Infotech
Sponsored Links
This presentation is the property of its rightful owner.
1 / 21

Infotech PowerPoint PPT Presentation


  • 99 Views
  • Uploaded on
  • Presentation posted in: General

Infotech. Unit 19 INTERNET SECURITY. Prepared by: JAWEED AHMED KHAN. Security and Privacy on the internet. Hackers Be Careful. Hacker. a person who secretly finds a way of looking at and/or changing information on sb else's computer system without permission .

Download Presentation

Infotech

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Infotech

Unit 19

INTERNET SECURITY

Prepared by: JAWEED AHMED KHAN


Security and Privacy on the internet


Hackers Be Careful


Hacker

a person who secretly finds a way of looking at and/or changing information on sb else's computer system without permission


How to make safe transactions?


Security on the web


RELAX

Set all security alerts to high on your web browser.

Use the browsers that displays lock sign on the website and enables you to delete cookies.


For online banking

Make sure banks provide digital certificates.

Use a browser that is compliant with SSL(Secure Sockets layer)


Email Privacy

Put it in virtual envelope- encode it with encryption.

Use the freeware invented by Phil Zimmerman called PRETTY GOOD PRIVACY.


Phil Zimmerman


NETWORK SECURITY


Methods of Protection


Encryption

Changes data into a secret code so that someone with a key can read it.


Decryption

Converts encrypted data back into its original form.


Malware Protection


Malware are malicious software designed to damage your computer .

Example:-

Viruses, Trojans, Worms, Spyware.


  • A virus can enter PC via infected discs or internet.

  • A worm spreads through e- mail attachments.

  • A Trojan horse is disguised as useful program but may attack data security.

  • Spyware and adware collect information from your PC. They come with ads and free downloads.


So, If You want to protect your PC


Don’t open e-mail from strangers.

Take care when downloading files.

Update your anti – virus.


Note


Thank You


  • Login