1 / 12

Cyber Security

By:Jerusa Miller July 7, 2008. Cyber Security. What Is Cyber Security?. The protection of data and systems in networks that are connected to the Internet. Internet Issues. Viruses Worms Trojan Horses Hackers. What are they all? What do they do?.

nishan
Download Presentation

Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. By:Jerusa Miller July 7, 2008 Cyber Security

  2. What Is Cyber Security? • The protection of data and systems in networks that are connected to the Internet .

  3. Internet Issues • Viruses • Worms • Trojan Horses • Hackers What are they all? What do they do?

  4. A small piece of manmade code that is loaded onto your computer without your knowledge and runs without granted acces Viruses can replicate itself over and over again Rapidly use all your memory Slow down system and/or bring to a halt Transmit itself across networks and bypass security systems Viruses What do they do What is a Virus

  5. A special type of Virus that replicates itself over a computer network and usually performs malicious actions. Use computer memory Use computer resources Bring system to a halt Possibly shut the entire system down in other terms crash your computer Worms What is a WORM? What does a WORM do?

  6. A destructive program that masquerades as a benign application that does not replicate itself A program that claims it rids your computer or viruses but in actuality introduces viruses onto your computer Remote acces tojans Date Sending Trojans Destrcutive Trojans Proxy Trojans FTP Trojans Security Software disabler Trojans Denial-of-Service Attck Trojans Trojan Horses What is a Trojan Types of Trojans

  7. Computer Hackers • An individual that gains unauthorized access to computer systems for the purpose of stealing and corrupting data.

  8. What Is a Password • A password is a private series of characters that enables a user to access files, computer, and/or programs.

  9. Is your Password Strong? A strong password should consist of, • 6-12 characterts • Uppercase letters • Lower Case letters • Numbers • Special Characters • (*%$#)

  10. Purchase or download spyware Make sure you are protected by fireware Turn on pop-up blockers Be cautious of what information you submit and who you submit it to. Create strong passwords Be cautious of the sites and programs that your enter Pay attention of ALL warnings directed at you Methods to Prevent Malicious objects

  11. HAPPY BROWSING!!!!!

  12. Work Citations • http://www.pcmag.com/encyclopedia_term/0,2542,t=cybersecurity&i=40643,00.asp • http://www.ssqq.com/information/images/computer%20girl%20gary.jpg • http://www.webopedia.com/TERM/V/virus.html • http://www.webopedia.com/TERM/w/worm.html • http://www.webopedia.com/TERM/T/Trojan_horse.html • http://instructors.cwrl.utexas.edu/jbrown/files/hackers_cartoons.jpg • http://www.webopedia.com/TERM/h/hacker.html • http://www.webopedia.com/TERM/p/password.html

More Related