computer security dylan, robert, matanel, jordan
TRANSCRIPT
Computer Security
Dylan, Robert, Matanel, Jordan
Topics Covered• Password Security
• Security softwares
• Consequences of computer insecurity
• Preventing hacks
Password Security • Consequences of weak passwords
• Results of a strong password
• Tips for password security
“Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it
with strangers.”
- Chris Pirillo
Password Security (Cont.)
Weak Password Examples
Strong Password Examples
• john1234• abc123• qwerty• Password• 12345678
• jelly22fi$h• RollTide%.%• .Susan53• $m3llycat• d3ltagamm@
Antivirus Software• Antivirus software definition
• What do viruses do?
• Identification methods
• Data mining: algorithms used to analyze behavior of files
Antivirus Software Types
Antivirus Softwares
Firewall: gatekeeper; keeps
out incoming attacks
Antivirus software: scans viruses, stops
them from being installed
Antispyware software: scans
computer, removes spyware
Antivirus Software Programs
• Examples of programs:
Norton Antivirus
Bitdefender Internet Security
McAfee AntiVirus
Kaspersky Internet Security
Rogers Online Protection
Malware Popularity
80.8%
9.3%
6.4%2.9%
0.6%
Malware Popularity in 2012
TrojanWormVirusAdware / SpywareOthers
Firewall• Security system that controls network traffic
• Works as barrier
• Firewalls built in with operating systems
Firewall Types • Packet filter
• Application gateway
• Circuit level layer
• Proxy server
Consequences of Computer Insecurity
• Info and identity loss / theft
• Tracking a user’s actions
• Data manipulation
Preventing Hacks• Strong password
• Backing up info
• Having firewalls/antivirus softwares
• Never click on suspicious emails
Resources • "Data Mining: What Is Data Mining?" Data Mining: What Is
Data Mining? Web. 22 May 2015 • "What Are Heuristics?" We Live Security RSS 20. 29 Dec.
2010. Web. 22 May 2015. • "How Firewalls Work - HowStuffWorks." HowStuffWorks.
Web. 25 May 2015. • "What Is a Firewall?" Firewall: What It Is and How It Works.
Web. 25 May 2015. • Oak, Manali. "What Are the Effects of Computer Hacking?"
Buzzle. Buzzle.com. Web. 25 May 2015. • "How to Prevent Hacking." WikiHow. Web. 25 May 2015.