computer security dylan, robert, matanel, jordan

13
Computer Security Dylan, Robert, Matanel, Jordan

Upload: lynette-franklin

Post on 23-Dec-2015

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Computer Security Dylan, Robert, Matanel, Jordan

Computer Security

Dylan, Robert, Matanel, Jordan

Page 2: Computer Security Dylan, Robert, Matanel, Jordan

Topics Covered• Password Security

• Security softwares

• Consequences of computer insecurity

• Preventing hacks

Page 3: Computer Security Dylan, Robert, Matanel, Jordan

Password Security • Consequences of weak passwords

• Results of a strong password

• Tips for password security

“Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it

with strangers.”

- Chris Pirillo

Page 4: Computer Security Dylan, Robert, Matanel, Jordan

Password Security (Cont.)

Weak Password Examples

Strong Password Examples

• john1234• abc123• qwerty• Password• 12345678

• jelly22fi$h• RollTide%.%• .Susan53• $m3llycat• d3ltagamm@

Page 5: Computer Security Dylan, Robert, Matanel, Jordan

Antivirus Software• Antivirus software definition

• What do viruses do?

• Identification methods

• Data mining: algorithms used to analyze behavior of files

Page 6: Computer Security Dylan, Robert, Matanel, Jordan

Antivirus Software Types

Antivirus Softwares

Firewall: gatekeeper; keeps

out incoming attacks

Antivirus software: scans viruses, stops

them from being installed

Antispyware software: scans

computer, removes spyware

Page 7: Computer Security Dylan, Robert, Matanel, Jordan

Antivirus Software Programs

• Examples of programs:

Norton Antivirus

Bitdefender Internet Security

McAfee AntiVirus

Kaspersky Internet Security

Rogers Online Protection

Page 8: Computer Security Dylan, Robert, Matanel, Jordan

Malware Popularity

80.8%

9.3%

6.4%2.9%

0.6%

Malware Popularity in 2012

TrojanWormVirusAdware / SpywareOthers

Page 9: Computer Security Dylan, Robert, Matanel, Jordan

Firewall• Security system that controls network traffic

• Works as barrier

• Firewalls built in with operating systems

Page 10: Computer Security Dylan, Robert, Matanel, Jordan

Firewall Types • Packet filter

• Application gateway

• Circuit level layer

• Proxy server

Page 11: Computer Security Dylan, Robert, Matanel, Jordan

Consequences of Computer Insecurity

• Info and identity loss / theft

• Tracking a user’s actions

• Data manipulation

Page 12: Computer Security Dylan, Robert, Matanel, Jordan

Preventing Hacks• Strong password

• Backing up info

• Having firewalls/antivirus softwares

• Never click on suspicious emails

Page 13: Computer Security Dylan, Robert, Matanel, Jordan

Resources • "Data Mining: What Is Data Mining?" Data Mining: What Is

Data Mining? Web. 22 May 2015 • "What Are Heuristics?" We Live Security RSS 20. 29 Dec.

2010. Web. 22 May 2015. • "How Firewalls Work - HowStuffWorks." HowStuffWorks.

Web. 25 May 2015. • "What Is a Firewall?" Firewall: What It Is and How It Works.

Web. 25 May 2015. • Oak, Manali. "What Are the Effects of Computer Hacking?"

Buzzle. Buzzle.com. Web. 25 May 2015. • "How to Prevent Hacking." WikiHow. Web. 25 May 2015.