Transcript: Are you interested in a job where your primary purpose will be to ensure the confidentiality, integrity, and availability of systems, networks and data through the planning, analysis, development, implementation, maintenance and enhancement of information systems security programs, policies, procedures, and tools? Then consider joining the Critical Infrastructure Cyber Protection & Awareness, National Cyber Security Division, Office of Cybersecurity and Communications, National Protection and Programs Directorate (NPPD), Department of Homeland Security (DHS). Internships in adminstering networks Team building exercise experience Work well under pressure NOVA/D.C. HQ Education Apply for a 10-week summer internship Massachusetts Institute of Technology (MIT) in Cambridge, MA Advanced Math Advanced Science Advanced Networking Programming background High School Diploma Masters or higher in Computer Science Carnegie Mellon University in Pittsburgh, PA Career Training Location Citizenship You MUST be a citizen Gap Year Top IT Schools University of Texas at Austin
Transcript: Don’t give out your personal information. E.g. Name, address, phone number or school. Phishing is email messages designed to steal your identity. our final stop In order to avoid phishing, do not give out your personal details, such as school, full name, phone number and age. Malware Personal information-where its not needed The email might appear to be from someone in your online address book. Internet filters can keep unwanted emails (spam) out of your email inbox. A Trojan horse is a type of malware that disguises itself as a helpful program but whose real purpose is to grant a hacker access to a computer. By Sophie, Noelle and Tiana Watch out... Obstacle 1 Obstacle 2 Internet filters can warn you about and block you from suspicious websites. They can give out your private information to others. THEY ARE VERY DANGEROUS...... Internet filters are designed to protect children like you from the dangers on the internet. Cyber Security Don't forget the world is watching... Once you have put your info on the internet it will effectively be there forever and ANYONE can track you down. Start A computer worm is a computer program that can spread to other computers. Obstacle 3 It is so easy to give out your information by simply just taking an online survey or signing up for a fun game to play. For example club penguin or moshi monsters. The word ‘Hacker’ means someone who can find the weaknesses in computers, they are very smart when it comes to computers. It is very simple for someone who knows a lot about computers to access anyone’s information and use it to carry out actions you have no idea about. Internet Filters Hackers can easily find your personal information online and steal your identity. Schools can block websites that are not useful or trustworthy. Adware or advertising software is any software package which automatically allows advertisements. These advertisements can be in the form of a pop up. Parents and guardians can block some websites that are inappropriate or don't want children to see. Up we go!!! The email might include a web address that looks familiar but has been changed slightly. e.g. www.micorsoft.com or www. Goggle .com Over we go!!! They try to break into the security of networks, web servers, and email servers. Always tell a responsible adult if you are sent one of these emails to stop it from happening again. Spyware is a type of malware installed on computers that collects information about users without them knowing. Malware Is short for malicious software. Hackers Includes computer viruses, Trojans, worms, unwanted programs etc. Malware can end up being quite costly. Malware is designed to access credit card details and stop computers from running programs. Phishing
Transcript: text symbols On December 23, 2015, regional energy distribution companies in Ukraine suffered a cyber-attack, leaving approximately 225,000 customers without power. Payroll company ADP suffered a breach in May 2016 that disclosed the payroll, tax and benefits information from nearly 640,000 companies, including the US National Bank. On February 4, 2016, a cyber-attack on the central bank of Bangladesh resulted in losses of $81 Million and prevented another $850 Million in transactions from being processed. Make a Presentation on the topics of Cyber Security, Hacking or IT technology. Cyber Security Insert Your Own Content: Zoom Anywhere on the World Map and Add Locations images videos Download this Prezi Presentation Template from : https://prezibase.com 3D Prezi Template with an Animated Video Background
Transcript: World Wide Web Security Spam, online scams and frauds, identity theft and issues related to online purchases are a serious issue in the online world. Navigating the Web while avoiding these threats can be a challenging task. Safety Ethics Who owns digital data (such as music, movies, books photo credit Nasa / Goddard Space Flight Center / Reto Stöckli make the world a better place create strong password do not talk to strangers Is it OK to display personal information about others on the Internet check your security software Should users be protected from false information?" Ethnics
Transcript: DONT'S HARDENED SCCM CLIENT FILE SYSTEM NTFS FIRST BOOT DEVICE PHYSICAL SECURITY HARDWARE ACCESS DISABLE MASS STORAGE DEVICES DONT FORMAT PC WITHOUT APPROPRIATE AUTH DONT SEND STORAGE MEDIA FOR REPAIR DONT USE AUTOPLAY FOR EXTERNAL DRIVES DONT USE INTERNET ON OFFICIAL PC'S OPERATING SYSTEM MISC THANK YOU WHAT AM I SUPPOSED TO DO? THREATS AND VULNERABILITIES TIP OF THE ICEBERG!!! CYBER SECURITY INSTALL ANTIVIRUS AND REGULARLY UPDATE TAKE REGULAR BACKUP USE STRONG PASSWORDS MAINTAIN AIRGAP SECURE ERASE CONFIDENTIAL DATA USE ENCRYPTION TO STORE CLASSIFIED DATA LACK OF AWARENESS UNAUTHORIZED ACCESS VIRURS/WORMS/TROJANS MASS STORAGE DEVICES STORAGE OF CLASSIFIED DATA AIRGAP VOILATION Under the surface DO'S WELCOME SCREEN ACCOUNT LOCKOUT COOKIES BROWSING HISTORY VIRTUAL MEMORY POWER ON PASSWORD LOGIN PASSWORD SCREEN SAVER PASSWORD PASSWORD MANAGEMENT
Transcript: Team Uh-Oh Oreo A computer without virus protection is like a castle without a moat. There are a variety of viruses that can infect a computer. The basic computer virus is a program that self replicates and performs a malicious function. A Trojan is a virus disguised as something benign, but when activated, reveals its true nature. One of the worst types of virus is the logic bomb. Logic bombs are set off when certain conditions are met, time or a specific action, and then procede to do any number of malicious things. A logic bomb is essentially a time delayed virus. While it is impossible to guarantee protection from all computer viruses, it is possible to block a great number of them. It is the opinion of your IT department that the school invest in one of the following virus protection plans. •Search Advisor failed to search every site •Average length of installation duration •Does not really speed up your PC •Parental Control on IM is easily evaded •Large download file •Anti-phishing does not work well with IE 8 •Smart memory management does not work very well and will slow down your computer if you do not reach the recommended specification BitDefender may classify some safe programs as viral, and may either remove them or quarantine what it perceives as a virus threat. No phone number is given to call for support without making you jump through hoops, always referring you back to their knowledgebase to troubleshoot problems before contacting them. Very frustrating. We need Virus Protection! Either of these choices is better than having no protection at all. The costs of implementing a security package is far smaller than the worst case scenario of having to replace computers after an attack. With virus protesction, the liklihood of such attacks are diminished. Security is a must! THE END! Eric Daniel Denver Governor Jared Jackson Why Have Virus Protection? Pros hi Cons BitDefender Pros Panda Antivirus Simple installation User friendly Strong malware detection test results Good disinfection and cleanup Panda Antivirus is an effective defender, though it's one of the slower antivirus products we tested. A pricier option at $49.95 Support cost extra Some odd interface quirks Slow scanner speed Easy to use Affordable Easy installation Backup options Advanced data security tools Parental control Laptop mode and Game mode Easy to use firewall Effective spam control Configurable UI Comes with performance monitor Smart memory and CPU management Good product support Bottom Line Cons
Transcript: kid-friendly search engines: they are ran by computer or software or people. most of the time,people work better than computers or software Cookies: they arent things you eat. They are a memory card that shows you that you have a account at the website that you are at. firewalls: firewalls prevent access to our computer ar your account. by jake norris b7 4-25-11 top 10 things you can do with your computer: 1. use trustworthy security software, 2.set your computer to automatically, send you alertes and updates 3.use passwords, 4.check the website before using downloading the information., 5.don't use easy to guess passwords, 6.only buy stuff from trustworthy sites, 7.dont share passwords with anyone, 8.don't click on pop-ups or SPAM, 9.when some thing looks to good to be true, it isn't true, 10.And finally,use credit cards. 2. .3 .3 (no pic for#5) .4 malware: this type o program will hurt your computer. Things you can can happen to your computer: 1.brake your computer forever 2.take control of your computer 3.stea.l information about you 4.any info can be destroyed 5.downloads may have viruses. Cyber sercurity 1. SPAM: SPAM is junk mail.
Transcript: lets enjoy the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages. END Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. Identity theft the co-option of another person's personal information (e.g., name, Social Security number, credit card number, passport) without that person's filter dm bookmark In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames. Phishing Peer-to-peer involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others. -Bill Belsey". remove by passing through a filter; "filter out the impurities" Cyber security measures taken to protect computers and computer networks from accidental or malicious harm. "Cyber Security." Wikipedia. Wikipedia, 16 Sept. 2010. Web. 21 Sept. 2010. <en.wikipedia.org/wiki/Cyber_security>. A virus (from the Latin virus meaning toxin or poison) is a small infectious agent that can replicate only inside the cells of other organisms. Firewall Spamming computer software that obtains information from a user's computer without the user's knowledge or consent. Viruses Cyberbullying Cyberstalking a marker (a piece of paper or ribbon) placed between the pages of a book to mark the reader's place. Malicious code practice of distributing or providing access to digitally stored information, such as computer program. File sharing the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. Spyware computing or networking is a distributed application. (colloquial) the application of maximum thrust; "he moved the throttle to the firewall"
Description: Catch the eye and engage the imagination with this cool-looking Prezi proposal template. The bold, bright design and highly dynamic theme all but guarantee success for your next sales or marketing proposal. All Prezi presentation templates are easily customized.
Description: The sky’s the limit. Boost your new sales initiative into orbit with an engaging and compelling SKO presentation. This template features a effective sales kickoff theme that makes it easy to be engaging. Like all Prezi SKO templates, it’s fully customizable with your own information.
Description: Storytelling is at the heart of great service. Use this stunning, customizable business presentation template to highlight employees who do exceptional work or position your customers as the heroes of your business.
Now you can make any subject more engaging and memorable