Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Computer Security and Risks - Phishing, Viruses, Corporate Espionage PowerPoint Presentation
Download Presentation
Computer Security and Risks - Phishing, Viruses, Corporate Espionage

Computer Security and Risks - Phishing, Viruses, Corporate Espionage

151 Views Download Presentation
Download Presentation

Computer Security and Risks - Phishing, Viruses, Corporate Espionage

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Computer Security and Risks - Phishing, Viruses, Corporate Espionage BY: LIA CARLSON AND CHRISTINA DEL PINO

  2. Why is it Important to Have Computer Security? • People can hack into your computer • Strangers can read your emails • People can look at the information that is on your computer • People can use your computer to attack other systems

  3. Why Would Someone Want to Hack onto Your Computer? • Hackers want to gain control of your computer • Hackers can launch attacks on other computer systems. • Your computer can hide their location of where they’re launching the attack • Hackers gain access to your file

  4. What is Phishing ? • Phishing is the criminally deceptive process of attempting to obtain information such as: • usernames • passwords • credit card details • Phishing is typically carried out by email or instant messaging

  5. This is what a Phishing E-mail Looks Like • Don’t be fooled if it looks like the email is from a co-worker! • Phishing scams rely on placing links in your email from services you trust • Phishing can also be used on: websites and instant messaging

  6. A Virus is a software program capable of reproducing itself • It is capable of causing great harm to files or other programs • Some different kind of viruses are: • File infectors • System or boot record infectors • Macro viruses

  7. Three Main Classifications of Viruses: • File infectors-attach themselves to program files. • System or boot-record infectors- they infect executable codes found in certain system areas on a disk. • Macro-Viruses- most common viruses. Infects Microsoft word and inserts unwanted words.

  8. What is Corporate Espionage? • Individuals/corporations use any means to acquire data • They hope this will give them competitive advantages over competitions. • Companies hire military and government agents to use their spying techniques

  9. What Data are They Collecting? • Customer Information • Patents in progress • Latest research and development • Future plans and markets

  10. Social and Ethical Issues: • Is it right that people’s personal information is accessible? • Is it fair that hackers are stealing other companies secrets and not necessarily being punished?