Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Internet Security

No description

Paras Shah

on 25 November 2013

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Internet Security

by Paras Shah

Spam is irrelevant or unwanted messages sent over the Internet, typically to large numbers of users, for the purposes of advertising, phishing or spreading malware etc.
Viruses are a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
A hacker gains unauthorized access to data in a system or computer.

A firewall helps to protect the computer against the risk of infiltration.

You can receive hoaxes and they are usually suspicious and tryto be as persuasive as possible e.g. 'FOWARD THIS EMAIL OTHERWISE YOU WILL DIE TONIGHT'

All of these are to scare you and these hoaxes can be sent through chain mail, a virus in the computer, false alarms etc.
As a measure of protection, whatever your device, security is a key of protecting you and your information.
You can use anti spam software which is downloaded onto your computer to prevent these unwanted messages, being received.
These malicious programs are designed to spreads from machine to machine to cause malfunctions to the the electronic device.
You can use anti-virus and anti-spyware software to protect the computer from the risk of malicious programs but you have to regulary update them as viruses update as well so your computer can be protected.
Theft Identity

Any questions?
Full transcript