Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs.

Презентация:



Advertisements
Похожие презентации
The Internet Abramov History of the internet The modern history of the Internet starts in the 1950s and 1960s with the development of computers.
Advertisements

Why the community sites are dangerous?. Friendship on internet We can make lots of friends with the help of the internet, but some of them are sharing.
Safe Using of the Information Space The project is done by Anna Zhuykova, 8A Teacher E.A. Chernyaeva The project is done by Anna Zhuykova, 8A Teacher E.A.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Evaluating Network Security Policies ARCH v
Chalkboard Graphics Add your message here. E = m c².
PLUSES AND MINUSES OF THE INTERNET. I N OUR TIME THE INTERNET SHOWS BY ITSELF ONE OF MAJOR PARTS OF THE WORLD. N OW ABOUT HIM KNOW EVERYTHING LITERALLY.
Take Charge of Your Digital Life. Angelas password didnt protect her.
The advantages of computers the disadvantages of computers the advantages of computers the disadvantages of computers.
COMPUTER Made by Julia Kolchag and Maxim Galtsev Form 10-B.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, Voic Pro in SCN Module Four – Distributed Voic Pro.
Use of templates You are free to use these templates for your personal and business presentations. Do Use these templates for your presentations Display.
TITLE PowerPoint project PowerPoint note pad template.
© 2006 Avaya Inc. All rights reserved. Embedded File Management and SD-Card Handling.
© 2009 Avaya Inc. All rights reserved.1 Chapter Nine, Voic Pro in SCN Module Three – Backup Voic Pro.
The Web The Internet. Level A2 Waystage Level A2 Waystage Listening (p.17) I can understand simple messages delivered at a relatively high speed (on every.
COMPUTERS 1. Computers and computer equipment. screen/monitor CD-ROM drive printer floppy disc mouse mouse pad/mat modem floppy disc drive CD-ROMS keyboard.
DISCUSSION PRESENTATION Prepared and held by 11A, School 5, Monastyrysche 2011.
Payment Card Industry (PCI ) - Data Security Standard (DSS): Introduction and Best Practices Michael Jacobs Development Architect - OpenEdge Session 119.
© 2005 Cisco Systems, Inc. All rights reserved.INTRO v Managing Your Network Environment Managing Cisco Devices.
WINTER Template COLOUR CARD 01 Template. PowerPoint chart object 02.
Транксрипт:

Viruses/Worms Software programs designed to invade your computer, and copy, damage, or delete your data. Trojans Viruses that pretend to be helpful programs while destroying your data, damaging your computer, and stealing your personal information. Spyware Software that tracks your online activities or displays endless ads. Primary Threats to Computer Security

Spam Unwanted , instant messages, and other online communication Phishing sent by online criminals to trick you into going to fake Web sites and revealing personal information Identity Theft A crime where con artists get your personal information and access your cash and/or credit Hoaxes sent by online criminals to trick you into giving them money Primary Threats to Personal Online Safety

Turn on Windows Internet firewall Four Steps to Help Protect Your Computer Use Microsoft Update to keep Windows up-to-date automatically Install and maintain antispyware software Install and maintain antivirus software

Turn on Windows Internet Firewall An Internet firewall helps create a protective barrier between your computer and the Internet

Use Automatic Updates to Keep Software Up-to-date Install all updates as soon as they are available Automatic updates provide the best protection

Install and Maintain Antivirus Software Antivirus software helps to detect and remove computer viruses before they can cause damage. For antivirus software to be effective, you must keep it up-to-date. Dont let it expire

Install and Maintain Antispyware Software Use antispyware software, like Microsoft Windows Defender, so unknown software cannot track your online activity and potentially steal your information.

Other Ways to Help Protect Your Computer Back up your files regularly Think before you click Read Web site privacy statements Close pop-ups using red X