www.webopedia.com/TERM/V/virus.html http://www.webopedia.com/TERM/w/worm.html http://www.webopedia.com/TERM/w/worm.html http://www.webopedia.com/TERM/T/Trojan_hors e.html http://www.webopedia.com/TERM/T/Trojan_hors e.html http://www.webopedia.com/TERM/T/Trojan_hors e.html http://instructors.cwrl.utexas.edu/jbrown/files/hac kers_cartoons.jpg http://instructors.cwrl.utexas.edu/jbrown/files/hac kers_cartoons.jpg http://instructors.cwrl.utexas.edu/jbrown/files/hac kers_cartoons.jpg http://www.webopedia.com/TERM/h/hacker.html http://www.webopedia.com/TERM/h/hacker.html http://www.webopedia.com/TERM/p/password.ht ml http://www.webopedia.com/TERM/p/password.ht ml http://www.webopedia.com/TERM/p/password.ht ml
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.