SlideShare ist ein Scribd-Unternehmen logo
1 von 7
LOGO




       Detect, Protect, Dis-
              infect

           SafeSpaceOnline
 Consumers Online Face Wide Choices in Security
  Products

  With new threats to computer security and data
  integrity a regular feature of the evening news, a
  panoply of products that promise to detect, protect, and
  dis-infect are being marketed to consumers. Intrusion
  detection systems, firewalls and anti-virus software are
  critical to online security, but the Federal Trade
  Commission, the nations consumer protection agency,
  says computer users from grade school kids to
  grandparents need to know exactly why they need
  online security products and what they're buying.
  .
Why the Need
Computers talk to each other over the Internet by
sending data through their communications ports. If a
port is open, it listens for communications from the
Internet. A computer has thousands of ports: which
ones are open depends on the software the computer
is running. Hackers can eavesdrop or scan the ports to
determine which are open and vulnerable to
unauthorized access.
Detection
An intrusion detection system (IDS) monitors incoming
Internet traffic, much like a security camera watches
your front door to see who might be trying to come in.
When the IDS detects a suspicious pattern, it sends an
alert (and creates a record) that an intruder may be
trying to break in to your computer. Some IDS alerts
but not all show a pop-up message on your screen. An
IDS alone cannot prevent an unauthorized entry into
your computer; only a firewall can do that.

                     Protection
    Firewalls block hackers access to your computer by
    creating a barrier like a wall between your ports and
    the Internet that allows you to control the data that
    comes and goes through your ports. Your firewall
    protects your ports even if you don't have an IDS.
    Sometimes a firewall is bundled with an IDS. If not,
    and if you want an IDS, be sure its compatible with
    your firewall.
Dis-infection
Anti-virus software detects and deletes viruses that
are in your computer. Viruses often attach
themselves to your computer through email
attachments and floppy disks. That means a firewall
cant catch them. Similarly, an IDS wont alert you
when a virus is attacking your computer. Look for
anti-virus software that recognizes current viruses,
as well as older ones; that can effectively reverse
the damage; and that updates automatically.
 By: Robert Rogers
LOGO




       Read more at SafeSpaceOnline.com

Weitere ähnliche Inhalte

Andere mochten auch

Universidad UGMEX
Universidad UGMEXUniversidad UGMEX
Universidad UGMEXesdeguau27
 
FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
 FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES. FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.popeyo
 
RHF Achievements
RHF AchievementsRHF Achievements
RHF AchievementsArt Carr
 
Foro y tipos de foros
Foro y tipos de forosForo y tipos de foros
Foro y tipos de forosleidymtzugmex
 
Quick Introduction to OpenStack Neutron and SDN feat. MidoNet
Quick Introduction to OpenStack Neutron and SDN feat. MidoNetQuick Introduction to OpenStack Neutron and SDN feat. MidoNet
Quick Introduction to OpenStack Neutron and SDN feat. MidoNetSandro Mathys
 

Andere mochten auch (7)

How to give a presentation
How to give a presentationHow to give a presentation
How to give a presentation
 
Universidad UGMEX
Universidad UGMEXUniversidad UGMEX
Universidad UGMEX
 
FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
 FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES. FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
FOROS VIRTUALES COMO ESTRATEGIA DE APRENDIZAJE EN UNIVERSIDADES.
 
SCPI Notapierre acquisition en VEFA
SCPI Notapierre acquisition en VEFASCPI Notapierre acquisition en VEFA
SCPI Notapierre acquisition en VEFA
 
RHF Achievements
RHF AchievementsRHF Achievements
RHF Achievements
 
Foro y tipos de foros
Foro y tipos de forosForo y tipos de foros
Foro y tipos de foros
 
Quick Introduction to OpenStack Neutron and SDN feat. MidoNet
Quick Introduction to OpenStack Neutron and SDN feat. MidoNetQuick Introduction to OpenStack Neutron and SDN feat. MidoNet
Quick Introduction to OpenStack Neutron and SDN feat. MidoNet
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Detect, protect, dis infect

  • 1. LOGO Detect, Protect, Dis- infect SafeSpaceOnline
  • 2.  Consumers Online Face Wide Choices in Security Products With new threats to computer security and data integrity a regular feature of the evening news, a panoply of products that promise to detect, protect, and dis-infect are being marketed to consumers. Intrusion detection systems, firewalls and anti-virus software are critical to online security, but the Federal Trade Commission, the nations consumer protection agency, says computer users from grade school kids to grandparents need to know exactly why they need online security products and what they're buying. .
  • 3. Why the Need Computers talk to each other over the Internet by sending data through their communications ports. If a port is open, it listens for communications from the Internet. A computer has thousands of ports: which ones are open depends on the software the computer is running. Hackers can eavesdrop or scan the ports to determine which are open and vulnerable to unauthorized access.
  • 4. Detection An intrusion detection system (IDS) monitors incoming Internet traffic, much like a security camera watches your front door to see who might be trying to come in. When the IDS detects a suspicious pattern, it sends an alert (and creates a record) that an intruder may be trying to break in to your computer. Some IDS alerts but not all show a pop-up message on your screen. An IDS alone cannot prevent an unauthorized entry into your computer; only a firewall can do that.
  • 5. Protection Firewalls block hackers access to your computer by creating a barrier like a wall between your ports and the Internet that allows you to control the data that comes and goes through your ports. Your firewall protects your ports even if you don't have an IDS. Sometimes a firewall is bundled with an IDS. If not, and if you want an IDS, be sure its compatible with your firewall.
  • 6. Dis-infection Anti-virus software detects and deletes viruses that are in your computer. Viruses often attach themselves to your computer through email attachments and floppy disks. That means a firewall cant catch them. Similarly, an IDS wont alert you when a virus is attacking your computer. Look for anti-virus software that recognizes current viruses, as well as older ones; that can effectively reverse the damage; and that updates automatically. By: Robert Rogers
  • 7. LOGO Read more at SafeSpaceOnline.com