1 / 12

--CYBER SECURITY--

--CYBER SECURITY--. By: Jamea Miller June 7, 2008. What is Cyber Security?. We live in a time where almost all aspects of our lives are associated with computers. Cyber Security involves protecting this vital information by detecting and responding to attacks. Things to be aware of…. Hackers

pancho
Télécharger la présentation

--CYBER SECURITY--

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. --CYBER SECURITY-- By: Jamea Miller June 7, 2008

  2. What is Cyber Security? We live in a time where almost all aspects of our lives are associated with computers. Cyber Security involves protecting this vital information by detecting and responding to attacks.

  3. Things to be aware of… • Hackers • Intruders • Attackers --All of these are people who’s actions could cause harm to your computer and the information stored on your computer-- These people’s intentions are not all the same, meaning that some of them intend harm and others don’t.

  4. BASIC MALICIOUS CODE TERMS • VIRUS — a virus requires that you take an action before it can infect your computer, such as opening an infected e-mail, or clicking on particular link • WORMS — a worm doesn’t have to be responded to to infect your computer. They feed off of software weaknesses and vulnerability. After the worm is inside the software, it searches for other computers to infect. Worms operate through e-mail and web pages as well • TROJAN HORSES — a trojan horses is software that is disguised as something else. Because of the disguise, users allow them onto the software without knowing that harm is being done.

  5. …..about firewalls FIREWALLS PROVIDE PROTECTION AGAINST ATTACKERS BY ACTING AS A WALL BETWEEN YOUR COMPUTER OR NETWORK AND UNNECESSARY INTERNET TRAFFIC.

  6. There are 2 types of firewalls • HARDWARE -CALLED NETWORK FIREWALLS -EXTERNAL DEVICES -POSITIONED BETWEEN COMPUTER OR NETWORK AND YOUR CABLE OR DSL MODEM -USEFUL FOR PROTECTING MULTIPLE COMPUTERS -AVAILABLE FOR LESS THAN $100.

  7. There are 2 types of firewalls • SOFTWARE -INTERNAL DEVICE -ONLY NECESSARY IF YOU DO NOT HAVE A BUILT IN FIREWALL -BEST TI INSTALL FROM A CD, DVD, OR FLOPPY DISK -HAVING THIS FIREWALL ON THE SAME COMPUTER AS THE INFORMATION YOUR TRYING TO PROTECT MAY STOP THE FRIELWALL FROM BLOCKING THINGS BEFORE THEY REACH YOUR SYSTEM- information attained from…http://www.us-cert.gov/cas/tips/ST04-004.html

  8. SPYWARE SPYWARE IS A SOFTWARE THAT WHNE INSTALLED ON YOUR COMPUTER SENDS YOU POP UP ADS,MONITOR THE SITED YOU VISIT AND REDIRECT YOUR BROWSER TO CERTAIN WEBSITES…SOME VERSIONS OF SPYWARE CAN EVN MONITOR EVERY KEYSTROKE TAKEN. SPYWARE ALERT!!!! • ENDLESS POP UP WINDOWS • RANDOM WINDOW ERROR MESSAGES • NEW TOOLBARS APPEAR IN YOUR WEB BROWSER • BEING REDIRECTED TO WEBSITES OTHER THAN WHAT YOU TYPED INTO YOUR WEB BROWSER

  9. WHY PASSWORDS ARE IMPORTANT • PASSWORDS ARE THE KEY TO “LOCKED” INFORMATION. IF A PASSWORD IS WEAK, IT IS EASIER TO FIGURE OUT AND EASIER FOR THE PROTECTED INFROMATION TO BE ATTAINED

  10. A STRONG PASSWORD CONSISTS OF… • A COMBINATION OF UPPER AND LOWER CASE LETTERS • NO PERSONAL INFORMATION • A COMBINATION OF LETTERS, NUMBERS, AND SPECIAL SYMBOLS USE DIFFERENT PASSWORDS FOR DIFFERENT SYSYTEMS!!

  11. IN CONCLUSION…… CYBER SECURITY IS VERY IMPORTANT TO THE LIFE AND EFFICIENCY OF YOUR COMPUTER AND NETWORK

  12. INFORMATION ATTAINED FROM THE FOLLOWING • http://www.us-cert.gov/cas/tips/ST04-002.html • http://search.us-cert.gov/search?q=PASSWORDS&entqr=0&ud=1&sort=date%3AD%3AL%3Ad1&output=xml_no_dtd&oe=UTF-8&ie=UTF-8&client=default_frontend&proxystylesheet=default_frontend&hq=inurl%3Awww.us-cert.gov%2F&site=default_collection • GOOGLE IMAGES

More Related