Date post: | 29-Jan-2016 |
Category: |
Documents |
Upload: | eunice-moore |
View: | 213 times |
Download: | 0 times |
Cyber SecurityCyber Security
By:Jerusa MillerBy:Jerusa Miller
July 7, 2008July 7, 2008
What Is Cyber Security?What Is Cyber Security?
•The protection of The protection of data and systems in data and systems in networks that are networks that are connected to the connected to the Internet .Internet .
Internet IssuesInternet IssuesVirusesViruses
WormsWorms
Trojan HorsesTrojan Horses
HackersHackers
What are they all?
What do they do?
VirusesViruses
A small piece of A small piece of manmade code manmade code that is loaded that is loaded onto your onto your computer without computer without your knowledge your knowledge and runs without and runs without granted accesgranted acces
Viruses can replicate Viruses can replicate itself over and over itself over and over againagain
Rapidly use all your Rapidly use all your memorymemory
Slow down system Slow down system and/or bring to a haltand/or bring to a halt
Transmit itself across Transmit itself across networks and bypass networks and bypass security systemssecurity systems
What is a Virus What do they do
WormsWorms A special type of A special type of
Virus that Virus that replicates itself replicates itself over a computer over a computer network and network and usually performs usually performs malicious malicious actions.actions.
Use computer Use computer memorymemory
Use computer Use computer resourcesresources
Bring system to a Bring system to a halthalt
Possibly shut the Possibly shut the entire system down entire system down in other terms crash in other terms crash your computeryour computer
What is a WORM? What does a WORM do?
Trojan HorsesTrojan Horses
A destructive A destructive program that program that masquerades as a masquerades as a benign application benign application that does not that does not replicate itselfreplicate itself
A program that A program that claims it rids your claims it rids your computer or viruses computer or viruses but in actuality but in actuality introduces viruses introduces viruses onto your computeronto your computer
Remote acces tojans Remote acces tojans Date Sending TrojansDate Sending Trojans Destrcutive TrojansDestrcutive Trojans Proxy TrojansProxy Trojans FTP TrojansFTP Trojans Security Software Security Software
disabler Trojansdisabler Trojans Denial-of-Service Attck Denial-of-Service Attck
TrojansTrojans
Types of TrojansWhat is a Trojan
Computer HackersComputer Hackers
An individual An individual that gains that gains unauthorized unauthorized access to access to computer computer systems for the systems for the purpose of purpose of stealing and stealing and corrupting data.corrupting data.
What Is a PasswordWhat Is a Password
A password is A password is a private a private series of series of characters that characters that enables a user enables a user to access files, to access files, computer, computer, and/or and/or programs.programs.
Is your Password Strong?Is your Password Strong?
6-12 characterts6-12 characterts Uppercase lettersUppercase letters Lower Case lettersLower Case letters NumbersNumbers Special CharactersSpecial Characters (*%$#)(*%$#)
A strong password should consist of,
Methods to Prevent Malicious objectsPurchase or download spywareMake sure you are protected by firewareTurn on pop-up blockersBe cautious of what information you submit and who you submit it to.
Create strong passwordsBe cautious of the sites and programs that your enterPay attention of ALL warnings directed at you
HAPPY BROWSING!!!!!HAPPY BROWSING!!!!!
Work Citations Work Citations http://www.pcmag.com/encyclopedia_term/0,254http://www.pcmag.com/encyclopedia_term/0,254
2,t=2,t=cybersecurity&icybersecurity&i=40643,00.asp=40643,00.asp
http://www.ssqq.com/information/images/computhttp://www.ssqq.com/information/images/computer%20girl%20gary.jpger%20girl%20gary.jpg
http://www.webopedia.com/TERM/V/virus.htmlhttp://www.webopedia.com/TERM/V/virus.html http://www.webopedia.com/TERM/w/worm.htmlhttp://www.webopedia.com/TERM/w/worm.html http://www.webopedia.com/TERM/T/http://www.webopedia.com/TERM/T/
Trojan_horse.htmlTrojan_horse.html http://instructors.cwrl.utexas.edu/jbrown/files/http://instructors.cwrl.utexas.edu/jbrown/files/
hackers_cartoons.jpghackers_cartoons.jpg http://www.webopedia.com/TERM/h/hacker.htmlhttp://www.webopedia.com/TERM/h/hacker.html http://www.webopedia.com/TERM/p/http://www.webopedia.com/TERM/p/
password.htmlpassword.html