Loading presentation...

Present Remotely

Send the link below via email or IM


Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.


Protecting ICT

No description

nayri bedrossian

on 25 May 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Protecting ICT

Protecting ICT
A hacker is a person who breaks codes and passwords.
a computer program that is designed to copy itself repeatedly. once the computer got the virus it will slow down your device and might cause other problems.
Physical Methods
Log out your acount when your done
use swipe cards to activate locks
make sure no body sees your password while typing
Finger prints
palm prints
facial patters
voice patters
Logical methods
access rights
user IDS and password
Anti- virus and Anti- spyware software
Anti- virus software : this is special software which is used to detect viruses and limit their damage by removing them.
Anti - spyware software : can collect and relay personal information without your knowledge. some can change many information without your consent.
Full transcript