infotech
Download
Skip this Video
Download Presentation
Infotech

Loading in 2 Seconds...

play fullscreen
1 / 21

Infotech - PowerPoint PPT Presentation


  • 168 Views
  • Uploaded on

Infotech. Unit 19 INTERNET SECURITY. Prepared by: JAWEED AHMED KHAN. Security and Privacy on the internet. Hackers Be Careful. Hacker. a person who secretly finds a way of looking at and/or changing information on sb else's computer system without permission .

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Infotech' - lorne


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
infotech

Infotech

Unit 19

INTERNET SECURITY

Prepared by: JAWEED AHMED KHAN

hacker
Hacker

a person who secretly finds a way of looking at and/or changing information on sb else's computer system without permission

slide7
RELAX

Set all security alerts to high on your web browser.

Use the browsers that displays lock sign on the website and enables you to delete cookies.

slide8
For online banking

Make sure banks provide digital certificates.

Use a browser that is compliant with SSL(Secure Sockets layer)

slide9
Email Privacy

Put it in virtual envelope- encode it with encryption.

Use the freeware invented by Phil Zimmerman called PRETTY GOOD PRIVACY.

slide16
Malware are malicious software designed to damage your computer .

Example:-

Viruses, Trojans, Worms, Spyware.

slide17
A virus can enter PC via infected discs or internet.
  • A worm spreads through e- mail attachments.
  • A Trojan horse is disguised as useful program but may attack data security.
  • Spyware and adware collect information from your PC. They come with ads and free downloads.
slide19
Don’t open e-mail from strangers.

Take care when downloading files.

Update your anti – virus.

ad