You're about to create your best presentation ever

Computer Security Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Computer Security

Transcript: Computer Security The action of hacking into telecommunications systems, esp. to obtain free calls. the act of gaining unauthorized access to telecommunication systems. Any barrier that is intended to thwart the spread of a destructive agent. A computer system or network that is designed to block unauthorized access. FIREWALL BACK DOOR APPLICATIONS The identification of a user in an server by using the internet and web sites. MY DEFINITION: MY DEFINITION WEB DEFINITIONS: MY DEFINITION: A way of entering to a system and steal data from the system MY DEFINITION: A back door is a means of access to a computer program that bypasses security mechanisms. Also called a trapdoor. An undocumented way of gaining access to a program MY DEFINITION: Are codes that can affect a compurter system in different ways, in which data can be eliminated or they can use you information in a currupt way. WEB DEFINITIONS: replacement of a single course of stonework by two or more lower courses. Use a computer to gain unauthorized access to data in a system PHREAKING COOKIES WEB DEFINITIONS: It is a system that helps the computer acting like a wall to prevent and get rid off virus before they can attack the computer system An infection or disease caused by such an agent. A piece of code that is capable of corrupting the system or destroying data. HACKING WEB DEFINITIONS MY DEFINITION WEB DEFINITIONS: It is a back door that helps you to enter to a system by traspassing a program. WEB DEFINITIONS A packet of data sent by an Internet server to identify the user or track their access to the server a short line of text that a web site puts on your computer's hard drive when you access the web site. VIRUS

Computer Security

Transcript: Hackers they do this with no profit or sabotage Craker use their talent to infiltrate into the system networks with the objective of stole that information and sell them to bad people Firewall Password word that is use for: determine if the person is really the one that he says that why only the user should konw the password audits Data backup having a data backup is very useful if: you lost your computer you had been attacked by a virus or anything else, but is important to have one Warning tips Enter reliable services Each time you download something make shure you inspect it with an antivirus Make data backup Dont install program from an unknown location Change your passwords frequently Keep informate you about this things it flitrates the information that want to enter to the system if not they recieve a fine and is scorted to the autorities having access to such things could make the difference between failure and success Computer security they are not looking for making damage The company has the right to make a study to thier users to comprobate if them adquired the software legally they feel a sensation very especial while they infiltrate to a network. general terms industries and companies denpend on a computational systems and networks so they consider their information as general assets it determines if the content is allowed to enter or not definition it covers a huge area in computation and information processing with this sources they can calculate the Data integrity and high availability

Now you can make any subject more engaging and memorable