Download Victims who were Hacked PowerPoint Presentation

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer virus wikipedia , lookup

Unix security wikipedia , lookup

Mobile security wikipedia , lookup

Information security wikipedia , lookup

Trusted Computing wikipedia , lookup

Information privacy law wikipedia , lookup

Security-focused operating system wikipedia , lookup

Medical privacy wikipedia , lookup

Malware wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Antivirus software wikipedia , lookup

Cyberattack wikipedia , lookup

Computer security wikipedia , lookup

Social engineering (security) wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Cybercrime wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Privacy and Security Issues
Privacy and Security Issues related to
Information and Communication
Technology
Identity Theft
 stealing info from a person that allows you to
access anything in their name
Protection of Credit Card
Information
 protect the six-digit issuer identifier,
account number, cardholder name,
card verification value code (CVV) and
your pin number
 Your personal cookies may
get leaked out onto a
website and leave your
personal information out
there if you don’t delete
them often
Relation to ICT
 computer skills needed to access any info
through a computer
Why is privacy and
security important?
Victims who were Hacked
Victims who knew
Victims who didn't
know
About 90% of victims did not
know they were being hacked.
Cyber-bullying
What are some ways to be
protected?
Firewall
Complicated passwords
And more!
Antivirus-softwares
What are some ways to be
protected? (continuation)
 Pop-up blockers
 Back-up files
 Risk of losing important files
 Used for selfish or inappropriate
reasons, such as identity theft, etc.
Introduction to
Computer Viruses
Yearly Comparison
of Computer Viruses
Trojan Horse
•
•
•
•
Some of the uses or purposes of a Trojan can be:
Electronic money theft
Viewing users screen
Crashing computer
Control computer remotely
REMEMBER - a Trojan horse is software that pretends
to be a legitimate program in order to gain your trust.
Antivirus
What Is An Anti-Virus Software?
A software designed to be used on your
computer to find, treat, remove and keep
malwares away. It will keep all your
computer data safe!
What Anti-Virus Softwares Are Available
For Businesses
There are many anti-virus soft wares out there tailored to
businesses.
Such as:
-AVG (Business Edition)
-Bitdefender
-McaAfee
-Avira (Professional Security)
(Endpoint Security)
(Small Business Security Suite)
(Business Security Suite)
-And many more...
Files and data are protected so
no hackers can them. While
your working you won’t get
any threats or web viruses.
When you have to send an
email to one your of
employees, you won’t have
trouble sending them.
They install it because they
have less distractions and
less weight on their
shoulders. With having less
threats and hackers they
have more time to get their
work done. They are stress
free and are protected 24/7.