1 / 12

Internet Securtiy

Internet Securtiy. Sean Nagelski , Kristina Klima, and Kelly Sipko. Sean. Internet Security. Establish rules and measure to use against attacks over the Internet Privacy Settings Firewalls. Sean. Schools. Pros: . Cons:. Kids stay focused Safety

Download Presentation

Internet Securtiy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Securtiy Sean Nagelski, Kristina Klima, and Kelly Sipko

  2. Sean

  3. Internet Security • Establish rules and measure to use against attacks over the Internet • Privacy Settings • Firewalls Sean

  4. Schools Pros: Cons: • Kids stay focused • Safety • Learn how to use academic search engines • Can’t research • Reduces teaching options • Less options for resources Sean

  5. Businesses Pros: Cons: • Helps prevent fraud/hacking • Increase costumer satisfaction • Stay focused • Affordability • Too much security Sean

  6. Privacy Settings • Settings that allow the administrator to control the collection, use, and distribution of personal data • Facebook • Twitter • Tumblr • YouTube Kristina Facebook/Twitter Activity

  7. Real Life Stories Kristina

  8. Viruses • According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” • Harm data, spread to others through email, destroy hard drive • Contracted through emails, downloads, CDs, etc • can be instantaneous or dormant

  9. Viruses • Some types: • Worm: replicates self through email attachments • File infectors: attached to files; when program loads, so does virus • Macro viruses: attack Word; inserts unwanted words/phrases • Spyware: pop-up windows that literally spy on your computer by sending out private info

  10. Viruses • The best way to guard against viruses is to know the origin of every program and everything you download

  11. Firewalls • “Hardware or software that slows the invasion of a computer system by blocking viruses and hackers” (Gil) • Monitors traffic and blocks certain ports while only allowing specified program and services • Routers: limit traffic from certain IP addresses

  12. Antivirus • Most protect against more than just viruses, such as any “malicious software” • Security Suites • Need to be updated because viruses and other malicious software are constantly updated

More Related