Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

SECURITY

No description
by

maryoOoma maskoOona

on 5 June 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of SECURITY

Introduction SECURITY (information security)
Network threats What is Network threats Two type of network threat - A computer virus Computer Worms Computer Worms Types of worms Email Worms Instant Messaging Worms File-sharing Networks Worms Physical Threat Spoofing Types of spoofing: IP Spoofing URL Spoofing Email spoofing Phishing Phishing techniques: Spear Phishing Phone phishing How to recognize Spoofing Physical Security Best Practices Why to secure physical access? Clean desk policy Best Password Policy Passwords characteristics Passwords problems Password management Types of passwords Two type of network threat - A computer virus Computer Worms network security Anti-Virus Software is used to... -detect
-prevent
-remove How dose the anti-virus work,protect,update? Fire wall what is a firewall? How its work? And what's the best anti-virus software? 1. Norton Updates
Fast
detect the all files 2. AVG 3. Nod 32 Securing Wireless Communication
MAC Filtering:- Media Access Control numbers are allocated by manufacturers to every Wi-Fi radio Encryption Options:- (WEP):
(WPA):
(WPA2): Start The action of making something look like something that it is not in order to gain unauthorized access to a user's private information. Phishing Social engineering Dumpster Diving Spoofing GAME An object, person, or other entity that represents a constant danger to an asset. Attack Danger Threat Risk . Occurs when one website appears as if it is another IP Spoofing URL Spoofing Email spoofing spoofing . A virus that attaches itself to the first part of the hard disk? Macro Virus Boot sector Virus Virus Macro . A computer ________ is a self-replicating malware computer program Virus worms threats spoofing Conclusion (1) (2) (3) (4) (5) (7) (8) (9) (10) (11) (12) (13) (15) - A computer virus (3) Types of virus: 1-Boot sector Virus 2-Macro Virus 3-Rootkit Virus 4-Polymorphic http://abclocal.go.com/wls/video?id=9106724&pid=9106726
Full transcript