Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading…
Transcript

Tips on creating a Password for your computer.

  • open up user control panel.
  • click on your account name.
  • click create a password.
  • make a password for your computer
  • then press create and you have a new password.

Which Malware is on the rise due to social networking.

  • 57% of users report they have been spammed via social, networking sites, as a rise of 70.6% form last year.
  • 35% revealed they have been sent malware via social networking sites, a rise of 69.9% from last year.

How to Remove a

Trojan.

BIBLIOGRAPHY

www.windows.microsoft.com

www.google.com

www.wikipedia.org

www.transunion.com

www.wikihow.com

1.Disable system restore.

2.Install an anti malware system

3.Reboot to safety mode

4.Uninstall any unfamiliar programs

5.Start a malware scan

How to Remove a

Worm.

How to Remove a Virus.

1. restart your computer.

2.press CLT+ALT+DEL to get to normal screen

3.Go to your browser and download these three things.http://www.avira.com/

http://www.malwarebytes.org/

http://www.superantispyware.com/

4.Install them

5.Run Scan with all these (should finish in 1 to 2 hours).

6.Your computer is fully clean now

  • When you have a virus you should keep your Anti- virus system up to date.
  • When you have a virus you should use a online scanner for your virus.
  • Viruses are often created to take control of your computer and send copies of themselves from your computer to other computers.
  • Sometimes a virus must be removed manually. This is often a technical process and should only be attempted by computer users who have experience on computer viruses.

TYPES OF NETWORK THREATS.

By: Daniella Rizzotto

Trojan

A Trojan horse, or Trojan, in computing is a non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.

Worm

A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Virus

  • A computer viruses is a small software programs that are designed to spread from one computer to another.

Computer viruses are often spread by attachments in email messages or instant messaging messages. Viruses can also be spread by funny pictures and video. Don't open a email unless you no how its from.

Types of Network Threats.

What is Identity Theft?

Identity theft is a form of stealing someones identity. Usually a method of gaining access to their credit card.

How to Prevent Identity theft.

  • step 1:Only carry essential documents with you.
  • step 2:Keep new checks out of the mail
  • step 3:Be careful when giving out personal information over the phone.
  • step 4: Your trash is their treasure
  • step 5: Make sure others are keeping you safe.
  • step6:Create passwords or PIN numbers out of a random mix of letters and numbers
  • Virus
  • Worm
  • Trojan
  • Malware

What is a Firewall?

In computing, a firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set.

THE END

Learn more about creating dynamic, engaging presentations with Prezi