Transcript: Cajasol security... IS YOUR ACCOUNT SECURE?? Phishing are pharmning are YOUR main threat HOW? when you use online banking, use the screen keyboard we offer to prevent keyboard logging Never send personal information via email! SSL technology! Confidenciality VeriSign Firewall Encription HELP PROTECT IT! These are ways in which hackers steal information like credit card numbers and password
Transcript: -6 hour battery life -The reason I like the Razer Blade is because it has lots of ram for gamming and a good battery life for using the internet. -The reason why an engineer would need a pc like this is because it is extremely powerful to run all of their programs. -Battery life, 7-8 hours -Has 64-128-256-512 GBs of SSD. -750 Gbs of SSD Business Student -4th generation Intel i7 processor that is very powerful and helps with graphics and battery Computer powerpoint Conclusion -200 GBs of Skydrive space for one year. -7-8 hours of battery life Price: $1799 -13.3'' Display -Very powerful, 4-8 GBs of ram. -8 GBs of ram Microsoft Surface Pro 2 -128 Gbs of SSD -4 GBs of ram Art Student Microsoft Surface Pro 2 Alienware 17 Price: $899-$1799 -The reason an art student would need this ultrabook is because it is extremely portable and has a good amount of ram to run art programs such as Photoshop along with good battery and decent storage for an art student. Razer Blade Engineer student Samsung series 9 Price: $1800 - Type and Touch cover are magnetic keyboards that attach at the bottom for fast typing. -Has peripherals, one USB 3.0, one microsdhx up to 64 GBs of extra space. -Intel i7 Haswell processor -Comes with 8 GBs of ram, upgradable to 16 My own computer -The reason why for the surface pro 2 is because a business student can get the Microsoft Office suite preloaded on it. -Up to 32 GBs of ram. Price: $1299
Transcript: General term very useful for industries. Firewall Back up Hacker Computer security. It registers all the information which enters a company and it verify it is safe. They do not want to destroy something they only have a special interest in computers. Cracker Encription Programs that help to protect information You must check everything that enters your computer (internet files, disks, usbs,etc). Enter reliavable sites only. Make back ups of programms and documents. Change passowrds constantly. Make sure you understand every message you say "yes" to. Their intention is to enter another one's computer and access to information illegaly Its a copy of everything your information. It prevents you to loose it all in case a virus enters your system The way people can verify a software is legal. If they found something which is not normal they can take that person to the authorities Recommendations: It allows to salve documents or information with a safety word so information can only be access if you know the password A key word to protect information or accounts. In order to access it you have to know the word. Definitions: Auditory Mariana Cabeza A01362206 Password
Transcript: My favorite college football team! Oregon Ducks Javes Lewis Number 2 in the Nation! Number 1 in the league! the Ducks made it to the championship! Auburn won by 3 points.:( The championship game was not their best game. :( I still think UO is the best college football team though!
Transcript: Encriptation They are not looking to do something wrong. They just like to introduce into systems and avoid security. In fact they warned companies what the problems in software are. Computer Security Auditorials Every time you transfer a document you must check that is against viruses. Enter to secure sites. Do a copy of your important documents. Never install programs form not secure sites. Change your passwords constantly. Never say yes to messages that appear on screen. Firewall Password They use their knowledge to steal information so they can use it for any kind of purposes, like selling it to people or something entirely different. Support Computer security has become a very important aspect in diary life. Enterprises that have lots of information must protect their facts and be careful with the systems they use. Software companies have the right to realize a type of study to all users about their computer systems to know if the software was given in a legal way or not. Is the key word. It's used to verified if the user that wants to get in the system is that user or not, that's why the user must know the password. Security Tips Checks if the information that wants to get into a server has the permission to do so or not. It allows us to save document with a password so that only the people who know it can access to the documents. Crackers Hackers To avoid that a virus or any person can damage or steal your information it is necessary to do a support of your information. To make a copy of all your information in any kind of saving device. Introduction
Transcript: RECOMMEND Scenario Total=$1,139.96 Total=$1,379.98 Thank You Choice 2 Asus CM6870-US0145 Processior: Intel Core i7-3370 Memory: 32GB Hard Drive: 1TB SATA Price:$999.99 Dell XPS 8700-3751BLK Processor: Intel Core i7-4770 Memory:16GB Hard Drive: 2TB SATA Price: $1,189.99 MONITOR Dell S2340M 23'' LED Monitor Price: $189.99 Computer Powerpoint by: Harpreet and Manjinder Choice 1 We recommend to buy ASUS because it less expensive than Dell .ASUS has 32GB memory and Dell has only 16GB memory. A small business owner wants to upgrade his computer. MONITOR ASUS VS207D-P 19'' LED Monitor Price: $139.99
Transcript: Resident Viruses Direct Action Viruses Overwrite Viruses Boot Virus Macro Virus Directory Virus Polymorphic Virus File Infectors Companion Viruses FAT Virus Worms images of viruses 1.Trust all the software to abide by a security policy but the software is not trustworthy (this is computer insecurity). A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. definition Computer security is a branch of computer technology known as information security as applied to computers and computer networks. There are 4 approaches to security in computing, sometimes a combination of approaches is valid: 2.Trust all the software to abide by a security policy and the software is validated as trustworthy (by tedious branch and path analysis for example). Adware Backdoor Fork Bomb Robots, Bots, Spider and Crawler Web bug Crackers Hijacker Trojans or Trojan Horses Logic Bombs Rootkit Spyware Tricklers Zombie 4.Trust no software but enforce a security policy with trustworthy hardware mechanisms. 3.Trust no software but enforce a security policy with mechanisms that are not trustworthy (again this is computer insecurity). types Jennifer Ashley Gomez Romero Computer security examples
Transcript: The following are some of the measure to protect computer equipment Cover equipment to avoid dust. Dust can damage electronic components Work place is well ventilated. Do not block/cover openings at the back of a system unit or monitor. Computer equipment should be positioned on a stable surface. Avoid plugging and unplugging cables while computer is switched on Use usernames and passwords to log in Baking up data to a secondary storage medium (USB flash disk, CD/DVD Shutting down the computer properly. Avoid eating or drinking next to computer equipment Data Security Protecting software and data from unauthorised tampering or damaga Install an anti-virus program - able to detect and remove viruses Update the anti-virus program regularly Treat all files (especially those with .exe and .vbs extensions) attached to emails with caution Do not open attached files before scanning with update anti-virus software Avoid sharing of files via USB flash disks, CD/DVDs etc. some computer users may unknowingly transmit virues via disks. Make regurlar back up copies of all data files present in your computer. There are 2 main categories of computer security: Physical and Data Security Computer Viruses Information Security A computer virus is a piece of program designed and written to make additonal copies of itself and spread from one location to another, without user knowlede There are different categories of viruses: some may corrupt data some may destroy data stored in the hard disk Computer Protection This is concerned with protecting hardware from possible human and natural disasters Computing equipment should be locked when not in use. Laptops can be secured to a desk by means of a security cable Physical Security
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Description: Add some color to your quarterly business review with this vibrant business presentation template. The bold visuals in this business template will make your next QBR a memorable one.
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Now you can make any subject more engaging and memorable