SlideShare ist ein Scribd-Unternehmen logo
1 von 16
   A virus is a parasitic program written intentionally to alter
    the way your computer operates without your permission or
    knowledge.
   Trojan horses are programs that appear to
    serve some useful purpose or provide
    entertainment, which encourages you to run
    them.
   Worms are programs that replicate and
    spread, often opening a back door to allow
    hackers to gain access to the computers that
    they infect.
   A Zombie is a dormant program that lies
    inactive on a computer. It can be activated
    remotely to aid a collective attack on another
    computer.
   A Phishing attack is when you are sent an
    email that asks you to click on a link and re-
    enter your bank or credit card details.
   These sites are often made to look like well
    known web sites and can have similar web
    addresses to the sites they are imitating.
    Users who visit these sites often
    inadvertently download and run a virus or
    Trojan and can then become infected or the
    subject of hacker attacks.
   Spyware, Adware and Advertising Trojans are
    often installed with other programs, usually
    without your knowledge. They record your
    behaviour on the Internet, display targeted
    ads to you and can even download other
    malicious software on to your computer.
   Virus hoaxes are messages, usually sent by
    email, that amount to little more than chain
    letters.
   If a wireless access point, e.g. an ADSL
    (Broadband) Router, hasn't been secured
    then anyone with a wireless device (laptop,
    PDA, etc) will be able to connect to it and
    thereby access the Internet and all the other
    computers on the wireless network.
   The act of stealing personal data, specifically
    calendar and contact information, from a
    Bluetooth enabled device.
   Tricking computer users into revealing
    computer security or private information, e.g.
    passwords, email addresses, etc, by
    exploiting the natural tendency of a person to
    trust and/or by exploiting a person's
    emotional response.
Danny D. J. Magdaraog

Weitere ähnliche Inhalte

Was ist angesagt?

Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Termsmikel_l
 
Surf smart
Surf smartSurf smart
Surf smart-
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hackingmissstevenson01
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notesLinda Barron
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenKlaus Drosch
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spywaremissstevenson01
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwaresKriti kohli
 

Was ist angesagt? (20)

Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Internet Safety Glossary of Terms
Internet Safety Glossary of TermsInternet Safety Glossary of Terms
Internet Safety Glossary of Terms
 
Surf smart
Surf smartSurf smart
Surf smart
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet threat
Internet threatInternet threat
Internet threat
 
Β. Hucking
Β. Hucking Β. Hucking
Β. Hucking
 
Ethical hacking introduction to ethical hacking
Ethical hacking   introduction to ethical hackingEthical hacking   introduction to ethical hacking
Ethical hacking introduction to ethical hacking
 
Malware part 1
Malware part 1Malware part 1
Malware part 1
 
Netiquette
NetiquetteNetiquette
Netiquette
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Firewall
FirewallFirewall
Firewall
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Internet safety v 4 slides and notes
Internet safety v 4  slides and notesInternet safety v 4  slides and notes
Internet safety v 4 slides and notes
 
What is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolenWhat is a Hacker (part 2): How data is stolen
What is a Hacker (part 2): How data is stolen
 
Online safety and security
Online safety and securityOnline safety and security
Online safety and security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Hacking
HackingHacking
Hacking
 
Cyber safety 101
Cyber safety 101Cyber safety 101
Cyber safety 101
 

Ähnlich wie Computer Security

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethicsJohnlery Guzman
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxMelanie Nava
 
information security common major attacks
information security common major attacksinformation security common major attacks
information security common major attacks3aw307
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp CisRobC76
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptSukhdev48
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptlowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptlowlesh1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 

Ähnlich wie Computer Security (20)

Online safety, security, and ethics
Online safety, security, and ethicsOnline safety, security, and ethics
Online safety, security, and ethics
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
KINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptxKINDS OF ONLINE THREATS.pptx
KINDS OF ONLINE THREATS.pptx
 
Security threats
Security threatsSecurity threats
Security threats
 
information security common major attacks
information security common major attacksinformation security common major attacks
information security common major attacks
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Security Pp Cis
Security Pp CisSecurity Pp Cis
Security Pp Cis
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

Mehr von Danz Magdaraog

AP III - Ang mga Kabihasnan sa Amerika
AP III - Ang mga Kabihasnan sa AmerikaAP III - Ang mga Kabihasnan sa Amerika
AP III - Ang mga Kabihasnan sa AmerikaDanz Magdaraog
 
AP III - Ang Kabihasnang Greek
AP III - Ang Kabihasnang GreekAP III - Ang Kabihasnang Greek
AP III - Ang Kabihasnang GreekDanz Magdaraog
 
AP III - Ang Kabihasnang Mesopotamia sa Asya
AP III - Ang Kabihasnang Mesopotamia sa AsyaAP III - Ang Kabihasnang Mesopotamia sa Asya
AP III - Ang Kabihasnang Mesopotamia sa AsyaDanz Magdaraog
 
Ap III - Ang Katangiang pisikal ng Daigdig
Ap III - Ang Katangiang pisikal ng DaigdigAp III - Ang Katangiang pisikal ng Daigdig
Ap III - Ang Katangiang pisikal ng DaigdigDanz Magdaraog
 
AP III - Ang Imperyong Byzantine
AP III - Ang Imperyong ByzantineAP III - Ang Imperyong Byzantine
AP III - Ang Imperyong ByzantineDanz Magdaraog
 
AP III - Kabihasnang Minoan at Mycenaean
AP III - Kabihasnang Minoan at MycenaeanAP III - Kabihasnang Minoan at Mycenaean
AP III - Kabihasnang Minoan at MycenaeanDanz Magdaraog
 
AP 7 - Ang Sinaunang Paniniwala at Buhay Pamilya
AP 7 - Ang Sinaunang Paniniwala at Buhay PamilyaAP 7 - Ang Sinaunang Paniniwala at Buhay Pamilya
AP 7 - Ang Sinaunang Paniniwala at Buhay PamilyaDanz Magdaraog
 
AP 7 - Sinaunang Pilipino Ayon sa mga Primaryang Sanggunian
AP 7 - Sinaunang Pilipino Ayon sa mga Primaryang SanggunianAP 7 - Sinaunang Pilipino Ayon sa mga Primaryang Sanggunian
AP 7 - Sinaunang Pilipino Ayon sa mga Primaryang SanggunianDanz Magdaraog
 
AP III - Paglitaw ng mga Unang Tao
AP III - Paglitaw ng mga Unang TaoAP III - Paglitaw ng mga Unang Tao
AP III - Paglitaw ng mga Unang TaoDanz Magdaraog
 
History of Computer Technology
History of Computer TechnologyHistory of Computer Technology
History of Computer TechnologyDanz Magdaraog
 
Mga Panahong Paleolitiko at Neolitiko
Mga Panahong Paleolitiko at NeolitikoMga Panahong Paleolitiko at Neolitiko
Mga Panahong Paleolitiko at NeolitikoDanz Magdaraog
 
Ang Kabihasnang Egyptian
Ang Kabihasnang EgyptianAng Kabihasnang Egyptian
Ang Kabihasnang EgyptianDanz Magdaraog
 

Mehr von Danz Magdaraog (12)

AP III - Ang mga Kabihasnan sa Amerika
AP III - Ang mga Kabihasnan sa AmerikaAP III - Ang mga Kabihasnan sa Amerika
AP III - Ang mga Kabihasnan sa Amerika
 
AP III - Ang Kabihasnang Greek
AP III - Ang Kabihasnang GreekAP III - Ang Kabihasnang Greek
AP III - Ang Kabihasnang Greek
 
AP III - Ang Kabihasnang Mesopotamia sa Asya
AP III - Ang Kabihasnang Mesopotamia sa AsyaAP III - Ang Kabihasnang Mesopotamia sa Asya
AP III - Ang Kabihasnang Mesopotamia sa Asya
 
Ap III - Ang Katangiang pisikal ng Daigdig
Ap III - Ang Katangiang pisikal ng DaigdigAp III - Ang Katangiang pisikal ng Daigdig
Ap III - Ang Katangiang pisikal ng Daigdig
 
AP III - Ang Imperyong Byzantine
AP III - Ang Imperyong ByzantineAP III - Ang Imperyong Byzantine
AP III - Ang Imperyong Byzantine
 
AP III - Kabihasnang Minoan at Mycenaean
AP III - Kabihasnang Minoan at MycenaeanAP III - Kabihasnang Minoan at Mycenaean
AP III - Kabihasnang Minoan at Mycenaean
 
AP 7 - Ang Sinaunang Paniniwala at Buhay Pamilya
AP 7 - Ang Sinaunang Paniniwala at Buhay PamilyaAP 7 - Ang Sinaunang Paniniwala at Buhay Pamilya
AP 7 - Ang Sinaunang Paniniwala at Buhay Pamilya
 
AP 7 - Sinaunang Pilipino Ayon sa mga Primaryang Sanggunian
AP 7 - Sinaunang Pilipino Ayon sa mga Primaryang SanggunianAP 7 - Sinaunang Pilipino Ayon sa mga Primaryang Sanggunian
AP 7 - Sinaunang Pilipino Ayon sa mga Primaryang Sanggunian
 
AP III - Paglitaw ng mga Unang Tao
AP III - Paglitaw ng mga Unang TaoAP III - Paglitaw ng mga Unang Tao
AP III - Paglitaw ng mga Unang Tao
 
History of Computer Technology
History of Computer TechnologyHistory of Computer Technology
History of Computer Technology
 
Mga Panahong Paleolitiko at Neolitiko
Mga Panahong Paleolitiko at NeolitikoMga Panahong Paleolitiko at Neolitiko
Mga Panahong Paleolitiko at Neolitiko
 
Ang Kabihasnang Egyptian
Ang Kabihasnang EgyptianAng Kabihasnang Egyptian
Ang Kabihasnang Egyptian
 

Kürzlich hochgeladen

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 

Kürzlich hochgeladen (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Computer Security

  • 1.
  • 2.
  • 3.
  • 4.
  • 5. A virus is a parasitic program written intentionally to alter the way your computer operates without your permission or knowledge.
  • 6. Trojan horses are programs that appear to serve some useful purpose or provide entertainment, which encourages you to run them.
  • 7. Worms are programs that replicate and spread, often opening a back door to allow hackers to gain access to the computers that they infect.
  • 8. A Zombie is a dormant program that lies inactive on a computer. It can be activated remotely to aid a collective attack on another computer.
  • 9. A Phishing attack is when you are sent an email that asks you to click on a link and re- enter your bank or credit card details.
  • 10. These sites are often made to look like well known web sites and can have similar web addresses to the sites they are imitating. Users who visit these sites often inadvertently download and run a virus or Trojan and can then become infected or the subject of hacker attacks.
  • 11. Spyware, Adware and Advertising Trojans are often installed with other programs, usually without your knowledge. They record your behaviour on the Internet, display targeted ads to you and can even download other malicious software on to your computer.
  • 12. Virus hoaxes are messages, usually sent by email, that amount to little more than chain letters.
  • 13. If a wireless access point, e.g. an ADSL (Broadband) Router, hasn't been secured then anyone with a wireless device (laptop, PDA, etc) will be able to connect to it and thereby access the Internet and all the other computers on the wireless network.
  • 14. The act of stealing personal data, specifically calendar and contact information, from a Bluetooth enabled device.
  • 15. Tricking computer users into revealing computer security or private information, e.g. passwords, email addresses, etc, by exploiting the natural tendency of a person to trust and/or by exploiting a person's emotional response.
  • 16. Danny D. J. Magdaraog