You're about to create your best presentation ever

Computer Security Powerpoint Template

Create your presentation by reusing a template from our community or transition your PowerPoint deck into a visually compelling Prezi presentation.

Computer Security

Transcript: Computer Security The action of hacking into telecommunications systems, esp. to obtain free calls. the act of gaining unauthorized access to telecommunication systems. Any barrier that is intended to thwart the spread of a destructive agent. A computer system or network that is designed to block unauthorized access. FIREWALL BACK DOOR APPLICATIONS The identification of a user in an server by using the internet and web sites. MY DEFINITION: MY DEFINITION WEB DEFINITIONS: MY DEFINITION: A way of entering to a system and steal data from the system MY DEFINITION: A back door is a means of access to a computer program that bypasses security mechanisms. Also called a trapdoor. An undocumented way of gaining access to a program MY DEFINITION: Are codes that can affect a compurter system in different ways, in which data can be eliminated or they can use you information in a currupt way. WEB DEFINITIONS: replacement of a single course of stonework by two or more lower courses. Use a computer to gain unauthorized access to data in a system PHREAKING COOKIES WEB DEFINITIONS: It is a system that helps the computer acting like a wall to prevent and get rid off virus before they can attack the computer system An infection or disease caused by such an agent. A piece of code that is capable of corrupting the system or destroying data. HACKING WEB DEFINITIONS MY DEFINITION WEB DEFINITIONS: It is a back door that helps you to enter to a system by traspassing a program. WEB DEFINITIONS A packet of data sent by an Internet server to identify the user or track their access to the server a short line of text that a web site puts on your computer's hard drive when you access the web site. VIRUS

Computer Security

Transcript: Hackers they do this with no profit or sabotage Craker use their talent to infiltrate into the system networks with the objective of stole that information and sell them to bad people Firewall Password word that is use for: determine if the person is really the one that he says that why only the user should konw the password audits Data backup having a data backup is very useful if: you lost your computer you had been attacked by a virus or anything else, but is important to have one Warning tips Enter reliable services Each time you download something make shure you inspect it with an antivirus Make data backup Dont install program from an unknown location Change your passwords frequently Keep informate you about this things it flitrates the information that want to enter to the system if not they recieve a fine and is scorted to the autorities having access to such things could make the difference between failure and success Computer security they are not looking for making damage The company has the right to make a study to thier users to comprobate if them adquired the software legally they feel a sensation very especial while they infiltrate to a network. general terms industries and companies denpend on a computational systems and networks so they consider their information as general assets it determines if the content is allowed to enter or not definition it covers a huge area in computation and information processing with this sources they can calculate the Data integrity and high availability

Computer Security

Transcript: Computer Protection! By Mitchell Ungar Everything you do you on your computer maybe at harm, either from computer hackers, or just from anyone that might happen to find out a password. One of the most basic Questions What is Computer Security? Computer security is simple NOT ALLOWING UNAUTHORIZED USE OF YOUR COMPUTER!!! It's very simple on how to protect your computer from hackers. Create Passwords that only YOU will know. Don't tell OTHERS these passwords. Never save a password on your computer. Remember to ALWAYS log out before you leave a computer unattended. WIRELESS INTERNET Problems with Wireless Internet Everyone is going on wireless networks now. It is easy to set up, and too use, as long as you have a wireless card, or signal. The problem with wireless is that people forget to put PASSWORDS on these routers, making it easier for hackers to go into your computer, and steal information, or even your identity. What is Identity theft? Identity theft is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. Hackers are always finding ways to get on your computer. Hackers can steal everything from you. Money. Friends. Identity. They pretty much steal your WHOLE LIFE! Another video of Identity theft, true story..... Everything you put on the internet everyone can see. What ever you put on the internet stays on there, it is another life , and this is called your "cyber life". Your computer is always at risk, from hackers, friends, enemies, or just random person noticing that you didn't sign out. Someone can always find information about you and cause you trouble. But you know how to do the procautions you can do. Make GOOD Passwords Don't tell others about your password Log off anything that you are not using Delete your history DO NOT save passwords on your computer. Instant Messaging Facebook www.youtube.ca. http://typesofidentitytheft.com/ . http://www.sans.org/top-cyber-security-risks/ www.wikipedia.ca MySpace References

Now you can make any subject more engaging and memorable