1 / 8

Digital security

Pelenatino Vito 1 st period. Digital security. Meaning. Theme Meaning: security Security (self-protection): electronic precautions to guarantee safety Protecting hardware and network security by using secure and secret passwords

sonja
Download Presentation

Digital security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Pelenatino Vito 1st period Digital security

  2. Meaning Theme Meaning: security Security (self-protection): electronic precautions to guarantee safety Protecting hardware and network security by using secure and secret passwords Protecting personal by not posting personal information online

  3. Ways to follow Ways to follow: However, governments are also developing the capacity to manipulate, monitor and subvert electronic information. Surveillance and censorship is growing and the lack of security for digitally stored or communicated information is becoming a major problem for human rights defenders in some countries

  4. Consequences Consequences: It might seem like a lot of trouble remembering passwords and asking about security everywhere you use your credit card. Perhaps we should review what happens when you have been hacked. Within minutes of the attack, hackers will have uploaded your personal and financial information to the Internet, where others will acquire it and begin to use it within an hour. You might notice that your computer or device is running more slowly, or an implanted virus might create pop-up advertisements or otherwise interrupt how your device functions. Those tactics, however, have grown long in the tooth. In most cases these days, you might not know about the breach for several months, and even then a third party—your bank or credit card vendor—is more likely to notice the problem than you are.

  5. My Sources Ribble, M. (2012). Digital citizenship. Retrieved from http://www.digitalcitizenship.net/ http://www.frontlinedefenders.org/security-training. (n.d.). Retrieved from Front line defenders Computer applications. (2012). Retrieved from http://www.pensacolachs.org/webpages/ca applications/index.cfm?subpage=428866 Your digital life. (2012). Retrieved from http://www.pcworld.com/article/2010047/ke eping-your-financial-data-safe.html

  6. Sources http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=VWZPwuL8_goHUM:&imgrefurl=http://www.relationship-economy.com/2007/10/the-security-factor/the-digital-security-factors/&docid=IqMTiwQVV-lj1M&imgurl=http://www.relationship-economy.com/wp-content/uploads/2007/10/digital_security2.jpg&w=253&h=380&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=rc&dur=250&sig=104824352009350813061&page=1&tbnh=171&tbnw=114&start=0&ndsp=21&ved=1t:429,r:0,s:0,i:72&tx=82&ty=68&surl=1 http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=36DC8OVa8VIIWM:&imgrefurl=http://pisa.org.pk/&docid=N44DObetg9AByM&imgurl=http://pisa.org.pk/wp-content/uploads/2011/06/HumanElement.jpg&w=600&h=400&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=rc&dur=312&sig=104824352009350813061&page=1&tbnh=130&tbnw=195&start=0&ndsp=21&ved=1t:429,r:18,s:0,i:129&tx=112&ty=67&surl=1

  7. Sources http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=36DC8OVa8VIIWM:&imgrefurl=http://pisa.org.pk/&docid=N44DObetg9AByM&imgurl=http://pisa.org.pk/wp-content/uploads/2011/06/HumanElement.jpg&w=600&h=400&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=rc&dur=312&sig=104824352009350813061&page=1&tbnh=130&tbnw=195&start=0&ndsp=21&ved=1t:429,r:18,s:0,i:129&tx=112&ty=67&surl=1 http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=Yy13v6Lp9KdD3M:&imgrefurl=http://www.docusign.com/jross/3417&docid=1qHNhTVD8cTeoM&imgurl=http://www.docusign.com/sites/default/files/blog/Security.jpeg&w=250&h=235&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=hc&vpx=878&vpy=215&dur=1015&hovh=188&hovw=200&tx=134&ty=148&sig=104824352009350813061&page=1&tbnh=149&tbnw=167&start=0&ndsp=21&ved=1t:429,r:9,s:0,i:100&surl=1

  8. Sources http://www.google.com/imgres?q=digital+security+pics&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=9HiVHd6sGoakTM:&imgrefurl=http://www.amazon.com/Security-Powerpoint-Templates-Template-Background/dp/B0042RMNUW&docid=j0q2RJXOvrUTdM&imgurl=http://ecx.images-amazon.com/images/I/41EQpa9a7oL._SL500_AA300_.jpg&w=300&h=300&ei=wnOFUOyfD5DbigL6z4HgBw&zoom=1&iact=hc&vpx=176&vpy=499&dur=765&hovh=225&hovw=225&tx=136&ty=152&sig=104824352009350813061&page=3&tbnh=146&tbnw=140&start=48&ndsp=29&ved=1t:429,r:17,s:48,i:285&surl=1 http://www.google.com/imgres?q=digital+security+pics&start=250&hl=en&safe=active&sa=X&biw=1280&bih=843&tbm=isch&prmd=imvns&tbnid=kfaogw9-DSg6IM:&imgrefurl=http://www.smallbizdaily.com/8432/8432/&docid=o-dZdyxsvcpqNM&imgurl=http://www.smallbizdaily.com/wp-content/uploads/2012/04/95411875-199x300.jpg&w=199&h=300&ei=vHSFUMTdF4n3iwKGlYBQ&zoom=1&iact=rc&dur=125&sig=104824352009350813061&page=10&tbnh=154&tbnw=102&ndsp=30&ved=1t:429,r:25,s:250,i:268&tx=85&ty=51&surl=1

More Related