cyber security

Download Cyber Security

Post on 23-Jan-2016




0 download

Embed Size (px)


By:Jerusa Miller July 7, 2008. Cyber Security. What Is Cyber Security?. The protection of data and systems in networks that are connected to the Internet. Internet Issues. Viruses Worms Trojan Horses Hackers. What are they all? What do they do?. - PowerPoint PPT Presentation


  • Cyber SecurityBy:Jerusa MillerJuly 7, 2008

  • What Is Cyber Security?The protection of data and systems in networks that are connected to the Internet .

  • Internet IssuesVirusesWormsTrojan HorsesHackers

    What are they all? What do they do?

  • VirusesA small piece of manmade code that is loaded onto your computer without your knowledge and runs without granted accesViruses can replicate itself over and over againRapidly use all your memorySlow down system and/or bring to a haltTransmit itself across networks and bypass security systemsWhat is a VirusWhat do they do

  • WormsA special type of Virus that replicates itself over a computer network and usually performs malicious actions.Use computer memoryUse computer resourcesBring system to a haltPossibly shut the entire system down in other terms crash your computerWhat is a WORM?What does a WORM do?

  • Trojan HorsesA destructive program that masquerades as a benign application that does not replicate itselfA program that claims it rids your computer or viruses but in actuality introduces viruses onto your computerRemote acces tojans Date Sending TrojansDestrcutive TrojansProxy TrojansFTP Trojans Security Software disabler TrojansDenial-of-Service Attck TrojansTypes of TrojansWhat is a Trojan

  • Computer HackersAn individual that gains unauthorized access to computer systems for the purpose of stealing and corrupting data.

  • What Is a PasswordA password is a private series of characters that enables a user to access files, computer, and/or programs.

  • Is your Password Strong?6-12 charactertsUppercase lettersLower Case lettersNumbersSpecial Characters(*%$#)A strong password should consist of,

  • Methods to Prevent Malicious objectsPurchase or download spywareMake sure you are protected by firewareTurn on pop-up blockersBe cautious of what information you submit and who you submit it to.Create strong passwordsBe cautious of the sites and programs that your enterPay attention of ALL warnings directed at you


  • Work Citations,2542,t=cybersecurity&i=40643,00.asp


View more >