1 / 11

Computer Security and Risks - Phishing, Viruses, Corporate Espionage

Computer Security and Risks - Phishing, Viruses, Corporate Espionage . BY: LIA CARLSON AND CHRISTINA DEL PINO. Why is it Important to Have Computer Security? . People can hack into your computer Strangers can read your emails People can look at the information that is on your computer

tudor
Download Presentation

Computer Security and Risks - Phishing, Viruses, Corporate Espionage

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security and Risks - Phishing, Viruses, Corporate Espionage BY: LIA CARLSON AND CHRISTINA DEL PINO

  2. Why is it Important to Have Computer Security? • People can hack into your computer • Strangers can read your emails • People can look at the information that is on your computer • People can use your computer to attack other systems

  3. Why Would Someone Want to Hack onto Your Computer? • Hackers want to gain control of your computer • Hackers can launch attacks on other computer systems. • Your computer can hide their location of where they’re launching the attack • Hackers gain access to your file

  4. What is Phishing ? • Phishing is the criminally deceptive process of attempting to obtain information such as: • usernames • passwords • credit card details • Phishing is typically carried out by email or instant messaging

  5. This is what a Phishing E-mail Looks Like • Don’t be fooled if it looks like the email is from a co-worker! • Phishing scams rely on placing links in your email from services you trust • Phishing can also be used on: websites and instant messaging

  6. A Virus is a software program capable of reproducing itself • It is capable of causing great harm to files or other programs • Some different kind of viruses are: • File infectors • System or boot record infectors • Macro viruses

  7. Three Main Classifications of Viruses: • File infectors-attach themselves to program files. • System or boot-record infectors- they infect executable codes found in certain system areas on a disk. • Macro-Viruses- most common viruses. Infects Microsoft word and inserts unwanted words.

  8. What is Corporate Espionage? • Individuals/corporations use any means to acquire data • They hope this will give them competitive advantages over competitions. • Companies hire military and government agents to use their spying techniques

  9. What Data are They Collecting? • Customer Information • Patents in progress • Latest research and development • Future plans and markets

  10. Social and Ethical Issues: • Is it right that people’s personal information is accessible? • Is it fair that hackers are stealing other companies secrets and not necessarily being punished?

More Related