![Page 1: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/1.jpg)
Computer Security
Dylan, Robert, Matanel, Jordan
![Page 2: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/2.jpg)
Topics Covered• Password Security
• Security softwares
• Consequences of computer insecurity
• Preventing hacks
![Page 3: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/3.jpg)
Password Security • Consequences of weak passwords
• Results of a strong password
• Tips for password security
“Passwords are like underwear; you don’t let people see it, you should change it very often, and you shouldn’t share it
with strangers.”
- Chris Pirillo
![Page 4: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/4.jpg)
Password Security (Cont.)
Weak Password Examples
Strong Password Examples
• john1234• abc123• qwerty• Password• 12345678
• jelly22fi$h• RollTide%.%• .Susan53• $m3llycat• d3ltagamm@
![Page 5: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/5.jpg)
Antivirus Software• Antivirus software definition
• What do viruses do?
• Identification methods
• Data mining: algorithms used to analyze behavior of files
![Page 6: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/6.jpg)
Antivirus Software Types
Antivirus Softwares
Firewall: gatekeeper; keeps
out incoming attacks
Antivirus software: scans viruses, stops
them from being installed
Antispyware software: scans
computer, removes spyware
![Page 7: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/7.jpg)
Antivirus Software Programs
• Examples of programs:
Norton Antivirus
Bitdefender Internet Security
McAfee AntiVirus
Kaspersky Internet Security
Rogers Online Protection
![Page 8: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/8.jpg)
Malware Popularity
80.8%
9.3%
6.4%2.9%
0.6%
Malware Popularity in 2012
TrojanWormVirusAdware / SpywareOthers
![Page 9: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/9.jpg)
Firewall• Security system that controls network traffic
• Works as barrier
• Firewalls built in with operating systems
![Page 10: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/10.jpg)
Firewall Types • Packet filter
• Application gateway
• Circuit level layer
• Proxy server
![Page 11: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/11.jpg)
Consequences of Computer Insecurity
• Info and identity loss / theft
• Tracking a user’s actions
• Data manipulation
![Page 12: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/12.jpg)
Preventing Hacks• Strong password
• Backing up info
• Having firewalls/antivirus softwares
• Never click on suspicious emails
![Page 13: Computer Security Dylan, Robert, Matanel, Jordan](https://reader036.vdocuments.mx/reader036/viewer/2022062421/56649dac5503460f94a9bcd1/html5/thumbnails/13.jpg)
Resources • "Data Mining: What Is Data Mining?" Data Mining: What Is
Data Mining? Web. 22 May 2015 • "What Are Heuristics?" We Live Security RSS 20. 29 Dec.
2010. Web. 22 May 2015. • "How Firewalls Work - HowStuffWorks." HowStuffWorks.
Web. 25 May 2015. • "What Is a Firewall?" Firewall: What It Is and How It Works.
Web. 25 May 2015. • Oak, Manali. "What Are the Effects of Computer Hacking?"
Buzzle. Buzzle.com. Web. 25 May 2015. • "How to Prevent Hacking." WikiHow. Web. 25 May 2015.